Standards & Guidelines

41 Results

Standard

UCSF 650-16 Addendum D - Wireless Networks

I. Introduction The use of wireless networking provides a more versatile way to access the Internet, broadening the scope of mobile computing. With the added benefits of a wireless network, there comes additional responsibility and additional risk. Authorized Users must be aware of the inherent security issues that exist in a wireless environment. Caution must be exercised to ensure a safe, secure, and reliable computing environment and reduce the risk of a security incident.

Impacted Services: IT Security Outreach and Training

Standard

Digital Millennium Copyright Act (DMCA)

What you need to know Digital Millennium Copyright Act (DMCA) UCSF complies with the provisions of the Digital Millennium Copyright Act (DMCA). If you have a concern regarding the use of copyrighted material on any site on the UCSF network, please contact the agent designated to respond to reports alleging copyright infringement. Designated agent The current designated agent for the UCSF campus to receive notification of claimed infringement under Title II of the DMCA is on file with the U.S. Copyright Office.

Impacted Services: IT Security Outreach and Training

Standard

UCSF 650-16 Addendum C - UCSF Incident Investigation

I. Purpose This document outlines the requirements for information security incident investigations at the University of California, San Francisco (UCSF). Effective incident response is essential in mitigating damage and loss due to an information security incident. Proper handling minimizes the disruption to workflow and ensures compliance to federal, state, and University laws, rules, regulations, and policies. This document satisfies the requirement in BFB IS-3 Information Security for Incident Response Procedures.

Impacted Services: Security Incident Response & Investigation

Guideline

Best Practices for Application and Website Security

Overview By following application and website security best practices, application owners can take proactive steps to eliminate or significantly reduce vulnerabilities in software before deployment. These vulnerabilities potentially provide attackers with the ability to take control of a server or computer, which can result in the compromise of UCSF data and personal data, denial of service, loss of service or damage to a system used by thousands of users. By reducing the numbers of vulnerabilities, UCSF data and personal data is better protected.

Impacted Services: IT Security Outreach and Training

Guideline

Physical Security Guidelines

Stop the most common method of information theft Many information security breaches do not occur through the Internet but because the device containing information is misplaced, lost or stolen.

Guideline

UCSF Implementation of the ECP - Access Without Consent

Access Without Consent to Electronic Communications Records A. Authorization An electronic communication holder's records may be inspected, monitored, or disclosed without the consent of the individual but with the approval of the authorizing Vice Chancellor (see Appendix A, Definitions) under the following conditions:

Guideline

Standards & Guidelines: Example (Web Style Guide)

Why have Web style guidelines? Each UCSF website provides an opportunity to make a strong positive impression on our audiences. In this, an attractive and consistently applied style for presenting graphics and other visuals plays an important role. We have put together a set of best practices guidelines for ensuring visual consistency across all UCSF-affiliated websites. These guidelines cover: Web banner and main navigation Logo lock-up placement and sizing Application of the graphic system  The proposed designs:

Impacted Services: IT Website