Topics Map > UW-Madison > Cybersecurity > Monitoring and Mitigation

UW-Madison - IT - Computer Logging Statement


The policy you are looking for has migrated to the UW–Madison-Policy Library at https://policy.wisc.edu/. The policy library brings all university-wide policies together in one place so you can quickly locate the most accurate, up-to-date version of a policy.

View the Computer Logging Statement (https://policy.wisc.edu/library/UW-520) in the policy library.

Visit the Policy Library to search for another specific policy by topic or key word(s).



Keywords:
definitions principles procedures statement definition principle procedure statements, administrators alumni applicants community executives faculty guests it-security-staff it-staff managers parents students supervisors visitors administration information-technology security, cloud-services copyright identity-management mobile-devices network personally-owned-devices security cloud cybersecurity devices identity mobile networking personal personally telecommunications, access business-use collection monitoring distribution, monitoring-and-mitigation privacy risk-management cdm mitigation monitoring risk rmf cio
Doc ID:
59273
Owned by:
Tim B. in IT Policy
Created:
2016-01-01
Updated:
2022-08-31
Sites:
IT Policy