Legal References for Sensitive Information
Description: Legal References for Sensitive Data The following are meant to provide a framework of legal references for use in understanding, working with, and securing sensitive information. Although no link below specifically addresses research data, be sure to recognize that some research data must also be considered sensitive information. North Carolina Identity Theft Protection Act of […]
» Subjects: , » Tags:

About the Onyen
Description:     This document will automatically redirect to the document ITS Onyen Policy. You will be redirected in seconds  
» Subjects: , , , , » Tags: ,

SSL and TLS
Description: SSL (Secure Sockets Layer) is a security protocol used to transmit private communications via the Internet. Many web sites use the SSL protocol to protect confidential user information, such as credit card numbers. By convention, URLs that require an SSL connection start with “https” instead of the normal “http“. Many email clients also support SSL […]
» Subjects: , » Tags:

Securing BroadBand Connections
Description: For perspective: You should consider that once you connect your computer to the Internet, the entire Internet (and every user on it) connects to your computer. If you are considering a Broad Band connection (ISDN/DSL/Cable/Satellite) to the Internet from your home, then security of that connection and your computers should be a concern. There are […]
» Subjects: , » Tags: ,

How will I know if the security of my machine has been compromised?
Description: How will I know if the security of my machine has been compromised? The best way to identify suspicious behavior on your computer is to look for files or programs that you didn’t install, or for other behavior that is unexpected and out of the ordinary. If programs run or open by themselves (and didn’t […]
» Subjects: ,

How can I protect myself from hackers?
Description: You can protect yourself by making sure that your virus definitions are up to date, that you open only e-mail attachments that you expect, that you visit only trusted Web sites, and that you download only trusted files. You will also want to keep your system up to date with all security patches (i.e. Windows […]
» Subjects: ,

Information Security Brochures
Description: Overview This page features a list of brochures that address common security concerns. Feel free to download or print out any or all of the brochures. The files are in pdf format and you will need Adobe Acrobat to read the files. Adobe Acrobat is available as a free download from the UNC Shareware Site. […]
» Subjects: ,

Securing Smart Phones
Description: Smart Phone Security With the increasing use of mobile devices comes accompanying risks to data stored on the devices. Following are a number of best practices to help users secure their smart phones. Best Practices for General Smart Phone Security Be aware of the possibility of theft. Smart phones are small and easily misplaced or lost. […]
» Subjects: , » Tags: , , , , , , , , , ,

What’s so bad about Kazaa?
Description: What’s so bad about Kazaa? Kazaa has been shutdown however if you have copies installed on your machine please read this notice. Kazaa, besides being a tool that could potentially violate UNC’s Acceptable Use Policy, also poses a threat to your privacy. It is very important to read any user agreements that appear with a […]
» Subjects: , » Tags: , , , ,

University Procedure on Dealing with Possible Infringement of Intellectual Property Rights
Description: I. Introduction The Digital Millennium Copyright Act amends federal copyright law to provide certain liability protections for online service providers, including the University of North Carolina at Chapel Hill, when their computer systems or networks carry materials that violate (infringe) copyright law. To qualify for liability protection, the University is required to have a policy […]
» Subjects: , » Tags: , ,