Log in to see all content. Some content is hidden to the public.
Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.
3165 Results
Standard
Unified UCSF Enterprise Password Standard
Standard has been moved to the UCSF IT Security Intranet Site.
Impacted Services: IT Security Outreach and Training
Guideline
UCSF Incident Investigation Procedures
Effective Date: October 1, 20061. PurposeThis document provides an overview of computer incident response and investigations procedures at the University of California, San Francisco (UCSF), as mandated in UCSF Policy 650-16 Addendum C: Incident Investigation.
Impacted Services: Security Incident Response & Investigation
Guideline
UCSF Implementation of the ECP - Access Without Consent
Access Without Consent to Electronic Communications RecordsA. AuthorizationAn electronic communication holder's records may be inspected, monitored, or disclosed without the consent of the individual but with the approval of the authorizing Vice Chancellor (see Appendix A, Definitions) under the following conditions:
Guideline
Physical Security Guidelines
Stop the most common method of information theftMany information security breaches do not occur through the Internet but because the device containing information is misplaced, lost or stolen.
Standard
Digital Millennium Copyright Act (DMCA)
What you need to knowDigital Millennium Copyright Act (DMCA)UCSF complies with the provisions of the Digital Millennium Copyright Act (DMCA). If you have a concern regarding the use of copyrighted material on any site on the UCSF network, please contact the agent designated to respond to reports alleging copyright infringement.Designated agentThe current designated agent for the UCSF campus to receive notification of claimed infringement under Title II of the DMCA is on file with the U.S. Copyright Office.
Impacted Services: IT Security Outreach and Training
Guideline
Recommendations for Securing Mobile Devices
What you need to knowThe following recommendations apply to all mobile devices, including both personally and UCSF-owned mobile devices, used for UCSF business.Mobile devices include, but are not limited to:
Impacted Services: IT Security Outreach and Training
Guideline
Access with Consent
The UC Electronic Communications Policy, Section IV, Privacy and Confidentiality, governs access to electronic communications records. In most circumstances, it is better to obtain the consent from the record holder before accessing records. However, consent is not required in every circumstance (See UCSF Implementation of the ECP - Access without Consent).
Impacted Services: IT Security Outreach and Training
Standard
UCSF Policy 650-16 Addendum F - UCSF Data Classification Standard
UCSF_Data_Classification_Standard_08-09-19 (PDF)Document Owner: Patrick PhelanDepartment Contact: UCSF IT SecurityIssue Date: 4/24/17Effective Date: 4/24/17Reviewed/Revised Date: 8/9/19
Impacted Services: IT Security Outreach and Training
Standard
UCSF Plan for Combating Unauthorized Distribution of Copyrighted Materials
Compliance with the peer-to-peer (P2P) provisions of the Higher Education Opportunity Act (HEOA) I. Introduction II. Technology-based deterrents A. Traffic monitoring B. DMCA notice response
Impacted Services: IT Security Outreach and Training
Guideline
Use of Third-party Email Systems at UCSF
OverviewUse of any 3rd-party email service by UCSF faculty, staff and learners is not approved by UCSF. This is due to:
Impacted Services: Email