Sensitive Information and Cloud Storage Providers like Dropbox, iCloud, and Others
Description: Should members of the UNC-CH community use cloud-based storage providers for storing sensitive information? Currently, there is no policy on cloud-based storage of non-sensitive information. Services like DropBox can be used for non-sensitive information. The guidance from the Information Security Office (ISO) is that for storing sensitive information with third party cloud storage providers, other […]
» Subjects: , » Tags: , , , , , , , ,

Dangers of file sharing programs
Description: Table of Contents Some common misconceptions about BitTorrent Useful information about filesharing and what can precipitate a copyright violation Helpful Links Some common misconceptions about BitTorrent I used encryption, so my activities will be undetectable to outside sources.Encrypting BitTorrent files will not protect you from detection by copyright holders and their representatives. While encryption may […]
» Subjects: ,

How do I clean the hard drive on my Mac notebook?
Description: Guidelines on best practices for secure data deletion can include 1) physical destruction of the media (driving a nail several times through the hard drive) or 2) multiple overwriting passes with random data writes and subsequent zeroing of the data on the media. Experts recommend anywhere from 3 to 25 passes, but accounts will vary. […]
» Subjects: ,

UNC-Chapel Hill Network Acceptable Use Policy
Description: This document will automatically redirect to the ITS Policy site. You will be redirected in seconds
» Subjects: , » Tags: , , , , , , , ,

How to Add a Lockscreen to an Android Phone
Description: How to Enable a Passcode Lockscreen for an Android Phone Note: This help document was created using a generic Android 2.2 device. The screen shots and the menu options may vary depending on device manufacturer and the version of the Android OS running on the device. 1. Determine the version of Android OS installed on […]
» Subjects: ,

How does the Security office notify individuals and departments of security problems?
Description: How does the Security office notify individuals and departments of security problems? Security notifications, such as those for system isolation, are sent to the DHCP registrant or the subnet contact for the affected system. The Security Office makes every effort to maintain accurate contact information, and to provide timely notification to administrators via their preferred […]
» Subjects: ,

What You Need to Know about File Sharing
Description: Points to consider about filesharing Nearly every work is copyrighted. “Everyone does it” is a fallacy and is not a defense for your actions when faced with fines or a lawsuit for infringing someone else’s copyright. Filesharing often leads to copyright infringement, but also has other dangers You should assume that files on peer-to-peer (p2p) […]
» Subjects: , » Tags:

Best practices for use of Skype on the UNC-Chapel Hill network
Description: General Best Practices for Computer Users To ensure safe and secure computing, be sure to follow general best practices. Make sure you have the latest version of an antivirus program and be sure to download and install the latest security patches for your operating system and programs. For more information on securing your computer please […]
» Subjects: , , ,

How to Secure a RedHat Linux System
Description: Getting Started Once you have installed Linux and logged in successfully for the first time you will want to immediately register your system with RedHat so that you can get free software updates. This is essential┬áto maintaining a secure and stable system. You should check for updates often to make sure that you are up-to-date […]
» Subjects:

Password Change Checklist (List of Onyen-Authenticated Services)
Description: Changing your Onyen password does not automatically change the password for all the other services you may access from your computer. You may have used the same password for other services, such as logging onto your computer, logging into your departmental server, the campus calendar system, or even Amazon.com or eBay. You need to decide […]
» Subjects: , , » Tags: ,