Search40 Results
- Knowledge Base
- Finance and Operations
- Finance
- Travel and Payment Card Services
Every two years after completion of the initial T&E Accountholder training, T&E accountholders must complete mandatory online refresher training. The training covers applicable restrictions, policies and reconciliation procedures. Accountholders are also required to pass an associated quiz.
- Knowledge Base
- Finance and Operations
- Finance
- Travel and Payment Card Services
Every two years after completion of the initial P-Card Accountholder training, P-Card accountholders must complete mandatory online refresher training. The training covers applicable restrictions, policies and reconciliation procedures. Accountholders are also required to pass an associated quiz.
- Knowledge Base
- Information Technology Services
- Information Security
Protected Health Information (PHI) and Sensitive Information (SI) that is transmitted or received on behalf of the University of North Carolina at Chapel Hill by any Constituent must be encrypted in accordance with this Standard, which details required minimum encryption standards for University Tier 2 and Tier 3 information. Particular transmissions may require a heightened encryption requirement or consideration of additional legal or policy requirements.
- Knowledge Base
- Human Resources and Equal Opportunity and Compliance
- Human Resources
The purpose of this Procedure is to outline the process for the disclosure, reporting, and oversight of Related Persons in academics and the workplace and Romantic Relationships between Employees and Students as defined in the Policy on Nepotism and Interpersonal Relationships (“Policy”).
- Knowledge Base
- Research
- Office of the Vice Chancellor for Research
Public trust in the integrity and ethical behavior of scholars must be maintained if research is to continue to play its proper role in our University and society. While the primary responsibility for maintaining integrity in research rests with those who conduct it, the University has established standards to ensure a healthy environment for research and compliance with law.
- Knowledge Base
- Information Technology Services
This policy sets up a framework for protecting University data. This framework: gives responsibilities to the stewards, managers, and custodians of University data; empowers the Enterprise Data Coordinating Committee (EDCC) to give advice about the best way to manage and protect enterprise data that still meets the University’s needs; and charges the EDCC with recommending standards and procedures for governing enterprise data.
- Knowledge Base
- Information Technology Services
The University has obligations to ensure integrity and accessibility of records, and security of sensitive University information that may be sent or received via email. This policy advises individuals of their obligations to use only their University email account and not personal email accounts for University business and to manage the records resulting from that use in accordance with applicable policy, standards, and procedures.
- Knowledge Base
- Information Technology Services
This policy describes the terms required for use of ConnectCarolina, InfoPorte, associated reporting tools, and other University business applications (“Administrative Systems”).
- Knowledge Base
- Information Technology Services
This policy defines a framework for the Information Security Program. It gives direction for policies, standards, and procedures that relate to security. These documents tell us how to include information security in all the ways we work at the University of North Carolina at Chapel Hill.
- Knowledge Base
- Information Technology Services
The Onyen ("Only Name You'll Ever Need") is a unique identifier given to everyone affiliated with the University. The Onyen gives each person secure access to electronic resources and proves their identity if they follow this policy.
- Knowledge Base
- Information Technology Services
This Standard to the Policy on Enterprise Data Governance describes each role that plays a part in governing University Data at the University of North Carolina at Chapel Hill ("University"). The roles are: Enterprise Data Coordinating Committee (EDCC); data trustees, data stewards, and data managers, who make up the Data Governance Oversight Group (DGOG); and data custodians in units across campus. This Standard also defines what kind of data makes up the University’s "enterprise data."
- Knowledge Base
- Information Technology Services
All members of the University community who engage with any University information technology (including wireless or other networks) must adhere to this Acceptable Use Policy.
- Knowledge Base
- Information Technology Services
The Information Classification Standard gives a structure for the University's information. This structure helps us recognize the types of University Information we handle. It makes it easier to keep the information safe. This Standard considers the University's academic culture, which values sharing information. Classifying information the right way gives everyone at the University, at every level, a structure that supports their University activities.
- Knowledge Base
- Information Technology Services
Requirements for all data network activities at the University. Central coordination of data networks supports the University mission of education, service, and research. It is the responsibility of ITS to coordinate, monitor, and manage University network traffic and activities. Compliance with this policy and related Standard helps our campus facilities adhere to FCC and other regulatory requirements, not disrupt statewide or larger networks, and provide robust and reliable services..
- Knowledge Base
- Information Technology Services
- Information Security
Failure to protect information through the use of strong passwords/pass-phrases and additional authentication methods may result in incidents that expose sensitive information and/or impact mission-critical UNC-Chapel Hill services. This Standard outlines minimum requirements for authentication mechanisms for information systems under the University's control and password strength and other requirements for accounts on University systems and accounts that use University data.