ITS Policies

Table of Contents

Affiliate Policy
Applying for Cellular Phones & Mobile Devices
Email Usage
Faculty and Staff Computer Hardware Support Policy
Faculty and Staff Computer Support Policy - Full
FERPA, Data Management, and Data Security Policy
InCommon Federation: Participant Operational Practices
Information Security Incident Response Team (ISIRT) Policy
ITS Social Media Policy and Guidelines
Mobile Device Support Policy
Mobile Phone Policy
NAU Information Security Policy
NAU Web Application Security Policy
Network Acceptable Use Policy for Faculty/Staff
Network Acceptable Use Policy for Students
Personal Equipment Support Policy
Physical Security Policy
Printers Support Policy
Risk Assessment Policy
Software Support Policy for Faculty and Staff

All policies

Affiliate Policy


This policy establishes guidelines for Information Technology Services (ITS) support of the management of affiliations at NAU. [See full policy]

Top

Applying for Cellular Phones & Mobile Devices


. [See full policy]

Top

Email Usage


E-mail is considered an official method for communication at Northern Arizona University (NAU) for its students and employees. [See full policy]

Top

Faculty and Staff Computer Hardware Support Policy


ITS supports computer systems that have been purchased within the last five years from a campus approved vendor. [See full policy]

Top

Faculty and Staff Computer Support Policy - Full


ITS supports the mission of NAU by providing desktop computing solutions for faculty and staff. [See full policy]

Top

FERPA, Data Management, and Data Security Policy


This policy establishes guidelines for the management, use and security administration of institutional data that exists within the NAU reporting environments. [See full policy]

Top

InCommon Federation: Participant Operational Practices


Participation in the InCommon Federation (“Federation”) enables a federation participating organization ("Participant") to use Shibboleth identity attribute sharing technologies to manage access to on-line resources that can be made available to the InCommon community. [See full policy]

Top

Information Security Incident Response Team (ISIRT) Policy


The Information Security Incident Response Team (ISIRT) is the specially-formed group of individuals responsible for investigating Information Security Incidents at the University. [See full policy]

Top

ITS Social Media Policy and Guidelines


Northern Arizona University’s Information Technology Services social media presence on Twitter and Facebook was established to help fulfill our mission to provide information technology and telecommunications services in support of Northern Arizona University’s missions and goals. [See full policy]

Top

Mobile Device Support Policy


This policy address supported Mobile Devices for NAU business by Faculty & Staff. [See full policy]

Top

Mobile Phone Policy


This policy addresses options for Faculty and Staff whose job requires them to use a cell phone for NAU business. [See full policy]

Top

NAU Information Security Policy


Northern Arizona University is committed to preserving the availability, confidentiality, and integrity of its information resources while also preserving and nurturing the open, information-sharing requirements of its academic culture. [See full policy]

Top

NAU Web Application Security Policy


Define appropriate security measures for the design and deployment of Northern Arizona University, hereinafter referred to as University, web applications. [See full policy]

Top

Network Acceptable Use Policy for Faculty/Staff


Access to Northern Arizona University computing and network resources is a privilege which imposes certain responsibilities and obligations and which is granted subject to university policies and codes, and local, state and federal laws. [See full policy]

Top

Network Acceptable Use Policy for Students


Access to the NAU computer and network systems is limited to current Northern Arizona University students, faculty, and staff who access these resources for legitimate research, teaching, professional service or other academic endeavors whose use complies with these and other policies of NAU. [See full policy]

Top

Personal Equipment Support Policy


These are the limitations on service for equipment that is not owned by NAU or the State of Arizona. [See full policy]

Top

Physical Security Policy


This purpose of this Physical Security Policy is to prevent unauthorized access, theft, interference, and damage to University data, information, or information systems. [See full policy]

Top

Printers Support Policy


ITS policy for support of specific printing hardware. [See full policy]

Top

Risk Assessment Policy


The Risk Assessment Policy authorizes the NAU Director of Information Security (IS) to perform periodic information security risk assessments to determine areas of vulnerability and to initiate appropriate remediation. [See full policy]

Top

Software Support Policy for Faculty and Staff


Faculty/Staff Software support policy  for NAU computers on campus. [See full policy]

Top