Log in to see all content. Some content is hidden to the public.
Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.
184 Results
Send Envelopes in DocuSign
Getting started There are two ways to send an envelope:
Create a Template with DocuSign
Your DocuSign template: what you need to know Creating a template in DocuSign can simplify your communications if you will be sending the same document – or even variations of the same document – repeatedly and with a similar workflow. But creating this simplicity tool and keeping the creation process simple are two different things. The information below is designed to smooth your path to a DocuSign template that meets your business needs.
Authorized Posters to Executive Listservs
- Faculty
- Staff
- Student
- Technical Partner
Bring Your Own Device (BYOD) to UCSF
Introduction to BYOD at UCSF You can use your own smartphone, tablet, laptop or computer to access UCSF systems, but the device needs to comply with UCSF's security policy. This is to ensure that your device, the UCSF network and UCSF sensitive data all remain safe. Get Technology Help The UCSF IT Service Desk is available 24 hours a day, 7 days a week. Contact us:
- Affiliate
- Faculty
- Non-UCSF
- Staff
- Student
- Technical Partner
- Volunteer
- Security
Box: Folder Settings
What you need to know As a folder Owner, you can control how your collaborators view and manage the files in your folder.
- Affiliate
- Faculty
- Staff
- Student
- Business Applications
Microsoft 365: Bookings
DescriptionMicrosoft Bookings is an online and mobile app for teams providing services to customers on an appointment basis.
- Faculty
- Staff
- Email & Collaboration
IT Information Technology Infrastructure Library (ITIL)
- Staff
- Technical Partner
Device Encryption
What is encryption? Why do I need it? Encryption is the process of encoding information so that only authorized persons can read it. It is used to protect confidential and legally protected data. In this case, "legally protected" has real and serious meaning. If an unencrypted laptop, tablet, mobile phone or other device is lost or stolen, and if it contained legally protected information, you or the University might be held liable for damages, you could be sent to prison, or the University could take corrective action against you.
- Affiliate
- Faculty
- Staff
- Student
- Technical Partner
- Volunteer
- Security
Modern Authentication for Thunderbird
- Faculty
- Staff
- Student
- Technical Partner
Box: External Collaborators
What you need to know For UCSF Box users If you want to use UCSF Box with an external collaborator, invite the person to your shared folder. Type the person's email into the text box where you'd usually invite a UCSF collaborator. This sends an email that invites the person to collaborate on your folder. Next, direct the person over to this same page for instructions on how to set up his or her own Box account.
- Affiliate
- Faculty
- Non-UCSF
- Staff
- Student
- Business Applications