Protected Data Communication via Conferencing and Video Services


This policy establishes the required guidelines for the use of HIPAA/FERPA protected healthcare conferencing and video services (e.g. Healthcare Zoom) by workforce members to discuss Protected Data.  Permitted uses are: case conferences, preceptor consultations, HIPAA/FERPA protected conferencing and video services, student performance measures, care coordination, student advising sessions, and administrative meetings.

PUNID required to review policy.

Updated August 2022.

Tuesday, March 12, 2019

Remote Access Policy and Procedure


This policy applies universally to all remote access, regardless of ownership of the equipment used to perform the remote access. Pacific University determines the financial and technical feasibility of implementing technical controls and remote workstation security enhancements.

PUNID required to review policy.

Revised 2/8/2022

Tuesday, Jan. 29, 2019

Risk Analysis and Management Policy and Procedures | UIS


Pacific University has adopted this Risk Analysis and Management Policy in order to recognize the requirement to comply with Information Security Requirements. Under the guidance of Senior Leadership, Pacific University will conduct periodic assessments of potential risks and vulnerabilities to the confidentiality, integrity, and availability of electronic Protected Data of which we have been entrusted.

Senior Leadership will be responsible for receiving, reviewing and acting upon the risk analysis, including assessing assignment of risk, prioritizing risk mitigation, and advocating for resources needed to implement a risk mitigation plan.

Updated 2/25/20
PUNID required to review policy.

Tuesday, Feb. 12, 2019

Security Evaluation Policy and Procedures | UIS


Pacific University takes reasonable and appropriate steps to conduct periodic technical and non-technical evaluations of its security safeguards in order to demonstrate and document the extent of the university’s compliance with its security policies and applicable laws and regulations. These safeguards include policies, controls, and processes, which are updated in response to environmental or operational changes affecting the security of Protected Data. The evaluations will be completed by a team or individual designated by Pacific University's Information Security Officer.

PUNID required to review this policy.


Tuesday, Jan. 29, 2019

Technology and Information Services Purchasing Policy | UIS


The purpose of this policy is to utilize University Information Services’ expertise to help purchasers make technology purchases that best benefit the university and avoid potential problems. UIS can help purchasers purchase the most cost effective technology and the technology UIS is best able to support, as well as avoid potential incompatibilities and legal issues. The policy also ensures that technology that needs to be tracked is recorded in UIS property databases and that the ownership of technology is clear.

PUNet ID required to review this policy.

Thursday, Nov. 29, 2018

UIS Digital Signage Policy

This policy provides a universal framework for digital signage communication.

Monday, Feb. 23, 2015

UIS Mobile Application Development Policy

This policy concerns the development of mobile applications ("apps") by and for the university.

Monday, Feb. 23, 2015

University Purchased Tablet Policy | UIS


This document covers tablet devices purchased by the University with University funds.  For information about UIS support of personally owned tablets, see the Service Level Agreement for Computer Support (located at

PUNet ID required to review this policy.

Thursday, Nov. 29, 2018

Workforce Security Policy and Procedures | UIS


Pacific University has adopted this Workforce Security Policy to ensure the confidentiality, integrity, and availability of all Protected Data we create, receive, maintain, or transmit as required by federal or state regulatory requirements, including but not limited to FERPA, GLBA, HIPAA, PCI, and other regional or local applicable laws and regulations. During the course of normal operations, it will be necessary to provide Pacific University workforce members with access to electronic Protected Data. Access to sensitive materials such as this should be restricted to those individuals who have been vetted and authorized for such access and possess a need to know to perform the course of their duties. Workforce clearance procedures screen access to Protected Data and ensure that only those individuals who should possess access have access.

PUNID required to review policy.

Tuesday, Jan. 29, 2019

Workstation Security and Use Policy | UIS


Policy safeguards Protected Data, which may reside on, or be accessed through Pacific University workstations. Members of the Pacific University workforce are expected to adhere to this policy whenever they are using workstations to access Protected Data.

PUNID required to review policy.

Tuesday, Jan. 29, 2019