Standards & Guidelines
41 Results
Guideline
Use of Third-party Email Systems at UCSF
OverviewUse of any 3rd-party email service by UCSF faculty, staff and learners is not approved by UCSF. This is due to:
Impacted Services: Email
Guideline
IT Field Services - Service Level Agreement
Impacted Services: IT Field Services (ITFS) Desktop Support
Standard
UCSF 650-16 Addendum B - UCSF Minimum Security Standards for Electronic Information Resources
Effective Date: December 2007, Updated December 2021
Impacted Services: IT Security Outreach and Training
Standard
Unified UCSF Enterprise Password Standard
Standard has been moved to the UCSF IT Security Intranet Site.
Impacted Services: IT Security Outreach and Training
Guideline
Field Services Customer Responsibilities
What you need to knowCustomers must:
Impacted Services: IT Field Services (ITFS) Desktop Support
Standard
Exemption from IT Field Services
BackgroundExempt positionsTraineesVolunteersEmployees of affiliated organizationsExempt title codesGeographic service areaBasic science research exemptionResponsibilities of exempt users
Impacted Services: IT Field Services (ITFS) Desktop Support
Guideline
Criteria for Basic Support
What you need to knowBasic Desktop Support is available for computers and devices that meet the following criteria:
Impacted Services: IT Field Services (ITFS) Desktop Support
Standard
IT Field Services - Operating System Requirements
Impacted Services: IT Field Services (ITFS) Desktop Support , ITFS Supported Macs
Standard
UCSF 650-16 Addendum D - Wireless Networks
I. IntroductionThe use of wireless networking provides a more versatile way to access the Internet, broadening the scope of mobile computing. With the added benefits of a wireless network, there comes additional responsibility and additional risk. Authorized Users must be aware of the inherent security issues that exist in a wireless environment. Caution must be exercised to ensure a safe, secure, and reliable computing environment and reduce the risk of a security incident.
Impacted Services: IT Security Outreach and Training
Standard
The 18 Protected Health Information Identifiers
What you need to knowThe 18 Protected Health Information (PHI) Identifiers include:
Impacted Services: IT Security Outreach and Training
Standard
UCSF 650-16 Addendum A - UCSF Roles and Responsibilities for Securing Institutional Information and IT Resources
RoleResponsibilitiesNotesCyber-risk Responsible Executive (CRE)
Impacted Services: IT Security Outreach and Training
Standard
Digital Millennium Copyright Act (DMCA)
What you need to knowDigital Millennium Copyright Act (DMCA)UCSF complies with the provisions of the Digital Millennium Copyright Act (DMCA). If you have a concern regarding the use of copyrighted material on any site on the UCSF network, please contact the agent designated to respond to reports alleging copyright infringement.Designated agentThe current designated agent for the UCSF campus to receive notification of claimed infringement under Title II of the DMCA is on file with the U.S. Copyright Office.
Impacted Services: IT Security Outreach and Training
Standard
UCSF 650-16 Addendum C - UCSF Incident Investigation
I. PurposeThis document outlines the requirements for information security incident investigations at the University of California, San Francisco (UCSF). Effective incident response is essential in mitigating damage and loss due to an information security incident. Proper handling minimizes the disruption to workflow and ensures compliance to federal, state, and University laws, rules, regulations, and policies. This document satisfies the requirement in BFB IS-3 Information Security for Incident Response Procedures.
Impacted Services: Security Incident Response & Investigation
Guideline
UCSF Incident Investigation Procedures
Effective Date: October 1, 20061. PurposeThis document provides an overview of computer incident response and investigations procedures at the University of California, San Francisco (UCSF), as mandated in UCSF Policy 650-16 Addendum C: Incident Investigation.
Impacted Services: Security Incident Response & Investigation
Standard
UCSF Plan for Combating Unauthorized Distribution of Copyrighted Materials
Compliance with the peer-to-peer (P2P) provisions of the Higher Education Opportunity Act (HEOA) I. Introduction II. Technology-based deterrents A. Traffic monitoring B. DMCA notice response
Impacted Services: IT Security Outreach and Training
Guideline
Best Practices for Application and Website Security
OverviewBy following application and website security best practices, application owners can take proactive steps to eliminate or significantly reduce vulnerabilities in software before deployment. These vulnerabilities potentially provide attackers with the ability to take control of a server or computer, which can result in the compromise of UCSF data and personal data, denial of service, loss of service or damage to a system used by thousands of users.
Impacted Services: IT Security Outreach and Training
Guideline
Physical Security Guidelines
Stop the most common method of information theftMany information security breaches do not occur through the Internet but because the device containing information is misplaced, lost or stolen.
Guideline
UCSF Implementation of the ECP - Access Without Consent
Access Without Consent to Electronic Communications RecordsA. AuthorizationAn electronic communication holder's records may be inspected, monitored, or disclosed without the consent of the individual but with the approval of the authorizing Vice Chancellor (see Appendix A, Definitions) under the following conditions:
Guideline
UCSF Wireless RF Design Guideline
OverviewAs healthcare continues to undergo digital transformation, networking technologies serve an increasingly vital role: Enabling Electronic Healthcare.
Impacted Services: Network Services
Guideline
Standards & Guidelines: Example (Web Style Guide)
Why have Web style guidelines?Each UCSF website provides an opportunity to make a strong positive impression on our audiences. In this, an attractive and consistently applied style for presenting graphics and other visuals plays an important role.We have put together a set of best practices guidelines for ensuring visual consistency across all UCSF-affiliated websites. These guidelines cover:Web banner and main navigationLogo lock-up placement and sizingApplication of the graphic system The proposed designs:
Impacted Services: IT Website