Skip to main content

UCPPD provides processes and structures for best practices regarding the security and protection of personal data in possession of the University, including:

  • Review current campus collection and uses of social security numbers and other personal identifying information as defined by the North Carolina Identity Theft Protection Act.
  • Approving or disapproving such collection and use of personally identifiable information.
  • Reviewing security measures associated with hard copy forms and electronic templates that contain personally identifiable information.
  • Documenting the University’s processes for the collection and use of personally identifiable information (including Social Security numbers).
  • Recommending institutional changes needed for continuing compliance or best practices.
  • Oversight of activities needed to implement the Red Flags Rule.

See the UCPPD Charter for additional information.

For details on submitting a request for approval, see the UCPPD Review Process document.


Micki Jernigan, ChairInformation Technology ServicesChief Privacy Officer
Dennis SchmidtInformation Technology ServicesAssistant Vice Chancellor and Chief Information Security Officer
Dean WeberInternal AuditChief Audit Officer
Wendy AndrewsOffice of the Executive Vice Chancellor and ProvostExecutive Business Manager
Rich ArnoldOffice of Human ResourcesSenior Director, HR Information Management
David T. Lambeth IIIOffice of University CounselAssistant University Counsel
Christy SamfordOffice of University RegistrarDeputy Registrar
Chris Williams, ITEC RepStudent AffairsIT Director

Meeting Dates & Deadlines

The UCPPD meets monthly. Requests must be submitted for review at least 10 business days before the meeting in order to be considered for that month’s agenda. See the UCPPD Review Process document for details on submission requirements.

Meeting Date: 3rd Tuesday 3-5 pm (with 30-minute time slots assigned by IPO).
Submission Deadline: 1st Tuesday by 5 pm.
*adjusted for holiday

MonthSubmission DeadlineMeeting Date

Additional Resources

UNC GA Memo Red Flag Rules (pdf)

UNC GA Model ID Theft Program (pdf)

NC State Controller Red Flag Rules Advisory Memo

Red Flags Rule (16 C.F.R. Section 681.1)

Appendix A to Part 681—Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation (Published as an appendix to the Red Flags Rule, provides an outline for developing a program.)

Supplement A to Appendix A (Provides examples of Red Flags – scroll about halfway down page)