This page is for all employees of NC State University.
For the student version, see NC State Regulations and Rules for Student IT Use.
Acceptable Use of IT Facilities and Services
This page lists the NC State IT regulations, rules and procedures apply to NC State employees when using the computing and data network resources provided by the university. Colleges and departments may have additional rules and procedures for the acceptable use of their IT facilities and services. See also All Policies, Regulations and Rules in the Category: Information Technology.
IT Regulations, Rules and Procedures
- POL 08.00.01 – Computer Use Policy
This official regulation governs the acceptable use of the campus data network and computing resources for administrative, academic and personal use. Some regulations apply only to faculty and staff, who are state employees. - Computer Use Regulation Summary and Guidance (“plain English” version)
- REG 08.00.10 – Antivirus Software Requirements
This regulation mandates the use of approved antivirus software on all Windows and Macintosh computers connected to the NC State network. See NC State Antivirus Resources. - REG 01.25.02 – Copyright Infringement – Policy Statement. See also:
- REG 04.25.05 – Information and Communication Technology Accessibility
This regulation specifies how NC State will meet its legal obligations to provide university Information and communication technologies, including web content, in formats that are accessible to persons with disabilities. For help in complying with this regulation, see IT Accessibility at NC State. - NC State University Password Standard
This document provides details of the rules governing Unity account password strength and password change. - Combined Pricing Initiative (CPI) at NC State
The university requirement to purchase laptop and desktop computer hardware through the Combined Pricing Initiative process became effective November 8, 2010. - Data Sensitivity Framework
This framework enables users of university data both to assess its sensitivity level and to secure it accordingly from risks which may include, but not be limited to, unauthorized destruction, modification, disclosure, access, use and removal. - RUL 08.00.13 – Network Printer Security Standard
This Rule describes the baseline technical security standards required for Networked Printers connected to the university network. It also provides recommended best practice guidelines for additional security controls to implement. - Information Security Acknowledgement Form (PDF)
All employees must review and agree to adhere to the content of this document the first time they sign into the MyPack portal. - Guidelines for Non-Employees with System Administration Duties
These guidelines assign and delineate responsibilities for custody and security of university data by non-employees (e.g., contractors, consultants, retirees) who function as system administrators on university resources.
Rules and Procedures
The following content applies to all university computing accounts and other systems and services supported by the Office of Information Technology.
Services for Faculty and Staff
- Computing Account Procedures for Faculty, Staff and Guests
Procedures for account creation and deactivation. - Email and Calendaring
Gmail, Calendar, Google Workspace - Email Alias
- Mailing List Services
- Optical Mark Reading Service
Network and IT Staff Resources
- Network Security Regulations
- Network Registration
Host registration - Rules for Implementation of Wireless Networks at NC State
See Also
Send questions and comments to the NC State Help Desk.
PRR Disclaimer:
This site contains information about the university’s Policies, Regulations and Rules (PRRs). Should any conflict exist between the content on this page and the official PRRs listed on the Policies, Regulations and Rules website, the latter governs.