Standards & Guidelines
41 Results
Guideline
macOS Monterey and Older Versions Discontinued
What is Happening?macOS Monterey (12.x) and older versions are all discontinued and no longer supported by Apple, which also ended security updates and maintenance. This means these older macOS versions no longer meet UCSF's minimum security standards.It is a minimum security standard of UCSF that all computers used for UCSF business must run vendor-supported versions of operating systems to avoid security risks. Computers that no longer meet this security requirement will eventually be blocked from UCSF's network.
Impacted Services: IT Field Services (ITFS) Desktop Support , ITFS Supported Macs
Standard
Intune Mobile Device Management (MDM) Privacy
Impacted Services: Email, Microsoft 365, Microsoft 365: Teams
Standard
Ordering Apple Devices (iPads and Macs)
Who Can Order? To order any computers (including iPads and other mobile devices) intended to be UCSF-owned devices, please check with your supervisor, manager or department chair to determine if you are authorized to purchase before placing an order.
Impacted Services: Computer and Accessory Ordering, IT Field Services (ITFS) Desktop Support
Guideline
iCloud Accounts with UCSF Email Addresses
Impacted Services: Account Login & Password, IT Field Services (ITFS) Desktop Support , Technology Introduction for Students, ITFS Supported Macs
Standard
UCSF IT Standard Desktop and Laptop workstations
Standard Hardware:Availability of specific models is subject to change.Peripherals may be managed to a greater or shorter useful life, based on condition and re-usability.Important Information About Ordering UCSF Macs
Standard
Research Analysis Environment - Hosting Agreement
General Overview This is a Service Level Agreement (“SLA”) between the campus community and the Information Technology Services Division (ITS) to document:
Impacted Services: Research Analysis Environment (RAE)
Standard
Bulk Email Standard
Background and Purpose Bulk email is a critical mass communications tool at UCSF that is used for distributing information to large audience groups through electronic mailing lists or newsletter tools. Purpose The purpose of the policy is to: Ensure the deliverability and efficiency of bulk email distribution at UCSF Deliver users a high-quality email experience by preventing security breaches and damage to UCSF’s reputation Establish levels of access to send bulk email
Impacted Services: Email, Listserv, Staffbase Email (formerly Bananatag)
Standard
What to do before returning your UCSF Mac computer
In light of concerns regarding Activation Lock on Macs, we advise all users to turn off 'Find My' by removing their UCSF-issued Mac from their iCloud accounts before returning their computers back to their UCSF department via one of the following methods: Method 1: Turn off 'Find My' via your iCloud on the web This is the method to use if you're asked to remove Activation Lock on a Mac that is either offline or no longer in your possession.
Impacted Services: Computer and Accessory Ordering, IT Field Services (ITFS) Desktop Support , ITFS Supported Macs
Standard
UCSF Web Browser Standards
Impacted Services: IT Field Services (ITFS) Desktop Support
Guideline
GitHub Enterprise Best Practices
Impacted Services: GitHub Enterprise Server (On-Premises)
Standard
The 18 Protected Health Information Identifiers
What you need to know The 18 Protected Health Information (PHI) Identifiers include:
Impacted Services: IT Security Outreach and Training
Guideline
UCSF Incident Investigation Procedures
Effective Date: October 1, 2006 1. Purpose This document provides an overview of computer incident response and investigations procedures at the University of California, San Francisco (UCSF), as mandated in UCSF Policy 650-16 Addendum C: Incident Investigation.
Impacted Services: Security Incident Response & Investigation
Standard
UCSF 650-16 Addendum C - UCSF Incident Investigation
I. Purpose This document outlines the requirements for information security incident investigations at the University of California, San Francisco (UCSF). Effective incident response is essential in mitigating damage and loss due to an information security incident. Proper handling minimizes the disruption to workflow and ensures compliance to federal, state, and University laws, rules, regulations, and policies. This document satisfies the requirement in BFB IS-3 Information Security for Incident Response Procedures.
Impacted Services: Security Incident Response & Investigation
Standard
Digital Millennium Copyright Act (DMCA)
What you need to know Digital Millennium Copyright Act (DMCA) UCSF complies with the provisions of the Digital Millennium Copyright Act (DMCA). If you have a concern regarding the use of copyrighted material on any site on the UCSF network, please contact the agent designated to respond to reports alleging copyright infringement. Designated agent The current designated agent for the UCSF campus to receive notification of claimed infringement under Title II of the DMCA is on file with the U.S. Copyright Office.
Impacted Services: IT Security Outreach and Training
Standard
UCSF 650-16 Addendum A - UCSF Roles and Responsibilities for Securing Institutional Information and IT Resources
RoleResponsibilitiesNotesCyber-risk Responsible Executive (CRE)
Impacted Services: IT Security Outreach and Training
Standard
UCSF 650-16 Addendum D - Wireless Networks
I. Introduction The use of wireless networking provides a more versatile way to access the Internet, broadening the scope of mobile computing. With the added benefits of a wireless network, there comes additional responsibility and additional risk. Authorized Users must be aware of the inherent security issues that exist in a wireless environment. Caution must be exercised to ensure a safe, secure, and reliable computing environment and reduce the risk of a security incident.
Impacted Services: IT Security Outreach and Training
Standard
Exemption from IT Field Services
Background Exempt positions Trainees Volunteers Employees of affiliated organizations Exempt title codes Geographic service area Basic science research exemption
Impacted Services: IT Field Services (ITFS) Desktop Support
Guideline
Field Services Customer Responsibilities
What you need to know Customers must:
Impacted Services: IT Field Services (ITFS) Desktop Support