2,654
edits
No edit summary |
No edit summary |
||
Line 40: | Line 40: | ||
Using UNMC’s information systems by anyone shall constitute agreement to abide by and be bound by the following: | Using UNMC’s information systems by anyone shall constitute agreement to abide by and be bound by the following: | ||
#Provisions of this policy | #Provisions of this policy | ||
#[http://www.unmc.edu/its/information_security_procedures.htm Information Security Procedures] | #[http://www.unmc.edu/its/information_security_procedures.htm UNMC Information Security Procedures] | ||
#UNMC Policy 6045, [[Privacy/Confidentiality|Privacy, Confidentiality and Information Security Policy]] | #UNMC Policy 6045, [[Privacy/Confidentiality|Privacy, Confidentiality and Information Security Policy]] | ||
#Information Technology Security Procedures | #<big>'''''Information Technology Security Procedures'''''</big>delete?? | ||
#Executive Memorandum No. 16, [http://nebraska.edu/docs/president/16%20Responsible%20Use%20of%20Computers%20and%20Info%20Systems.pdf Policy for Responsible Use of Information Resources] | #Executive Memorandum No. 16, [http://nebraska.edu/docs/president/16%20Responsible%20Use%20of%20Computers%20and%20Info%20Systems.pdf Policy for Responsible Use of Information Resources] | ||
#Executive Memorandum No. 26, [http://nebraska.edu/docs/president/26%20Information%20Security%20Plan%20%28GLB%20Compliance%29.pdf University of Nebraska Information Security Plan] | #Executive Memorandum No. 26, [http://nebraska.edu/docs/president/26%20Information%20Security%20Plan%20%28GLB%20Compliance%29.pdf University of Nebraska Information Security Plan] | ||
Line 239: | Line 239: | ||
*[http://www.unmc.edu/its/information_security.htm Information Technology Services]<br /> | *[http://www.unmc.edu/its/information_security.htm Information Technology Services]<br /> | ||
*Executive Memorandum No. 16, [http://nebraska.edu/docs/president/16%20Responsible%20Use%20of%20Computers%20and%20Info%20Systems.pdf Policy for Responsible Use of Information Resources] | *Executive Memorandum No. 16, [http://nebraska.edu/docs/president/16%20Responsible%20Use%20of%20Computers%20and%20Info%20Systems.pdf Policy for Responsible Use of Information Resources] | ||
*Executive Memorandum No. 26, [http://nebraska.edu/docs/president/26%20Information%20Security%20Plan%20%28GLB%20Compliance%29.pdf University of Nebraska Information Security Plan] | |||
*Executive Memorandum No. 27, [http://nebraska.edu/docs/president/27%20HIPAA%20Compliance.pdf HIPAA Compliance Policy] | |||
*UNMC Policy No. 6036, [[Reproducing_Copyrighted_Materials|Reproduction of Copyrighted Materials]] | *UNMC Policy No. 6036, [[Reproducing_Copyrighted_Materials|Reproduction of Copyrighted Materials]] | ||
*UNMC Policy No. 6045, [[Privacy/Confidentiality|Privacy, Confidentiality and Information Security Policy]] | *UNMC Policy No. 6045, [[Privacy/Confidentiality|Privacy, Confidentiality and Information Security Policy]] | ||
*UNMC Policy No. 6057, [[Protected Health Information (PHI)|Use and Disclosure of Protected Health Information]]). | *UNMC Policy No. 6057, [[Protected Health Information (PHI)|Use and Disclosure of Protected Health Information]]). | ||
*UNMC Policy No. 6065, [[Fax Transmissions|Facsimile Transmissions]]). | *UNMC Policy No. 6065, [[Fax Transmissions|Facsimile Transmissions]]). | ||
*[http://www.unmc.edu/its/information_security_procedures.htm UNMC Information Security Procedures] | |||
[http://www.unmc.edu/its/ | |||
*[http://www.copyright.gov/legislation/dmca.pdf The Digital Millennium Copyright Act of 1998] | *[http://www.copyright.gov/legislation/dmca.pdf The Digital Millennium Copyright Act of 1998] | ||
*[http://www.copyright.gov/ U.S. Copyright Office - General Guidelines About Copyright Law] | *[http://www.copyright.gov/ U.S. Copyright Office - General Guidelines About Copyright Law] | ||
This page maintained by dkp. | This page maintained by [mailto:dpanowic@unmc.edu dkp]. |