{"id":51,"date":"2007-12-13T22:25:00","date_gmt":"2007-12-14T03:25:00","guid":{"rendered":"https:\/\/med.sites.unc.edu\/it\/services\/informationsecurity\/"},"modified":"2024-10-09T15:52:43","modified_gmt":"2024-10-09T19:52:43","slug":"informationsecurity","status":"publish","type":"page","link":"https:\/\/www.med.unc.edu\/it\/services\/informationsecurity\/","title":{"rendered":"Information Security Services"},"content":{"rendered":"<p><!-- portlet_header --><\/p>\n<p><!-- portlet_above --><\/p>\n<p><!-- description --><\/p>\n<h2>Service Description<\/h2>\n<ul>\n<li>Security Incident Response<\/li>\n<li>System Vulnerability Scans<\/li>\n<li>Computer Forensics<\/li>\n<li>Laptop Encryption<\/li>\n<li>Information Security Training<\/li>\n<li>Security Consulting<\/li>\n<\/ul>\n<h2>Associated Fees<\/h2>\n<p>There are currently no direct fees related to security services.\u00a0 However, due to limited staff and resources, some services may not be available during high workload periods.<\/p>\n<h2>Provided By<\/h2>\n<ul>\n<li>The <a href=\"https:\/\/www.med.unc.edu\/it\/about\/about-us\/it-security-office\/\">Information Security<\/a> Team<\/li>\n<\/ul>\n<h2>Request Support\/Services<\/h2>\n<p>To learn more about Information Security, please see the <a href=\"https:\/\/med.unc.edu\/security\">Information Security<\/a> website. The site contains a wealth of information including best practices, HIPAA training, and other security related resources.<\/p>\n<p>For other inquiries, please contact the <a href=\"mailto:sominfosec@listserv.med.unc.edu\">Information Security Team<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Service Description Security Incident Response System Vulnerability Scans Computer Forensics Laptop Encryption Information Security Training Security Consulting Associated Fees There are currently no direct fees related to security services.\u00a0 However, due to limited staff and resources, some services may not be available during high workload periods. Provided By The Information Security Team Request Support\/Services To &hellip; <a href=\"https:\/\/www.med.unc.edu\/it\/services\/informationsecurity\/\" aria-label=\"Read more about Information Security Services\">Read more<\/a><\/p>\n","protected":false},"author":76119,"featured_media":0,"parent":22,"menu_order":13,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"layout":"","cellInformation":"","apiCallInformation":"","footnotes":"","_links_to":"","_links_to_target":""},"class_list":["post-51","page","type-page","status-publish","hentry","odd"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Information Security Services | Information Technology<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.med.unc.edu\/it\/services\/informationsecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Information Security Services | Information Technology\" \/>\n<meta property=\"og:description\" content=\"Service Description Security Incident Response System Vulnerability Scans Computer Forensics Laptop Encryption Information Security Training Security Consulting Associated Fees There are currently no direct fees related to security services.\u00a0 However, due to limited staff and resources, some services may not be available during high workload periods. Provided By The Information Security Team Request Support\/Services To &hellip; Read more\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.med.unc.edu\/it\/services\/informationsecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Information Technology\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-09T19:52:43+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.med.unc.edu\/it\/services\/informationsecurity\/\",\"url\":\"https:\/\/www.med.unc.edu\/it\/services\/informationsecurity\/\",\"name\":\"Information Security Services | Information Technology\",\"isPartOf\":{\"@id\":\"https:\/\/www.med.unc.edu\/it\/#website\"},\"datePublished\":\"2007-12-14T03:25:00+00:00\",\"dateModified\":\"2024-10-09T19:52:43+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.med.unc.edu\/it\/services\/informationsecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.med.unc.edu\/it\/services\/informationsecurity\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.med.unc.edu\/it\/services\/informationsecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.med.unc.edu\/it\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Services\",\"item\":\"https:\/\/www.med.unc.edu\/it\/services\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Information Security Services\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.med.unc.edu\/it\/#website\",\"url\":\"https:\/\/www.med.unc.edu\/it\/\",\"name\":\"School of Medicine IT\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.med.unc.edu\/it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.med.unc.edu\/it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.med.unc.edu\/it\/#organization\",\"name\":\"UNC School of Medicine Information Technology\",\"url\":\"https:\/\/www.med.unc.edu\/it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.med.unc.edu\/it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.med.unc.edu\/it\/wp-content\/uploads\/sites\/477\/2019\/03\/InformationTechnology_logo_rgb_h.png\",\"contentUrl\":\"https:\/\/www.med.unc.edu\/it\/wp-content\/uploads\/sites\/477\/2019\/03\/InformationTechnology_logo_rgb_h.png\",\"width\":1217,\"height\":151,\"caption\":\"UNC School of Medicine Information Technology\"},\"image\":{\"@id\":\"https:\/\/www.med.unc.edu\/it\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Information Security Services | Information Technology","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.med.unc.edu\/it\/services\/informationsecurity\/","og_locale":"en_US","og_type":"article","og_title":"Information Security Services | Information Technology","og_description":"Service Description Security Incident Response System Vulnerability Scans Computer Forensics Laptop Encryption Information Security Training Security Consulting Associated Fees There are currently no direct fees related to security services.\u00a0 However, due to limited staff and resources, some services may not be available during high workload periods. Provided By The Information Security Team Request Support\/Services To &hellip; Read more","og_url":"https:\/\/www.med.unc.edu\/it\/services\/informationsecurity\/","og_site_name":"Information Technology","article_modified_time":"2024-10-09T19:52:43+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.med.unc.edu\/it\/services\/informationsecurity\/","url":"https:\/\/www.med.unc.edu\/it\/services\/informationsecurity\/","name":"Information Security Services | Information Technology","isPartOf":{"@id":"https:\/\/www.med.unc.edu\/it\/#website"},"datePublished":"2007-12-14T03:25:00+00:00","dateModified":"2024-10-09T19:52:43+00:00","breadcrumb":{"@id":"https:\/\/www.med.unc.edu\/it\/services\/informationsecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.med.unc.edu\/it\/services\/informationsecurity\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.med.unc.edu\/it\/services\/informationsecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.med.unc.edu\/it\/"},{"@type":"ListItem","position":2,"name":"Services","item":"https:\/\/www.med.unc.edu\/it\/services\/"},{"@type":"ListItem","position":3,"name":"Information Security Services"}]},{"@type":"WebSite","@id":"https:\/\/www.med.unc.edu\/it\/#website","url":"https:\/\/www.med.unc.edu\/it\/","name":"School of Medicine IT","description":"","publisher":{"@id":"https:\/\/www.med.unc.edu\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.med.unc.edu\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.med.unc.edu\/it\/#organization","name":"UNC School of Medicine Information Technology","url":"https:\/\/www.med.unc.edu\/it\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.med.unc.edu\/it\/#\/schema\/logo\/image\/","url":"https:\/\/www.med.unc.edu\/it\/wp-content\/uploads\/sites\/477\/2019\/03\/InformationTechnology_logo_rgb_h.png","contentUrl":"https:\/\/www.med.unc.edu\/it\/wp-content\/uploads\/sites\/477\/2019\/03\/InformationTechnology_logo_rgb_h.png","width":1217,"height":151,"caption":"UNC School of Medicine Information Technology"},"image":{"@id":"https:\/\/www.med.unc.edu\/it\/#\/schema\/logo\/image\/"}}]}},"_links_to":[],"_links_to_target":[],"_links":{"self":[{"href":"https:\/\/www.med.unc.edu\/it\/wp-json\/wp\/v2\/pages\/51","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.med.unc.edu\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.med.unc.edu\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.med.unc.edu\/it\/wp-json\/wp\/v2\/users\/76119"}],"replies":[{"embeddable":true,"href":"https:\/\/www.med.unc.edu\/it\/wp-json\/wp\/v2\/comments?post=51"}],"version-history":[{"count":0,"href":"https:\/\/www.med.unc.edu\/it\/wp-json\/wp\/v2\/pages\/51\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.med.unc.edu\/it\/wp-json\/wp\/v2\/pages\/22"}],"wp:attachment":[{"href":"https:\/\/www.med.unc.edu\/it\/wp-json\/wp\/v2\/media?parent=51"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}