Title
University of North Carolina at Chapel Hill Policy on Information Security
Introduction
Purpose
This policy defines a framework for the Information Security Program. It gives direction for policies, standards, and procedures that relate to security. These documents tell us how to include information security in all the ways we work at the University of North Carolina at Chapel Hill ("University" or "UNC-Chapel Hill").
Scope
Everyone connected to the University and all University units.
Policy
Policy Statement
The University has an information technology environment that is:
- rich,
- complex,
- distributed,
- diverse, and
- dynamic.
To do the work of the University, everyone at the University needs technology they can trust and access. That includes people in the academic, research, and administrative functions. That is easier said than done. University systems experience challenges every day. Those challenges are always evolving. They attack the systems’ integrity and can make them less reliable or available. We need a strong information security program to meet those challenges.
Everyone at the University needs to keep University technology and data secure. To help, the Information Security Program:
- gives training,
- raises awareness,
- creates reports,
- protects sensitive information, and
- puts in place security controls.
The Information Security Program follows a framework set out in an international standard. Our University follows the International Standards Organization Standard (ISO) 27002. The Program also takes best practices from other sources. For example, industry organizations and professional associations give best practices.
Two people at the University are in charge of security. They are the Chief Information Officer and Chief Information Security Officer. These two leaders determined the ISO 27002 framework meets the University’s needs.
The Information Security Program also follows regulations like:
- the Family Educational Rights and Privacy Act (FERPA),
- the Health Insurance Portability and Accountability Act (HIPAA), and
- the North Carolina ID Theft Protection Act (NCID).
The Chief Information Security Officer:
- recommends policies that follow security-related laws and best practices.
- creates standards and procedures to give specific requirements about how to follow policies, and
- runs an Information Security Program that keeps the University secure.
Exceptions
You may find that you need an exception from part of the Information Security Program. If you do, the processes in the information security policies, standards, and procedures explain how to ask for it.
Definitions
Sensitive Information: Information that the Information Classification Standard classifies as Tier 2 or Tier 3.
Related Requirements
External Regulations and Consequences
Compliance
Failure to comply with this policy may put University information assets at risk and may have disciplinary consequences for employees, up to and including termination of employment. Students who fail to adhere to this policy may be referred to the UNC-Chapel Hill Office of Student Conduct. Contractors, vendors, and others who fail to adhere to this policy may face termination of their business relationships with UNC-Chapel Hill.
Violation of this policy may also carry the risk of civil or criminal penalties.
University Policies, Standards, and Procedures
Contact Information
Policy Contact
Unit: ITS Policy Office
Phone: 919-962-HELP
Email: its_policy@unc.edu
Other Contacts
Guidance on Specific Requests
Reach out to the ITS Policy Office (919-962-HELP or its_policy@unc.edu), or check out the resources on help.unc.edu.
Important Dates
- Effective Date and title of Approver:
- Effective Date: 6/30/2010
- Approver: Chief Information Officer
- Revision and Review Dates, Change notes, title of Reviewer or Approver:
- Last Revised Date: 10/24/2017
- Revised by: Chief Information Officer
- Substantive Revisions:
- Complete revision