Our information security policies provide guidance on how RF business information is to be handled by all employees. All Research Foundation employees must be aware of these policies and procedures designed to ensure the security of the Research Foundation’s information assets, minimize the number and impact of security incidents, and provide an easy to understand framework within which information workers can safely and confidently conduct RF business.
Procedure for Electronic Signatures
The Research Foundation has implemented an electronic form processing system for procurement of goods and services, grant proposal routing and submission, and more. This system utilizes a process whereby a user inputs their domain login & password to electronically sign forms, negating the need for paper copies of forms with physical signatures.
All employees who utilize electronic signatures must download, print, and sign the Electronic Signature Acknowledgement Form, and return it to the RF Human Resources office.
Please familiarize yourself with the following:
Acceptable Use and Security of RF Data and Information Technology
RF Confidential Information Policy
Confidentiality of Employee Information Policy
Guidelines for Protecting Research Foundation Data
Notification Procedure for Electronic Breach of Information Security