Our information security policies provide guidance on how RF business information is to be handled by all employees. All Research Foundation employees must be aware of these policies and procedures designed to ensure the security of the Research Foundation’s information assets, minimize the number and impact of security incidents, and provide an easy to understand framework within which information workers can safely and confidently conduct RF business.
 

Procedure for Electronic Signatures
The Research Foundation has implemented an electronic form processing system for procurement of goods and services, grant proposal routing and submission, and more. This system utilizes a process whereby a user inputs their domain login & password to electronically sign forms, negating the need for paper copies of forms with physical signatures.
All employees who utilize electronic signatures must download, print, and sign the Electronic Signature Acknowledgement Form, and return it to the RF Human Resources office.


Please familiarize yourself with the following:
 

Acceptable Use and Security of RF Data and Information Technology

RF Confidential Information Policy

Confidentiality of Employee Information Policy

Guidelines for Protecting Research Foundation Data

Notification Procedure for Electronic Breach of Information Security

Protected Health Information and HIPAA Policy