You are currently in the confidential and secure reporting structure of EthicsPoint. Below are the choices available to you. Please click on the arrow (Arrow Example) to select the type of report you would like to make.

University of North Carolina-Chapel Hill
Information Technology
Data Privacy/Integrity Refers to the technical, contractual, administrative and physical steps taken by the institution to protect against unauthorized access to and disclosure of personally identifiable data of students, faculty and other third parties that we possess.
Malicious / Inappropriate Use of Technology Any event that has the potential to negatively impact the confidentiality, integrity, or availability of UNC-Chapel Hill’s sensitive information (including physical files such as paper files) or Mission-Critical Resources. Examples of incidents include the loss or theft of a mobile device that has not been encrypted and that stores sensitive, University- owned information, a virus infection of an end-user work station that works with sensitive, University-owned information or the malicious disabling of a piece of hardware that endangers Mission-Critical Resources.
Misuse of Resources Improper or unauthorized use of Institution resources for personal gain.
Software Piracy/Intellectual Property Infringement Unauthorized use of copyrights or software; also includes the use of unauthorized software on college owned systems.
Other Information Technology Matters Other matters of concern not specifically outlined above.