University Policy Library
Virtual Visit Request info Apply
MENUMENU
  • Manuals
    • Academic and Faculty Affairs
    • Campus Operations
    • Equal Opportunity and Access
    • Financial Management
    • General Administration
    • Human Resources
    • Information Technology
    • Lumberjack Athletics
    • Marketing and Communications
    • Research
    • Student Affairs
  • Indexes
    • By Subject
    • By Responsible Office
    • By Responsible Executive
  • Process
    • Policy Development and Administration
    • Policy Process Diagram
    • Policy Impact Statement
    • Policy Template
    • Policy Development Queue
    • Policies Under Review
  • About
    • University Policy Program
    • Policy Advisory Committee
    • Policy Liaisons
    • Policy Hierarchy
    • Frequently Asked Questions
  • Search
  • NAU
  • University Policy Library
  • Appropriate Use of Information Technology Resources
If you have questions regarding ITS policies or services, visit the ITS website, call 928-523-3335, or email ITS@nau.edu

Quick Links

Data Classification and HandlingElectronic Mail PolicyInformation Security
Use the feedback form to provide input about this policy.
Information Technology

Appropriate Use of Information Technology Resources

Use of Northern Arizona University’s information technology or IT resources must occur within the parameters defined by this policy and its accompanying standards of appropriate use. These resources, which include computers, servers, networks, electronic mail and telephonic services, data and data storage systems, and mobile devices, may only be used for the advancement of the University’s mission. All such use must comply with all applicable federal and state laws and regulations, Arizona Board of Regents and University policies, and the University’s IT contracting and licensing agreements.

Responsible Executive: Chief Information Officer
Responsible Office: Information Technology Services
Effective Date: June 1, 2006
Last Revised: August 19, 2022
Contact: Director, Information Security

View the Policy

View the Standards

 

Keywords:

Appropriate Use
Appropriate Use Standards
IT Resource