University Policy Library
Virtual Visit Request info Apply
MENUMENU
  • Manuals
    • Academic and Faculty Affairs
    • Campus Operations
    • Equal Opportunity and Access
    • Financial Management
    • General Administration
    • Human Resources
    • Information Technology
    • Lumberjack Athletics
    • Marketing and Communications
    • Research
    • Student Affairs
  • Indexes
    • By Subject
    • By Responsible Office
    • By Responsible Executive
  • Process
    • Policy Development and Administration
    • Policy Process Diagram
    • Policy Impact Statement
    • Policy Template
    • Policy Development Queue
    • Policies Under Review
  • About
    • University Policy Program
    • Policy Advisory Committee
    • Policy Liaisons
    • Policy Hierarchy
    • Frequently Asked Questions
  • Search
  • NAU
  • University Policy Library
  • Appropriate Use of Information Technology Resources

If you have questions regarding ITS policies or services, visit the ITS website, call 928-523-3335, or email ITS@nau.edu


Quick Links

Data Classification and Handling

Electronic Mail Policy

Information Security


Use the feedback form to provide input about this policy.

Information Technology

Appropriate Use of Information Technology Resources

Use of Northern Arizona University’s information technology or IT resources must occur within the parameters defined by this policy and its accompanying standards of appropriate use. These resources, which include computers, servers, networks, electronic mail and telephonic services, data and data storage systems, and mobile devices, may only be used for the advancement of the University’s mission. All such use must comply with all applicable federal and state laws and regulations, Arizona Board of Regents and University policies, and the University’s IT contracting and licensing agreements.

Responsible Executive: Chief Information Officer
Responsible Office: Information Technology Services
Effective Date: June 1, 2006
Last Revised: December 1, 2020
Contact: Director, Information Security

View the Policy

View the Standards

 

Keywords:

Appropriate Use
Appropriate Use Standards
IT Resource