Topics Map > UW-Madison > Cybersecurity > Monitoring and Mitigation

UW-Madison - IT - Computer Logging Statement

The policy you are looking for has migrated to the UW–Madison-Policy Library at The policy library brings all university-wide policies together in one place so you can quickly locate the most accurate, up-to-date version of a policy.

View the Computer Logging Statement ( in the policy library.

Visit the Policy Library to search for another specific policy by topic or key word(s).

Keywordsdefinitions principles procedures statement definition principle procedure statements, administrators alumni applicants community executives faculty guests it-security-staff it-staff managers parents students supervisors visitors administration information-technology security, cloud-services copyright identity-management mobile-devices network personally-owned-devices security cloud cybersecurity devices identity mobile networking personal personally telecommunications, access business-use collection monitoring distribution, monitoring-and-mitigation privacy risk-management cdm mitigation monitoring risk rmf cioDoc ID59273
OwnerTim B.GroupIT Policy
Created2016-01-01 16:53:35Updated2022-08-31 16:05:22
SitesIT Policy
Feedback  2   3