Standards & Guidelines

41 Results

Guideline

macOS Monterey and Older Versions Discontinued

macOS Monterey (12.x) and older versions are all discontinued and no longer supported by Apple, which also ended security updates and maintenance.  This means these older macOS versions no longer meet UCSF's minimum security standards.It is a minimum security standard of UCSF that all computers used for UCSF business must run vendor-supported versions of operating systems to avoid security risks.  Computers that no longer meet this security requirement will eventually be blocked from UCSF's network.

Impacted Services: IT Field Services (ITFS) Desktop Support , ITFS Supported Macs

Standard

UCSF 650-16 Addendum C - UCSF Incident Investigation

This document outlines the requirements for information security incident investigations at the University of California, San Francisco (UCSF). Effective incident response is essential in mitigating damage and loss due to an information security incident. Proper handling minimizes the disruption to workflow and ensures compliance to federal, state, and University laws, rules, regulations, and policies. This document satisfies the requirement in BFB IS-3 Information Security for Incident Response Procedures.

Impacted Services: Security Incident Response & Investigation

Standard

Digital Millennium Copyright Act (DMCA)

UCSF complies with the provisions of the Digital Millennium Copyright Act (DMCA). If you have a concern regarding the use of copyrighted material on any site on the UCSF network, please contact the agent designated to respond to reports alleging copyright infringement.The current designated agent for the UCSF campus to receive notification of claimed infringement under Title II of the DMCA is on file with the U.S. Copyright Office.

Impacted Services: IT Security Outreach and Training

Standard

UCSF 650-16 Addendum D - Wireless Networks

The use of wireless networking provides a more versatile way to access the Internet, broadening the scope of mobile computing. With the added benefits of a wireless network, there comes additional responsibility and additional risk. Authorized Users must be aware of the inherent security issues that exist in a wireless environment. Caution must be exercised to ensure a safe, secure, and reliable computing environment and reduce the risk of a security incident.

Impacted Services: IT Security Outreach and Training