IS-3

Items related to BFB-IS-3: Electronic Information Security Policy

Instructions for Registering P4 Workstations in Socreg

Requirement:

P4 workstations need to be registered as Protected Data Applications in Socreg. This applies to:

Workstations that store P4 Institutional Information. Workstations that are used to connect to P4 systems or services IF the user's credentials provide access to P4 Institutional Information in that system/service. Workstations that are used to administer P4 systems or services. Process:

To register a large number of P4 workstations, please contact socreg@berkeley.edu for assistance. Otherwise, select one of the...

Cybersecurity Posters and Flyers

Security is a shared responsibility. We all have a part to play. Know what you are working with and protect research with these handy flyers.

Click on the image(s) to download the pdfs.

IS-3 Resources for Researchers

Overview

Increasingly, data sharing agreements and research funding agreements include cyber security requirements. Researchers working with protected data may be affected by the updates from the system-wide Information Security Policy (IS-3).

If you’re conducting research on behalf of UC, you’re considered a Workforce Member and should follow the requirements for that role. Additionally, if you’re working with information...

Where can I get detailed questions answered regarding the new IS-3?

Units interested in detailed information about IS-3 controls; roles and responsibilities; and implementation tools from the UC Systemwide Policy Office can contact ISO at security@berkeley.edu to request access to the systemwide materials.