Search300 Results
- Knowledge Base
- Information Technology Services
This policy sets up a framework for protecting University data. This framework: gives responsibilities to the stewards, managers, and custodians of University data; empowers the Enterprise Data Coordinating Committee (EDCC) to give advice about the best way to manage and protect enterprise data that still meets the University’s needs; and charges the EDCC with recommending standards and procedures for governing enterprise data.
- Knowledge Base
- Information Technology Services
This policy describes the terms required for use of ConnectCarolina, InfoPorte, associated reporting tools, and other University business applications (“Administrative Systems”).
- Knowledge Base
- Information Technology Services
- Digital Accessibility Office
This Standard sets out the minimum requirements for creating accessible Digital Content, Resources, and Technology (“Digital Material”) to advance the University’s commitment to providing equitable access in compliance with the University Policy on Digital Accessibility. Accessibility is a shared responsibility among those who maintain University Digital Material.
- Knowledge Base
- Information Technology Services
The Onyen ("Only Name You'll Ever Need") is a unique identifier given to everyone affiliated with the University. The Onyen gives each person secure access to electronic resources and proves their identity if they follow this policy.
- Knowledge Base
- Information Technology Services
The University of North Carolina at Chapel Hill (“University”) has a strong interest in the integrity, confidentiality, and availability of University information and systems. Access controls protect University information by only allowing authorized people to access systems. Following this policy minimizes risk to the University resulting from unauthorized use of resources. Access control at the University happens through procedures and standards that follow this policy.
- Knowledge Base
- Information Technology Services
All members of the University community who engage with any University information technology (including wireless or other networks) must adhere to this Acceptable Use Policy.
- Knowledge Base
- Information Technology Services
This policy defines a framework for the Information Security Program. It gives direction for policies, standards, and procedures that relate to security. These documents tell us how to include information security in all the ways we work at the University of North Carolina at Chapel Hill.
- Knowledge Base
- Information Technology Services
The University has obligations to ensure integrity and accessibility of records, and security of sensitive University information that may be sent or received via email. This policy advises individuals of their obligations to use only their University email account and not personal email accounts for University business and to manage the records resulting from that use in accordance with applicable policy, standards, and procedures.
- Knowledge Base
- Information Technology Services
Some University business units operate their own email systems. Email accounts used to conduct the business of the University require that appropriate security, backup, and records-retention measures be in place. Departments may host or contract for separate email systems using either unc.edu sub-domains (such as "physics.unc.edu") or entirely separate domains (such as "unclatindepartment.org"). This Policy addresses requirements for these units.
- Knowledge Base
- Information Technology Services
Requirements for all data network activities at the University. Central coordination of data networks supports the University mission of education, service, and research. It is the responsibility of ITS to coordinate, monitor, and manage University network traffic and activities. Compliance with this policy and related Standard helps our campus facilities adhere to FCC and other regulatory requirements, not disrupt statewide or larger networks, and provide robust and reliable services..
- Knowledge Base
- Office of the Chancellor
- Environment, Health & Safety
- Laboratory Safety Manual
To ensure that research laboratory freezer alarm systems (freezer alarms) are functional and compatible with existing monitoring equipment, this policy establishes guidelines for all university departments relating to the request for and installation and operation of freezer alarms. The existence of this policy is not a guarantee that the University will always be able to respond to freezer alarms or be able to restore temperate conditions quickly enough to prevent damage.
- Knowledge Base
- Finance and Operations
- Finance
- Travel and Payment Card Services
The purpose of this document is to create a policy to: (1) mandate training for all Travel & Expense Card (T&E Card) Accountholders and (2) enforce penalties on T&E Card Accountholders who violate their Accountholder Agreement by not complying with the terms and conditions regarding use of their T&E Card account.
- Knowledge Base
- Office of the Chancellor
- Emergency Management and Planning
The purpose of this policy is to ensure that the University is prepared for and can effectively respond to and recover from a Disaster or Emergency through the appropriate use of University and community resources. This preparation and effective response will mitigate the immediate and long-term effects on the University’s constituents, operations, and mission.
- Knowledge Base
- Finance and Operations
- Human Resources
Before finalizing or communicating an end of appointment decision for any permanent EHRA non-faculty employee, departments must contact the EHRA Non-Faculty HR Department in the Office of Human Resources (OHR) by phone so that the proposed action may be prescreened. Prescreening is not required for EHRA non-faculty temporary or student employees, postdocs, or an employee who voluntarily submits their resignation in writing or by email.
- Knowledge Base
- Office of University Counsel
- University Compliance Office
No person, on the basis of protected status, shall be excluded from participation in, be denied the benefits of, or be subjected to unlawful discrimination, harassment, or retaliation under any University program or activity, including with respect to employment terms and conditions. Such a policy ensures that only relevant factors are considered and that equitable and consistent standards of conduct and performance are applied.