Log in to see all content. Some content is hidden to the public.
Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.
3165 Results
Learner Hardware & Software
Purchasing Hardware and SoftwareYou may purchase from any vendor, UCSF does not have a campus computer store or make any specific recommendations. Purchasing decisions should be guided by the Technology Requirements for Learners. Before purchasing anything, please take account of what is provided by UCSF and the discounts that are available to learners with a .edu email.
- Student
- Education Applications
Learner Technology Support
UCSF IT Service DeskFirst point of contact for assistance with all UCSF IT Services. Email, VPN, WiFi, MyAccess account.Hours: 24 hours a day, 7 days a weekPhone: (415) 514-4100Chat, Tickets, Knowledge Base: http://help.ucsf.eduEmail: [email protected]
- Student
- Education Applications
Learner Accounts
First-time LoginThe Registrar distributes login credentials; you should receive this in advance of your orientation. If you have not, please contact your program. Please follow these instructions the first time you log in. You need to setup the Duo Mobile App for two-factor authentication, enroll in the UCSF Password Management Tool, change your password, and setup Hitachi ID Mobile Access App.
- Student
- Education Applications
HIPAA Designated Officials
HIPAA security official Patrick Phelan, Chief Information Security Officer, is UCSF's designated HIPAA security official. The Chief Information Security Officer is responsible for the security of UCSF HIPAA components' electronic Protected Health Information (ePHI), including development of the policies necessary to comply with the Security Rule and the implementation of security measures to protect ePHI.
IT Website Content: Create a Status Update
- Staff
- Technical Partner
Avoid Spam
Overview Most of us have received unsolicited email at one time or another. Most of the time, we just delete the message and get on with our lives. However, there may be times when some of the content of this email is so offensive or so obviously an illegal scam that we ask ourselves, "How do these people get my address, and what can I do to stop this?" Good question. Let's first examine how spammers may get your address. How do spammers and marketers get my address?
- Technical Partner
- Security
How to Troubleshoot Your Home Internet Connection
Are you working from home and your internet connection is driving you crazy? Terrible Zoom audio? Websites loading slowly? Please use these resources to troubleshoot the problem.
- Faculty
- Staff
- Student
- Desktop Support
How to Work Together Remotely
With many of our IT teams working remotely, we want to provide you not only the tools, but the habits and support to do so successfully. Remote work has its benefits, including not commuting and challenges such as isolation. We've curated a list of resources aimed at helping you manage your telecommute. This is a growing list, and we welcome your suggestions and feedback. Reach out to [email protected] (don't forget to share your remote-work success stories).
- Faculty
- Staff
- Student
- Desktop Support
Office 365 Training Resources
Office 365 Desktop Applications Office 365 Resources Training Resources Related Resources Office 365 Teams and Mobile Using O365 in Box Collaboration & Sharing Security & Privacy (PHI) Additional Training Office 365 Word Online Excel Online PowerPoint Online OneNote Online O365 Teams Office 365 Desktop Applications
- Faculty
- Staff
- Student
- Email & Collaboration
Telecommute Securely
Working remotely? Follow these tips to securely manage your telecommute.
- Faculty
- Staff
- Student
- Desktop Support