UNC-Chapel Hill Copyright Information and Policies
Description: Introduction This document provides links to various policies and resources related to the Digital Millennium Copyright Act at UNC Chapel Hill. Policies University Procedure on Dealing with Possible Infringement of Intellectual Property Rights UNC Official Copyright Policy Patent and Copyright Policies and Procedures (UNC System) Resources We’ve created a Copyright Basics explaining the basics of […]
» Subjects: , » Tags:

Procedure for Regaining Network Access after a Copyright or other Acceptable Use Policy Violation
Description: In order to regain network access, you must do the following: If you received a copyright violation: always remove the infringing content. If you received a copyright violation you will need to self-enroll in the “Acceptable Use Policy training” in Sakai. Instructions should have been emailed to you. Please log into Sakai (https://sakai.unc.edu) with your […]
» Subjects: ,

Copyright procedure summary
Description: Overview of copyright enforcement at UNC-Chapel Hill The help.unc.edu document UNC-Chapel Hill Copyright Information and Policies contains some of the procedures that UNC-Chapel Hill has adopted to enforce copyright protection. Please note that any disciplinary action taken by the university when notified of a copyright violation linked to a computer on the UNC network may […]
» Subjects: ,

UNC-Chapel Hill Campus Standards for Electronic Media Disposal
Description: Table of Contents Overview Purpose Scope Policy Disposal of Hard Drives Disposal of Electronic Media Other Than Hard Drives Violation of Policy Enforcement Overview Increasing amounts of electronic data are being transmitted and stored on computer systems and electronic media by virtually every person conducting business for UNC-Chapel Hill. Some of that data contains sensitive […]
» Subjects: , » Tags:

Mass Email Requirements
Description: An electronic mass email request system (http://www.unc.edu/massmail) is available to support requesting, approving and scheduling official mass emails. The Mass Email System does not replace individual, school, or departmental address lists or mailing lists. These other methods are more appropriate for most announcements. The Mass Email System should only be used when a more limited […]
» Subjects: , » Tags:

UNC Computing Policy
Description: This document will automatically redirect to the ITS Policy site. You will be redirected in seconds
» Subjects: , » Tags: ,

What is Sensitive Information?
Description: Sensitive information is defined as information that is protected against unwarranted disclosure. Access to sensitive information should be safeguarded. Protection of sensitive information may be required for legal or ethical reasons, for issues pertaining to personal privacy, or for proprietary considerations. Sensitive Information includes all data, in its original and duplicate form, which contains: Personal […]
» Subjects: , » Tags:

Login Banner Message for Use with any System that Hosts Nonpublic Services
Description: Login Banner Message for Use with Any System that Hosts Nonpublic Services Please note that the following login banner message should be posted, to the degree technically feasible, on any system that hosts nonpublic services, such as any service that has restricted access through Onyen login, ssh, etc. Please contact security@unc.edu or submit a remedy […]
» Subjects: , » Tags: ,

Legal References for Sensitive Information
Description: Legal References for Sensitive Data The following are meant to provide a framework of legal references for use in understanding, working with, and securing sensitive information. Although no link below specifically addresses research data, be sure to recognize that some research data must also be considered sensitive information. North Carolina Identity Theft Protection Act of […]
» Subjects: , » Tags:

About the Onyen
Description:     This document will automatically redirect to the document ITS Onyen Policy. You will be redirected in seconds  
» Subjects: , , , , » Tags: ,