Search30 Results

This Policy prohibits (i) all forms of Discrimination and Harassment based on Protected Status; (ii) Sexual Violence and Sexual Exploitation, (iii) Stalking and Interpersonal Violence, which need not be based on an individual’s Protected Status; (iv) Complicity for knowingly assisting in an act that violates this Policy; and (iv) Retaliation against an individual because of their good faith participation in the reporting, investigation, or adjudication of violations of this Policy.
This policy establishes a governance framework designed to promote and safeguard the appropriate and effective use of Enterprise Data.
This Standard to the Policy on Enterprise Data Governance describes the roles, responsibilities, and scope of authority of the Enterprise Data Coordinating Committee (EDCC), Data Trustees, Data Stewards, Data Managers (comprising the Data Governance Oversight Group (DGOG)), and Data Custodians in distributed Units. Further, this Standard defines data types that comprise University "Enterprise Data" and identifies the scope of authority for governance of each role and group.
The University of North Carolina at Chapel Hill's (UNC-Chapel Hill) Information Classification Standard defines a structure for the University's institutional information. This Standard is intended to guide University Constituents in recognizing the types of University Information they handle in order to better safeguard that information. This Standard takes into account the open, information sharing mission of the University's academic culture.
This Standard provides requirements for the procurement of accessible Digital Content, Resources, and Technology (“Digital Material”). Implementing this standard will ensure that all individuals have access to Digital Material purchased by or on behalf of the University in compliance with the Policy on Digital Accessibility and with governing law.
This Standard sets out the minimum requirements for creating accessible Digital Content, Resources, and Technology (“Digital Material”) to advance the University’s commitment to providing equitable access in compliance with the University Policy on Digital Accessibility. Accessibility is a shared responsibility among those who maintain University Digital Material.
The University is committed to establishing a welcoming and equitable digital experience. This policy provides direction on creating an accessible experience that enhances usability for everyone. Implementing this policy will ensure that all individuals have access to Digital Content, Resources, and Technology (“Digital Material”) provided by or on behalf of the University.
Requirements related to Information Technology-related incidents including data breach (or possible data breach), misuse of equipment/applications/data, loss of University-owned equipment, or related.
To provide guidance for individuals and units on responsibilities for managing suppliers of Information Technology (IT) services, software, and systems. To manage risk to university information and other assets by creating clearer communication and understanding between vendors and University staff. To define required security controls monitoring activities.
This policy defines the framework upon which the University information security program operates and gives direction for Information Security-related Policies, Standards, and Procedures to address specific areas of operation.
The University has obligations to ensure integrity and accessibility of records, and security of sensitive University information that may be sent or received via email. This policy advises individuals of their obligations to use only their University email account and not personal email accounts for University business and to manage the records resulting from that use in accordance with applicable policy, standards, and procedures.
Adherence to the procedures outlined below will streamline the handling of Information Security Incidents and minimize the timeframe during which Sensitive Information and Mission-Critical Resources exist in a vulnerable state.
The Onyen (originally, the "Only Name You'll Ever Need") is a campus-wide identifier used to gain access to various electronic resources. The Onyen provides each University user with secure access and ensures proper authentication when used in accordance with this policy.
Failure to protect information through the use of strong passwords/pass-phrases and additional authentication methods may result in incidents that expose sensitive information and/or impact mission-critical UNC-Chapel Hill services. This Standard outlines minimum requirements for authentication mechanisms for information systems under the University's control and password strength and other requirements for accounts on University systems and accounts that use University data.
The Wireless Standard provides a structure for managing the shared resource of wireless communications spectrum on the UNC-Chapel Hill campus. The UNC-Chapel Hill technology infrastructure is provided to support University operations and its mission of education, service, and research.