Log in to see all content. Some content is hidden to the public.
Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.
85 Results
Protect UCSF and Myself from Phishing and Other Similar Scams
See the Red Flags from The latest UCSF Phishing Campaign Information you need to knowWHAT YOU SHOULD DO IF YOU RECEIVE A RANDOM EMAIL OR CALL THAT ASKS FOR YOUR PRIVATE INFORMATION:
- Technical Partner
- Security
Procurement (BearBuy)
- Affiliate
- Faculty
- Staff
- Student
Set Up a DocuSign Workflow
Workflow decisions (read this before sending) In order to best utilize DocuSign, you should document your current workflow and then think through how to transition it to DocuSign most efficiently. Consider, for example, that the routing from sender to signer 1 to signer 2, and so on, is automated with DocuSign but most likely occurs manually in your current process.
- Affiliate
- Faculty
- Staff
- Student
- Business Applications
Send Envelopes in DocuSign
Getting started There are two ways to send an envelope:
Create a Template with DocuSign
Your DocuSign template: what you need to know Creating a template in DocuSign can simplify your communications if you will be sending the same document – or even variations of the same document – repeatedly and with a similar workflow. But creating this simplicity tool and keeping the creation process simple are two different things. The information below is designed to smooth your path to a DocuSign template that meets your business needs.
Bring Your Own Device (BYOD) to UCSF
Introduction to BYOD at UCSF You can use your own smartphone, tablet, laptop or computer to access UCSF systems, but the device needs to comply with UCSF's security policy. This is to ensure that your device, the UCSF network and UCSF sensitive data all remain safe. Get Technology Help The UCSF IT Service Desk is available 24 hours a day, 7 days a week. Contact us:
- Affiliate
- Faculty
- Non-UCSF
- Staff
- Student
- Technical Partner
- Volunteer
- Security
Upgrading Pulse Secure to Ivanti Secure Access on UCSF-managed Macs
These instructions only apply to Macs at UCSF that are enrolled in UCSF's Jamf Pro to upgrade our installed VPN software from Pulse Secure to Ivanti Secure Access.To begin:Click here to be directed to the Jamf Self Service app on your UCSF-managed Mac.
Box: Folder Settings
What you need to know As a folder Owner, you can control how your collaborators view and manage the files in your folder.
- Affiliate
- Faculty
- Staff
- Student
- Business Applications
IT Information Technology Infrastructure Library (ITIL)
- Staff
- Technical Partner
Device Encryption
What is encryption? Why do I need it? Encryption is the process of encoding information so that only authorized persons can read it. It is used to protect confidential and legally protected data. In this case, "legally protected" has real and serious meaning. If an unencrypted laptop, tablet, mobile phone or other device is lost or stolen, and if it contained legally protected information, you or the University might be held liable for damages, you could be sent to prison, or the University could take corrective action against you.
- Affiliate
- Faculty
- Staff
- Student
- Technical Partner
- Volunteer
- Security