{"id":7544,"date":"2018-04-08T23:03:08","date_gmt":"2018-04-09T03:03:08","guid":{"rendered":"https:\/\/med.sites.unc.edu\/it\/?page_id=7544"},"modified":"2019-08-02T08:38:55","modified_gmt":"2019-08-02T12:38:55","slug":"policies","status":"publish","type":"page","link":"https:\/\/www.med.unc.edu\/it\/about\/policies\/","title":{"rendered":"IT Policies"},"content":{"rendered":"<h2>Information Security &amp; Privacy Policies<\/h2>\n<ul>\n<li><a href=\"http:\/\/www.med.unc.edu\/security\/hipaa\/policies\">School of Medicine Policies<\/a><br \/>\nIncludes security policies for desktop configuration, electronic data disposal, end user accounts, information security audits, network access, passwords, pdas, Peer2Peer, remote access, and server security.<\/li>\n<li><a class=\"external-link\" href=\"http:\/\/intranet.unchealthcare.org\/hospitaldepartments\/hipaa\/policies\" target=\"_blank\" rel=\"noopener noreferrer\">UNC Health Care Policies<\/a><br \/>\nThese policies are on UNC Health Care&#8217;s intranet site.\u00a0 If you would like to view these policies, you must either be on the School of Medicine\/UNC Health Care networks or have a hospital userid and password.<\/li>\n<\/ul>\n<h2>Main Campus IT Policies<\/h2>\n<ul>\n<li><a href=\"http:\/\/unc.policystat.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">UNC Computing Policies<\/a> (select policies listed below)<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><a href=\"https:\/\/sso.unc.edu\/idp\/profile\/SAML2\/Unsolicited\/SSO?providerId=https:\/\/uncch.service-now.com&amp;target=%2Fsp%3Fid%3Dkb_article_view%26sysparm_article%3DKB0010296\" target=\"_blank\" rel=\"noopener noreferrer\">University Procedure on Dealing with Possible Infringement of Intellectual Property Rights<\/a><\/li>\n<\/ul>\n<ul>\n<li><a href=\"https:\/\/unc.policystat.com\/policy\/4721576\/latest\/\" target=\"_blank\" rel=\"noopener noreferrer\">UNC-Chapel Hill Copyright Information and Policies <\/a><\/li>\n<\/ul>\n<ul>\n<li>Policy Development and Compliance<\/li>\n<\/ul>\n<ul>\n<li><a href=\"https:\/\/sso.unc.edu\/idp\/profile\/SAML2\/Unsolicited\/SSO?providerId=https:\/\/uncch.service-now.com&amp;target=%2Fsp%3Fid%3Dkb_article_view%26sysparm_article%3DKB0010206\" target=\"_blank\" rel=\"noopener noreferrer\">UNC Chapel Hill Policy on Mass Email<\/a><\/li>\n<li><a href=\"https:\/\/unc.policystat.com\/policy\/4620099\/latest\/\">UNC Data Network Policy<\/a><\/li>\n<li><a href=\"https:\/\/unc.policystat.com\/policy\/4622952\/latest\/\">UNC Data Network Standard<\/a><\/li>\n<li><a href=\"https:\/\/unc.policystat.com\/policy\/4681641\/latest\/\">UNC Wireless Standard<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Information Security &amp; Privacy Policies School of Medicine Policies Includes security policies for desktop configuration, electronic data disposal, end user accounts, information security audits, network access, passwords, pdas, Peer2Peer, remote access, and server security. UNC Health Care Policies These policies are on UNC Health Care&#8217;s intranet site.\u00a0 If you would like to view these policies, &hellip; <a href=\"https:\/\/www.med.unc.edu\/it\/about\/policies\/\" aria-label=\"Read more about IT Policies\">Read more<\/a><\/p>\n","protected":false},"author":1369,"featured_media":0,"parent":714,"menu_order":25,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"layout":"","cellInformation":"","apiCallInformation":"","footnotes":"","_links_to":"","_links_to_target":""},"class_list":["post-7544","page","type-page","status-publish","hentry","odd"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IT Policies | Information Technology<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.med.unc.edu\/it\/about\/policies\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT Policies | Information Technology\" \/>\n<meta property=\"og:description\" content=\"Information Security &amp; Privacy Policies School of Medicine Policies Includes security policies for desktop configuration, electronic data disposal, end user accounts, information security audits, network access, passwords, pdas, Peer2Peer, remote access, and server security. UNC Health Care Policies These policies are on UNC Health Care&#8217;s intranet site.\u00a0 If you would like to view these policies, &hellip; Read more\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.med.unc.edu\/it\/about\/policies\/\" \/>\n<meta property=\"og:site_name\" content=\"Information Technology\" \/>\n<meta property=\"article:modified_time\" content=\"2019-08-02T12:38:55+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.med.unc.edu\/it\/about\/policies\/\",\"url\":\"https:\/\/www.med.unc.edu\/it\/about\/policies\/\",\"name\":\"IT Policies | Information Technology\",\"isPartOf\":{\"@id\":\"https:\/\/www.med.unc.edu\/it\/#website\"},\"datePublished\":\"2018-04-09T03:03:08+00:00\",\"dateModified\":\"2019-08-02T12:38:55+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.med.unc.edu\/it\/about\/policies\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.med.unc.edu\/it\/about\/policies\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.med.unc.edu\/it\/about\/policies\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.med.unc.edu\/it\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"About\",\"item\":\"https:\/\/www.med.unc.edu\/it\/about\/about-us\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"IT Policies\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.med.unc.edu\/it\/#website\",\"url\":\"https:\/\/www.med.unc.edu\/it\/\",\"name\":\"School of Medicine IT\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.med.unc.edu\/it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.med.unc.edu\/it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.med.unc.edu\/it\/#organization\",\"name\":\"UNC School of Medicine Information Technology\",\"url\":\"https:\/\/www.med.unc.edu\/it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.med.unc.edu\/it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.med.unc.edu\/it\/wp-content\/uploads\/sites\/477\/2019\/03\/InformationTechnology_logo_rgb_h.png\",\"contentUrl\":\"https:\/\/www.med.unc.edu\/it\/wp-content\/uploads\/sites\/477\/2019\/03\/InformationTechnology_logo_rgb_h.png\",\"width\":1217,\"height\":151,\"caption\":\"UNC School of Medicine Information Technology\"},\"image\":{\"@id\":\"https:\/\/www.med.unc.edu\/it\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IT Policies | Information Technology","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.med.unc.edu\/it\/about\/policies\/","og_locale":"en_US","og_type":"article","og_title":"IT Policies | Information Technology","og_description":"Information Security &amp; Privacy Policies School of Medicine Policies Includes security policies for desktop configuration, electronic data disposal, end user accounts, information security audits, network access, passwords, pdas, Peer2Peer, remote access, and server security. UNC Health Care Policies These policies are on UNC Health Care&#8217;s intranet site.\u00a0 If you would like to view these policies, &hellip; Read more","og_url":"https:\/\/www.med.unc.edu\/it\/about\/policies\/","og_site_name":"Information Technology","article_modified_time":"2019-08-02T12:38:55+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.med.unc.edu\/it\/about\/policies\/","url":"https:\/\/www.med.unc.edu\/it\/about\/policies\/","name":"IT Policies | Information Technology","isPartOf":{"@id":"https:\/\/www.med.unc.edu\/it\/#website"},"datePublished":"2018-04-09T03:03:08+00:00","dateModified":"2019-08-02T12:38:55+00:00","breadcrumb":{"@id":"https:\/\/www.med.unc.edu\/it\/about\/policies\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.med.unc.edu\/it\/about\/policies\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.med.unc.edu\/it\/about\/policies\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.med.unc.edu\/it\/"},{"@type":"ListItem","position":2,"name":"About","item":"https:\/\/www.med.unc.edu\/it\/about\/about-us\/"},{"@type":"ListItem","position":3,"name":"IT Policies"}]},{"@type":"WebSite","@id":"https:\/\/www.med.unc.edu\/it\/#website","url":"https:\/\/www.med.unc.edu\/it\/","name":"School of Medicine IT","description":"","publisher":{"@id":"https:\/\/www.med.unc.edu\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.med.unc.edu\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.med.unc.edu\/it\/#organization","name":"UNC School of Medicine Information Technology","url":"https:\/\/www.med.unc.edu\/it\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.med.unc.edu\/it\/#\/schema\/logo\/image\/","url":"https:\/\/www.med.unc.edu\/it\/wp-content\/uploads\/sites\/477\/2019\/03\/InformationTechnology_logo_rgb_h.png","contentUrl":"https:\/\/www.med.unc.edu\/it\/wp-content\/uploads\/sites\/477\/2019\/03\/InformationTechnology_logo_rgb_h.png","width":1217,"height":151,"caption":"UNC School of Medicine Information Technology"},"image":{"@id":"https:\/\/www.med.unc.edu\/it\/#\/schema\/logo\/image\/"}}]}},"_links_to":[],"_links_to_target":[],"_links":{"self":[{"href":"https:\/\/www.med.unc.edu\/it\/wp-json\/wp\/v2\/pages\/7544","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.med.unc.edu\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.med.unc.edu\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.med.unc.edu\/it\/wp-json\/wp\/v2\/users\/1369"}],"replies":[{"embeddable":true,"href":"https:\/\/www.med.unc.edu\/it\/wp-json\/wp\/v2\/comments?post=7544"}],"version-history":[{"count":0,"href":"https:\/\/www.med.unc.edu\/it\/wp-json\/wp\/v2\/pages\/7544\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.med.unc.edu\/it\/wp-json\/wp\/v2\/pages\/714"}],"wp:attachment":[{"href":"https:\/\/www.med.unc.edu\/it\/wp-json\/wp\/v2\/media?parent=7544"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}