Log in to see all content. Some content is hidden to the public.
Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.
67 Results
IT Field Services (ITFS) Subscription FAQs
questions about subscribing to ITFS Desktop Support: Basic, Premium, Hourly, etc.
- Faculty
- Staff
- Desktop Support
Manage Your UCSF Password
How to AccessEveryone accessing UCSF resources will have a password for their computers, email and access to email and Office 365 applications on their mobile devices. NOTE: To access your email on your mobile device, you will need to Enroll Your Mobile Device in Intune Company Portal.
- Affiliate
- Faculty
- Staff
- Student
- Technical Partner
- Volunteer
- Access & Identity
Standard
UCSF 650-16 Addendum B - UCSF Minimum Security Standards for Electronic Information Resources
Effective Date: December 2007, Updated December 2021 Contents Purpose Overview and Scope Exception from Minimum Security Standards Exception Requests Covering Legacy Systems Compatibility Exemptions Enforcement Minimum Security Standards System Inventory and Protection Level Classification (PLC) Transmission of Restricted Information
Impacted Services: IT Security Outreach and Training
Guideline
IT Field Services - Service Level Agreement
Impacted Services: IT Field Services (ITFS) Desktop Support
Standard
UCSF Policy 650-16 Addendum F, UCSF Data Classification Standard
UCSF_Data_Classification_Standard_08-09-19 (PDF) Document Owner: Patrick PhelanDepartment Contact: UCSF IT SecurityIssue Date: 4/24/17Effective Date: 4/24/17Reviewed/Revised Date: 8/9/19
Impacted Services: IT Security Outreach and Training
Data Network Recharge: FAQs
Overview This page provides you with answers to common questions about the new network funding model. History and rationale Why does UCSF have a recharge funding model for network services?
- Affiliate
- Faculty
- Non-UCSF
- Staff
- Student
- Technical Partner
- Hosting & Computing
UCSF Security Update Announcements
05/16/24: Vulnerabilities in Multiple Cisco Products05/16/24: Vulnerabilities in Multiple Adobe Products05/16/24: Vulnerabilities in Intel Products