Log in to see all content. Some content is hidden to the public.
Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.
651 Results
- How-To
Using ChromeOS or Chromebooks for UCSF Business
Chromebooks are unique devices that, considering their architecture from both a security and a service standpoint, warrant caution in using them for UCSF business. Chromebooks use local encryption by default (although it is system-level and not full-disk) and are architected against malware. However, there are challenges from a regulatory risk perspective.
Edit DocuSign Email Notifications
To edit your email notifications:
Creating a Signature in DocuSign
When you need to sign a document for the first time, DocuSign will lead you through the process of adopting a signature. You can also access the same signature-adopting interface at any time to edit your signature and initials. You have three options for adopting a signature and initials. All options are equally secure.
- Affiliate
- Faculty
- Staff
- Student
- Business Applications
Decline Signing a DocuSign Document
Follow the instructions below if you want to decline to sign a document that was sent to you via DocuSign.
- Affiliate
- Faculty
- Staff
- Student
- Business Applications
Enable DocuSign Recipient Edits
When I am sending an envelope, how do I make sure that my recipient(s) can edit the document if they need to do so?
- Affiliate
- Faculty
- Staff
- Student
- Business Applications
Send Envelopes in DocuSign
There are two ways to send an envelope:
Share DocuSign Folders
DocuSign allows users to grant the ability to view their DocuSign folders (inbox, sent folder, deleted and any others) to other users.
- Affiliate
- Faculty
- Staff
- Student
- Business Applications
Manage Recipients' Action Levels
Recipient Action Description Action required for routing to move forward?
External Vulnerability Resources
Keeping on top of information security vulnerabilities is an essential component of information security. Attackers exploit existing security vulnerabilities on systems to gain unauthorized access to systems and data.
Web Application Security: OWASP
The Open Web Application Security Project (OWASP) is an open-source application security project. The OWASP community includes corporations, educational organizations and individuals from around the world.