The UNC Policy Manual
1400.1[1]
Adopted
02/26/26
Information
Technology
I.
Purpose.
As provided in G.S. 116-11(9c), G.S. 116-40.22, and G.S. 143B-1320(b), the
purpose of this policy is to delegate authority to the president to establish
and administer a Systemwide information technology program and direct the
University of North Carolina System (UNC System) and its constituent
institutions to adopt certain policies or regulations to ensure the integrity
of the UNC System’s information technology programs across the System. This
policy requires minimum standards for the UNC System Office and constituent
institutions’ information technology governance, information security, and user
and access control programs. The president shall be responsible for the Systemwide
information technology program and may further delegate additional oversight or
other responsibilities as appropriate.
II.
Management
Flexibility. Constituent institutions with management flexibility shall
establish policies and rules governing the planning, acquisition,
implementation, and delivery of information technology and telecommunications
at the constituent institution consistent with this policy and supplemental
regulations. These policies and rules shall provide for security and encryption
standards; software standards; hardware standards; acquisition of information
technology consulting and contract services; disaster recovery standards; and
standards for desktop and server computing, telecommunications, networking,
video services, personal digital assistants, and other wireless technologies;
and other information technology matters that are necessary and appropriate to
fulfill the teaching, educational, research, extension, and service missions of
the constituent institutions.
III.
Information
Technology Governance.
A.
Documented
Information Technology Governance Plan. The UNC System Office and constituent
institutions shall adopt a comprehensive information technology governance plan
and related policies. The plan may be part of a larger information technology
framework, or a stand-alone plan. The information technology governance plan
shall include:
1.
A
defined framework to guide the development and implementation of the plan; and
2.
A set of principles and guidelines addressing
planning and investment prioritization, funding, evaluation, auditing, disaster
recovery, risk assessment, risk management, oversight of distributed IT
resources, performance measurement, and such other areas as may be appropriate.
B.
Electronic
Records. The UNC System Office and constituent
institutions shall adopt policies and procedures that provide certain minimum
requirements for the maintenance and disposition of electronic records. The
minimum requirements shall be established in a supplemental regulation and
include retention and disposition processes and timelines for electronically
stored information.
C.
Strategic
Procurement and Evaluation of Technology Costs.
1.
To
promote efficiency, cost effectiveness, and consistent high-quality services
for students, the University of North Carolina System shall encourage, when
appropriate, the use of common information technology solutions and systems.
The president shall adopt a supplemental regulation implementing an information
technology strategic procurement process that includes provisions governing the
selection, use, and oversight of strategic Systemwide technologies. Under the information
technology strategic procurement process, costs may be reasonably allocated to participating
constituent institutions and affiliates.
2.
Constituent
institutions shall evaluate technology, computer hardware, and software using criteria
as provided in a supplemental regulation that includes at least the following:
a.
The
long-term cost of ownership, including costs of repairing the technology,
computer hardware, or software;
b.
Any
flexibility for innovation during the life of the technology, computer
hardware, or software; and
c.
Any
anticipated resale or salvage value at the end of the target life cycle for the
technology, computer hardware, or software based on the average resale or
salvage value of similar technology, computer hardware, or software as a
percentage of the initial cost of purchase.
3.
The
president may adopt additional requirements related to the UNC System and constituent
institutions procurement of information technology goods and services.
IV.
Information
Security.
A.
Documented
Information Security Program. The UNC System Office and constituent
institutions shall adopt a comprehensive information security program. The program
may be part of a larger information technology framework, or a stand-alone program.
The information security program shall include:
1.
Written
security policies and standards aligned with UNC System Office-defined
standards;
2.
Periodic
risk assessments and a documented risk treatment plan;
3.
Security
awareness practices and training; and
4.
Incident
response planning, including notification and escalation expectations.
V.
Identity
and Access Control.
A.
Identity
and Access Control Requirements. The UNC System Office and constituent
institutions shall adopt minimum identity and access control requirements. The requirements
may be part of a larger information technology framework, or stand-alone
requirements. Minimum identity and access control requirements shall include:
1.
Risk-based
access controls for all systems and data;
2.
Multi-factor
authentication where appropriate; and
3.
Where
multi-factor authentication is not implemented, the documented basis and
compensating controls to address associated risk.
VI.
Other
Matters.
A.
Effective
Date. The requirements of this policy shall be effective on the date of
adoption by the Board of Governors.
B.
Relation
to State Laws. The foregoing policies as adopted by the Board of Governors are
meant to supplement, and do not purport to supplant or modify, those statutory
enactments which may govern the activities of public officials.
C.
Regulations.
This policy shall be implemented and applied in accordance with such
regulations as may be adopted from time to time by the president.
[1] This policy repeals and replaces Section 1400.1, Information Technology Governance (05/24/18), Section 1400.2, Information Security (04/25/19), and Section 1400.3, User Identity and Access Control (05/24/18), of the UNC Policy Manual.