Standards & Guidelines

43 Results

Procedure

IS-3 Role Termination

If you are unable to fulfill the responsibilities of your IS-3 role for any reason—such as leaving the University or transitioning to a different role—you must notify IT Security by emailing [email protected] at least seven days before the change takes effect. This ensures proper handling and reassignment of your IS-3 responsibilities.

Guideline

macOS Ventura and Older Versions Discontinued

macOS Ventura (13.x) and older versions are all discontinued and no longer supported by Apple, which also ended security updates and maintenance.  This means these older macOS versions no longer meet UCSF's minimum security standards.It is a minimum security standard of UCSF that all computers used for UCSF business must run vendor-supported versions of operating systems to avoid security risks.  Computers that no longer meet this security requirement will eventually be blocked from UCSF's network.

Impacted Services: IT Field Services (ITFS) Desktop Support , ITFS Supported Macs

Standard

Digital Millennium Copyright Act (DMCA)

UCSF complies with the provisions of the Digital Millennium Copyright Act (DMCA). If you have a concern regarding the use of copyrighted material on any site on the UCSF network, please contact the agent designated to respond to reports alleging copyright infringement.The current designated agent for the UCSF campus to receive notification of claimed infringement under Title II of the DMCA is on file with the U.S. Copyright Office.

Impacted Services: IT Security Outreach and Training

Standard

UCSF 650-16 Addendum C - UCSF Incident Investigation

This document outlines the requirements for information security incident investigations at the University of California, San Francisco (UCSF). Effective incident response is essential in mitigating damage and loss due to an information security incident. Proper handling minimizes the disruption to workflow and ensures compliance to federal, state, and University laws, rules, regulations, and policies. This document satisfies the requirement in BFB IS-3 Information Security for Incident Response Procedures.

Impacted Services: Security Incident Response & Investigation