policy:data_privacy:management_and_oversight
Differences
This shows you the differences between two versions of the page.
Next revision | Previous revision | ||
policy:data_privacy:management_and_oversight [2019/03/28 17:33] – created tonyromero | policy:data_privacy:management_and_oversight [2019/06/05 19:28] (current) – [University of Colorado Denver Security Management HIPPA Policy] tonyromero | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== | + | ====== |
- | Here's some formatting stuff to show off what a policy could look like. | + | ==== University of Colorado IT Security Program Policy ==== |
- | ===== Sub Heading ===== | + | All data and information resources of the SEHD are subject to University of Colorado' |
- | :!: **Important: | + | > The Program shall be managed and monitored collaboratively by the Chief Information Security Office (CISO), campus Information Security Officers, Security Advisory Committee (SAC), and other University representatives as appropriate. |
- | **Note:** Lorem ipsum dolor sit amet, consectetur adipiscing elit. | + | ==== University of Colorado Denver HIPPA Policy |
- | ===== Headline ===== | + | |
- | Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean eu eleifend orci, vel scelerisque nisi. Praesent finibus euismod auctor. Cras leo massa, auctor eu cursus nec, volutpat eu sapien. Cras mollis euismod diam, eu viverra elit ornare sit amet. Mauris vel dolor vel magna molestie eleifend tempor vitae massa. Phasellus at lacus a libero pharetra imperdiet vitae sed lorem. Pellentesque eu dictum sem. | + | As applicable, the most secure SEHD data are subject to the UCD HIPPA policy. As stated on the [[http:// |
- | ---- | + | > Responsibility for HIPAA compliance is coordinated by the Office of Regulatory Compliance under the direction of the Associate Vice Chancellor for Regulatory Compliance, Dr. Alison D. Lakin, RN, LLB, LLM, PhD. |
- | ===== Various Underlines ===== | ||
- | Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean eu eleifend orci, vel scelerisque nisi. Praesent finibus euismod auctor. Cras leo massa, auctor eu cursus nec, volutpat eu sapien. Cras mollis euismod diam, eu viverra elit ornare sit amet. Mauris vel dolor vel magna molestie eleifend tempor vitae massa. Phasellus at lacus a libero pharetra imperdiet vitae sed lorem. Pellentesque eu dictum sem. | + | ==== SEHD Secure Data Server ==== |
- | ===== List Items ===== | + | The SEHD Secure Data Server's security program is monitored collaboratively by the SEHD Data Governance Manager, |
- | + | ||
- | - One | + | |
- | - something | + | |
- | - three | + | |
- | - eleven | + | |
- | - five hundred((I'm adding | + | |
- | + | ||
- | Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean eu eleifend orci, vel scelerisque nisi. Praesent finibus euismod auctor. Cras leo massa, auctor eu cursus nec, volutpat eu sapien. Cras mollis euismod diam, eu viverra elit ornare sit amet. Mauris vel dolor vel magna molestie eleifend tempor vitae massa. Phasellus at lacus a libero pharetra imperdiet vitae sed lorem. Pellentesque eu dictum sem. | + | |
- | + | ||
- | ---- | + | |
- | + | ||
- | ==== Slightly Lower Header ==== | + | |
- | + | ||
- | |We can also use tables|for describing various policies| | + | |
- | | | | | + | |
- | | | | | + | |
- | + | ||
- | \\ | + | |
policy/data_privacy/management_and_oversight.1553794417.txt.gz · Last modified: 2019/03/28 17:33 by tonyromero