Policies & Guidelines

Guidelines, Policies & Standards

UWM Information Assurance Protocol for Social Security Numbers

Merchant Card (Credit Card) Administration
In order for UWM to accept credit card payments, it is bound by contracts with corresponding payment card companies. ASM Policy: 2.2.23 addresses this issue.

UWM Higher Education Opportunity Act Disclosure

UWM Acceptable Use of University Information Technology Resources

The UWM Chief Information Security Office, acting as a designee for the UWM CIO, offers the following guidance, pursuant to the UW System and UWM Acceptable Use Policy statements:  “Not using any hardware or software which is designed to assess or weaken security strength unless authorized by the institutional CIO or their designee(s).”

When necessary to further the academic goals of UWM or to fulfill assigned job duties, UWM faculty, staff, or students may use hardware or software to assess or to weaken security strength provided both the owners of the IT assets affected and any relevant data custodians have explicitly granted prior approval of such activity.

UWM HIPAA Compliance Web Site

UWM FERPA Guidelines

UWM Policies and Procedures

UW-Milwaukee Information Security Policy

           – IAM Procedure 1 – ePantherID Change Requests

GLBA UWM Information Security Plan

Information Incident Response Procedure (Data Breach Brochure)
(Updated 7/1/15)
Pursuant to Wisconsin Statute section 134.98 and other legislation, rules, and restrictions, UW-Milwaukee has developed a procedure regarding unauthorized disclosures of information.

UW System Policy on Use of University Information Technology Resources