Skip to Main Content

What is a Unit Information Security Lead?

The Unit Information Security Lead (UISL) is a term for the Workforce Member(s) assigned responsibility for tactical execution of information security activities in a School or Unit.

On this site Bruins can: 

→ Learn more about the Unit Information Security Lead (UISL) role.

→ Find out who your UISL, IT Strategic Partner (ITSP), and Unit Head are.

→ Explore policies and standards to learn how cybersecurity works across the UCLA campus and systemwide.

Bruin Bear

Empower the Bruin community

  • Grow a security culture by socializing policies and services.
  • Gather feedback from across campus.

 

diverse hands putting together a puzzle piece

Collaborate and Communicate

  • Promote collaboration and enhance communication to support Units in their security needs.
  • Empower the UISL community to serve as advocates for their Units.
giant lock over internal computer hardware

Support cyber maturity goals

  • Create a security-first approach that fits each Unit's needs and resources to create a more secure UCLA.
person walking and making check marks on a line leading towards a green flag

Build accountability

  • Outline and define the roles and responsibilities of UISLs as they interact with Units.
  • Identify opportunities for improvement in security practices on a regular basis.
hands holding ideas

Overview

Box is a secure UCLA-approved method to store and share documents online. You can create files and folders, share files using a direct link, and invite both internal UCLA employees and external colleagues to collaborate. Box is easily accessible from any device. UCLA’s Box services are available free of charge to everyone in the UCLA community.

BENEFITS

  1. Easy collaboration
  2. File encryption
  3. Unlimited storage
  4. 50 GB individual file limit
  5. Enterprise features such as version history and access control

BEST PRACTICES

  1. Check user permissions / access rights before sharing files. You can edit permissions to keep the file private or add a UCLA employee, external contact, or anyone with a link.
  2. Organize your files to keep track of resources.
  3. Utilize the free training provided by Box to their user community.
  4. Conduct periodic reviews of folder contents, folder access, and file access.
  5. If you are unsure whether a file or data type may be stored or shared in Box for sensitivity reasons, reach out to security@ucla.edu or help@it.ucla.edu

HELPFUL LINKS

Web Instructions for Obtaining a Departmental Box Account

Accessing your Individual Box Account

IT Service Portal - Box Knowledge Article

UCLA Box FAQs

Box Demo Video - Youtube

Box Community

Box Folder Permissions

Box FTPS

Migrating Content into Box

HUMTECH’S BOX KNOWLEDGE BASE

HumTech has compiled resources to assist Box users with navigating and understanding the Box environment. Some of the HumTech resources include video tutorials and screenshots of instructions specific to UCLA’s Box services : HumTech’s Box Starting Point. In addition to the creation of their starting point webpage, HumTech has provided server migration instructions and a presentation illustrating how HumTech’s department files were migrated to Box. 

NEED FURTHER ASSISTANCE?

Please visit the IT Services Support Portal or contact the IT Support Center at help@it.ucla.edu or by phone at (310) 267-HELP (4357).

Bruin Bear

Empower the Bruin community

  • Grow a security culture by socializing policies and services.
  • Gather feedback from across campus.

 

diverse hands putting together a puzzle piece

Collaborate and Communicate

  • Promote collaboration and enhance communication to support Units in their security needs.
  • Empower the UISL community to serve as advocates for their Units.
giant lock over internal computer hardware

Support cyber maturity goals

  • Create a security-first approach that fits each Unit's needs and resources to create a more secure UCLA.
person walking and making check marks on a line leading towards a green flag

Build accountability

  • Outline and define the roles and responsibilities of UISLs as they interact with Units.
  • Identify opportunities for improvement in security practices on a regular basis.