Change Management
Hardware Standards
Information Security
- Logging and Activity Review
- Assign Security Responsibility
- Audit Trail Requirements
- Automatic Logoff
- Contingency Planning, Disaster Recovery, and Testing Standard
- Data Backup And Restoration Standard
- Data Integrity Controls
- Elevated PC Rights Procedure
- Encryption
- Facilities Access Control
- Facility Security Plan Standard
- Incident Management
- Malicious Software Protection
- Patch Management Standard
- Physical Facility Maintenance
- Risk Acceptance Procedure
- Risk Management and Assessment
- Sanction Guidelines
- Secure Clinical Subnet (SCSN) Standard
- Security Awareness
- Separation of Duties
- Surplus And Destruction Of Storage Devices
- Surplus Procedures
- Virtual Private Network (VPN)
- Workstation Security And Use
Service Requests
Software Standards
Supporting Documents
- Accessing Epic Remotely From a MAC
- Accessing Epic Remotely From a Windows PC
- Accessing Epic using a smartphone or iPad
- Access Management Procedure Diagram
- Access Request Procedure Diagram
- Access Request Procedures
- Add-Vendor VPN Implementation Process
- Approved Senders List for Mass Email
- CREDANT External Media Shield Instructions
- Data Loss Prevention (DLP) Frequently Asked Questions
- Data Provisioning Spreadsheet
- Dell DDPE EME Installation Instructions
- Electronic Access Requirements
- Existing System Risk Management Framework
- Help with VPN Compliance
- How to Access UVA Health IT Resources Off-Site with VPN
- HSCS Lifecycle process for desktop computing devices (1).docx
- Joint VPN Implementation Process
- MAC VPN Instructions
- New System Risk Management Framework
- Password Protect Excel Spreadsheet
- Remote Your Desktop From A MAC
- Remote Your Desktop From A Windows PC
- Secure Cloud Storage Guide for Customers
- Site-to-Site VPN Implementation Process
- VPN for smartphones and iPads
- Windows VPN Instructions
System Acquisition
User Access Management
- Requesting a Medical Center Network Account
- Access Authorization
- Access Request Procedures
- Access Termination Standard
- Access Validation Procedures
- Emergency Access
- F: Drive Usage And Accountability
- Password Management
- Shared O: And Z: Drive Structure And Usage
- Vendor Connectivity
- Workforce Clearance