Sensitive Information Terms of Use Agreement
Description:
» Subjects: , , , » Tags: ,

Auto-forwarding of email to untrusted email domains
Description: Policy clarification for all UNC-Chapel Hill affiliates regarding email accounts used to conduct University business UNC-Chapel Hill affiliates may have their email auto-forward removed if their email account is currently being forwarded to an email system that is not run by UNC-Chapel Hill or is not among systems that have agreements in place with UNC-Chapel […]
» Subjects: , , , » Tags: , , , ,

Exporting or Importing a Profile in Identity Finder
Description: If you get a new computer, you may want to export your Identify Finder profile from your old machine to the new one. If you performed an IDF scan on the old machine,┬áthe old profile would contain locations that you ignored due to false positives. If you migrated your documents to a new computer, the […]
» Subjects: , , » Tags: ,

Identity Finder Search on Mac OS X
Description: Starting a Search What will Identity Finder scan and how long will it take? Identity Finder will search your computer for any occurrences of Social Security numbers, credit card numbers, and passport numbers. It will only search local hard drives and external USB drives. It will not search remote drives connected to your computer over […]
» Subjects: , , , » Tags: ,

Sensitive Information (Onyen Restricted)
Description: -
» Subjects: , , » Tags: , ,

Examples of Sensitive Information
Description: Introduction Sensitive information is defined as data that is protected against unwarranted disclosure. Access to sensitive information should be safeguarded. Protection of sensitive information may be required for legal or ethical reasons, for issues pertaining to personal privacy, or for proprietary considerations. Sensitive information includes all data, in its original and duplicate form, for which […]
» Subjects: » Tags:

What is Sensitive Information?
Description: Sensitive information is defined as information that is protected against unwarranted disclosure. Access to sensitive information should be safeguarded. Protection of sensitive information may be required for legal or ethical reasons, for issues pertaining to personal privacy, or for proprietary considerations. Sensitive Information includes all data, in its original and duplicate form, which contains: Personal […]
» Subjects: , » Tags:

Protecting Your Sensitive Information
Description: The encryption solutions mentioned in this article deal exclusively with files and folders, not disks. For more information on whole disk encryption please contact ITS Information Security. File/folder encryption solutions handle copies of encrypted files differently. There are cases where one could unintentionally decrypt files when they are e-mailed, backed up, copied to another disk, […]
» Subjects: , » Tags: , , , , ,

Legal References for Sensitive Information
Description: Legal References for Sensitive Data The following are meant to provide a framework of legal references for use in understanding, working with, and securing sensitive information. Although no link below specifically addresses research data, be sure to recognize that some research data must also be considered sensitive information. North Carolina Identity Theft Protection Act of […]
» Subjects: , » Tags:

Sensitive Information and Cloud Storage Providers like Dropbox, iCloud, and Others
Description: Should members of the UNC-CH community use cloud-based storage providers for storing sensitive information? Currently, there is no policy on cloud-based storage of non-sensitive information. Services like DropBox can be used for non-sensitive information. The guidance from the Information Security Office (ISO) is that for storing sensitive information with third party cloud storage providers, other […]
» Subjects: , » Tags: , , , , , , , ,