Search102 Results
- Knowledge Base
- Research
- Research Integrity
This procedure explains how the University responds to allegations of Research Misconduct.
- Knowledge Base
- Information Technology Services
This policy defines a framework for the Information Security Program. It gives direction for policies, standards, and procedures that relate to security. These documents tell us how to include information security in all the ways we work at the University of North Carolina at Chapel Hill.
- Knowledge Base
- Information Technology Services
The Onyen ("Only Name You'll Ever Need") is a unique identifier given to everyone affiliated with the University. The Onyen gives each person secure access to electronic resources and proves their identity if they follow this policy.
- Knowledge Base
- Information Technology Services
The Wireless Standard provides a structure for managing the shared resource of wireless communications spectrum on the UNC-Chapel Hill campus. The UNC-Chapel Hill technology infrastructure is provided to support University operations and its mission of education, service, and research.
- Knowledge Base
- Information Technology Services
All members of the University community who engage with any University information technology (including wireless or other networks) must adhere to this Acceptable Use Policy.
- Knowledge Base
- Information Technology Services
The Information Classification Standard gives a structure for the University's information. This structure helps us recognize the types of University Information we handle. It makes it easier to keep the information safe. This Standard considers the University's academic culture, which values sharing information. Classifying information the right way gives everyone at the University, at every level, a structure that supports their University activities.
- Knowledge Base
- Information Technology Services
This standard provides structure for effective operation of data networks for the University in accordance with the UNC-Chapel Hill Data Network Policy. This document represents minimum requirements related to all forms of data networking at the University.
- Knowledge Base
- Information Technology Services
Requirements for all data network activities at the University. Central coordination of data networks supports the University mission of education, service, and research. It is the responsibility of ITS to coordinate, monitor, and manage University network traffic and activities. Compliance with this policy and related Standard helps our campus facilities adhere to FCC and other regulatory requirements, not disrupt statewide or larger networks, and provide robust and reliable services..
- Knowledge Base
- Information Technology Services
- Information Security
The University's Information Security Office is working to make the Information Security Program more consistent and clear. This Standard provides definitions that will apply to all Information Security Policies, Standards, and Procedures as they are updated to refer to it.
- Knowledge Base
- Information Technology Services
- Information Security
Protected Health Information (PHI) and Sensitive Information (SI) that is transmitted or received on behalf of the University of North Carolina at Chapel Hill by any Constituent must be encrypted in accordance with this Standard, which details required minimum encryption standards for University Tier 2 and Tier 3 information. Particular transmissions may require a heightened encryption requirement or consideration of additional legal or policy requirements.
- Knowledge Base
- Information Technology Services
- Information Security
Failure to protect information through the use of strong passwords/pass-phrases and additional authentication methods may result in incidents that expose sensitive information and/or impact mission-critical UNC-Chapel Hill services. This Standard outlines minimum requirements for authentication mechanisms for information systems under the University's control and password strength and other requirements for accounts on University systems and accounts that use University data.
- Knowledge Base
- Information Technology Services
- Information Security
To describe minimum requirements for members of the University of North Carolina at Chapel Hill ("University" or "UNC-Chapel Hill") experiencing a concern that might indicate a Possible Information Security Incident. To specify Information Security Incident authority and role requirements for Information Security Incident Handlers and Information Security Liaisons.
- Knowledge Base
- School of Medicine
- Offices of Medical Student Education
This Procedure provides the attendance expectations for Medical Doctorate Program students as it relates to University Holidays, Wellness Days, and Day-backs.
- Knowledge Base
- School of Medicine
- Offices of Medical Student Education
This Policy outlines the attendance expectations for Medical Doctorate Program students as it relates to University Holidays, Wellness Days, and Day-backs.
- Knowledge Base
- School of Medicine
- Offices of Medical Student Education
The purpose of this Procedure is to outline steps for students to follow when using absence days in the Foundation Phase and steps for notification of Student Affairs Leadership, the Committee on Professionalism Education (CoPE), and the Student Progress Committee in the event of non-compliance.