Use the feedback form to provide input about this policy.
Information Technology
Device Configuration Management
Northern Arizona University owns or controls, and acts as custodian for, a broad array of information, including Sensitive Information protected by law. Maintaining the integrity of this data and the information systems where it is stored is an important obligation. This policy establishes baseline controls and standards for the management and maintenance of the University’s Information Technology (“IT”) Resources in support of this crucial task. All units and University Community Members are responsible for classifying all data within their care and implementing appropriate device configuration standards to protect the data.
Responsible Executive: Chief Information Officer
Responsible Office: Information Technology Services
Effective Date: July 24, 2019
Last Revised: August 19, 2022
Contact: Director, Information Security
View the Policy
View the Standards
Keywords:
Endpoint
Information security standard
IT resource
Personal device
Sensitive information
server
University IT resource