Log in to see all content. Some content is hidden to the public.
Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.
3165 Results
Standard
Exemption from IT Field Services
BackgroundExempt positionsTraineesVolunteersEmployees of affiliated organizationsExempt title codesGeographic service areaBasic science research exemptionResponsibilities of exempt users
Impacted Services: IT Field Services (ITFS) Desktop Support
Standard
IT Field Services - Operating System Requirements
Impacted Services: IT Field Services (ITFS) Desktop Support , ITFS Supported Macs
Guideline
UCSF IT Security Cloud Computing Guidance - Cloud Service Basics
Overview | What is the "cloud"?The "cloud" is a continually evolving concept that broadly references cloud services, or cloud computing. Cloud services can mean collections of any or all of the following: applications, information, infrastructure components and services provided as pools of resources.
Impacted Services: IT Security Outreach and Training
Standard
UCSF 650-16 Addendum B - UCSF Minimum Security Standards for Electronic Information Resources
Effective Date: December 2007, Updated December 2021
Impacted Services: IT Security Outreach and Training
Standard
UCSF 650-16 Addendum A - UCSF Roles and Responsibilities for Securing Institutional Information and IT Resources
RoleResponsibilitiesNotesCyber-risk Responsible Executive (CRE)
Impacted Services: IT Security Outreach and Training
Standard
UCSF 650-16 Addendum G - Third-Party Remote Access Standards
PurposeTo establish and set the requirements for a University of California San Francisco enterprise standard for third-party remote access to UCSF networks.DefinitionsSee the University of California - Systemwide IT Policy Glossary for the most up-to-date definitions. Terms that are not in the Systemwide Glossary are defined below.
Standard
UCSF 650-16 Addendum E - PCI
PurposeUCSF 650-16 Addendum E - PCI outlines the requirements for information, locations, facilities, and devices processing, storing, or transmitting credit card information.ObjectiveTo comply with data security requirements defined by Payment Card Industry Data Security Standards 3.1/3.2 (PCI-DSS)
Impacted Services: IT Security Outreach and Training
Standard
UCSF 650-16 Addendum D - Wireless Networks
I. IntroductionThe use of wireless networking provides a more versatile way to access the Internet, broadening the scope of mobile computing. With the added benefits of a wireless network, there comes additional responsibility and additional risk. Authorized Users must be aware of the inherent security issues that exist in a wireless environment. Caution must be exercised to ensure a safe, secure, and reliable computing environment and reduce the risk of a security incident.
Impacted Services: IT Security Outreach and Training
Standard
The 18 Protected Health Information Identifiers
What you need to knowThe 18 Protected Health Information (PHI) Identifiers include:
Impacted Services: IT Security Outreach and Training
Guideline
Best Practices for Application and Website Security
OverviewBy following application and website security best practices, application owners can take proactive steps to eliminate or significantly reduce vulnerabilities in software before deployment. These vulnerabilities potentially provide attackers with the ability to take control of a server or computer, which can result in the compromise of UCSF data and personal data, denial of service, loss of service or damage to a system used by thousands of users.
Impacted Services: IT Security Outreach and Training