CON Facilities and Resources: Difference between revisions

From University of Nebraska Medical Center
Jump to navigation Jump to search
Line 34: Line 34:
<p style="margin-left:4em;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;6.2.4&nbsp;&nbsp;&nbsp;&nbsp;[[Use of Personnel/Students and Facilities for Research]]</p>
<p style="margin-left:4em;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;6.2.4&nbsp;&nbsp;&nbsp;&nbsp;[[Use of Personnel/Students and Facilities for Research]]</p>
<p style="margin-left:4em;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;6.2.5&nbsp;&nbsp;&nbsp;&nbsp;[[CON Student Use of Clinically Related Lab Supplies and Equipment|Student Use of Clinically Related Lab Supplies and Equipment]]</p>
<p style="margin-left:4em;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;6.2.5&nbsp;&nbsp;&nbsp;&nbsp;[[CON Student Use of Clinically Related Lab Supplies and Equipment|Student Use of Clinically Related Lab Supplies and Equipment]]</p>
<p>6.2.6 [[CON Research Data Security and Storage|Research Data Security and Storage]]</p>
<p style="margin-left:4em;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;6.2.6&nbsp;&nbsp;&nbsp;&nbsp;[[CON Research Data Security and Storage|Research Data Security and Storage]]</p>

Revision as of 14:11, March 16, 2017

Home   Facilities and Resources                    


6.0      Facilities and Resources

6.1      Clinical Agencies and Preceptors

          6.1.3    Selection and Use of Preceptors in Undergraduate Program

          6.1.4    Selection and Use of Preceptors for Specialty Roles

6.2      Use of College Resources and Facilities

          6.2.1    Loan of Media and Media, Simulation and Computer Equipment

          6.2.2    Audio Visual Equipment, Media and Computer Hardware and Software

          6.2.3    Grant Equipment Policy

          6.2.4    Use of Personnel/Students and Facilities for Research

          6.2.5    Student Use of Clinically Related Lab Supplies and Equipment

          6.2.6    Research Data Security and Storage