Standards & Guidelines
41 Results
Guideline
macOS Monterey and Older Versions Discontinued
What is Happening?macOS Monterey (12.x) and older versions are all discontinued and no longer supported by Apple, which also ended security updates and maintenance. This means these older macOS versions no longer meet UCSF's minimum security standards.It is a minimum security standard of UCSF that all computers used for UCSF business must run vendor-supported versions of operating systems to avoid security risks. Computers that no longer meet this security requirement will eventually be blocked from UCSF's network.
Impacted Services: IT Field Services (ITFS) Desktop Support , ITFS Supported Macs
Standard
Intune Mobile Device Management (MDM) Privacy
Impacted Services: Email, Microsoft 365, Microsoft 365: Teams
Standard
Ordering Apple Devices (iPads and Macs)
Who Can Order?To order any computers (including iPads and other mobile devices) intended to be UCSF-owned devices, please check with your supervisor, manager or department chair to determine if you are authorized to purchase before placing an order.
Impacted Services: Computer and Accessory Ordering, IT Field Services (ITFS) Desktop Support
Guideline
iCloud Accounts with UCSF Email Addresses
Impacted Services: Account Login & Password, IT Field Services (ITFS) Desktop Support , Technology Introduction for Learners, ITFS Supported Macs
Standard
UCSF IT Standard Desktop and Laptop workstations
Standard Hardware:Availability of specific models is subject to change.Peripherals may be managed to a greater or shorter useful life, based on condition and re-usability.Important Information About Ordering UCSF Macs
Standard
Research Analysis Environment - Hosting Agreement
General OverviewThis is a Service Level Agreement (“SLA”) between the campus community and the Information Technology Services Division (ITS) to document:
Impacted Services: Research Analysis Environment (RAE)
Standard
Bulk Email Standard
Background and PurposeBulk email is a critical mass communications tool at UCSF that is used for distributing information to large audience groups through electronic mailing lists or newsletter tools.PurposeThe purpose of the policy is to:
Impacted Services: Email, Listserv, Staffbase Email (formerly Bananatag)
Standard
What to do before returning your UCSF Mac computer
In light of concerns regarding Activation Lock on Macs, we advise all users to turn off 'Find My' by removing their UCSF-issued Mac from their iCloud accounts before returning their computers back to their UCSF department via one of the following methods:
Impacted Services: Computer and Accessory Ordering, IT Field Services (ITFS) Desktop Support , ITFS Supported Macs
Standard
UCSF Web Browser Standards
Impacted Services: IT Field Services (ITFS) Desktop Support
Guideline
GitHub Enterprise Best Practices
Impacted Services: GitHub Enterprise Server (On-Premises)
Standard
The 18 Protected Health Information Identifiers
What you need to knowThe 18 Protected Health Information (PHI) Identifiers include:
Impacted Services: IT Security Outreach and Training
Guideline
UCSF Incident Investigation Procedures
Effective Date: October 1, 20061. PurposeThis document provides an overview of computer incident response and investigations procedures at the University of California, San Francisco (UCSF), as mandated in UCSF Policy 650-16 Addendum C: Incident Investigation.
Impacted Services: Security Incident Response & Investigation
Standard
UCSF 650-16 Addendum C - UCSF Incident Investigation
I. PurposeThis document outlines the requirements for information security incident investigations at the University of California, San Francisco (UCSF). Effective incident response is essential in mitigating damage and loss due to an information security incident. Proper handling minimizes the disruption to workflow and ensures compliance to federal, state, and University laws, rules, regulations, and policies. This document satisfies the requirement in BFB IS-3 Information Security for Incident Response Procedures.
Impacted Services: Security Incident Response & Investigation
Standard
Digital Millennium Copyright Act (DMCA)
What you need to knowDigital Millennium Copyright Act (DMCA)UCSF complies with the provisions of the Digital Millennium Copyright Act (DMCA). If you have a concern regarding the use of copyrighted material on any site on the UCSF network, please contact the agent designated to respond to reports alleging copyright infringement.Designated agentThe current designated agent for the UCSF campus to receive notification of claimed infringement under Title II of the DMCA is on file with the U.S. Copyright Office.
Impacted Services: IT Security Outreach and Training
Standard
UCSF 650-16 Addendum A - UCSF Roles and Responsibilities for Securing Institutional Information and IT Resources
RoleResponsibilitiesNotesCyber-risk Responsible Executive (CRE)
Impacted Services: IT Security Outreach and Training
Standard
UCSF 650-16 Addendum D - Wireless Networks
I. IntroductionThe use of wireless networking provides a more versatile way to access the Internet, broadening the scope of mobile computing. With the added benefits of a wireless network, there comes additional responsibility and additional risk. Authorized Users must be aware of the inherent security issues that exist in a wireless environment. Caution must be exercised to ensure a safe, secure, and reliable computing environment and reduce the risk of a security incident.
Impacted Services: IT Security Outreach and Training
Standard
Exemption from IT Field Services
BackgroundExempt positionsTraineesVolunteersEmployees of affiliated organizationsExempt title codesGeographic service areaBasic science research exemptionResponsibilities of exempt users
Impacted Services: IT Field Services (ITFS) Desktop Support
Guideline
Field Services Customer Responsibilities
What you need to knowCustomers must:
Impacted Services: IT Field Services (ITFS) Desktop Support