ࡱ> tvsg AbjbjVV 4dr<r<9     8V\46IpVVVVEEEHHHHHHH$&KMH EEEEEH  VVHE V VHEHEDGVE׏F&HI06IFvNmLvNLGGPvN HEEEEEEEHHEEE6IEEEEvNEEEEEEEEE : POL 08.00.03 Network Management and Usage Policy NOTICE:This policy/regulation is presented in its format as of the date of posting to this website. The university is in the process of conducting a thorough review of all its policies and regulations. This policy has not yet been reviewed/vetted in accordance with HYPERLINK "/about-uncp/administration/policies-and-regulations/all-regulations/reg-012001-procedure-formatting-adopting-and-publishing-policies-and-regulations" REG 01.20.01. Authority: History: First issued: April 25, 2008. Revised: September 18, 2009 Last revised: June 24, 2014 Related Policies:  HYPERLINK "/about-uncp/administration/policies-and-regulations/all-regulations/reg-080001-appropriate-use-unc-pembroke-technology-infrastructure" 鶹 Pembroke REG 08.00.01 Appropriate Use of the 鶹P Technology Infrastructure Regulation  HYPERLINK "/about-uncp/administration/policies-and-regulations/all-regulations/reg-074501-disposal-computer-equipment" 鶹 Pembroke REG 07.45.01 Disposal of Computer Equipment  HYPERLINK "/about-uncp/administration/policies-and-regulations/all-policies/pol-080002-information-systems-access-policy" 鶹 Pembroke POL 08.00.02 Information Systems Access Policy  HYPERLINK "https://www.scio.nc.gov/mission/itPoliciesStandards.aspx" Statewide Information Security Manual Additional References:  HYPERLINK "http://www.ncleg.net/gascripts/statutes/statutelookup.pl?statute=14-454" NC General Statute 14-454 - Accessing computers Contact Information: Associate Vice Chancellor for Information Technology and CIO, (910.775.4355) 1. PURPOSE 1.1 鶹 (hereinafter 鶹P) provides computer access and capabilities through the Division of Information Technology and various college and department computer systems. 鶹P relies heavily upon these systems to meet operational, financial, educational and informational needs. It is essential that these systems and machines be protected from misuse and unauthorized access. It is also essential that 鶹Ps computers, computer systems and computer networks, as well as the data they store and process, be operated and maintained in a secure environment and in a responsible manner. This policy applies to all 鶹P computer systems and refers to all hardware, data, software and communications networks associated with these computers. In particular, this policy covers computers ranging from multi-user timesharing systems to single user personal computers, whether free-standing or connected to the network. Computing resources are valuable, and their abuse can have a far-reaching negative impact. Computer abuse affects everyone who uses computing facilities. The same moral and ethical behavior that applies in the non-computing environment applies in the computing environment. 1.2 The 鶹P computing and telecommunicating networks, computing equipment and computing resources are owned by 鶹P and are provided primarily to support the academic and administrative functions of 鶹P. Federal and state laws, and university policies and procedures govern the use of this equipment and technologies. Additional rules and regulations may be adopted by various divisions/departments to meet specific administrative or academic needs. Any adopted requirements must be in compliance with applicable federal and state laws, and this policy. 2. DEFINITION OF TERMS 2.1 Network devices. Network devices include any device that connects to the universitys digital computer networking infrastructure. Network devices may include desktop computers, laptop computers, Internet protocol telephones, network storage devices, printers and network infrastructure devices such as routers, switches and wireless access points. They may also include wireless devices such as laptop computers, PDAs and some wireless telephones. These do not include devices that access 鶹P service through an internet service provider, such as home computers used to check email, Blackboard, etc. 2.2 Computer systems. Computer systems include any microcomputer (stand-alone or networked), workstation, mini-computer or mainframe computer used on this campus or accessible by way of networks, at other locations. 2.3 Computer networks. Computer networks include any local or wide area communications systems connecting computer systems as defined above. The network backbone consists of the primary communications media that connect small networks and individual terminals, microcomputers, workstations, etc. to other devices. Local area networking media may consist of copper wire or fiber optic cable that is used to connect one terminal, microcomputer, workstation, etc. to another or to network interface equipment. 2.4 Administrative privileges. Administrative privileges are the highest level of permission that can be granted to a computer user, and with this permission comes a higher level of responsibility. Levels of permissions are necessary in networked environments to ensure system security and prevent damage to computer hardware and software. A user with administrative privileges can perform tasks such as install and uninstall software and change a computers configurations. 3. POLICY 3.1 Network security 3.1.1 All network devices connected to the university network must first be registered and approved by the Division of Information Technology (DoIT). All university owned network devices must be approved by DoIT before purchase. 3.1.2 All network-capable devices must be decommissioned and sent to surplus according to approved procedures. 3.1.3 Any network device that is detected and verified as degrading the quality of service on the network may be barred from network access until the cause of the problem is corrected. 3.1.4 Activities that interfere with the operation of the network are prohibited. These include but are not limited to the propagation of computer worms, network sweeps, network probing, viruses or Trojan horses. 3.1.5 Inbound Internet traffic will only be allowed using protocols, addresses and ports approved by DoIT. Other inbound traffic will be blocked at the network perimeter. 3.1.6 Approved encryption technology is required for the transmission of confidential information. 3.1.7 DoIT may regulate outbound Internet traffic as required to comply with federal or state legislation, court orders or university policy, or to maintain the security of the campus network and its components. 3.1.8 DoIT may take proactive approaches to network management and may implement such changes as are necessary to improve network security and stability. 3.1.9 Vulnerability scanning and penetration testing of any network device or network application is prohibited except as authorized by the associate vice chancellor for Information Resources and Chief Information Officer (CIO). 3.1.10 DoIT shall define baseline configurations for all cases of network devices, to include security, network settings and standard configuration. 3.1.11 All server operating systems, applications and subsystems must be maintained in a current patched state. All security patches or upgrades must be implemented in a timely manner. Patches or upgrades that do not impact security may or may not be implemented at the decision of the system administrator. 3.1.12 Administrative privileges shall be granted at the discretion and direction of the associate vice chancellor for Information Resources and CIO. 3.1.13 Any device that is capable of connecting to the 鶹P network must meet the minimum specifications and configuration requirements established under the authority of the associate vice chancellor for Information Resources and CIO. 3.1.14 鶹P shall limit network access of network devices that are not current on patches or upgrades. 3.1.15 Depending on the critical nature of the supported applications, 鶹P may require external (vendor or contracted) support for hardware and operating system environments. 3.2 Network Accounts 3.2.1 Accounts for access privileges to the campus networking infrastructure and all 鶹P networking devices, including special access such as virtual private network (VPN) services, shall be granted as authorized by the associate vice chancellor for Information Resources and CIO. 3.2.2 Account privileges shall be subject to the Appropriate Use of the 鶹P Technology Infrastructure Regulation and other relevant policies. 3.3 Physical Security 3.3.1 Access to physical spaces such as closets and rooms that contain functioning network infrastructure devices and server devices shall be limited to personnel authorized by the associate vice chancellor for Information Resources and CIO and, in cases involving an imminent threat of physical harm, the director of Police and Public Safety. Access may be controlled through special access technologies such as card swipe, biometric and other special devices. 3.4 Computer Security Incident Response 3.4.1 The university will maintain an emergency response plan that includes the campus intranet infrastructure and all network devices. 3.5 Compliance 3.5.1 鶹P will maintain its network and network devices in compliance with all federal, state or regulatory agency requirements. These guidelines are intended to satisfy requirements for laws such as the Federal Educational Rights Protection Act (FERPA), the Health Insurance Portability and Accountability Act (HIPAA), the Gramm-Leach-Bliley Act and the Payment Card Industry (PCI). 鶹P network policies and procedures are subject to audit by the NC Office of the State Auditor. 3.6 Monitoring the Network 3.6.1 鶹P expressly reserves the right to impose any restraints or monitor the content of communications, data, or other information on the 鶹P technology infrastructure under the following circumstances: 3.6.1.a. when required to do so by applicable federal, state or local laws, including without limitation laws that prohibit publication of defamatory material, laws requiring the disclosure of public records upon request and laws prohibiting the misuse of state property for private gain; or 3.6.1.b. to maintain the security and integrity of the 鶹P technology infrastructure; 3.6.2 The university respects the privacy of users. It does not routinely inspect or monitor the contents of electronic information, nor is the university responsible for its contents. However, when there is reasonable suspicion and with the approval of the chancellor or his/her delegate, DoIT reserves the right: 3.6.2.a. to investigate any alleged Appropriate Use Regulation or other 鶹P or 鶹 policy infractions; or 3.6.2.b. to assist in any university or law enforcement investigations seeking evidence regarding alleged violation of any criminal law. 3.6.3 Users have no Constitutional expectation of privacy in any information on the 鶹P technology infrastructure. 鶹P cannot guarantee the confidentiality or integrity of or any users continuing access to any information or data stored or transmitted on 鶹Ps network because of the possibility, despite 鶹Ps best efforts, of unauthorized access by third parties (hackers), failure of equipment (system crashes) or some other event. Users are reminded that 鶹P may be required to disclose any information transmitted or stored on the 鶹P technology infrastructure that is determined to be a public record and not otherwise exempt from disclosure under applicable law. While every effort is made to insure confidentiality and integrity, users are still responsible for maintaining the secrecy of their personal access and authentication information (passwords, etc.) and for transmitting information (email, files, etc.) to the proper address. 3.6.4 In the event that such monitoring or review is necessary or appropriate, the Division of Information Technology or the chancellors designee will be responsible for such monitoring, investigation and enforcement or for working in cooperation with the federal, state or local law enforcement agency involved. 3.7 Exceptions and waivers 3.7.1 Recognizing the rapid pace of change in available information technology and the resulting possibility of unforeseen and unintended consequences arising from this policy, the chancellor is authorized to issue waivers and/or exceptions to this policy if such waivers and exceptions maintain the integrity of sensitive data, do not result in a violation of applicable law, and are documented in a memorandum or other writing signed by the chancellor. Such waivers and exceptions should be reported to the Board of Trustees at its next regularly scheduled meeting. 4. RESPONDING TO SECURITY AND ABUSE INCIDENTS 4.1 All users have the responsibility to report any discovered unauthorized access attempts or other improper usage of 鶹P computers, networks or other information processing equipment. If a security or abuse problem with any university computer or network facility is observed by or reported to a user, such user shall immediately report the same to DoIT. 5. RANGE OF DISCIPLINARY SANCTIONS 5.1 Persons in violation of this policy are subject to a full range of sanctions, including, but not limited to, the loss of computer or network access privileges, disciplinary action and dismissal from 鶹. Any sanctions against employees will be imposed through procedures consistent with any applicable state regulations. Some violations may constitute criminal or civil offenses, as defined by local, state and federal laws, and the university may prosecute any such violations to the full extent of the law. 5.2 鶹P may suspend computer or network access privileges immediately and without prior notice to the user if necessary to preserve the safety or integrity of 鶹Ps Network or to prevent or investigate violation of applicable federal, state or local law or 鶹P policy. The user must be sent written or electronic notice of any such intentional suspension of access and the reasons for it, and notice of the time, date and location for a meeting at which continued suspension of access may be discussed with the associate or assistant CIO or his/her designee, who must reconsider his or her suspension decision in light of the information received in the meeting. Following the meeting, the associate or assistant CIO or his/her designee shall send a copy of his or her decision upon reconsideration to the user and advise the user that he or she may appeal the decision to the associate vice chancellor for Information Resources and Chief Information Officer.       *0129= >            ; Ʒxrlf]WlQJ hx5CJ h~|CJ hZCJh#>h#>CJ h aCJ hxCJ h#>CJh#>hZ5CJh#>h#>0J5CJ+jh#>h#>5B*CJUph%jh#>h#>5B*CJUphh#>h#>5B*CJph$h#>h#>B*CJOJQJ\ph hDR5 h~|5 hWB5hZhDR5 h>Bc5 hZ5 h#>5 2     < X t u ] / BC dgdZ  & Fgd#>  & Fgd#>  & Fgd#>gdZ $a$gdZ; < = W X f s t u 1 2 3 @ D N O _   < Z [ \ ĵ˩~ocYh#>hx5CJh#>h#>0J5CJjh#>5CJU hZc5CJh#>hZc0J5CJh#>hx0J5CJh#>h"10J5CJh#>h~|0J5CJjh#>5CJU h#>5CJjh#>5CJU h"15CJ hxCJ hZCJ hx5CJ hWB5CJ h~|5CJ\ ] ^  , - . / 0 v w x ǻ饛ymf`ZTEjh#>hWB5CJU hWBCJ hxCJ hZCJ hx5CJh"1hx0J5CJjh"15CJU h"15CJjh"15CJUh#>h"15CJh#>hx5CJh>Bch>Bc0J5CJh>Bchx0J5CJh>Bch#>0J5CJjh>Bc5CJU h>Bc5CJjh>Bc5CJUh#>hZc5CJ @ABCWYSUl#%jԾ~zs~ls~z~shshshshshshshshshDR h$hZ h$hDRhxhZhb&OJQJ\hx5OJQJ\hxOJQJ\ hxCJ#hZhx5CJOJPJQJaJ hZ5CJhxhx5CJh#>hWB0J5CJjh#>hWB5CJU"jh#>hWB5CJUh#>hWB5CJ(~!"LM & FgdZgdZgdZgdZjl~KMbcijAC2J"$Ji!"%&67835 hd)\ hm5w5\ hm5w\hxhDR\ hx\ hZ\ h$hZhxhZ h$hDRhDRLWwIN!IKLMRS  WYF H I!k!!!!!!h#>hDR5hd)hd)5 hZ5 h$hZhd)hZhDR h$hDR hd)\ hm5w\hd)hDR\KM !!^"_"D#E###%%%%&&&&'''gdZ & FgdZ!!^"_"d"e"""""""<#>#A#B#D#E#K#L#######I$K$$$%%%%i%j%s%t%x%y%%%%%%%%W&X&a&b&f&g&&&&&&&&&&&&'''''''''''(((((((h#>hDR5h#>hd)5ho*hDR h$h =h =hd) h$hDRhZQ''((q)r)))W+X+++ , ,,,--.... 00f0g01gdZgdZ & FgdZ((((((#)I)S)T)q)r)s)u)v))))))>*?*H*I*M*N*v*z*****+;+W+X+Z+[+\+++++++ , , , ,,,,,, ,t,x,,,V-u------..........hDRhdh#>hZ5h#>hd5h#>hDR5 h$ho*ho*h~|hd)hZ h$hDRh =K.......// 0 0 0000000f0g0i0l0m0r0{0000001 1,1K1i1j1z1~11111111112222222)2*22222222 3303T33333344@4T4V4A5C555V6W6Y6\6]66666h=lhDR h$hDRho*hd)hdhZY112222V6W6777799::};~;;;==AAAdgdDRgdZgdZgdZ & FgdZ6X7f7777777777c8e8i9j9s9u999999::::::::::::";M;v;z;};~;;;;;;;;;O<n<<<==K=e=v=w=======4>5>R>r>>>>>????hn& h$hZh =hd)hdh#>hDR5h#>hZ5h#>hd5hZhDR h$hDRL?e@g@@@@@@@ A A=A>AGAHALAMAAAAAAAAAAAAAAAAh#>hvh#>OJQJhsjhsU hQhDRhn&hDR h$hDRAAAAAAAAAAAAgdDR  <gdDRd 21h:pDR/ =!"#$% DyK yK jhttps://www.uncp.edu/about-uncp/administration/policies-and-regulations/all-regulations/reg-012001-procedure-formatting-adopting-and-publishing-policies-and-regulationsyX;H,]ą'cDyK yK Lhttps://www.uncp.edu/about-uncp/administration/policies-and-regulations/all-regulations/reg-080001-appropriate-use-unc-pembroke-technology-infrastructureyX;H,]ą'cDyK yK https://www.uncp.edu/about-uncp/administration/policies-and-regulations/all-regulations/reg-074501-disposal-computer-equipmentyX;H,]ą'cDyK yK https://www.uncp.edu/about-uncp/administration/policies-and-regulations/all-policies/pol-080002-information-systems-access-policyyX;H,]ą'cDyK yK https://www.scio.nc.gov/mission/itPoliciesStandards.aspxyX;H,]ą'cDyK yK http://www.ncleg.net/gascripts/statutes/statutelookup.pl?statute=14-454yX;H,]ą'cj& 0 OJPJQJ_HmH nH sH tH J`J "*Normal dCJ_HaJmH sH tH DA D Default Paragraph FontRiR 0 Table Normal4 l4a (k ( 0No List \^@\ b0 Normal (Web)ddd[$\$CJOJPJQJaJ** b pagetitle,, b storytitle6U`!6 b0 Hyperlink >*B*phZO2Z b storytitle1ddd[$\$CJOJPJQJaJ*W`A* b`Strong5\N@RN O0 Balloon Text dCJOJQJaJJoaJ O0Balloon Text CharCJOJQJaJ4@r4 v0Header !6o6 v0 Header CharCJaJ4 4 v0Footer !6o6 v0 Footer CharCJaJ.). v Page Number\O\ l) policy headerd<h5CJOJPJQJaJVOV %policy section headerPOP l) policy body d@CJOJPJQJaJHOH 03policy body bold x5JOJ l)policy body bullets F xB'`B 2Comment ReferenceCJaJ<@"< #2 Comment Text"CJaJBo1B "2Comment Text CharCJaJHj@!"H %2Comment Subject$5CJ\aJNoQN $2Comment Subject Char5CJ\aJPK![Content_Types].xmlN0EH-J@%ǎǢ|ș$زULTB l,3;rØJB+$G]7O٭V$ !)O^rC$y@/yH*񄴽)޵߻UDb`}"qۋJחX^)I`nEp)liV[]1M<OP6r=zgbIguSebORD۫qu gZo~ٺlAplxpT0+[}`jzAV2Fi@qv֬5\|ʜ̭NleXdsjcs7f W+Ն7`g ȘJj|h(KD- dXiJ؇(x$( :;˹! I_TS 1?E??ZBΪmU/?~xY'y5g&΋/ɋ>GMGeD3Vq%'#q$8K)fw9:ĵ x}rxwr:\TZaG*y8IjbRc|XŻǿI u3KGnD1NIBs RuK>V.EL+M2#'fi ~V vl{u8zH *:(W☕ ~JTe\O*tHGHY}KNP*ݾ˦TѼ9/#A7qZ$*c?qUnwN%Oi4 =3N)cbJ uV4(Tn 7_?m-ٛ{UBwznʜ"Z xJZp; {/<P;,)''KQk5qpN8KGbe Sd̛\17 pa>SR! 3K4'+rzQ TTIIvt]Kc⫲K#v5+|D~O@%\w_nN[L9KqgVhn R!y+Un;*&/HrT >>\ t=.Tġ S; Z~!P9giCڧ!# B,;X=ۻ,I2UWV9$lk=Aj;{AP79|s*Y;̠[MCۿhf]o{oY=1kyVV5E8Vk+֜\80X4D)!!?*|fv u"xA@T_q64)kڬuV7 t '%;i9s9x,ڎ-45xd8?ǘd/Y|t &LILJ`& -Gt/PK! ѐ'theme/theme/_rels/themeManager.xml.relsM 0wooӺ&݈Э5 6?$Q ,.aic21h:qm@RN;d`o7gK(M&$R(.1r'JЊT8V"AȻHu}|$b{P8g/]QAsم(#L[PK-![Content_Types].xmlPK-!֧6 0_rels/.relsPK-!kytheme/theme/themeManager.xmlPK-!0C)theme/theme/theme1.xmlPK-! ѐ' theme/theme/_rels/themeManager.xml.relsPK] 9d ; \ j!(.6?A!#$%'(*,-/0M'1AA"&)+.1=2Z],/w@9XXXXXXL# @0(  B S  ?LPv3z399999999999)x (())**9999999999933333333 []-99]a |G8yUTG~t&Ҫu9)$2~4 e9D 7>lEVD4pIU4{d_VBvF-^x6O{άh^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hH^`CJOJQJo(^`CJOJQJo(opp^p`CJOJQJo(@ @ ^@ `CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(PP^P`CJOJQJo(^`CJOJQJo(^`CJOJQJo(opp^p`CJOJQJo(@ @ ^@ `CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(PP^P`CJOJQJo(^`CJOJQJo(^`CJOJQJo(opp^p`CJOJQJo(@ @ ^@ `CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(PP^P`CJOJQJo(h^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hH^`CJOJQJo(^`CJOJQJo(opp^p`CJOJQJo(@ @ ^@ `CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(PP^P`CJOJQJo( ^`OJQJo( ^`OJQJo(o p^p`OJQJo( @ ^@ `OJQJo( ^`OJQJo(o ^`OJQJo( ^`OJQJo( ^`OJQJo(o P^P`OJQJo(^`CJOJQJo(^`CJOJQJo(opp^p`CJOJQJo(@ @ ^@ `CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(PP^P`CJOJQJo( 8^8`OJQJo( ^`OJQJo(o  ^ `OJQJo(  ^ `OJQJo( x^x`OJQJo(o H^H`OJQJo( ^`OJQJo( ^`OJQJo(o ^`OJQJo(^`CJOJQJo(^`CJOJQJo(opp^p`CJOJQJo(@ @ ^@ `CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(PP^P`CJOJQJo(^`CJOJQJo(^`CJOJQJo(opp^p`CJOJQJo(@ @ ^@ `CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(PP^P`CJOJQJo(^`CJOJQJo(^`CJOJQJo(opp^p`CJOJQJo(@ @ ^@ `CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(PP^P`CJOJQJo(^`CJOJQJo(^`CJOJQJo(opp^p`CJOJQJo(@ @ ^@ `CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(PP^P`CJOJQJo(^`CJOJQJo(^`CJOJQJo(opp^p`CJOJQJo(@ @ ^@ `CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(PP^P`CJOJQJo(^`CJOJQJo(^`CJOJQJo(opp^p`CJOJQJo(@ @ ^@ `CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(PP^P`CJOJQJo(h^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hHu9)e9VD-^xUd_ 7>$2va IU`>~t&]O{                  0v                          3cYRH67&hQE67&YRHhQEE|=fG[7dn&b&#>WBDRTk] a>BcZck=l vm5w~|g"1xszo*/ =d)Z99@9@UnknownG*Ax Times New Roman5Symbol3. *Cx Arial7.@CalibriCLucida Grande?= *Cx Courier New;WingdingsA$BCambria Math"qh`&G&G&G0h0h!20t9t9C#QHP ?g2xx DoIT 03 07: Network Policy DoIT Policy Yoshi Guy UNC PembrokeL           Oh+'0  0 < H T`hpxDoIT 03 07: Network Policy DoIT Policy Yoshi GuyNormal鶹 Pembroke4Microsoft Office Word@@׏@F4ҏ@׏0՜.+,D՜.+,L hp  鶹Pht9 DoIT 03 07: Network Policy Title@(V^j_PID_LINKBASE _PID_HLINKSAA$uwHhttp://www.ncleg.net/gascripts/statutes/statutelookup.pl?statute=14-454 L 9https://www.scio.nc.gov/mission/itPoliciesStandards.aspx_ https://www.uncp.edu/about-uncp/administration/policies-and-regulations/all-policies/pol-080002-information-systems-access-policyvahttps://www.uncp.edu/about-uncp/administration/policies-and-regulations/all-regulations/reg-074501-disposal-computer-equipmentZ https://www.uncp.edu/about-uncp/administration/policies-and-regulations/all-regulations/reg-080001-appropriate-use-unc-pembroke-technology-infrastructureQhttps://www.uncp.edu/about-uncp/administration/policies-and-regulations/all-regulations/reg-012001-procedure-formatting-adopting-and-publishing-policies-and-regulations  !"#$%&'()*+,-./012456789:<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abdefghijlmnopqruRoot Entry FpX׏wData 31Table;NWordDocument4dSummaryInformation(cDocumentSummaryInformation8kCompObjr  F Microsoft Word 97-2003 Document MSWordDocWord.Document.89q