Device Configuration Management
Northern Arizona University owns or controls, and acts as custodian for, a broad array of information, including Sensitive Information protected by law. Maintaining the integrity of this data and the information systems where it is stored is an important obligation. This policy establishes baseline controls and standards for the management and maintenance of the University’s Information Technology (“IT”) Resources in support of this crucial task. All units and University Community Members are responsible for classifying all data within their care and implementing appropriate device configuration standards to protect the data.
View the DRAFT Standards
Information security standard
University IT resource