Table of Contents
The Onyen is what used to be called the ITS UserID. “Onyen” stands for the “Only Name You’ll Ever Need” and will eventually replace all campus login names. ITS grants one Onyen per person for access to a variety of University services. Visit the Onyen web page for further information.
UNC requires that people creating and using an Onyen have an active personal identification (PID) number. The procedure for activating a PID is located at the PID Office. Individuals that are affiliated in one or more of the following categories may obtain an active PID:
- Students enrolled at UNC-CH
- Full-time or Temporary Employees of UNC-CH
- Visiting Scholars
- Distance Learners
- Retired Faculty or Staff
- Contractors working with UNC-CH
- Event Attendees
ITS grants one Onyen per person for access to a variety of University services. Services requiring an Onyen can be accessed with the same Onyen and the same password. This provides greater system security, better performance, and simplifies ITS resource allocations.
Research accounts are reserved for faculty, staff, and graduate students. Undergraduates needing a research account should bring a letter from a sponsoring faculty or staff member to the ITS Postmaster staff, located in the ITS Response Center.
People are expected to follow conventional standards of ethics and polite conduct in their use of the computing resources. It is expected that users will behave responsibly, ethically, and politely, even in the absence of reminders or enforcement.
You, the customer, are solely responsible for the use of your UNC Onyen, the resources to which your Onyen provides access, activity on the network that can be traced back to your account or computer, and for the content of any information you make available through use of these resources. All such activity is subject to the laws of the State of North Carolina and the United States, as well as the policies governing the University of North Carolina at Chapel Hill. By accepting computing and network privileges and continued access to these resources, you are also accepting the following terms of agreement:
- Access to computing and network resources granted through the issuing of a UNC Onyen may be used only by the specific individual to whom the Onyen is issued and may not be shared with other individuals.
- An individual’s personal data and use of the network are considered private, but personal data and network activity may be reviewed by ITS staff under certain circumstances. Such circumstances include, but are not limited to, the specific request of the owner of data for staff to examine content; the administration of a system or the network requiring special intervention; and suspicion of ethical or legal violations that staff members with proper security authorization are compelled to investigate.
- Access to computing and network resources is intended to support the University mission and must be used in an ethical and legal manner consistent with all University policies.
The following list of prohibitions is meant as a representative sampling and is by no means intended to provide a comprehensive collection of legal, ethical, and University policy violations.
Activities prohibited when using UNC computing and network resources include, but are not limited to:
- Harassment (which is defined in the Campus Honor Code)
- Any commercial or for-profit ventures (such as running a business using your campus web space, email account, or network access)
- Disrupting a system or the network, consuming excessive system or network resources, or preventing authorized access of such resources for use by others;
- Access, attempted or successful, to resources for which you do not have proper authorization
- Distribution of pornography
- Possession, accessing, or distribution of obscene material
- Copyright violation (including possession or distribution of written, graphic, video, music or other media, such as MP3 files, which you are not legally authorized to possess or distribute).
Violations of the above terms of agreement may result in suspension of computing privileges, disciplinary review, termination of employment, and/or legal action. ITS will refer serious violations to the appropriate department for disciplinary action.
If disk space in addition to the amount allotted is needed for University related work, submit an Online Help Request. Include your department and a phone number in the message. See the Data Storage Policy for further information or visit onyen.unc.edu to check your current disk space usage.
An email alias can be easier to remember than a regular email address, and consists of your first and last name separated by an underscore and followed by “@unc.edu”, as in email@example.com. Create, modify or delete aliases on the Onyen Services page at onyen.unc.edu.
Forgotten passwords for Onyens can be reset. See Onyen Password Management for more information. Security precautions require a personal visit and a picture ID. You may also setup the Challenge Response System so that you may reset your own password.
For security purposes, Onyen passwords expire every ninety days. To protect your data it is important that your Onyen password conform to the security requirements listed on the Onyen Password Management page. The HelpSite offers guidelines for choosing a strong password.
Onyens can be renamed for the following reasons:
- Where a legal name change has occurred (marriage, divorce, etc.).
- Where there is an issue of personal security as determined by ITS and, as necessary, the Office of University Counsel.
- Where the Onyen is clearly offensive.
Other requests will be reviewed on a case-by-case basis.
Your Onyen is subject to immediate termination once you are no longer affiliated with the University. Access to your Onyen, files, web pages, and ITS research computing services will be unavailable 60 days after you are deemed officially unaffiliated with the University. Your files will be deleted one year from the day you are deemed officially unaffiliated with the University. You will receive an email message from ITS informing you of these deadlines 30 days after your official separation from the university. The following sample timeline explains the order of events:
- June 1, 2007 – Official termination with the University.
- July 1, 2007 – Email message explaining that your account will be terminated.
- August 1, 2007 – Termination of access to Onyen, files, web pages, and ITS research computing services.
- June 1, 2008 – Files and data deleted.
In keeping with the value of the Onyen to the UNC-Chapel Hill community any suspected compromise of Onyen credentials should be treated as a serious threat to security of UNC-Chapel Hill systems and immediate action must be taken to resolve the compromise and restore integrity of the Onyen authentication. A compromised Onyen account refers to an Onyen account that is known to be, or reasonably suspected of being, used by an unauthorized party. Functionality of any Onyen likely to have been compromised will not be restored until risk associated with any such compromise has been mitigated. UNC-Chapel Hill affiliates agree to cooperate with UNC-Chapel Hill authorities to investigate and resolve issues related to compromise or suspected compromise of any Onyen under their control.
Any suspected Onyen compromise must be reported immediately via 962-HELP. The reporting party should ask that an “Onyen compromise” ticket be created and assigned to ITS Security as a “critical” ticket.
For further information about your Onyen, refer to the Onyen FAQs. Please read the Onyen Password FAQs for more information regarding passwords. If you have further questions, you may reach us at firstname.lastname@example.org or contact 962-HELP.