Topics Map > UW-Madison > Cybersecurity > Identity and Access Management
Topics Map > UW-Madison > Cybersecurity > Configuration and Maintenance

UW-Madison - IT - Storage and Encryption Policy


The policy you are looking for has migrated to the UW–Madison-Policy Library at https://policy.wisc.edu/. The policy library brings all university-wide policies together in one place so you can quickly locate the most accurate, up-to-date version of a policy.

View the Storage and Encryption Policy (https://policy.wisc.edu/library/UW-516) in the policy library.

Visit the Policy Library to search for another specific policy by topic or key word(s).



Keywords:
policies definitions policy requirements definition requirement requirements, administrators faculty it-security-staff it-staff managers supervisors administration information-technology security, cloud-services mobile-devices personally-owned-devices records-management security cloud cybersecurity devices mobile personal personally records, access business-use monitoring storage distribution, access-control configuration-and-maintenance access configuration maintenance restricted-data sensitive-data hipaa-data ferpa-data restricted-research-data sensitive-research-data restricted sensitive hipaa ferpa fisma research cio 
Doc ID:
59336
Owned by:
Tim B. in IT Policy
Created:
2016-01-05
Updated:
2022-08-31
Sites:
IT Policy