Quick Links
Appropriate Use of IT ResourcesElectronic Mail PolicyInformation SecurityUse the feedback form to provide input about this policy.
Information Technology
Access Management
Northern Arizona University owns or controls, and acts as custodian for, a broad array of information, including Sensitive Information protected by law. Maintaining the confidentiality and integrity of this data and the information systems where it is stored is an important University function. This policy is one component of the University’s program and strategy for Identity and Access Management (“IAM”), which includes access, Authentication, and audit controls. All units and University Community Members are responsible for the protection of University Information Technology (“IT”) Resources, including their NAU User ID (“UID”) and all other IT Account types under their control.
Responsible Executive: Chief Information Officer
Responsible Office: Information Technology Services
Effective Date: June 21, 2005
Last Revised: August 19, 2022
Contact: Director, Information Security Services
View the Policy
View the Standard
View the Authentication Standard
View the User Account Types Standard
Keywords:
Appropriate Use
Appropriate Use Standards
IT Resource