Log in to see all content. Some content is hidden to the public.
Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.
128 Results
Guideline
IT Enterprise Service Level Agreement (SLA)
Scope This Service Level Agreement (hereafter referred to as "SLA") applies to all services provided by Enterprise IT ("Central IT") except where specific exceptions are noted or superseded by service-specific SLAs. For APeX, client connectivity and infrastructure support are covered by this agreement as well as first-level support provided by the Service Desk. Objectives The objectives of this document are to describe the base level of service and the means of providing consistent service at a predefined level of quality.
Guideline
GitHub Enterprise Best Practices
Impacted Services: GitHub Enterprise Server (On-Premises)
UCSF IT Security Awareness News You Can Use - Archive
The UCSF IT Security Awareness News You Can Use Newsletter includes monthly articles, contests, and upcoming events. Learn about new threats and how to protect UCSF and yourself from data breaches. You can also participate in contests to win prizes! May 2024Report security incidents| Multi-factor (Duo) fatigue flyer Contest | See the red flags from the recent UCSF-wide mock phishRead the May IT Security Awareness News You Can Use
2023 UC Cybersecurity Awareness Month (UC CAM) Events
Guideline
UCSF IT Security Cloud Computing Guidance - Cloud Service Basics
Overview | What is the "cloud"? The "cloud" is a continually evolving concept that broadly references cloud services, or cloud computing. Cloud services can mean collections of any or all of the following: applications, information, infrastructure components and services provided as pools of resources. The ability for these broadly accessible services to be rapidly provisioned, deprovisioned, expanded and contracted based on demand creates a demand-driven service model, which can be seen as a "Pay for what you use" type of IT service.
Impacted Services: IT Security Outreach and Training
IT Portfolio | Intake Queue
This intake queue list is updated on the first Tuesday of the month.
Please email immediate questions to [email protected].
Please visit Our Process to learn about our intake process.
UC Celebrates UCCAM 2022
Guideline
UCSF Incident Investigation Procedures
Effective Date: October 1, 2006 1. Purpose This document provides an overview of computer incident response and investigations procedures at the University of California, San Francisco (UCSF), as mandated in UCSF Policy 650-16 Addendum C: Incident Investigation.
Impacted Services: Security Incident Response & Investigation
Lantern Loader
Arjabi
About integration services team
UCSF Security Update Announcements
05/16/24: Vulnerabilities in Multiple Cisco Products05/16/24: Vulnerabilities in Multiple Adobe Products05/16/24: Vulnerabilities in Intel Products