Protected: Processes for Working with Sensitive Information
There is no excerpt because this is a protected post.
There is no excerpt because this is a protected post.
This content is Onyen protected. Please enter your Onyen to log in and view it.
This content is Onyen protected. Please enter your Onyen to log in and view it.
This content is Onyen protected. Please enter your Onyen to log in and view it.
Document describes how to set folder privileges on storage.unc.edu Group naming convention SOP_M-folder.subfolder-permission Permission is either LF, R or F List Folder (LF) This allows for folder traversal, should be used sparingly to avoid deeply nested / confusing inheritance structures. … Read more
This content is Onyen protected. Please enter your Onyen to log in and view it.
If you leave your computer unattended make sure to lock the computer to prevent someone from sitting at the console and using the computer under your account. Locking your computer will require your login password to be entered in order … Read more
This document describes best practices and standards for configuring a Red Hat Enterprise Linux 7 system on the network to comply with the University Information Security Policy. The following scripts can be used to configure the system. https://adminliveunc.sharepoint.com/sites/pharmacy/itsop/Downloads/rhel7_setup.zip Monthly … Read more
This document provides a discussion of computer backup solutions and our recommendations. For computer backups we generally distinguish between two types: file and image. A file backup is simply a copy, or snapshot, of a set of files at a … Read more
Qualtrics Research Suite, an on-line survey tool, is available at no cost and approved for sensitive information. Sponsored by UNC-Chapel Hill for use by faculty, staff and students, Qualtrics is the only on-line survey tool authorized by the University for … Read more