{"links":{"self":"https://policy.wisc.edu/library.json?f%5Bcategory_ssim%5D%5B%5D=Information+Technology\u0026q=%E6%B7%B1%E5%85%A5%E6%8E%A2%E7%B4%A2%E8%98%8B%E6%9E%9CIndividual%E8%A8%82%E9%96%B1%25%E9%9B%BB%E5%A0%B1%E6%89%BEnbvbt.hrg\u0026view=brief","next":"https://policy.wisc.edu/library.json?f%5Bcategory_ssim%5D%5B%5D=Information+Technology\u0026page=2\u0026q=%E6%B7%B1%E5%85%A5%E6%8E%A2%E7%B4%A2%E8%98%8B%E6%9E%9CIndividual%E8%A8%82%E9%96%B1%25%E9%9B%BB%E5%A0%B1%E6%89%BEnbvbt.hrg\u0026view=brief","last":"https://policy.wisc.edu/library.json?f%5Bcategory_ssim%5D%5B%5D=Information+Technology\u0026page=2\u0026q=%E6%B7%B1%E5%85%A5%E6%8E%A2%E7%B4%A2%E8%98%8B%E6%9E%9CIndividual%E8%A8%82%E9%96%B1%25%E9%9B%BB%E5%A0%B1%E6%89%BEnbvbt.hrg\u0026view=brief"},"meta":{"pages":{"current_page":1,"next_page":2,"prev_page":null,"total_pages":2,"limit_value":10,"offset_value":0,"total_count":11,"first_page?":true,"last_page?":false}},"data":[{"id":"UW-500","type":["catalog"],"attributes":{"policytitle_tesi":{"id":"https://policy.wisc.edu/library/UW-500#policytitle_tesi","type":"document_value","attributes":{"value":"Release of Wiscard Data","label":"Policy Title"}},"responsibleoffice_tesi":{"id":"https://policy.wisc.edu/library/UW-500#responsibleoffice_tesi","type":"document_value","attributes":{"value":"Data, Academic Planning \u0026amp; Institutional Research","label":"Responsible Office"}},"policynumberdisplay_ss":{"id":"https://policy.wisc.edu/library/UW-500#policynumberdisplay_ss","type":"document_value","attributes":{"value":"UW-500","label":"Policy Number"}}},"links":{"self":"https://policy.wisc.edu/library/UW-500"}},{"id":"UW-522","type":["catalog"],"attributes":{"policytitle_tesi":{"id":"https://policy.wisc.edu/library/UW-522#policytitle_tesi","type":"document_value","attributes":{"value":"University-Funded Cellular Service","label":"Policy Title"}},"responsibleoffice_tesi":{"id":"https://policy.wisc.edu/library/UW-522#responsibleoffice_tesi","type":"document_value","attributes":{"value":"Division of Information Technology (DoIT)","label":"Responsible Office"}},"policynumberdisplay_ss":{"id":"https://policy.wisc.edu/library/UW-522#policynumberdisplay_ss","type":"document_value","attributes":{"value":"UW-522","label":"Policy Number"}}},"links":{"self":"https://policy.wisc.edu/library/UW-522"}},{"id":"UW-523","type":["catalog"],"attributes":{"policytitle_tesi":{"id":"https://policy.wisc.edu/library/UW-523#policytitle_tesi","type":"document_value","attributes":{"value":"Institutional Data","label":"Policy Title"}},"responsibleoffice_tesi":{"id":"https://policy.wisc.edu/library/UW-523#responsibleoffice_tesi","type":"document_value","attributes":{"value":"Data, Academic Planning \u0026amp; Institutional Research","label":"Responsible Office"}},"policynumberdisplay_ss":{"id":"https://policy.wisc.edu/library/UW-523#policynumberdisplay_ss","type":"document_value","attributes":{"value":"UW-523","label":"Policy Number"}}},"links":{"self":"https://policy.wisc.edu/library/UW-523"}},{"id":"UW-516","type":["catalog"],"attributes":{"policytitle_tesi":{"id":"https://policy.wisc.edu/library/UW-516#policytitle_tesi","type":"document_value","attributes":{"value":"Storage and Encryption","label":"Policy Title"}},"responsibleoffice_tesi":{"id":"https://policy.wisc.edu/library/UW-516#responsibleoffice_tesi","type":"document_value","attributes":{"value":"Division of Information Technology (DoIT)","label":"Responsible Office"}},"policynumberdisplay_ss":{"id":"https://policy.wisc.edu/library/UW-516#policynumberdisplay_ss","type":"document_value","attributes":{"value":"UW-516","label":"Policy Number"}}},"links":{"self":"https://policy.wisc.edu/library/UW-516"}},{"id":"UW-509","type":["catalog"],"attributes":{"policytitle_tesi":{"id":"https://policy.wisc.edu/library/UW-509#policytitle_tesi","type":"document_value","attributes":{"value":"Incident Reporting and Response","label":"Policy Title"}},"responsibleoffice_tesi":{"id":"https://policy.wisc.edu/library/UW-509#responsibleoffice_tesi","type":"document_value","attributes":{"value":"Division of Information Technology (DoIT)","label":"Responsible Office"}},"policynumberdisplay_ss":{"id":"https://policy.wisc.edu/library/UW-509#policynumberdisplay_ss","type":"document_value","attributes":{"value":"UW-509","label":"Policy Number"}}},"links":{"self":"https://policy.wisc.edu/library/UW-509"}},{"id":"UW-505","type":["catalog"],"attributes":{"policytitle_tesi":{"id":"https://policy.wisc.edu/library/UW-505#policytitle_tesi","type":"document_value","attributes":{"value":"Media and Device Disposal and Reuse","label":"Policy Title"}},"responsibleoffice_tesi":{"id":"https://policy.wisc.edu/library/UW-505#responsibleoffice_tesi","type":"document_value","attributes":{"value":"Division of Information Technology (DoIT)","label":"Responsible Office"}},"policynumberdisplay_ss":{"id":"https://policy.wisc.edu/library/UW-505#policynumberdisplay_ss","type":"document_value","attributes":{"value":"UW-505","label":"Policy Number"}}},"links":{"self":"https://policy.wisc.edu/library/UW-505"}},{"id":"UW-1083","type":["catalog"],"attributes":{"policytitle_tesi":{"id":"https://policy.wisc.edu/library/UW-1083#policytitle_tesi","type":"document_value","attributes":{"value":"UW–Madison Employer Recruiting","label":"Policy Title"}},"responsibleoffice_tesi":{"id":"https://policy.wisc.edu/library/UW-1083#responsibleoffice_tesi","type":"document_value","attributes":{"value":"Teaching and Learning","label":"Responsible Office"}},"policynumberdisplay_ss":{"id":"https://policy.wisc.edu/library/UW-1083#policynumberdisplay_ss","type":"document_value","attributes":{"value":"UW-1083","label":"Policy Number"}}},"links":{"self":"https://policy.wisc.edu/library/UW-1083"}},{"id":"UW-503","type":["catalog"],"attributes":{"policytitle_tesi":{"id":"https://policy.wisc.edu/library/UW-503#policytitle_tesi","type":"document_value","attributes":{"value":"Cybersecurity Risk Management","label":"Policy Title"}},"responsibleoffice_tesi":{"id":"https://policy.wisc.edu/library/UW-503#responsibleoffice_tesi","type":"document_value","attributes":{"value":"Division of Information Technology (DoIT)","label":"Responsible Office"}},"policynumberdisplay_ss":{"id":"https://policy.wisc.edu/library/UW-503#policynumberdisplay_ss","type":"document_value","attributes":{"value":"UW-503","label":"Policy Number"}}},"links":{"self":"https://policy.wisc.edu/library/UW-503"}},{"id":"UW-515","type":["catalog"],"attributes":{"policytitle_tesi":{"id":"https://policy.wisc.edu/library/UW-515#policytitle_tesi","type":"document_value","attributes":{"value":"Restricted Data Security Management","label":"Policy Title"}},"responsibleoffice_tesi":{"id":"https://policy.wisc.edu/library/UW-515#responsibleoffice_tesi","type":"document_value","attributes":{"value":"Division of Information Technology (DoIT)","label":"Responsible Office"}},"policynumberdisplay_ss":{"id":"https://policy.wisc.edu/library/UW-515#policynumberdisplay_ss","type":"document_value","attributes":{"value":"UW-515","label":"Policy Number"}}},"links":{"self":"https://policy.wisc.edu/library/UW-515"}},{"id":"UW-1082","type":["catalog"],"attributes":{"policytitle_tesi":{"id":"https://policy.wisc.edu/library/UW-1082#policytitle_tesi","type":"document_value","attributes":{"value":"Student and Alumni Use of Handshake","label":"Policy Title"}},"responsibleoffice_tesi":{"id":"https://policy.wisc.edu/library/UW-1082#responsibleoffice_tesi","type":"document_value","attributes":{"value":"Teaching and Learning","label":"Responsible Office"}},"policynumberdisplay_ss":{"id":"https://policy.wisc.edu/library/UW-1082#policynumberdisplay_ss","type":"document_value","attributes":{"value":"UW-1082","label":"Policy Number"}}},"links":{"self":"https://policy.wisc.edu/library/UW-1082"}}],"included":[{"type":"facet","id":"category_ssim","attributes":{"label":"Topic","items":[{"attributes":{"label":"Academic","value":"Academic","hits":2},"links":{"self":"https://policy.wisc.edu/library.json?f%5Bcategory_ssim%5D%5B%5D=Information+Technology\u0026f%5Bcategory_ssim%5D%5B%5D=Academic\u0026q=%E6%B7%B1%E5%85%A5%E6%8E%A2%E7%B4%A2%E8%98%8B%E6%9E%9CIndividual%E8%A8%82%E9%96%B1%25%E9%9B%BB%E5%A0%B1%E6%89%BEnbvbt.hrg\u0026view=brief"}},{"attributes":{"label":"Academic - General Academic","value":"Academic - General Academic","hits":2},"links":{"self":"https://policy.wisc.edu/library.json?f%5Bcategory_ssim%5D%5B%5D=Information+Technology\u0026f%5Bcategory_ssim%5D%5B%5D=Academic+-+General+Academic\u0026q=%E6%B7%B1%E5%85%A5%E6%8E%A2%E7%B4%A2%E8%98%8B%E6%9E%9CIndividual%E8%A8%82%E9%96%B1%25%E9%9B%BB%E5%A0%B1%E6%89%BEnbvbt.hrg\u0026view=brief"}},{"attributes":{"label":"Information Technology","value":"Information Technology","hits":11},"links":{"remove":"/library.json?q=%E6%B7%B1%E5%85%A5%E6%8E%A2%E7%B4%A2%E8%98%8B%E6%9E%9CIndividual%E8%A8%82%E9%96%B1%25%E9%9B%BB%E5%A0%B1%E6%89%BEnbvbt.hrg\u0026view=brief"}}]},"links":{"self":"https://policy.wisc.edu/library/facet/category_ssim.json?f%5Bcategory_ssim%5D%5B%5D=Information+Technology\u0026q=%E6%B7%B1%E5%85%A5%E6%8E%A2%E7%B4%A2%E8%98%8B%E6%9E%9CIndividual%E8%A8%82%E9%96%B1%25%E9%9B%BB%E5%A0%B1%E6%89%BEnbvbt.hrg\u0026view=brief"}},{"type":"facet","id":"policyscope_ssim","attributes":{"label":"Includes","items":[{"attributes":{"label":"University","value":"University","hits":11},"links":{"self":"https://policy.wisc.edu/library.json?f%5Bcategory_ssim%5D%5B%5D=Information+Technology\u0026f%5Bpolicyscope_ssim%5D%5B%5D=University\u0026q=%E6%B7%B1%E5%85%A5%E6%8E%A2%E7%B4%A2%E8%98%8B%E6%9E%9CIndividual%E8%A8%82%E9%96%B1%25%E9%9B%BB%E5%A0%B1%E6%89%BEnbvbt.hrg\u0026view=brief"}}]},"links":{"self":"https://policy.wisc.edu/library/facet/policyscope_ssim.json?f%5Bcategory_ssim%5D%5B%5D=Information+Technology\u0026q=%E6%B7%B1%E5%85%A5%E6%8E%A2%E7%B4%A2%E8%98%8B%E6%9E%9CIndividual%E8%A8%82%E9%96%B1%25%E9%9B%BB%E5%A0%B1%E6%89%BEnbvbt.hrg\u0026view=brief"}},{"type":"search_field","id":"all fields","attributes":{"label":"All Fields"},"links":{"self":"https://policy.wisc.edu/library.json?f%5Bcategory_ssim%5D%5B%5D=Information+Technology\u0026q=%E6%B7%B1%E5%85%A5%E6%8E%A2%E7%B4%A2%E8%98%8B%E6%9E%9CIndividual%E8%A8%82%E9%96%B1%25%E9%9B%BB%E5%A0%B1%E6%89%BEnbvbt.hrg\u0026search_field=all+fields\u0026view=brief"}},{"type":"search_field","id":"title","attributes":{"label":"Title"},"links":{"self":"https://policy.wisc.edu/library.json?f%5Bcategory_ssim%5D%5B%5D=Information+Technology\u0026q=%E6%B7%B1%E5%85%A5%E6%8E%A2%E7%B4%A2%E8%98%8B%E6%9E%9CIndividual%E8%A8%82%E9%96%B1%25%E9%9B%BB%E5%A0%B1%E6%89%BEnbvbt.hrg\u0026search_field=title\u0026view=brief"}},{"type":"search_field","id":"policy details","attributes":{"label":"Policy Details"},"links":{"self":"https://policy.wisc.edu/library.json?f%5Bcategory_ssim%5D%5B%5D=Information+Technology\u0026q=%E6%B7%B1%E5%85%A5%E6%8E%A2%E7%B4%A2%E8%98%8B%E6%9E%9CIndividual%E8%A8%82%E9%96%B1%25%E9%9B%BB%E5%A0%B1%E6%89%BEnbvbt.hrg\u0026search_field=policy+details\u0026view=brief"}},{"type":"search_field","id":"policy number","attributes":{"label":"Policy Number"},"links":{"self":"https://policy.wisc.edu/library.json?f%5Bcategory_ssim%5D%5B%5D=Information+Technology\u0026q=%E6%B7%B1%E5%85%A5%E6%8E%A2%E7%B4%A2%E8%98%8B%E6%9E%9CIndividual%E8%A8%82%E9%96%B1%25%E9%9B%BB%E5%A0%B1%E6%89%BEnbvbt.hrg\u0026search_field=policy+number\u0026view=brief"}},{"type":"search_field","id":"responsible office","attributes":{"label":"Responsible Office"},"links":{"self":"https://policy.wisc.edu/library.json?f%5Bcategory_ssim%5D%5B%5D=Information+Technology\u0026q=%E6%B7%B1%E5%85%A5%E6%8E%A2%E7%B4%A2%E8%98%8B%E6%9E%9CIndividual%E8%A8%82%E9%96%B1%25%E9%9B%BB%E5%A0%B1%E6%89%BEnbvbt.hrg\u0026search_field=responsible+office\u0026view=brief"}},{"type":"sort","id":"score desc, policytitle_ssi asc","attributes":{"label":"Relevance"},"links":{"self":"https://policy.wisc.edu/library.json?f%5Bcategory_ssim%5D%5B%5D=Information+Technology\u0026q=%E6%B7%B1%E5%85%A5%E6%8E%A2%E7%B4%A2%E8%98%8B%E6%9E%9CIndividual%E8%A8%82%E9%96%B1%25%E9%9B%BB%E5%A0%B1%E6%89%BEnbvbt.hrg\u0026sort=score+desc%2C+policytitle_ssi+asc\u0026view=brief"}},{"type":"sort","id":"policytitle_ssi asc, effectivedate_dtsi desc","attributes":{"label":"Title"},"links":{"self":"https://policy.wisc.edu/library.json?f%5Bcategory_ssim%5D%5B%5D=Information+Technology\u0026q=%E6%B7%B1%E5%85%A5%E6%8E%A2%E7%B4%A2%E8%98%8B%E6%9E%9CIndividual%E8%A8%82%E9%96%B1%25%E9%9B%BB%E5%A0%B1%E6%89%BEnbvbt.hrg\u0026sort=policytitle_ssi+asc%2C+effectivedate_dtsi+desc\u0026view=brief"}},{"type":"sort","id":"policynumber_is asc","attributes":{"label":"Policy number"},"links":{"self":"https://policy.wisc.edu/library.json?f%5Bcategory_ssim%5D%5B%5D=Information+Technology\u0026q=%E6%B7%B1%E5%85%A5%E6%8E%A2%E7%B4%A2%E8%98%8B%E6%9E%9CIndividual%E8%A8%82%E9%96%B1%25%E9%9B%BB%E5%A0%B1%E6%89%BEnbvbt.hrg\u0026sort=policynumber_is+asc\u0026view=brief"}}]}