Office 365 User Guide
Description: Don’t see your question answered here? Please visit the¬†Office 365¬†program website. We post information about upcoming learning events, a list of training resources, and you can sign up for the monthly newsletter there. Looking for guidelines about storing sensitive information in Office 365? Read the Sensitive Information Guidelines to learn about which applications you can […]
» Subjects: , » Tags: , , , , , , , , , , , , , , , , , , , , , ,

Sensitive Information Terms of Use Agreement
Description:
» Subjects: , , , » Tags: ,

Auto-forwarding of email to untrusted email domains
Description: Policy clarification for all UNC-Chapel Hill affiliates regarding email accounts used to conduct University business UNC-Chapel Hill affiliates may have their email auto-forward removed if their email account is currently being forwarded to an email system that is not run by UNC-Chapel Hill or is not among systems that have agreements in place with UNC-Chapel […]
» Subjects: , , , » Tags: , , , ,

Sensitive Information (Onyen Restricted)
Description: -
» Subjects: , , » Tags: , ,

Examples of Sensitive Information
Description: Introduction Sensitive information is defined as data that is protected against unwarranted disclosure. Access to sensitive information should be safeguarded. Protection of sensitive information may be required for legal or ethical reasons, for issues pertaining to personal privacy, or for proprietary considerations. Sensitive information includes all data, in its original and duplicate form, for which […]
» Subjects: » Tags:

What is Sensitive Information?
Description: Sensitive information is defined as information that is protected against unwarranted disclosure. Access to sensitive information should be safeguarded. Protection of sensitive information may be required for legal or ethical reasons, for issues pertaining to personal privacy, or for proprietary considerations. Sensitive Information includes all data, in its original and duplicate form, which contains: Personal […]
» Subjects: , » Tags:

Protecting Your Sensitive Information
Description: The encryption solutions mentioned in this article deal exclusively with files and folders, not disks. For more information on whole disk encryption please contact ITS Information Security. File/folder encryption solutions handle copies of encrypted files differently. There are cases where one could unintentionally decrypt files when they are e-mailed, backed up, copied to another disk, […]
» Subjects: , » Tags: , , , , ,

Securing sensitive information
Description: Definition of Personal Data G.S. 14 113.20(b) defines personal data as a person’s first name or first initial and last name in combination with identifying information. Personal information does not include information in publicly available directories which an individual has voluntarily consented to have publicly disseminated or listed. Please note that UNC-Chapel Hill permits students […]
» Subjects: , » Tags: