Computer Use/Electronic Information: Difference between revisions

Jump to navigation Jump to search
No edit summary
Line 40: Line 40:
Using UNMC’s information systems by anyone shall constitute agreement to abide by and be bound by the following:
Using UNMC’s information systems by anyone shall constitute agreement to abide by and be bound by the following:
#Provisions of this policy  
#Provisions of this policy  
#[http://www.unmc.edu/its/information_security_procedures.htm UNMC Information Security Procedures]  
#[http://www.unmc.edu/its/security/procedures/ UNMC Information Security Procedures]  
#UNMC Policy 6045, [[Privacy/Confidentiality|Privacy, Confidentiality and Information Security]]   
#UNMC Policy 6045, [[Privacy/Confidentiality|Privacy, Confidentiality and Information Security]]   
#Executive Memorandum No. 16, [http://nebraska.edu/docs/president/16%20Responsible%20Use%20of%20Computers%20and%20Info%20Systems.pdf Policy for Responsible Use of Information Resources]
#Executive Memorandum No. 16, [http://nebraska.edu/docs/president/16%20Responsible%20Use%20of%20Computers%20and%20Info%20Systems.pdf Policy for Responsible Use of Information Resources]
#Executive Memorandum No. 26, [http://nebraska.edu/docs/president/26%20Information%20Security%20Plan%20%28GLB%20Compliance%29.pdf University of Nebraska Information Security Plan]  
#Executive Memorandum No. 26, [http://nebraska.edu/docs/president/26%20Information%20Security%20Plan%20%28GLB%20Compliance%29.pdf University of Nebraska Information Security Plan]  
#Executive Memorandum No. 27, [http://nebraska.edu/docs/president/27%20HIPAA%20Compliance.pdf HIPAA Compliance Policy]
#Executive Memorandum No. 27, [http://nebraska.edu/docs/president/27%20HIPAA%20Compliance.pdf HIPAA Compliance Policy]
=== Access ===
=== Access ===
Physical and electronic access to proprietary information and computing resources is controlled. The level of control will depend on user need and the level of risk and exposure to loss or compromise. Access will be assigned based upon the information needed to perform assigned duties. On campus electronic access is controlled through user id and password. Off Campus electronic access in some instances requires two-factor authentication.
Physical and electronic access to proprietary information and computing resources is controlled. The level of control will depend on user need and the level of risk and exposure to loss or compromise. Access will be assigned based upon the information needed to perform assigned duties. On campus electronic access is controlled through user id and password. Off Campus electronic access in some instances requires two-factor authentication.

Navigation menu