Its.ucsc.edu

Protected Health Information (PHI)

WEBElectronic Protected Health Information (ePHI) is patient health information which is computer based, e.g., created, received, stored or maintained, processed and/or …

Actived: 3 days ago

URL: https://its.ucsc.edu/policies/protected-health-information.html

Disability information or other medical information collected from

WEBDisability information or other medical information collected from students to provide services

Category:  Medical Go Health

Sensitive and/or Identifiable Research Data

WEBIf the research cannot be conducted unless the data accessed, collected or created are identifiable, the IRB will look at the sensitivity of the data and whether the information is …

Category:  Health Go Health

UCSC Practices for HIPAA Security Rule Compliance

WEBSTANDARD §164.308(a)(4)(i) - INFORMATION ACCESS MANAGEMENT Implement policies and procedures for authorizing access to electronic protected health …

Category:  Health Go Health

Protected Data with Specific Regulatory Requirements

WEBDefinitions of Selected Types of Protected Data. Personally Identifiable Information (PII): Personally Identifiable Information (PII) is the electronic manifestation …

Category:  Health Go Health

MyUCSC Campus Portal

WEBMyUCSC Campus Portal. MyUCSC is the university's online academic information systems portal for students, applicants, faculty, and staff. It is used by …

Category:  Health Go Health

Protection Levels for UC Institutional Information

WEBIn accordance with UC's IS-3 Electronic Information Security policy, university data (also known as Institutional Information) and IT resources are classified into one of …

Category:  Health Go Health

MyUCSC Help for Students

WEBMyUCSC also provides information on other campus services. MyUCSC accounts for students are created automatically during the admission process. If you are …

Category:  Health Go Health

ITS Staff Directory

WEB831-459-1980. Email. [email protected]. [email protected]. Office Location. Remote work location, G1011. Office Hours Monday through Friday, 8AM to …

Category:  Health Go Health

Protecting Mobile Devices

WEBActivate your device’s built-in firewall or access control functionality. Default settings are typically acceptable for most people. Disable or remove applications (apps) …

Category:  Health Go Health

Virtru Email & File Encryption Service

WEBVirtru products allow you to control access and encrypt sensitive data when sharing information over UCSC Gmail or through Secure File Share. You choose the …

Category:  Health Go Health

For All HIPAA Workforce Members Revised April 2013

WEBGood Security Standards follow the “90 / 10” Rule: } 10% of security safeguards are technical } 90% of security safeguards rely on the computer user (“YOU”) to adhere to …

Category:  Health Go Health

2015-16 HIPAA wkbk-blank

WEB2015-16_HIPAA_wkbk-blank. This document is arranged by HIPAA Security Rule requirement. Each implementation specification (or Standard in the. absence of specific …

Category:  Health Go Health

Introduction to Computer Security

WEBA compromised computer can be used for all kinds of surprising things. Many cyber security threats are largely avoidable. Some key steps that everyone can take include (1 of 2): l …

Category:  Health Go Health

Qualtrics CoreXM Survey

WEBBenefits and Features. Quick survey builder that guides beginners through creating a survey. Survey library with templates that you can customize to meet your …

Category:  Health Go Health