How do I remove P2P file sharing software from my computer?
Description: After reading our document What You Need to Know about File Sharing, you may be interested in removing file-sharing or P2P (peer-to-peer) software from your computer. Many users configure their P2P software for downloading files, but they disable the feature to allow their files to be uploaded to the public. It has been shown that […]
» Subjects: Policies and Legal Issues, Security
Best Practices for Erasing Data from Cell Phones
Description: Best Practices for Erasing Data from Cell Phones Erase Your Cell Phone Data! Before disposing of your cell phone in any manner, remove all University data and your personal information and data (e.g., contact names and phone numbers, notes, calendars, and documents) from the device. University cell phones that are turned over to Campus Recycling […]
» Subjects: Security, Security Best Practice
Electronic Media Disposal FAQ
Description: What is electronic media? Electronic Media is defined as any storage that is used to record information, including, but not limited to hard disks, magnetic tapes, compact disks, video tapes, audio tapes, and removable storage such as USB flash drives. How should I prepare media for disposal? In order to protect all University information, and […]
» Subjects: Policies and Legal Issues, Security » Tags: Electronic Media Disposal
Securing sensitive information
Description: Definition of Personal Data G.S. 14 113.20(b) defines personal data as a person’s first name or first initial and last name in combination with identifying information. Personal information does not include information in publicly available directories which an individual has voluntarily consented to have publicly disseminated or listed. Please note that UNC-Chapel Hill permits students […]
» Subjects: Policies and Legal Issues, Security » Tags: Sensitive Information
Macintosh Security Checklist
Description: Faculty and staff should contact their IT support staff or ITS for assistance configuring and troubleshooting Apple macOS or OS X. All other affiliates please visit this site.
» Subjects: Security, Security Best Practice » Tags: ISO docs, None, security