Library Search Results

 Library Search Results

Results from your Search are visible below.  You may further refine your search using the Refine Your Results links below, right.  Clicking on one of the refinement items will return a subset of your original search.  To return to your original results, simply choose the "Any [term] link at the top of each section.  You may also sort your results, either by Relevance/Ranking (default result), Title, or Date Modified. 
11-20 of 27 results
Sort by: 
UAB Policy
This policy establishes guidelines for departments engaged in administration, education, research, and clinical programs that utilize portable computing devices and/or use portable storage devices or who are considering their implementation in the future.
UAB Policy
This policy establishes guidelines for contingency planning for information systems that contain, maintain, or transmit ePHI or other sensitive information.
UAB Policy
This policy establishes guidelines for ongoing risk analysis and management of ePHI, which will assist in determining the value of assets and the corresponding exposure to threats and vulnerabilities.
UAB Policy
This policy establishes guidelines for the secure reallocation and disposal of media that contain sensitive data.
UAB Policy
This policy ensures that UAB covered entities implement certain human resources requirements to protect against the wrongful use or disclosure of protected health information (PHI) in compliance with the Health Insurance Portability and Accountability Act ("HIPAA") and Alabama state law.
UAB Procedure
This standard defines password/passphrase requirements for users, servers, and applications at UAB that use BlazerIDs or other authentification identifiers.
UAB Policy
All laptops that are used for UAB business must adhere to the Portable Computing Device Security Standards. This document defines these standards and outlines the procedures for protecting a portable computing device.
UAB Policy
UAB will comply with copyright law and license agreements entered into with vendors or authors of computer software. No illegally obtained or illegally copied computer software is allowed at UAB. UAB does not condone illegal copying of computer software or the use of illegally copied or obtained computer software.
UAB Policy
The Computer Software Policy describes the process for maintaining intellectual property, ownership and equities, with regards to computer software developed at UAB.
UAB Procedure
This procedure establishes a graduated disciplinary response to security violations in accordance with U.S. Department of Defense regulations and the University's security agreement with the Department of Defense.