Search129 Results
- Knowledge Base
- Finance and Operations
- Facilities Services
The "Use of University Property Standard" at UNC-Chapel Hill provides rules for using University spaces, ensuring activities align with the University's mission and maintain campus order. It emphasizes the need for administrative approval for events and outlines specific rules for space usage.
- Knowledge Base
- Research
- Animal Care and Use and IACUC
The standards and procedures described below provide guidance to all researchers and animal handlers for the use of media (e.g., images, audio or video recordings, radiographs, ultrasound and other diagnostic imaging techniques, etc.) at the University of North Carolina at Chapel Hill (“UNC-Chapel Hill” or “University”).
- Knowledge Base
- Information Technology Services
Instructions for IT staff, system administrators, and others with IT management responsibilities on how to properly manage contents of individual persons' accounts, as well as logs and other data on individual use of IT systems. The Standard aids compliance with University IT policies including the University of North Carolina at Chapel Hill Policy on Access to Individual User Accounts (“Account Policy”).
- Knowledge Base
- Information Technology Services
The Wireless Standard provides a structure for managing the shared resource of wireless communications spectrum on the UNC-Chapel Hill campus. The UNC-Chapel Hill technology infrastructure is provided to support University operations and its mission of education, service, and research.
- Knowledge Base
- Information Technology Services
This Standard to the Policy on Enterprise Data Governance describes each role that plays a part in governing University Data at the University of North Carolina at Chapel Hill ("University"). The roles are: Enterprise Data Coordinating Committee (EDCC); data trustees, data stewards, and data managers, who make up the Data Governance Oversight Group (DGOG); and data custodians in units across campus. This Standard also defines what kind of data makes up the University’s "enterprise data."
- Knowledge Base
- Information Technology Services
Information Technology (IT) change management increases awareness and understanding of proposed IT changes. IT change management ensures that we make IT changes in a way that is better for IT systems, services, and the people who use them.
- Knowledge Base
- Information Technology Services
The Information Classification Standard gives a structure for the University's information. This structure helps us recognize the types of University Information we handle. It makes it easier to keep the information safe. This Standard considers the University's academic culture, which values sharing information. Classifying information the right way gives everyone at the University, at every level, a structure that supports their University activities.
- Knowledge Base
- Information Technology Services
This standard provides structure for effective operation of data networks for the University in accordance with the UNC-Chapel Hill Data Network Policy. This document represents minimum requirements related to all forms of data networking at the University.
- Knowledge Base
- Information Technology Services
- Information Security
The University's Information Security Office is working to make the Information Security Program more consistent and clear. This Standard provides definitions that will apply to all Information Security Policies, Standards, and Procedures as they are updated to refer to it.
- Knowledge Base
- Information Technology Services
- Information Security
Protected Health Information (PHI) and Sensitive Information (SI) that is transmitted or received on behalf of the University of North Carolina at Chapel Hill by any Constituent must be encrypted in accordance with this Standard, which details required minimum encryption standards for University Tier 2 and Tier 3 information. Particular transmissions may require a heightened encryption requirement or consideration of additional legal or policy requirements.
- Knowledge Base
- Information Technology Services
- Information Security
Failure to protect information through the use of strong passwords/pass-phrases and additional authentication methods may result in incidents that expose sensitive information and/or impact mission-critical UNC-Chapel Hill services. This Standard outlines minimum requirements for authentication mechanisms for information systems under the University's control and password strength and other requirements for accounts on University systems and accounts that use University data.
- Knowledge Base
- Information Technology Services
- Information Security
To provide guidance for individuals and units on responsibilities for managing suppliers of Information Technology (IT) services, software, and systems. To manage risk to university information and other assets by creating clearer communication and understanding between vendors and University staff. To define required security controls monitoring activities.
- Knowledge Base
- Information Technology Services
- Information Security
This standard sets a minimum baseline for managing vulnerabilities on any UNC-Chapel Hill system required by the UNC-Chapel Hill Information Security Controls Standard to be scanned for vulnerabilities. Please see the “Exceptions” section for phased implementation through 2026.
- Knowledge Base
- Information Technology Services
- Information Security
To guide University Constituents in preserving the integrity, confidentiality, and availability of University information and information systems. Access controls are intended to minimize inappropriate exposure of University information by limiting system access to authorized individuals.
- Knowledge Base
- Information Technology Services
- Information Security
This document describes who at the University of North Carolina at Chapel Hill appoints Information Security Liaisons and what those Information Security Liaisons do.