Sensitive Information Terms of Use Agreement
» Subjects: , , , » Tags: ,

UNC-Chapel Hill Copyright Information and Policies
Description: Introduction This document provides links to various policies and resources related to the Digital Millennium Copyright Act at UNC Chapel Hill. Policies University Procedure on Dealing with Possible Infringement of Intellectual Property Rights UNC Official Copyright Policy Patent and Copyright Policies and Procedures (UNC System) Resources We’ve created a Copyright Basics explaining the basics of […]
» Subjects: , » Tags:

Procedure for Regaining Network Access after a Copyright or other Acceptable Use Policy Violation
Description: In order to regain network access, you must do the following: If you received a copyright violation: always remove the infringing content. If you received a copyright violation you will need to self-enroll in the “Acceptable Use Policy training” in Sakai. Instructions should have been emailed to you. Please log into Sakai ( with your […]
» Subjects: ,

Copyright procedure summary
Description: Overview of copyright enforcement at UNC-Chapel Hill The document UNC-Chapel Hill Copyright Information and Policies contains some of the procedures that UNC-Chapel Hill has adopted to enforce copyright protection. Please note that any disciplinary action taken by the university when notified of a copyright violation linked to a computer on the UNC network may […]
» Subjects: ,

UNC-Chapel Hill Campus Standards for Electronic Media Disposal
Description: For UNC-Chapel Hill Standards on disposal of electronic media, please see the UNC-Chapel Hill Information Security Controls Standard listed on the ITS policy page at: More information about how to go about properly disposing of electronic media is available here:
» Subjects: , » Tags:

Mass Email Requirements
Description: An electronic mass email request system (UNC Mass Mail) is available to support requesting, approving and scheduling official mass emails. The Mass Email System does not replace individual, school, or departmental address lists or mailing lists. These other methods are more appropriate for most announcements. The Mass Email System should only be used when a […]
» Subjects: , » Tags: ,

UNC Computing Policy
Description: This document will automatically redirect to the ITS Policy site. You will be redirected in seconds
» Subjects: , » Tags: ,

What is Sensitive Information?
Description: Sensitive information is defined as information that is protected against unwarranted disclosure. Access to sensitive information should be safeguarded. Protection of sensitive information may be required for legal or ethical reasons, for issues pertaining to personal privacy, or for proprietary considerations. Sensitive Information includes all data, in its original and duplicate form, which contains: Personal […]
» Subjects: , » Tags:

Login Banner Message for Use with Systems Hosting Nonpublic Services
Description: Login Banner Message Recommendations for Use with Systems Hosting Nonpublic Services Systems required by the Information Security Controls Standard to have a warning banner may use the text below (or other text specific to the system) to give notice to users.  Most University systems hosting nonpublic services, particularly those restricting access through Onyen login, ssh, […]
» Subjects: , » Tags: ,

Legal References for Sensitive Information
Description: Legal References for Sensitive Data The following are meant to provide a framework of legal references for use in understanding, working with, and securing sensitive information. Although no link below specifically addresses research data, be sure to recognize that some research data must also be considered sensitive information. North Carolina Identity Theft Protection Act of […]
» Subjects: , » Tags: