Verified Access
Verified access supports UC Santa Cruz compliance with requirements mandated by the UC Office of the President.
Starting on May 28, 2025, all systems on UCSC networks must be protected by verified access. UCSC networks include UCSC Virtual Private Network (VPN), and systems in the Communications Building Data Center, Quincy Data Center, Amazon Web Services (AWS). See list of UCSC systems protected by verified access (UCSC login required).
How to set up devices for verified access
To connect to systems protected by verified access, computers and devices must have UCSC Security Software and Device Management Tools installed:
- Self-managed computers and devices: Will need to install UCSC Security Software and Device Management Tools. Detailed instructions will be available soon.
- ITS-managed computers and devices: No action is needed. All ITS-managed computers will have UCSC security software and device management tools installed.
Security exceptions
If you have a university-business need to use a device that cannot run the UCSC Security Software and Device Management Tools, you may request a security exception (UCSC login required.) Security exception requests will be reviewed by the office of the UCSC Chief Information Security Officer.
Examples of exceptions include:
- Devices like Chromebooks, mobile devices, or servers.
- Complex or unique use cases.
If you are not sure whether an exception is needed, submit a security exception request and the Information Security Team will follow up with you.
How devices are secured
The UCSC Security Software and Device Management Tools:
- Scan computers and devices continuously to detect and respond to potential threats, including malware, zero-day exploits, and advanced persistent threats.
- Save only the most recent 10-minute record of activity, which may include things like active applications, network activity, and file downloads.
- UC employees that manage the security software and device management tools must adhere to UC Electronic Communications Policy (see section 4C, 2b), which restricts university employees who operate and support IT systems from intentionally searching for or disclosing personal or confidential information.
Questions?
ITS is here to answer your questions and help with all your technology needs. Contact us for assistance.
- Online
- Call: (831) 459-HELP (4357)
- Email: help@ucsc.edu