Minor changes in pay calculations in Workday

Along with the implementation of Workday, some employees can expect some minor changes to the way pay is calculated. These are primarily based on differences in rounding. More than 99% of employees will experience no change, or the change will not be more than a few cents. For the small number of employees who will see a greater difference, the change is most often due to tax calculations, rounding, and regulatory compliance.

Examples of these changes include:

  • Garnishments: Some employees pay a $3 employer fee with each garnishment deduction. While Human Resource System (HRS) added the fee on top of the deduction, Workday will lower the deduction to accommodate the fee. For example, an employee in HRS with a $200 garnishment deduction would be charged $203. In Workday, this same employee will be charged $200, with $197 going to the garnishment vendor and $3 paying the employer fee.
  • Time submission: Rounding to the quarter hour differs on timesheets.​ Workday rounds at the seven-minute mark: It rounds back at seven minutes or fewer and forward at eight minutes or more.
  • Benefits:
    • Application of supplemental tax rates create variation due to fewer decimal places permitted in Workday.​
    • The premium for State Group Life now rounds similarly to other insurance premiums, resulting in a slight change for a limited number of employees.
    • The Wisconsin Retirement System (WRS) limits for Highly Compensated Employees are applied within the year instead of being refunded at the end of the year.​
  • Multiple Positions: Tax withholding for employees with multiple positions between universities may vary slightly.
  • Minnesota and Massachusetts tax withholding: This varies based on allowable tax rate applications.
  • Foreign National Taxation: Taxes for foreign nationals may vary depending on Workday’s pre-tax deduction settings and treaty calculations, which differ for Resident Aliens in their final pay period.​
    • Workers who are Nonresident Aliens should be prevented from having non-WI tax reporting/withholding in Workday using an Alternate Work Location.

Email UW-Shared Services with questions about these changes or your payslip.

Avoid phishing scams during Workday go-live 

Workday goes live at the Universities of Wisconsin on July 7, 2025. As we begin to use Workday, we must keep in mind that cybercriminals often target organizations that are changing systems. Other universities have seen an increase in phishing emails and scam calls with similar large-scale implementations. You can help keep the UWs’ information secure by watching for and reporting phishing attempts.  

Recognize Phishing Red Flags 

  • Someone pretending to be a colleague: Scammers might send emails or call pretending to be someone you know. They might ask you to change settings for something like where a paycheck goes. 
  • Fake vendor messages: You may get a message from someone claiming to be from a company we work with asking to update banking information.  
  • Password phishing: You may get an email asking that you share your login information.  
  • Bogus Workday notifications: You may see fake emails that look like they’re from Workday, with links you shouldn’t click. The presence of an official logo does not guarantee the authenticity of an email. 
  • Rush tactics: Beware of messages claiming you need to act right away about your paycheck or account, trying to make you hurry and not think things through. 

Examples of Workday Phishing Emails  

Erroneous Login Page

Erroneous login page showing Workday logo and email and password fields.

Phony Service Offerings in Workday

Fake service offering prompting a user to confirm their email address.

Fake Offers of Assistance

Screenshot of phishing email prompting a user to log in to Workday, with a message to act urgently.

How to Spot Real Workday Messages 

Legitimate Workday communications will come from known sources and usually through multiple channels: 

  • Announcements within the Workday system itself 
  • Official university newsletters or emails  

How to Stay Secure During the Transition 

  • Check who’s sending: Look for subtle variations from legitimate UW email domains and addresses.  
    • Emails sent directly from the Workday system will be from wisconsin@myworkday.com  
    • All other UW emails related to Workday or from our support teams will end in wisconsin.edu (UW Administration) or wisc.edu (UW–Madison). These addresses will also include a preceding reference to the support function such as: @uwss.wisconsin.edu; @support.wisconsin.edu; @vc.wisc.edu. To the left of the @, you will see serviceoperations, servicedesk, enterprisedesk, or RAMP. 
  • Be careful with links: Take a good look at Workday-related emails before clicking links or attachments. Before you click, ask yourself, “Does this seem legitimate?” and always be intentional before taking any action. 
  • Use official sources and the right login page: Always log in through the official UW Workday portal instead of following email links. Access Workday by going directly to the Workday icon on your My Apps (Okta) homepage or my.wisc.edu portal for UW–Madison.  
  • Protect your credentials: Remember that your login credentials are yours alone — never share it, even with coworkers or IT staff. Legitimate support staff will never ask for your password. Never enter your credentials into links from unsolicited emails or messages. 
  • Use multifactor authentication: Workday will ask for MFA when you log in. If it doesn’t ask after you enter your password, stop and contact your campus IT help desk. 
  • Watch for random MFA prompts: If you get MFA prompts you didn’t initiate, don’t accept them, and call your campus IT help desk. 
  • Report “phishy” email: If you get a questionable Workday-related email, report it to your organization’s IT or security team immediately. Do not reply or click on links.  

How Workday Protects Our Data 

  • Data encryption: Workday encrypts all customer data and secures information being sent back and forth.  
  • Login security: Workday will use multifactor authentication, and people will only be able to see the information they need for their job. 
  • Secure facilities: Workday’s systems are in secure data centers with multiple security layers, including biometric verification and 24/7 monitoring.  
  • Ongoing security checks: Workday regularly tests for vulnerabilities and has outside experts conduct security assessments. 
  • Multifactor authentication: Our Workday implementation features multifactor authentication via Okta and Duo (UW–Madison) to create a barrier to entry for credential phishers who may try to log into your account.

By using Workday’s security features and following good phishing awareness practices, we can protect the UW’s data during this transition. If something seems off, check with a trusted source. Remember that security is a shared responsibility, and vigilance is key in combating cyber threats.    

Review resources to prepare for Workday training in March

ATP is here to help you get ready for Workday training. Not sure where to start? Watch the Get Ready for Workday Training video to see where to find introductory videos and overviews about what is changing for your role.

You’ll also find a directory of Workday terms and descriptions of training formats.

Explore the basics now and you’ll be ready to start learning how to use Workday to complete your tasks.

Watch for the Workday website to go live in February. It will be your home base for training information and job aids.