Skip to main content
University of California San Francisco Give to UCSF

UCSF IT Technology

Main navigation

  • Status
    • Security Announcements
  • Services
    • Projects
  • How To
  • News & Events
  • About Us
  • Log In
Open Close Search
Open menu
Give to UCSF

Breadcrumb

  1. Home
  2. Search

    Log in to see all content. Some content is hidden to the public.

    Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.

    Type

    • Event (20)
    • Homepage (1)
    • How-To (623)
    • Landing Page (56)
    • News (134)
    • Other Content (618)
    • Service (162)
    • (-) Standard & Guideline (41)
    • Status (821)

    Service Category

    • Access & Identity (0)
    • Business Applications (0)
    • Desktop Support (0)
    • Education Applications (0)
    • Email & Collaboration (0)
    • Health Systems (0)
    • Hosting & Computing (0)
    • Network & Wireless (0)
    • Phones & Pager (0)
    • Research Services (0)
    • Security (0)
    • Web Services (0)

    41 Results

    • Event
    • Homepage
    • How-To
    • Landing Page
    • News
    • Other Content
    • Service
    • Standard & Guideline
    • Status
    • Access & Identity
    • Business Applications
    • Desktop Support
    • Education Applications
    • Email & Collaboration
    • Health Systems
    • Hosting & Computing
    • Network & Wireless
    • Phones & Pager
    • Research Services
    • Security
    • Web Services

    Standard

    UCSF 650-16 Addendum D - Wireless Networks

    The use of wireless networking provides a more versatile way to access the Internet, broadening the scope of mobile computing. With the added benefits of a wireless network, there comes additional responsibility and additional risk. Authorized Users must be aware of the inherent security issues that exist in a wireless environment. Caution must be exercised to ensure a safe, secure, and reliable computing environment and reduce the risk of a security incident.

    Impacted Services: IT Security Outreach and Training

    Standard

    The 18 Protected Health Information Identifiers

    The 18 Protected Health Information (PHI) Identifiers include:

    Impacted Services: IT Security Outreach and Training

    Guideline

    Best Practices for Application and Website Security

    By following application and website security best practices, application owners can take proactive steps to eliminate or significantly reduce vulnerabilities in software before deployment. These vulnerabilities potentially provide attackers with the ability to take control of a server or computer, which can result in the compromise of UCSF data and personal data, denial of service, loss of service or damage to a system used by thousands of users.

    Impacted Services: IT Security Outreach and Training

    Standard

    Unified UCSF Enterprise Password Standard

    Standard has been moved to the UCSF IT Security Intranet Site.

    Impacted Services: IT Security Outreach and Training

    Guideline

    UCSF Implementation of the ECP - Access Without Consent

    An electronic communication holder's records may be inspected, monitored, or disclosed without the consent of the individual but with the approval of the authorizing Vice Chancellor (see Appendix A, Definitions) under the following conditions:

    Guideline

    Physical Security Guidelines

    Many information security breaches do not occur through the Internet but because the device containing information is misplaced, lost or stolen.

    Standard

    Digital Millennium Copyright Act (DMCA)

    UCSF complies with the provisions of the Digital Millennium Copyright Act (DMCA). If you have a concern regarding the use of copyrighted material on any site on the UCSF network, please contact the agent designated to respond to reports alleging copyright infringement.The current designated agent for the UCSF campus to receive notification of claimed infringement under Title II of the DMCA is on file with the U.S. Copyright Office.

    Impacted Services: IT Security Outreach and Training

    Guideline

    Recommendations for Securing Mobile Devices

    The following recommendations apply to all mobile devices, including both personally and UCSF-owned mobile devices, used for UCSF business.Mobile devices include, but are not limited to:

    Impacted Services: IT Security Outreach and Training

    Guideline

    Access with Consent

    The UC Electronic Communications Policy, Section IV, Privacy and Confidentiality, governs access to electronic communications records.  In most circumstances, it is better to obtain the consent from the record holder before accessing records.  However, consent is not required in every circumstance (See UCSF Implementation of the ECP - Access without Consent).

    Impacted Services: IT Security Outreach and Training

    Standard

    UCSF Plan for Combating Unauthorized Distribution of Copyrighted Materials

    Compliance with the peer-to-peer (P2P) provisions of the Higher Education Opportunity Act (HEOA)  I.    Introduction II.    Technology-based deterrents            A. Traffic monitoring            B. DMCA notice response

    Impacted Services: IT Security Outreach and Training

    Pagination

    • First page « First
    • Previous page ‹ Previous
    • Page 1
    • Page 2
    • Current page 3
    • Page 4
    • Page 5
    • Next page Next ›
    • Last page Last »
    Home

    Footer Col 1

    • Status
    • Services
    • How To
    • News & Events

    Footer Col 2

    • About
    • IT Directory
    • Standards & Guidelines

    Footer Col 3

  • Get Help
  • Recognize IT Staff
  • Submit a Support Inquiry

    For emergencies and high priority issues please call the IT Service Desk (415) 514-4100

    • Facebook
    • Twitter
    • YouTube
    • Instagram

    © 2025 The Regents of the University of California