Log in to see all content. Some content is hidden to the public.
Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.
240 Results
Send Envelopes in DocuSign
Getting started There are two ways to send an envelope:
Share DocuSign Folders
DocuSign allows users to grant the ability to view their DocuSign folders (inbox, sent folder, deleted and any others) to other users.
- Affiliate
- Faculty
- Staff
- Student
- Business Applications
Manage Recipients' Action Levels
What you need to know about each action Recipient Action Description Action required for routing to move forward?
Overview of UCSF's SSL Certificate Service
- Staff
View IT Security Awareness Videos
IT Security awareness videos For more details about participating in our awareness campaign (and winning prizes), visit the Awareness Site. Theft & loss
WebLinks System Requirements
- Staff
Data Network Recharge: Business Process
Overview UCSF IT implemented an electronic system in October 2009 that automates the campus data network recharge. This Data Recharge System calculates and applies the appropriate recharge amount based on the monthly payroll earn file from UCPath. Purpose The Data Network Recharge is consistent with UCSF’s Strategic Plan to urge: Optimal deployment of information technology Development of new funding mechanisms And to ensure:
- Affiliate
- Faculty
- Staff
- Student
- Business Applications
Dropbox to Box Migration Guide for Windows
UCSF does NOT support Dropbox. This guide helps UCSF users migrate content from Dropbox to UCSF Box.
- Affiliate
- Faculty
- Non-UCSF
- Staff
- Student
- Business Applications
Dropbox to Box Migration Guide for OSX
UCSF does NOT support Dropbox. This guide helps UCSF users migrate content from Dropbox to UCSF Box.
- Affiliate
- Faculty
- Staff
- Business Applications
Information Security Is Everyone's Responsibility
We take Information Security seriously, and we believe you do, too. UCSF IT Security's responsibility is to assist UCSF community members in reducing their risk of information security incidents. On this page, you will find links to what you should know and what you can do to maximize the outcome of this effort.