Standards & Guidelines

41 Results

Standard

UCSF 650-16 Addendum D - Wireless Networks

I. IntroductionThe use of wireless networking provides a more versatile way to access the Internet, broadening the scope of mobile computing. With the added benefits of a wireless network, there comes additional responsibility and additional risk. Authorized Users must be aware of the inherent security issues that exist in a wireless environment. Caution must be exercised to ensure a safe, secure, and reliable computing environment and reduce the risk of a security incident.

Impacted Services: IT Security Outreach and Training

Standard

Digital Millennium Copyright Act (DMCA)

What you need to knowDigital Millennium Copyright Act (DMCA)UCSF complies with the provisions of the Digital Millennium Copyright Act (DMCA). If you have a concern regarding the use of copyrighted material on any site on the UCSF network, please contact the agent designated to respond to reports alleging copyright infringement.Designated agentThe current designated agent for the UCSF campus to receive notification of claimed infringement under Title II of the DMCA is on file with the U.S. Copyright Office.

Impacted Services: IT Security Outreach and Training

Standard

UCSF 650-16 Addendum C - UCSF Incident Investigation

I. PurposeThis document outlines the requirements for information security incident investigations at the University of California, San Francisco (UCSF). Effective incident response is essential in mitigating damage and loss due to an information security incident. Proper handling minimizes the disruption to workflow and ensures compliance to federal, state, and University laws, rules, regulations, and policies. This document satisfies the requirement in BFB IS-3 Information Security for Incident Response Procedures.

Impacted Services: Security Incident Response & Investigation

Standard

UCSF Plan for Combating Unauthorized Distribution of Copyrighted Materials

Compliance with the peer-to-peer (P2P) provisions of the Higher Education Opportunity Act (HEOA)  I.    Introduction II.    Technology-based deterrents            A. Traffic monitoring            B. DMCA notice response

Impacted Services: IT Security Outreach and Training

Guideline

Best Practices for Application and Website Security

OverviewBy following application and website security best practices, application owners can take proactive steps to eliminate or significantly reduce vulnerabilities in software before deployment. These vulnerabilities potentially provide attackers with the ability to take control of a server or computer, which can result in the compromise of UCSF data and personal data, denial of service, loss of service or damage to a system used by thousands of users.

Impacted Services: IT Security Outreach and Training

Guideline

Physical Security Guidelines

Stop the most common method of information theftMany information security breaches do not occur through the Internet but because the device containing information is misplaced, lost or stolen.

Guideline

UCSF Implementation of the ECP - Access Without Consent

Access Without Consent to Electronic Communications RecordsA. AuthorizationAn electronic communication holder's records may be inspected, monitored, or disclosed without the consent of the individual but with the approval of the authorizing Vice Chancellor (see Appendix A, Definitions) under the following conditions:

Guideline

Standards & Guidelines: Example (Web Style Guide)

Why have Web style guidelines?Each UCSF website provides an opportunity to make a strong positive impression on our audiences. In this, an attractive and consistently applied style for presenting graphics and other visuals plays an important role.We have put together a set of best practices guidelines for ensuring visual consistency across all UCSF-affiliated websites. These guidelines cover:Web banner and main navigationLogo lock-up placement and sizingApplication of the graphic system The proposed designs:

Impacted Services: IT Website