{"id":1013,"date":"2018-12-04T08:59:31","date_gmt":"2018-12-04T14:59:31","guid":{"rendered":"https:\/\/uwm.edu\/information-technology\/?page_id=1013"},"modified":"2026-04-28T15:54:29","modified_gmt":"2026-04-28T20:54:29","slug":"policies","status":"publish","type":"page","link":"https:\/\/uwm.edu\/information-technology\/policies\/","title":{"rendered":"IT Policies"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-uwm-it-policies\">UWM IT Policies<\/h2>\n\n\n\n<p>UWM maintains policies regarding the use and security of its computer systems, networks and information resources.<\/p>\n\n\n\n<p>All UWM users are required to adhere to these policies (faculty, staff, students, and visitors). These policies protect the University&#8217;s computer systems, networks, data and other information resources:<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Acceptable Use<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.wisconsin.edu\/regents\/policies\/acceptable-use-of-information-technology-resources\/\">Regent Policy: Acceptable Use of Information Technology Resources<\/a><\/li>\n<\/ul>\n\n\n\n<hr class=\"has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Information Security<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">UWM<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/uwm.edu\/information-technology\/policies\/uwm-shared-account-service-account-guidelines\/\">UWM Shared Account &amp; Service Account Guidelines<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/uwm.edu\/information-technology\/policies\/uwm-system-security-guidelines\/\">UWM System Security Guidelines<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/uwm.edu\/information-technology\/policies\/uwm-data-classification-guidelines\/\">UWM Data Classification Guidelines<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/uwm.edu\/information-technology\/policies\/information-security-practice-sensitivity-labels\/\">Information Security Practice: Sensitivity Labels<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/uwm.edu\/information-technology\/policies\/uwm-practice-for-vendor-associated-data-breach-notification\/\">UWM Practice for Vendor-associated Data Breach Notification<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/uwm.edu\/information-technology\/policies\/information-security-practice-protecting-the-privacy-of-users\/\">Information Security Practice: Protecting the Privacy of Users<\/a><\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Universities of Wisconsin<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.wisconsin.edu\/uw-policies\/uw-system-administrative-policies\/information-security-authentication\/\">Information Security: Identity and Access Management Standard<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.wisconsin.edu\/uw-policies\/uw-system-administrative-policies\/information-security-data-classification-and-protection\/\">Information Security: Data Classification<\/a><\/li>\n<\/ul>\n\n\n\n<hr class=\"has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Procurement<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">UWM<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/uwm.edu\/information-technology\/it-procurement\/\">UWM IT Procurement Practice<\/a><\/li>\n<\/ul>\n\n\n\n<hr class=\"has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Technology Standards<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">UWM<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/uwm.edu\/information-technology\/policies\/university-videoconference-technology-standards\/\">Information Technology Practice: UWM Videoconference Technology Standards<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/uwm.edu\/information-technology\/policies\/standard-for-uw-milwaukee-apple-macintosh-computers\/\">Standard for UW-Milwaukee Apple Macintosh Computers<\/a><\/li>\n<\/ul>\n\n\n\n<hr class=\"has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Privacy<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">UWM<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/uwm.edu\/full-privacy-statement\/\">UWM Privacy Statement<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/uwm.edu\/web-privacy-statement\/\">Web Privacy Statement<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>UWM IT Policies UWM maintains policies regarding the use and security of its computer systems, networks and information resources. All UWM users are required to adhere to these policies (faculty, staff, students, and visitors). These policies protect the University&#8217;s computer &hellip;<\/p>\n","protected":false},"author":200,"featured_media":0,"parent":0,"menu_order":45,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":"","uwm_wg_additional_authors":[]},"class_list":["post-1013","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Technology Resources<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/uwm.edu\/information-technology\/policies\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT Policies\" \/>\n<meta property=\"og:description\" content=\"UWM IT Policies UWM maintains policies regarding the use and security of its computer systems, networks and information resources. All UWM users are required to adhere to these policies (faculty, staff, students, and visitors). These policies protect the University&#8217;s computer &hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/uwm.edu\/information-technology\/policies\/\" \/>\n<meta property=\"og:site_name\" content=\"Technology Resources\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-28T20:54:29+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@UWM_IT\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/policies\\\/\",\"url\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/policies\\\/\",\"name\":\"IT Policies - Technology Resources\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/#website\"},\"datePublished\":\"2018-12-04T14:59:31+00:00\",\"dateModified\":\"2026-04-28T20:54:29+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/policies\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/policies\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/policies\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT Policies\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/#website\",\"url\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/\",\"name\":\"Technology Resources\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Technology Resources","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/uwm.edu\/information-technology\/policies\/","og_locale":"en_US","og_type":"article","og_title":"IT Policies","og_description":"UWM IT Policies UWM maintains policies regarding the use and security of its computer systems, networks and information resources. All UWM users are required to adhere to these policies (faculty, staff, students, and visitors). These policies protect the University&#8217;s computer &hellip;","og_url":"https:\/\/uwm.edu\/information-technology\/policies\/","og_site_name":"Technology Resources","article_modified_time":"2026-04-28T20:54:29+00:00","twitter_card":"summary_large_image","twitter_site":"@UWM_IT","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/uwm.edu\/information-technology\/policies\/","url":"https:\/\/uwm.edu\/information-technology\/policies\/","name":"IT Policies - Technology Resources","isPartOf":{"@id":"https:\/\/uwm.edu\/information-technology\/#website"},"datePublished":"2018-12-04T14:59:31+00:00","dateModified":"2026-04-28T20:54:29+00:00","breadcrumb":{"@id":"https:\/\/uwm.edu\/information-technology\/policies\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/uwm.edu\/information-technology\/policies\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/uwm.edu\/information-technology\/policies\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/uwm.edu\/information-technology\/"},{"@type":"ListItem","position":2,"name":"IT Policies"}]},{"@type":"WebSite","@id":"https:\/\/uwm.edu\/information-technology\/#website","url":"https:\/\/uwm.edu\/information-technology\/","name":"Technology Resources","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/uwm.edu\/information-technology\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"acf":[],"publishpress_future_action":{"enabled":false,"date":"2026-05-13 18:41:48","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/pages\/1013","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/users\/200"}],"replies":[{"embeddable":true,"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/comments?post=1013"}],"version-history":[{"count":45,"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/pages\/1013\/revisions"}],"predecessor-version":[{"id":15274,"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/pages\/1013\/revisions\/15274"}],"wp:attachment":[{"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/media?parent=1013"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}