![]() ![]()
Given the prevalence of restricted data (e.g., protected health information, financial information, personal information, intellectual property) in the UCSF environment, all endpoints (desktops, laptops and mobile devices, including mobile phones and tablets) used for UCSF business must be encrypted.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |