University Data Assistance

Service Description

The Data Governance Oversight Group (DGOG) provides guidance and consulting on appropriate uses of University (Enterprise) data, classification questions, direction to authoritative sources of specific data, training on data governance responsibilities, and other University Data-related topics.

Additionally, the DGOG handles or facilitate requests for review or approval of certain data uses (procurement of new software or IT services, development of campus systems, changes to data inclusion or use for existing systems, new use of regulated data such as SSN, or other activities implicating mainly sensitive (Tier 2/3) information that require specific review.)

Some requests for specific data from campus sources for unit-level reporting, and guidance on unit self-reporting/dashboard activities can also be handled through the DGOG (see Data Governance at UNC for resources and guidance and for more detail).

If you are not sure where to go for help with a University Data question, the DGOG is available as a way finder and guide.

Audience

Employees

Documentation

User/Customer Responsibilities

  • Provide the best information available related to your request. Not all questions on the Service Request apply to your situation. You many provide as much or little information as you choose in the initial request.
  • Do not include any sensitive information of any kind in your service request! (A fulfiller will contact you if it’s necessary to communicate any Tier 2 or 3 information related to your request, simply note that you need to supply SI but do not attach or include it).
  • Respond promptly and thoroughly to follow-up communications, provide the documentation or information needed to give you a response to your request.

Out of Scope

  • Requests reporting data breach or other security incidents.
  • Requests handled through specific offices of the University (see Data Governance at UNC for references to other types of data oversight and compliance and how to access those resources.)
  • Requests for user access to specific systems (see the specific service/system which should have access provisioning methods available).

Other Important Info Worth Noting

DO NOT SUBMIT REPORTS OF KNOWN OR SUSPECTED DATA BREACH OR OTHER SECURITY INCIDENTS. If you believe that University Data may have been compromised, please call 919-962-HELP and ask for a critical response from a Security Analyst. Other information about reporting data malfeasance is available through the Office of Ethics and Policy or specific offices with responsibility for the data you are concerned with.

Documentation

See more at Datagov.unc.edu, safecomputing.unc.edu, and privacy.unc.edu

Expected Delivery

More than 2 weeks.

Keywords

report,  steward, privacy, security, access, vendor, procurement, third party, DPC, protection, DGOG, use agreement, BAA, PCI, PII, personally identifiable, HIPAA, release, PHI, advice, research, analysis, Tier, protected, CERTIFI, custodian classification, FERPA, Legacy, risk 

Support

Request support at any time. Service is monitored during weekdays. If you suspect a security or other data issue please do not report that in this form. Call the Service Desk and request a critical ticket to a Security Incident Handler. 

Hours of Operation

8:00am-5:00pm M-F only