Log in to see all content. Some content is hidden to the public.
Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.
19 Results
Standard
UCSF Policy 650-16 Addendum F, UCSF Data Classification Standard
UCSF_Data_Classification_Standard_08-09-19 (PDF) Document Owner: Patrick PhelanDepartment Contact: UCSF IT SecurityIssue Date: 4/24/17Effective Date: 4/24/17Reviewed/Revised Date: 8/9/19
Impacted Services: IT Security Outreach and Training
Guideline
UCSF Implementation of the ECP - Access Without Consent
Access Without Consent to Electronic Communications Records A. Authorization An electronic communication holder's records may be inspected, monitored, or disclosed without the consent of the individual but with the approval of the authorizing Vice Chancellor (see Appendix A, Definitions) under the following conditions:
Standard
Exemption from IT Field Services
Background Exempt positions Trainees Volunteers Employees of affiliated organizations Exempt title codes Geographic service area Basic science research exemption
Impacted Services: IT Field Services (ITFS) Desktop Support
Guideline
IT Enterprise Service Level Agreement (SLA)
Scope This Service Level Agreement (hereafter referred to as "SLA") applies to all services provided by Enterprise IT ("Central IT") except where specific exceptions are noted or superseded by service-specific SLAs. For APeX, client connectivity and infrastructure support are covered by this agreement as well as first-level support provided by the Service Desk. Objectives The objectives of this document are to describe the base level of service and the means of providing consistent service at a predefined level of quality.
Impacted Services: IT Service Management (ITSM)
Guideline
GitHub Enterprise Best Practices
Impacted Services: GitHub Enterprise Server (On-Premises)
Guideline
UCSF IT Security Cloud Computing Guidance - Cloud Service Basics
Overview | What is the "cloud"? The "cloud" is a continually evolving concept that broadly references cloud services, or cloud computing. Cloud services can mean collections of any or all of the following: applications, information, infrastructure components and services provided as pools of resources. The ability for these broadly accessible services to be rapidly provisioned, deprovisioned, expanded and contracted based on demand creates a demand-driven service model, which can be seen as a "Pay for what you use" type of IT service.
Impacted Services: IT Security Outreach and Training
Guideline
UCSF Incident Investigation Procedures
Effective Date: October 1, 2006 1. Purpose This document provides an overview of computer incident response and investigations procedures at the University of California, San Francisco (UCSF), as mandated in UCSF Policy 650-16 Addendum C: Incident Investigation.
Impacted Services: Security Incident Response & Investigation