Our information security policies provide guidance on how RF business information is to be handled by all employees. All Research Foundation employees must be aware of these policies and procedures designed to ensure the security of the Research Foundation’s information assets, minimize the number and impact of security incidents, and provide an easy to understand framework within which information workers can safely and confidently conduct RF business.
The Research Foundation has implemented an electronic form processing system for procurement of goods and services, grant proposal routing and submission, and more. This system utilizes a process whereby a user inputs their domain login & password to electronically sign forms; negating the need for paper copies of forms with physical signatures.
All employees who utilize electronic signatures must download, print, and sign the Electronic Signature Acknowledgement Form, and return it to the RF Human Resources office.
Acceptable Use and Security of RF Data and Information Technology
RF Confidential Information Policy
Confidentiality of Employee Information Policy
Confidentiality of Health Information Policy
Guidelines for Protecting Research Foundation Data
Disciplinary Action Regarding a Breach of Confidentiality of Protected Health Information
Notification Procedure for Electronic Breach of Information Security
Some content on this page is saved in PDF format. To view these files, download Adobe Acrobat Reader free.