Policies and Legal Issues
Mass Email Requirements
Description: An electronic mass email request system (UNC Mass Mail) is available to support requesting, approving and scheduling official mass emails. The Mass Email System does not replace individual, school, or departmental address lists or mailing lists. These other methods are more appropriate for most announcements. The Mass Email System should only be used when a […]
» Subjects: Policies and Legal Issues, Security » Tags: Mass Mail, None
Login Banner Message for Use with Systems Hosting Nonpublic Services
Description: Login Banner Message Recommendations for Use with Systems Hosting Nonpublic Services Systems required by the Information Security Controls Standard to have a warning banner may use the text below (or other text specific to the system) to give notice to users. Most University systems hosting nonpublic services, particularly those restricting access through Onyen login, ssh, […]
» Subjects: Policies and Legal Issues, Security » Tags: banner, Login Banner
University Process on Dealing with Possible Infringement of Intellectual Property Rights
Description: I. Introduction The Digital Millennium Copyright Act amends federal copyright law to provide certain liability protections for online service providers, including the University of North Carolina at Chapel Hill, when their computer systems or networks carry materials that violate (infringe) copyright law. To qualify for liability protection, the University is required to have a policy […]
» Subjects: Policies and Legal Issues, Security » Tags: copyright, legal, policy
UNC-Chapel Hill Wireless Spectrum Management Policy
Description: Data Network Policy Data Network Standard Wireless Standard On May 2, 2017 new Policy and Standards superseded this Policy. This page was updated to direct to the new documents.
» Subjects: Policies and Legal Issues, Security » Tags: Guest Access, networking, Public Access, Tar-Heel, wireless
How do I remove P2P file sharing software from my computer?
Description: After reading our document What You Need to Know about File Sharing, you may be interested in removing file-sharing or P2P (peer-to-peer) software from your computer. Many users configure their P2P software for downloading files, but they disable the feature to allow their files to be uploaded to the public. It has been shown that […]
» Subjects: Policies and Legal Issues, Security