Box: CipherCloud Mobile App
The CipherCloud mobile app is available for iOS (iPhone and iPad) and Android It requires the Box app to function: CipherCloud on iOS CipherCloud on Android
- Affiliate
- Faculty
- Staff
- Student
- Business Applications
The CipherCloud mobile app is available for iOS (iPhone and iPad) and Android It requires the Box app to function: CipherCloud on iOS CipherCloud on Android
Overview CipherCloud is constantly scanning Box and OneDrive for UCSF PHI in the background. When it discovers UCSF PHI in a file, it encrypts the file and replaces it with a file of the same name and a .ccsecure extension. Once a file has been encrypted, it cannot be searched or previewed. Only the CipherCloud agent can access its contents. Learn more on the Cipher Cloud
Description Box protects data using both access controls and encryption. Access to your UCSF Box account is controlled using your MyAccess userID and password. Access to the files you store on Box is controlled by the permissions you set. By default, access is private to the account holder. All communication with Box from your computer or mobile device is encrypted using SSL. Data is encrypted in storage using 256-bit AES encryption. Other security features include file-level password protection and access notification.
You cannot share CipherCloud-encrypted files with non-UCSF collaborators. If you need to share restricted data with parties outside UCSF, you can use RAE; onboard your external collaborator as a UCSF affiliate; or use UCSF's Secure Email. Research Ana
UCSF Box Deprovisioning ProcessAn email reminder is sent to a Box user and their supervisor to transfer ownership of their files before they separate from UCSF to prevent the loss of access to shared content immediately upon the user’s separation. NOTE: If the person leaving is still a part of UCSF, he or she can transfer folder ownership by following these instructions.
Return to UCSF Voicemail service page
FAQs What is encryption? Encryption is a process in which data is “scrambled” using an encryption key. This makes the data unreadable and inaccessible to unauthorized users. How is DDPE or DEE different from current encryption solutions?
Workflow decisions (read this before sending) In order to best utilize DocuSign, you should document your current workflow and then think through how to transition it to DocuSign most efficiently. Consider, for example, that the routing from sender to signer 1 to signer 2, and so on, is automated with DocuSign but most likely occurs manually in your current process.