Mass Email Requirements
Description: An electronic mass email request system (UNC Mass Mail) is available to support requesting, approving and scheduling official mass emails. The Mass Email System does not replace individual, school, or departmental address lists or mailing lists. These other methods are more appropriate for most announcements. The Mass Email System should only be used when a […]
» Subjects: , » Tags: ,

What is Sensitive Information?
Description: This page has been consolidated/migrated to Safe Computing website.
» Subjects: , » Tags:

Login Banner Message for Use with Systems Hosting Nonpublic Services
Description: Login Banner Message Recommendations for Use with Systems Hosting Nonpublic Services Systems required by the Information Security Controls Standard to have a warning banner may use the text below (or other text specific to the system) to give notice to users.¬† Most University systems hosting nonpublic services, particularly those restricting access through Onyen login, ssh, […]
» Subjects: , » Tags: ,

About the Onyen
Description:     This document will automatically redirect to the document ITS Onyen Policy. You will be redirected in seconds  
» Subjects: , , , , » Tags: ,

University Process on Dealing with Possible Infringement of Intellectual Property Rights
Description: I. Introduction The Digital Millennium Copyright Act amends federal copyright law to provide certain liability protections for online service providers, including the University of North Carolina at Chapel Hill, when their computer systems or networks carry materials that violate (infringe) copyright law. To qualify for liability protection, the University is required to have a policy […]
» Subjects: , » Tags: , ,

UNC-Chapel Hill Wireless Spectrum Management Policy
Description: Data Network Policy Data Network Standard Wireless Standard On May 2, 2017 new Policy and Standards superseded this Policy.  This page was updated to direct to the new documents.
» Subjects: , » Tags: , , , ,

How do I remove P2P file sharing software from my computer?
Description: After reading our document What You Need to Know about File Sharing, you may be interested in removing file-sharing or P2P (peer-to-peer) software from your computer. Many users configure their P2P software for downloading files, but they disable the feature to allow their files to be uploaded to the public. It has been shown that […]
» Subjects: ,

Electronic Media Disposal FAQ
Description: This article has been consolidated into Safe Computing website.
» Subjects: , » Tags:

Securing sensitive information
Description: This page is being consolidated / relocated to Safe Computing website.
» Subjects: , » Tags: