High Fidelity
Wraparound
  • Home
  • Who We Are
  • Our Process
  • Trainings
  • Resources
  • Records
  • Sign in to Access
  • Login
  • Register

Acceptable Use Policy

Last Updated: February 16, 2026

Acceptable Use Policy Privacy Notice Terms of Service

This Acceptable Use Policy ("AUP") defines the rules and guidelines for using the North Carolina High Fidelity Wraparound Training Program (NCHFWTP) platform ("Platform"). This AUP supplements our Terms of Service and is designed to protect all users, the integrity of program data, and the youth and families served by the HFW program.

All users are expected to use the Platform responsibly, ethically, and in compliance with all applicable laws. Violations of this policy may result in account suspension, termination, and/or referral to appropriate authorities.

1. Authorized Use

The Platform may only be used for:

  • Activities directly related to the NC High Fidelity Wraparound program and its training, implementation, and evaluation.
  • Managing records, events, and communications as part of your authorized role.
  • Professional development, training registration, and program collaboration.
  • Administrative functions appropriate to your assigned access level.

2. Prohibited Conduct

The following activities are strictly prohibited:

2.1 Unauthorized Access
  • Accessing or attempting to access accounts, data, or features that are not assigned to you.
  • Sharing your login credentials with any other person.
  • Using another person's account without explicit authorization from a platform administrator.
  • Attempting to bypass, circumvent, or disable any security feature or access control.
  • Probing, scanning, or testing the vulnerability of the Platform without authorization.
2.2 Data Misuse
  • Accessing youth or family records for purposes unrelated to your authorized role.
  • Copying, downloading, exporting, or distributing record data outside the Platform without proper authorization.
  • Sharing Protected Health Information (PHI) or confidential youth data through unsecured channels (e.g., personal email, text messages, social media).
  • Using data obtained from the Platform for personal gain, marketing, or any unauthorized purpose.
  • Scraping, harvesting, or bulk-extracting data from the Platform.
  • Entering knowingly false or misleading data into records, census entries, or event registrations.
2.3 Harmful Activities
  • Uploading files containing malware, viruses, ransomware, or any other malicious code.
  • Engaging in any activity intended to disrupt, degrade, or interfere with the Platform's operation.
  • Sending spam, phishing attempts, or unsolicited bulk communications through Platform features.
  • Using the Platform to harass, threaten, or intimidate other users.
  • Posting or transmitting content that is defamatory, obscene, discriminatory, or otherwise objectionable.
2.4 Impersonation & Fraud
  • Impersonating another user, administrator, or any other person.
  • Registering for events under a false identity or with fraudulent information.
  • Misrepresenting your role, affiliation, or authorization level.

3. Data Handling Obligations

Users who have access to youth and family records or other sensitive data must:

  • Handle all data in accordance with applicable federal and state laws, including HIPAA, FERPA, and North Carolina General Statutes regarding confidentiality.
  • Access only the records and data necessary for their authorized job functions.
  • Report any suspected data breaches or unauthorized access immediately to a platform administrator.
  • Complete any required data handling or confidentiality training before accessing sensitive records.
  • Ensure that screens displaying sensitive data are not visible to unauthorized individuals when working in shared or public spaces.
  • Log out of the Platform when leaving a workstation unattended.

4. Account Security Requirements

All users are responsible for maintaining the security of their accounts:

  • Use a strong, unique password that is not used on other websites or services.
  • Do not write down or store passwords in unsecured locations.
  • Change your password immediately if you suspect it has been compromised.
  • Do not use shared or public computers to access the Platform without ensuring you log out completely afterward.
  • Report lost or stolen devices that may have been logged into the Platform.

5. Communication Standards

When using Platform communication features (support tickets, messages, etc.), you must:

  • Communicate professionally and respectfully.
  • Not include unnecessary sensitive data (e.g., youth names, PHI) in support tickets or messages.
  • Not use the Platform to transmit content that is abusive, threatening, or discriminatory.

6. File Upload Standards

When uploading files to the Platform, you must ensure that:

  • Files are free of malware and malicious content.
  • Files are relevant to your authorized use of the Platform.
  • You have the legal right to upload the content.
  • Files containing sensitive information are only uploaded where specifically required and appropriate.
  • Files do not contain copyrighted material for which you do not have authorization.

7. Monitoring & Logging

Users should be aware that:

  • User activity and access patterns are monitored and logged for security, fraud prevention, and system integrity purposes.
  • Security events and suspicious activities are monitored and may trigger automated alerts.
  • Administrators may review logs to investigate policy violations, security incidents, or technical issues.
  • Administrative actions are logged and auditable for accountability.

This monitoring is conducted for the purposes of protecting the Platform and its users. For more details, see our Privacy Notice.

8. Enforcement & Consequences

Violations of this Acceptable Use Policy may result in one or more of the following actions, depending on the severity of the violation:

Severity Examples Possible Actions
Minor Accidental access to wrong record, minor communication issues Verbal or written warning, additional training
Moderate Sharing credentials, entering false data, repeated minor violations Temporary account suspension, required training, access level reduction
Severe Unauthorized data export, security bypass, malicious activity, PHI exposure Immediate account termination, reporting to employer/agency, referral to legal authorities

We reserve the right to take any action we deem appropriate to protect the Platform, its users, and the youth and families served by the program.

9. Reporting Violations

If you become aware of any violation of this policy, or any security concern, please report it immediately through one of the following channels:

  • Submit a support ticket through the Platform's support system.
  • Contact a platform administrator directly.
  • Email us at the address below.

Reports will be treated confidentially to the extent possible. Retaliation against anyone who reports a violation in good faith is strictly prohibited.

10. Changes to This Policy

We may update this AUP from time to time. When changes are made, we will update the "Last Updated" date and notify users through the Platform or via email. Continued use of the Platform after changes constitutes acceptance of the updated policy.

11. Contact Information

If you have questions about this Acceptable Use Policy, please contact us at:

NC High Fidelity Wraparound Training Program

UNC Greensboro Center for Youth, Family, and Community Partnerships

Terms of Service Privacy Policy © CYFCP