Information Technology

Privacy and Online Monitoring

Defines requirements for notice, analysis, review, and approval of routine monitoring practices. If monitoring involves electronic communications, the escalation process for non-routine use of monitoring data must meet the requirements of the systemwide Electronic Communications policy.

Privacy Statement for UC Berkeley Websites

Ensures that campus websites and servers do not actively share (re-distribute or sell) personally-identifiable information that they may collect

Departmental Information Security Contact Policy

This Policy establishes responsibilities of Departments and Information Security Contacts in order to ensure that the UC Berkeley Information Security Office (ISO) is able to contact departments in the event of a security incident. The ability to quickly contact responsible personnel and have them take appropriate action is critical in mitigating the negative effects of an incident.

Copyright Notices on Campus Websites

Although a notice is not legally required to assert copyright on works published on and after March 1, 1989, displaying a copyright notice on websites is still a very good idea. A notice clarifies who owns the work, emphasizes that the owner asserts copyright, and encourages contact by those who wish to use the material. If any legal disputes arise, a posted notice may help defend against claims of "innocent infringement".

Campus Information Technology Security Policy

In order to fulfill its mission of teaching, research, and public service, the campus is committed to providing a secure yet open network that protects the integrity and confidentiality of information while maintaining its accessibility. Each member of the campus community is responsible for the security and protection of electronic information resources over which they have control. Resources to be protected include networks, computers, software, and data. The physical and logical integrity of these resources must be protected against threats such as unauthorized intrusions, malicious misuse, or inadvertent compromise. Activities outsourced to off-campus entities must comply with the same or equivalent security requirements as in-house activities.

Redelegation to Associate Vice Chancellor - Information Systems and Technology (2003)

Brief description of redelegated authority:

Serve as Berkeley campus Electronic Resource Security Guidelines Coordinator

Date: 3/26/2003 Delegated from: Chancellor Delegated to: Associate Vice Chancellor - Information Systems and Technology Can redelegate? Yes Original document source: available upon request

BFB-IS-3: Electronic Information Security (2019)

Brief description of delegated authority: appoint responsible parties to implement the IS-3 policy for the Berkeley campus Date: 10/25/2019 Delegated from: Chief Information Officer and Vice President - Information Technology Services, Office of the President Delegated to: Chancellor Can redelegate? Yes Original document source: https://policy.ucop.edu/doc/7000543/BFB-IS-3