Library Search Results

 Library Search Results

Results from your Search are visible below.  You may further refine your search using the Refine Your Results links below, right.  Clicking on one of the refinement items will return a subset of your original search.  To return to your original results, simply choose the "Any [term] link at the top of each section.  You may also sort your results, either by Relevance/Ranking (default result), Title, or Date Modified. 
1-5 of 5 results
Sort by: 
UAB Policy
UAB computer and network devices may only be used for work related to the university or for other approved activities. If these resources are used for destructive, disruptive or illegal activities, the right to use these resources may be revoked.
UAB Procedure
This standard defines password/passphrase requirements for users, servers, and applications at UAB that use BlazerIDs or other authentification identifiers.
UAB Policy
This policy governs the way in which University employees are authorized to access and interact with sensitive and restricted/PHI institutional data (as categorized by UAB's Data Classification Rule). This policy complements recently revised and developed IT security policies and rules, including the Data Protection and Security Poilcy, Data Classification Rule, and Data Protection Rule.
UAB Policy
Data (electronic) created at UAB must be protected and maintained in accordance with all applicable federal and state laws and university policies.
UAB Policy
This policy governs the use or creation of digital mass communications or digital content in pursuit of official UAB business or in association with the UAB brand.