Log in to see all content. Some content is hidden to the public.
Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.
239 Results
Create a Template with DocuSign
Your DocuSign template: what you need to know Creating a template in DocuSign can simplify your communications if you will be sending the same document – or even variations of the same document – repeatedly and with a similar workflow. But creating this simplicity tool and keeping the creation process simple are two different things. The information below is designed to smooth your path to a DocuSign template that meets your business needs.
Authorized Posters to Executive Listservs
- Faculty
- Staff
- Student
- Technical Partner
Request a REDCap Premium Account
- Faculty
- Staff
Bring Your Own Device (BYOD) to UCSF
Introduction to BYOD at UCSF You can use your own smartphone, tablet, laptop or computer to access UCSF systems, but the device needs to comply with UCSF's security policy. This is to ensure that your device, the UCSF network and UCSF sensitive data all remain safe. Get Technology Help The UCSF IT Service Desk is available 24 hours a day, 7 days a week. Contact us:
- Affiliate
- Faculty
- Non-UCSF
- Staff
- Student
- Technical Partner
- Volunteer
- Security
Upgrading Pulse Secure to Ivanti Secure Access on UCSF-managed Macs
These instructions only apply to Macs at UCSF that are enrolled in UCSF's Jamf Pro to upgrade our installed VPN software from Pulse Secure to Ivanti Secure Access.To begin:Click here to be directed to the Jamf Self Service app on your UCSF-managed Mac.
Box: Folder Settings
What you need to know As a folder Owner, you can control how your collaborators view and manage the files in your folder.
- Affiliate
- Faculty
- Staff
- Student
- Business Applications
Microsoft 365: Bookings
DescriptionMicrosoft Bookings is an online and mobile app for teams providing services to customers on an appointment basis.
- Faculty
- Staff
- Email & Collaboration
Account Request Form (Campus, SOM, ZSFG/SFGH) - How to Approve requests
- Faculty
- Staff
- Technical Partner
IT Information Technology Infrastructure Library (ITIL)
- Staff
- Technical Partner
Device Encryption
What is encryption? Why do I need it? Encryption is the process of encoding information so that only authorized persons can read it. It is used to protect confidential and legally protected data. In this case, "legally protected" has real and serious meaning. If an unencrypted laptop, tablet, mobile phone or other device is lost or stolen, and if it contained legally protected information, you or the University might be held liable for damages, you could be sent to prison, or the University could take corrective action against you.
- Affiliate
- Faculty
- Staff
- Student
- Technical Partner
- Volunteer
- Security