  {"id":3818,"date":"2025-03-24T12:38:10","date_gmt":"2025-03-24T17:38:10","guid":{"rendered":"https:\/\/uwm.edu\/officeofresearch\/?page_id=3818"},"modified":"2026-03-19T13:52:44","modified_gmt":"2026-03-19T18:52:44","slug":"data-security","status":"publish","type":"page","link":"https:\/\/uwm.edu\/officeofresearch\/research-integrity\/research-security\/data-security\/","title":{"rendered":"Data Security"},"content":{"rendered":"\n<p><a href=\"https:\/\/uwm.edu\/policy\/library\/research-data-management\/\">51ÁÔÆæ Research Data Management Policy<\/a><\/p>\n\n\n\n<p>51ÁÔÆæ SAAP 14-9 provides a general framework and expectations around research data and its stewardship, retention, accessibility, and security. In addition, this policy provides guidance on matters of research data transfer.<\/p>\n\n\n\n<p><a href=\"https:\/\/uwm.edu\/information-technology\/policies\/uwm-system-security-guidelines\/\">51ÁÔÆæ System Security Guidelines<\/a><\/p>\n\n\n\n<p>Per UW System Data Protections Procedure 1031.B, \u201cAll information shall be kept in a manner consistent with appropriate controls and procedures commensurate with its data classification the protections outlined in UW System Administrative Procedure 1031.B, Information Security: Data Protections.<\/p>\n\n\n\n<p><a href=\"https:\/\/uwm.edu\/information-technology\/cybersecurity\/\">51ÁÔÆæ Cybersecurity Program<\/a><\/p>\n\n\n\n<p>The Information Security Office supports the Chief Information Officer and the campus by leading and managing campus efforts to reduce risk. Strategies include appropriate handling of data, continued diagnostics, and good processes and procedures to manage our intellectual property and other sensitive information.<\/p>\n\n\n\n<p><a href=\"https:\/\/uwm.edu\/hr\/compliance-training\/\">Information Security Awareness<\/a><\/p>\n\n\n\n<p>All 51ÁÔÆæ employees are required by UW System policy to receive Information Security Awareness training.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>51ÁÔÆæ Research Data Management Policy 51ÁÔÆæ SAAP 14-9 provides a general framework and expectations around research data and its stewardship, retention, accessibility, and security. In addition, this policy provides guidance on matters of research data transfer. 51ÁÔÆæ System Security Guidelines &hellip;<\/p>\n","protected":false},"author":1650,"featured_media":0,"parent":1962,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":"","uwm_wg_additional_authors":[]},"class_list":["post-3818","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Office of Research<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/uwm.edu\/officeofresearch\/research-integrity\/research-security\/data-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data Security\" \/>\n<meta property=\"og:description\" content=\"51ÁÔÆæ Research Data Management Policy 51ÁÔÆæ SAAP 14-9 provides a general framework and expectations around research data and its stewardship, retention, accessibility, and security. In addition, this policy provides guidance on matters of research data transfer. 51ÁÔÆæ System Security Guidelines &hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/uwm.edu\/officeofresearch\/research-integrity\/research-security\/data-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Office of Research\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-19T18:52:44+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/officeofresearch\\\/research-integrity\\\/research-security\\\/data-security\\\/\",\"url\":\"https:\\\/\\\/uwm.edu\\\/officeofresearch\\\/research-integrity\\\/research-security\\\/data-security\\\/\",\"name\":\"Data Security - Office of Research\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/officeofresearch\\\/#website\"},\"datePublished\":\"2025-03-24T17:38:10+00:00\",\"dateModified\":\"2026-03-19T18:52:44+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/officeofresearch\\\/research-integrity\\\/research-security\\\/data-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/uwm.edu\\\/officeofresearch\\\/research-integrity\\\/research-security\\\/data-security\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/officeofresearch\\\/research-integrity\\\/research-security\\\/data-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/uwm.edu\\\/officeofresearch\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Research Integrity &amp; Compliance\",\"item\":\"https:\\\/\\\/uwm.edu\\\/officeofresearch\\\/research-integrity\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Research Security\",\"item\":\"https:\\\/\\\/uwm.edu\\\/officeofresearch\\\/research-integrity\\\/research-security\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Data Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/officeofresearch\\\/#website\",\"url\":\"https:\\\/\\\/uwm.edu\\\/officeofresearch\\\/\",\"name\":\"Office of Research\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/officeofresearch\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/uwm.edu\\\/officeofresearch\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/officeofresearch\\\/#organization\",\"name\":\"University of Wisconsin - Milwaukee\",\"url\":\"https:\\\/\\\/uwm.edu\\\/officeofresearch\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/officeofresearch\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/uwm.edu\\\/officeofresearch\\\/wp-content\\\/uploads\\\/sites\\\/577\\\/2020\\\/11\\\/uwm-seo-logo.jpg\",\"contentUrl\":\"https:\\\/\\\/uwm.edu\\\/officeofresearch\\\/wp-content\\\/uploads\\\/sites\\\/577\\\/2020\\\/11\\\/uwm-seo-logo.jpg\",\"width\":225,\"height\":224,\"caption\":\"University of Wisconsin - Milwaukee\"},\"image\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/officeofresearch\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Office of Research","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/uwm.edu\/officeofresearch\/research-integrity\/research-security\/data-security\/","og_locale":"en_US","og_type":"article","og_title":"Data Security","og_description":"51ÁÔÆæ Research Data Management Policy 51ÁÔÆæ SAAP 14-9 provides a general framework and expectations around research data and its stewardship, retention, accessibility, and security. In addition, this policy provides guidance on matters of research data transfer. 51ÁÔÆæ System Security Guidelines &hellip;","og_url":"https:\/\/uwm.edu\/officeofresearch\/research-integrity\/research-security\/data-security\/","og_site_name":"Office of Research","article_modified_time":"2026-03-19T18:52:44+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/uwm.edu\/officeofresearch\/research-integrity\/research-security\/data-security\/","url":"https:\/\/uwm.edu\/officeofresearch\/research-integrity\/research-security\/data-security\/","name":"Data Security - Office of Research","isPartOf":{"@id":"https:\/\/uwm.edu\/officeofresearch\/#website"},"datePublished":"2025-03-24T17:38:10+00:00","dateModified":"2026-03-19T18:52:44+00:00","breadcrumb":{"@id":"https:\/\/uwm.edu\/officeofresearch\/research-integrity\/research-security\/data-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/uwm.edu\/officeofresearch\/research-integrity\/research-security\/data-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/uwm.edu\/officeofresearch\/research-integrity\/research-security\/data-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/uwm.edu\/officeofresearch\/"},{"@type":"ListItem","position":2,"name":"Research Integrity &amp; Compliance","item":"https:\/\/uwm.edu\/officeofresearch\/research-integrity\/"},{"@type":"ListItem","position":3,"name":"Research Security","item":"https:\/\/uwm.edu\/officeofresearch\/research-integrity\/research-security\/"},{"@type":"ListItem","position":4,"name":"Data Security"}]},{"@type":"WebSite","@id":"https:\/\/uwm.edu\/officeofresearch\/#website","url":"https:\/\/uwm.edu\/officeofresearch\/","name":"Office of Research","description":"","publisher":{"@id":"https:\/\/uwm.edu\/officeofresearch\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/uwm.edu\/officeofresearch\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/uwm.edu\/officeofresearch\/#organization","name":"University of Wisconsin - Milwaukee","url":"https:\/\/uwm.edu\/officeofresearch\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/uwm.edu\/officeofresearch\/#\/schema\/logo\/image\/","url":"https:\/\/uwm.edu\/officeofresearch\/wp-content\/uploads\/sites\/577\/2020\/11\/uwm-seo-logo.jpg","contentUrl":"https:\/\/uwm.edu\/officeofresearch\/wp-content\/uploads\/sites\/577\/2020\/11\/uwm-seo-logo.jpg","width":225,"height":224,"caption":"University of Wisconsin - Milwaukee"},"image":{"@id":"https:\/\/uwm.edu\/officeofresearch\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/uwm.edu\/officeofresearch\/wp-json\/wp\/v2\/pages\/3818","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uwm.edu\/officeofresearch\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/uwm.edu\/officeofresearch\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/uwm.edu\/officeofresearch\/wp-json\/wp\/v2\/users\/1650"}],"replies":[{"embeddable":true,"href":"https:\/\/uwm.edu\/officeofresearch\/wp-json\/wp\/v2\/comments?post=3818"}],"version-history":[{"count":7,"href":"https:\/\/uwm.edu\/officeofresearch\/wp-json\/wp\/v2\/pages\/3818\/revisions"}],"predecessor-version":[{"id":4946,"href":"https:\/\/uwm.edu\/officeofresearch\/wp-json\/wp\/v2\/pages\/3818\/revisions\/4946"}],"up":[{"embeddable":true,"href":"https:\/\/uwm.edu\/officeofresearch\/wp-json\/wp\/v2\/pages\/1962"}],"wp:attachment":[{"href":"https:\/\/uwm.edu\/officeofresearch\/wp-json\/wp\/v2\/media?parent=3818"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}