62 information-security "https:" "https:" "https:" "https:" "https:" positions at University of California Irvine Health
Sort by
Refine Your Search
-
who have legitimate business need to know. Ensure that sensitive information is properly safeguarded. Follow all organizational policies and laws on data protection and privacy. This includes secure
-
, confidentiality, and security policies and procedures related to Protected Health Information (PHI) or other sensitive and personal information. Successful completion of an accredited Nurse Practitioner Program
-
policy may be reviewed by visiting the following page: https://hr.uci.edu/new-hire/conditions-of-employment.php Closing Statement: The University of California is an Equal Opportunity Employer. All
-
safeguarded. Follow all organizational policies and laws on data protection and privacy. This includes secure handling of physical and digital records and proper usage of IT systems to prevent data leaks
-
$22.12/Hr. Salary Range Maximum: USD $26.03/Hr. Who We Are UCI Health is the clinical enterprise of the University of California, Irvine, and the only academic health system based in Orange County. UCI
-
the areas of meal assembly, service and delivery, catering, dishwashing, sanitation and safety, and assisting in training of new Food Service Workers. What It Takes to be Successful Required Qualifications
-
procedures. Demonstrates an understanding of and adheres to privacy, confidentiality, and security policies and procedures related to Protected Health Information (PHI) or other sensitive and personal
-
that vision. They identify and develop organizational talent and embrace continuous learning of self and others. Staff and patient safety are a priority, and this position is directly responsible for
-
of each policy may be reviewed by visiting the following page - https://hr.uci.edu/new-hire/conditions-of-employment.php Closing Statement: The University of California is an Equal Opportunity Employer. All
-
assistance on all DSS systems and their local environment. What It Takes to be Successful Required: Intermediate knowledge of secure software development. Advanced skills associated with software design