The policy you are looking for has migrated to the UW–Madison-Policy Library at https://policy.wisc.edu/. The policy library brings all university-wide policies together in one place so you can quickly locate the most accurate, up-to-date version of a policy.
View the Vulnerability Scanning Policy (https://policy.wisc.edu/library/UW-518) in the policy library.
Visit the Policy Library to search for another specific policy by topic or key word(s).
Keywords | policies policy procedures requirements statement procedure requirement requirements statements, faculty it-security-staff it-staff information-technology security, mobile-devices network personally-owned-devices security cybersecurity devices mobile networking personal personally telecommunications, collection monitoring, monitoring-and-mitigation privacy risk-management cdm mitigation monitoring risk rmf cio | Doc ID | 59271 |
---|---|---|---|
Owner | Tim B. | Group | IT Policy |
Created | 2016-01-01 15:22:51 | Updated | 2023-03-29 13:32:33 |
Sites | IT Policy | ||
CleanURL | https://kb.wisc.edu/itpolicy/cio-vulnerability-scanning-policy | ||
Feedback | 0 0 Comment Suggest a new document |