Log in to see all content. Some content is hidden to the public.
Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.
171 Results
NameCoach FAQs
- Faculty
- Staff
- Student
Account Login Provisioning FAQ
- Technical Partner
Keeper Password Vault FAQs
- Technical Partner
Protect UCSF and Myself from Phishing and Other Similar Scams
See the Red Flags from The latest UCSF Phishing Campaign Information you need to knowWHAT YOU SHOULD DO IF YOU RECEIVE A RANDOM EMAIL OR CALL THAT ASKS FOR YOUR PRIVATE INFORMATION:
- Technical Partner
- Security
Authorized Posters to Executive Listservs
- Faculty
- Staff
- Student
- Technical Partner
Request a REDCap Premium Account
- Faculty
- Staff
Bring Your Own Device (BYOD) to UCSF
Introduction to BYOD at UCSF You can use your own smartphone, tablet, laptop or computer to access UCSF systems, but the device needs to comply with UCSF's security policy. This is to ensure that your device, the UCSF network and UCSF sensitive data all remain safe. Get Technology Help The UCSF IT Service Desk is available 24 hours a day, 7 days a week. Contact us:
- Affiliate
- Faculty
- Non-UCSF
- Staff
- Student
- Technical Partner
- Volunteer
- Security
Microsoft 365: Bookings
DescriptionMicrosoft Bookings is an online and mobile app for teams providing services to customers on an appointment basis.
- Faculty
- Staff
- Email & Collaboration
Digital Accessibility Awareness and Outreach
OverviewIn support of digital accessibility, we create awareness with this website and outreach. More details at our Training and Events pages. A wealth of digital accessibility resources on our Testing page.
- Affiliate
- Faculty
- Non-UCSF
- Staff
- Student
- Technical Partner
- Volunteer
- Web Services
Device Encryption
What is encryption? Why do I need it? Encryption is the process of encoding information so that only authorized persons can read it. It is used to protect confidential and legally protected data. In this case, "legally protected" has real and serious meaning. If an unencrypted laptop, tablet, mobile phone or other device is lost or stolen, and if it contained legally protected information, you or the University might be held liable for damages, you could be sent to prison, or the University could take corrective action against you.
- Affiliate
- Faculty
- Staff
- Student
- Technical Partner
- Volunteer
- Security