Log in to see all content. Some content is hidden to the public.
Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.
69 Results
Avoid the “Dirty Dozen” Tax Scams!
The link to the quiz is at the end of the article.
Standard
Digital Millennium Copyright Act (DMCA)
What you need to know Digital Millennium Copyright Act (DMCA) UCSF complies with the provisions of the Digital Millennium Copyright Act (DMCA). If you have a concern regarding the use of copyrighted material on any site on the UCSF network, please contact the agent designated to respond to reports alleging copyright infringement. Designated agent The current designated agent for the UCSF campus to receive notification of claimed infringement under Title II of the DMCA is on file with the U.S. Copyright Office.
Impacted Services: IT Security Outreach and Training
Standard
The 18 Protected Health Information Identifiers
What you need to know The 18 Protected Health Information (PHI) Identifiers include:
Impacted Services: IT Security Outreach and Training
Keep Your Software Updated!
The link to the quiz is at the end of the article
Guideline
IT Field Services - Service Level Agreement
Impacted Services: IT Field Services (ITFS) Desktop Support
Standard
UCSF Plan for Combating Unauthorized Distribution of Copyrighted Materials
Compliance with the peer-to-peer (P2P) provisions of the Higher Education Opportunity Act (HEOA) I. Introduction II. Technology-based deterrents A. Traffic monitoring B. DMCA notice response
Impacted Services: IT Security Outreach and Training
Standard
UCSF Policy 650-16 Addendum F, UCSF Data Classification Standard
UCSF_Data_Classification_Standard_08-09-19 (PDF) Document Owner: Patrick PhelanDepartment Contact: UCSF IT SecurityIssue Date: 4/24/17Effective Date: 4/24/17Reviewed/Revised Date: 8/9/19
Impacted Services: IT Security Outreach and Training
Guideline
UCSF Implementation of the ECP - Access Without Consent
Access Without Consent to Electronic Communications Records A. Authorization An electronic communication holder's records may be inspected, monitored, or disclosed without the consent of the individual but with the approval of the authorizing Vice Chancellor (see Appendix A, Definitions) under the following conditions:
Standard
Exemption from IT Field Services
Background Exempt positions Trainees Volunteers Employees of affiliated organizations Exempt title codes Geographic service area Basic science research exemption
Impacted Services: IT Field Services (ITFS) Desktop Support