Skip to content Skip to navigation

Security

6.7.1 Administrative Computing Systems

Last updated on:

This Guide Memo describes the policy that governs the Administrative Computing Systems at Stanford University and identifies Administrative Computing System ownership, development and management responsibilities. This policy applies to all computerized systems involved with the creation, updating, processing, outputting, distribution, and other uses of administrative information at Stanford.

6.3.1 Information Security

Last updated on:

The purpose of this policy is to ensure the protection of Stanford's information resources from accidental or intentional unauthorized access or damage while also preserving and nurturing the open, information-sharing requirements of its academic culture. This Guide Memo states requirements for the protection of Stanford's information assets.

6.4.1 Identification and Authentication Systems

Last updated on:

This Guide Memo states requirements for identifying and authenticating users of Stanford computer systems and networks, and describes centrally-supported identification and authentication facilities.

6.1.1 Privacy and Access to Electronic Information

Last updated on:

This guide memo establishes a policy on privacy in Electronic Information and the circumstances under which Electronic Information may be accessed and/or disclosed without User Consent.

6.2.1 Computer and Network Usage Policy

Last updated on:

This policy covers the appropriate use of all information resources including computers, networks, and the information contained therein.

6.6.1 Information Security Incident Response

Last updated on:

This Guide Memo describes the procedures to be followed when a computer security incident is discovered to have occurred involving an Academic or Administrative Computing System operated by Stanford University, its faculty, students, employees, consultants, vendors or others operating such systems on behalf of Stanford. It also describes the procedures to be followed when Prohibited or Restricted Information residing on any computing or information storage device is, or may have been, inappropriately accessed, whether or not such device is owned by Stanford. This policy outlines the procedures for decision making regarding emergency actions taken for the protection of Stanford's information resources from accidental or intentional unauthorized access, disclosure or damage.

1.6.1 Privacy Policy

Last updated on:

Stanford University has an interest in ensuring that the privacy of its students, faculty, and staff is respected. The University is committed to protecting the privacy of Prohibited, Restricted and Confidential Information within its control in a manner consistent with applicable laws, regulations and University policies.

1.6.2 Privacy and Security of Health Information (HIPAA)

Last updated on:

This Guide Memo describes Stanford University's implementation of the Health Insurance Portability and Accountability Act of 1996 ("HIPAA") and its regulations ("Privacy Rule" and "Security Rule") governing the protection of identifiable health information by health care providers and health plans. The portions of Stanford University that are impacted by HIPAA include the Stanford University HIPAA Components and the Group Health Plan, defined in Sections 3 and 4, respectively.

This Guide Memo references Stanford University HIPAA Components policies on the University HIPAA website and the Group Health Plan HIPAA policies. The Group Health Plan maintains HIPAA policies and procedures in the Resource Library section of the Benefits website. These policies outline more specific rights of individuals regarding their protected health information ("PHI") as well as the operational and system requirements to comply with the Privacy and Security Rules.

2.1.3 Personnel Files and Data

Last updated on:

The University maintains personnel information for each employee in order to have a complete, accurate and current record of the employee's salary and job history at the University. This guide memo sets forth policies and procedures to facilitate the establishment, use and maintenance of personnel data, in whatever form maintained.

Subscribe to RSS - Security