{"id":14301,"date":"2025-03-28T13:26:58","date_gmt":"2025-03-28T18:26:58","guid":{"rendered":"https:\/\/uwm.edu\/information-technology\/policies\/uwm-practice-for-vendor-associated-data-breach-notification\/"},"modified":"2026-04-28T16:22:49","modified_gmt":"2026-04-28T21:22:49","slug":"uwm-practice-for-vendor-associated-data-breach-notification","status":"publish","type":"page","link":"https:\/\/uwm.edu\/information-technology\/policies\/uwm-practice-for-vendor-associated-data-breach-notification\/","title":{"rendered":"UWM Practice for Vendor-associated Data Breach Notification"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-summary\">Summary<\/h2>\n\n\n\n<p>If a UWM campus unit receives a data breach notification from its IT service vendor, the affected UWM campus unit must immediately notify UWM\u2019s Chief Information Officer and Chief Information Security Officer. To do so, an email message should be sent to <a href=\"mailto:abuse@uwm.edu\">abuse@uwm.edu<\/a>.<\/p>\n\n\n\n<p>UWM must comply with UW System policy provisions and formal campus procedures on incident response. Moreover, in the event of a verified data breach, UWM must adhere to statutorily-required time limits for sending victim notifications.<\/p>\n\n\n\n<p>UWM campus leaders should regularly share information on this required practice with relevant colleagues in their respective schools, colleges, and divisions.<\/p>\n\n\n\n<p>Authority: Pursuant to Regent Policy Document 25-5 and UW System Presidential Directive, the CIO is currently the Chancellor-appointed Information Security Designee for our campus. As Designee, the CIO has individual responsibility for all the information technology environments used by UWM.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Summary If a UWM campus unit receives a data breach notification from its IT service vendor, the affected UWM campus unit must immediately notify UWM\u2019s Chief Information Officer and Chief Information Security Officer. To do so, an email message should &hellip;<\/p>\n","protected":false},"author":1652,"featured_media":0,"parent":1013,"menu_order":7,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":"","uwm_wg_additional_authors":[]},"class_list":["post-14301","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.5 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Technology Resources<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/uwm.edu\/information-technology\/policies\/uwm-practice-for-vendor-associated-data-breach-notification\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"UWM Practice for Vendor-associated Data Breach Notification\" \/>\n<meta property=\"og:description\" content=\"Summary If a UWM campus unit receives a data breach notification from its IT service vendor, the affected UWM campus unit must immediately notify UWM\u2019s Chief Information Officer and Chief Information Security Officer. To do so, an email message should &hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/uwm.edu\/information-technology\/policies\/uwm-practice-for-vendor-associated-data-breach-notification\/\" \/>\n<meta property=\"og:site_name\" content=\"Technology Resources\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-28T21:22:49+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@UWM_IT\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/policies\\\/uwm-practice-for-vendor-associated-data-breach-notification\\\/\",\"url\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/policies\\\/uwm-practice-for-vendor-associated-data-breach-notification\\\/\",\"name\":\"UWM Practice for Vendor-associated Data Breach Notification - Technology Resources\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/#website\"},\"datePublished\":\"2025-03-28T18:26:58+00:00\",\"dateModified\":\"2026-04-28T21:22:49+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/policies\\\/uwm-practice-for-vendor-associated-data-breach-notification\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/policies\\\/uwm-practice-for-vendor-associated-data-breach-notification\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/policies\\\/uwm-practice-for-vendor-associated-data-breach-notification\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT Policies\",\"item\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/policies\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"UWM Practice for Vendor-associated Data Breach Notification\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/#website\",\"url\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/\",\"name\":\"Technology Resources\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Technology Resources","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/uwm.edu\/information-technology\/policies\/uwm-practice-for-vendor-associated-data-breach-notification\/","og_locale":"en_US","og_type":"article","og_title":"UWM Practice for Vendor-associated Data Breach Notification","og_description":"Summary If a UWM campus unit receives a data breach notification from its IT service vendor, the affected UWM campus unit must immediately notify UWM\u2019s Chief Information Officer and Chief Information Security Officer. To do so, an email message should &hellip;","og_url":"https:\/\/uwm.edu\/information-technology\/policies\/uwm-practice-for-vendor-associated-data-breach-notification\/","og_site_name":"Technology Resources","article_modified_time":"2026-04-28T21:22:49+00:00","twitter_card":"summary_large_image","twitter_site":"@UWM_IT","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/uwm.edu\/information-technology\/policies\/uwm-practice-for-vendor-associated-data-breach-notification\/","url":"https:\/\/uwm.edu\/information-technology\/policies\/uwm-practice-for-vendor-associated-data-breach-notification\/","name":"UWM Practice for Vendor-associated Data Breach Notification - Technology Resources","isPartOf":{"@id":"https:\/\/uwm.edu\/information-technology\/#website"},"datePublished":"2025-03-28T18:26:58+00:00","dateModified":"2026-04-28T21:22:49+00:00","breadcrumb":{"@id":"https:\/\/uwm.edu\/information-technology\/policies\/uwm-practice-for-vendor-associated-data-breach-notification\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/uwm.edu\/information-technology\/policies\/uwm-practice-for-vendor-associated-data-breach-notification\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/uwm.edu\/information-technology\/policies\/uwm-practice-for-vendor-associated-data-breach-notification\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/uwm.edu\/information-technology\/"},{"@type":"ListItem","position":2,"name":"IT Policies","item":"https:\/\/uwm.edu\/information-technology\/policies\/"},{"@type":"ListItem","position":3,"name":"UWM Practice for Vendor-associated Data Breach Notification"}]},{"@type":"WebSite","@id":"https:\/\/uwm.edu\/information-technology\/#website","url":"https:\/\/uwm.edu\/information-technology\/","name":"Technology Resources","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/uwm.edu\/information-technology\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"acf":[],"publishpress_future_action":{"enabled":false,"date":"2026-05-16 12:37:00","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/pages\/14301","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/users\/1652"}],"replies":[{"embeddable":true,"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/comments?post=14301"}],"version-history":[{"count":7,"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/pages\/14301\/revisions"}],"predecessor-version":[{"id":16526,"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/pages\/14301\/revisions\/16526"}],"up":[{"embeddable":true,"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/pages\/1013"}],"wp:attachment":[{"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/media?parent=14301"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}