This page location is:
UAB Policies & Procedures Library
Give to UAB
Find by Title
Find by Keyword
Find by Unit
Full Text Search
Manuals and Handbooks
Board of Trustees Manual
Direction: Student Handbook
Graduate Student Handbook
You and UAB Handbook
Policy User Resources
Policy Library FAQ
Secure Content Access
Policy Development Process
Library Search Results
of 11 results
Acceptable Use of Computer and Network Resources
UAB computer and network devices may only be used for work related to the university or for other approved activities. If these resources are used for destructive, disruptive or illegal activities, the right to use these resources may be revoked.
Computer Software Copying and Use Policy
UAB will comply with copyright law and license agreements entered into with vendors or authors of computer software. No illegally obtained or illegally copied computer software is allowed at UAB. UAB does not condone illegal copying of computer software or the use of illegally copied or obtained computer software.
Computer Software Policy
The Computer Software Policy describes the process for maintaining intellectual property, ownership and equities, with regards to computer software developed at UAB.
Data Protection and Security Policy
Data (electronic) created at UAB must be protected and maintained in accordance with all applicable federal and state laws and university policies.
Export Control Policy
This policy outlines UAB's commitment to comply with all applicable laws and regulations governing exports.
Identity Theft Prevention Policy
UAB's Identity Theft Prevention Policy facilitates the University’s Identity Theft Prevention Program to detect, prevent, and mitigate identity theft in connection with the opening of certain accounts and the maintenance of certain existing accounts.
Payment Card Processing and Security Policy
This policy mandates compliance with the Payment Card Industry Data Security Standards for all UAB merchants in order to securely protect and maintain cardholder data during payment card processing, storage, or transmission.
Portable Computing Device Security Standards
All laptops that are used for UAB business must adhere to the Portable Computing Device Security Standards. This document defines these standards and outlines the procedures for protecting a portable computing device.
Procedure for Data and Safety Monitoring for Human Subjects Research - IRB PRO116
This procedure lists the responsibilities of the investigator, IRB and OIRB for conducting data and safety monitoring for Human Subjects research.
UAB IT Security Practices
The UAB IT Security Practices are designed to assist UAB IT or Health Systems Information Services system administrators in securing classified data. This document includes a checklist of items which may be used as guidelines for ensuring data security.
Refine your results by selecting from the categories and keywords below.
Any Effective Date
Greater than 1 Year
Data Security Standards (DSS)
Payment Card Industry (PCI)
UAB Web Pages Policy