Topics Map > UW-Madison > Cybersecurity > Monitoring and Mitigation

UW-Madison - IT - Restricted Data Security Management Policy


The policy you are looking for has migrated to the UW–Madison-Policy Library at https://policy.wisc.edu/. The policy library brings all university-wide policies together in one place so you can quickly locate the most accurate, up-to-date version of a policy.

View the Restricted Data Security Management Policy (https://policy.wisc.edu/library/UW-515) in the policy library.

Visit the Policy Library to search for another specific policy by topic or key word(s).



Keywordspolicies definitions policy requirements definition requirement requirements, administrators executives it-security-staff it-staff managers administration information-technology security, cloud-services mobile-devices personally-owned-devices records-management resource-management security cloud cybersecurity devices mobile personal personally records resource, access monitoring retention storage, access-control configuration-and-maintenance monitoring-and-mitigation privacy risk-management access configuration cdm maintenance mitigation monitoring risk rmf restricted-data hipaa-data pci-data restricted-research-data restricted hipaa pci fisma cioDoc ID59318
OwnerTim B.GroupIT Policy
Created2016-01-05 13:00:06Updated2022-08-31 16:05:22
SitesIT Policy
CleanURLhttps://kb.wisc.edu/itpolicy/cio-restricted-data-management-policy
Feedback  0   0