Data Integration and Analytics

The Data Integration and Analytics (DIA) team is about all things data. We are responsible for the identification, evaluation, and integration of all business data at UNC Kenan-Flagler. Our mission is to provide faculty and staff a single stop for insightful data, reporting and analytics to support their business needs.
  Open access to Tableau is not available at this time, but if you would like to request access, please follow the link below:How To Request Access to Tableau Dashboards  

Business Systems and Applications

Our Business Systems and Development team provides custom software development to support school operations. 

Research Resources and Computing

The UNC Research Computing group offers a variety of resources that UNC Kenan-Flagler faculty and staff can leverage.  Research Computing for UNC-Chapel Hill is developed, supported and maintained by the ITS Research Computing group.UNC Research ComputingGetting Access to Research Computing clusters

Wireless Projection in the Classroom

Wireless projection is available in our upgraded classrooms and is provided through AirMedia.  This allows easy presentation wirelessly using laptops and mobile devices.  No additional software is needed if you are using a laptop, but mobile devices must download an app.  Projecting is as simple as selecting AirMedia on the classroom touch panel and typing the displayed IP address into your web browser.  If you have any questions, issues, or would like to request a demo please contact the IT Academic Technologies team by email or phone

Personal Websites

UNC-Chapel Hill offers the ability for students, staff, and faculty to create and host their own personalized websites at http://tarheels.live.

This is a self-service web publishing platform that allows anyone with a main campus Onyen account to create a website at no cost. WordPress is the platform that main campus has selected, it allows sites to be created quickly, has advanced content management, and allows for customization of the look and feel.

Wordpress is best for publicly accessible webpages.

If you are a faculty member who needs to share a lot of documents with your students, your Canvas course website is best location for that.

Getting Started

More information on how to get started with campus-hosted WordPress websites is available if needed. Review the TarHeels.live Terms of Service before getting started.

Need more assistance with editing a WordPress site? Tutorials are available at WordPress.org. The Undergraduate Library also has guidance for editing a TarHeels.live website

Best Practices for Information Security

Information Security is essential to prevent those with malicious intent from accessing data.  Practices may include: Changing your online account passwords, avoiding unsolicited emails, locking or logging off your PC as you walk away, all of these things help prevent data loss from anyone who might wish to compromise accounts.

INSTRUCTIONS


Do not store any personally identifiable information on your computer

Do not store any personally identifiable information (such as Social Security Number, date of birth, Driver’s License Number, credit card information and home addresses) on your computer or removable media (such as disks, tapes, USB drives)

Create Complex Passwords

  • at least 8 characters
  • at least one letter
  • at least one digit
  • at least one special character, such as !, #, $, %, ^, etc. Do not use @, /, <, or ?
  • cannot contain all or part of your username or be one of your previous five passwords

Regularly Change Passwords

  • Change on a Monday so you have all week to remember
  • Change all passwords at the same time
  • Use different passwords for each account
  • Do not write down passwords
  • Do not share passwords

Delete or Archive Unnecessary Information

  • Shred papers and destroy CD/DVDs that contain confidential information (use cross-cut shredder)
  • Delete or move information off-line that is no longer needed
  • Old computers should have data completely erased before being discarded.

Password protect computers and use password protected screen savers

All computers should have login passwords
  • Lock your computer when you leave your office (on a PC, press Ctrl+Alt+Delete and select “Lock Computer” on a Mac)
  • Set your computer to automatically lock after 15 minutes of Inactivity
  • Set automatic updates for your computer
  • Your computer should be set with Windows/Mac OS automatic updates option enabled
  • Operating system firewalls should be enabled

Anti-virus and anti-spyware software

  • Anti-virus and anti-spyware software on your computer should be configured to update definitions at least once per day
  • Computers should be scanned daily for new viruses/spyware missed by active protection
  • Viruses/spyware are commonly distributed by websites, screen savers, game software, and other “free” programs
Review our information regarding spyware and viruses or anti-virus software for more information.
Links in unsolicited emails can appear safe but can actually link to websites with malicious content. If you don’t recognize the sender or are not expecting the email the best action is to not click on any links at all. If you must click on a link:
  • Type the URL address in the browser
  • Follow a link from a trusted web page
  • Use a previous bookmark
Outlook has a Report button which allows you to identify phishing or spam emails, use this instead of emailing the Service Desk unless you happen to have acted upon one:
  • In Outlook
    • Windows – Report button appears on right side of ribbon.
    • macOS – Report button appears in the middle of the ribbon.
    • Outlook Webmail – Report button appears on the left side of the ribbon.
  • When reporting use “Phishing” or “Junk” options.

Tips for securing laptops & other mobile devices

  • Store all passwords, account names, access codes, login instructions, and authentication tools separately from laptops (not in the pockets of the carrying case)
  • Lock up laptops when not attended (cable lock during the day, in a locked drawer or cabinet when you leave for the day)
  • Keep laptops out of sight when temporarily stored in a car, hotel room, or home
  • When traveling always keep laptop in your possession
  • Record make/model & serial number of your device
  • If a device is stolen or missing contact the IT Service Desk immediately

IT Policies