Policies

Engagement with Third-Party Online Program Management Providers

UC Berkeley’s administrative policy regarding academic units’ engagement with third-party online education program management service providers who provide services in exchange for a percentage of student tuition.

Domain Name System (DNS) Service Policy and Resources

The purpose of this policy is to define the terms under which the Domain Name System (DNS) is operated and maintained while also ensuring that the requirements of stakeholder groups are met. This policy is intended to ensure that the University utilizes limited DNS resources appropriately, that the University’s name and brand is protected, that security and legal risks are mitigated, and that DNS resources are allocated to the campus community appropriately.

Minimum Security Standards for Networked Devices (MSSND)

UC Berkeley’s Minimum Security Standards identify the minimum level of protection required for devices on our campus network and devices that store, process, or access institutional information.

Minimum Security Standards for Electronic Information (MSSEI)

The Minimum Security Standards for Electronic Information (MSSEI) define minimum security standards for all UC Berkeley Institutional Information and IT Resources. All Workforce Members who use or have access to Institutional Information and/or IT Resources must comply with the applicable information security requirements defined by the MSSEI.

Other Power-Driven Mobility Devices (OPDMD)

UC Berkeley must allow people with disabilities who use manual or power wheelchairs or scooters, and manually-powered mobility aids such as walkers, crutches, and canes, into all areas open to pedestrian use by members of the public. This policy also covers areas at UC Berkeley that are not open to the public.

Berkeley Campus Regulations Implementing University Policies

These regulations govern aspects of campus organizations and non-affiliates, use of University facilities, and time, place, and manner of public expression for which implementing campus regulations are required by the University Policies. The regulations address the rights and responsibilities of guests/non-affiliates and members of the University community, including faculty, staff and students, and provide standards for sustaining this community.

Roles and Responsibilities for the Protection of University Institutional Information and IT Resources (Roles and Responsibilities Policy)

A fundamental principle of information security at UC Berkeley is that all individuals in the university community have a responsibility for the security and protection of university Institutional Information and IT Resources over which they have control, according to their role(s). This policy establishes these roles and responsibilities.

Temporary Structures and Storage Buildings on the Central Berkeley Campus

Establishes rules and assigns responsibilities for the approval, and required subsequent removal, of temporary structures to house campus activities on the Central Berkeley Campus

Effort Reporting – Certifying Effort on Sponsored Projects

UC Berkeley must assure federal sponsors that the effort expended on their sponsored agreements justifies the salary and wages charged to those projects. Effort reports are required for each individual whose salary is charged to one or more federally sponsored agreements during the effort reporting period. Effort reports must to be certified by the principal investigator, employee (self certifier), or responsible official(s) with first-hand knowledge or using suitable means of verification that the work was performed.

Data and IT Resource Classification Standard

The UC Berkeley Data Classification Standard is UC Berkeley’s implementation of the UC Systemwide Data Classification Standard. UC BFB IS-3 establishes that Institutional Information and IT Resources must be protected according to their classifications. This Standard is a framework for assessing the adverse impact that loss of confidentiality, integrity or availability of Institutional Information and IT Resources would have upon the Campus. It provides the foundation for establishing security requirements for each classification of data. UC BFB IS-12 establishes Recovery Level (RL) to guide IT Recovery planning and preparation for IT Resources. At UC Berkeley, Recovery Level classification is required for non-research IT Infrastructure and Services to which IS-12 applies.