University Policy Library
Virtual Visit Request info Apply
MENUMENU
  • Manuals
    • Academic and Faculty Affairs
    • Campus Operations
    • Equal Opportunity and Access
    • Financial Management
    • General Administration
    • Human Resources
    • Information Technology
    • Lumberjack Athletics
    • Marketing and Communications
    • Research
    • Student Affairs
  • Indexes
    • By Subject
    • By Responsible Office
    • By Responsible Executive
  • Process
    • Policy Development and Administration
    • Policy Process Diagram
    • Policy Impact Statement
    • Policy Template
    • Policy Development Queue
    • Policies Under Review
  • About
    • University Policy Program
    • Policy Advisory Committee
    • Policy Liaisons
    • Policy Hierarchy
    • Frequently Asked Questions
  • Search
  • NAU
  • University Policy Library
  • Device Configuration Management
If you have questions regarding ITS policies or services, visit the ITS website, call 928-523-3335, or email ITS@nau.edu
Use the feedback form to provide input about this policy.
Information Technology

Device Configuration Management

Northern Arizona University owns or controls, and acts as custodian for, a broad array of information, including Sensitive Information protected by law. Maintaining the integrity of this data and the information systems where it is stored is an important obligation. This policy establishes baseline controls and standards for the management and maintenance of the University’s Information Technology (“IT”) Resources in support of this crucial task. All units and University Community Members are responsible for classifying all data within their care and implementing appropriate device configuration standards to protect the data.

Responsible Executive: Chief Information Officer
Responsible Office: Information Technology Services
Effective Date: July 24, 2019
Last Revised: August 19, 2022
Contact: Director, Information Security

View the Policy

View the Standards

 

Keywords:

Endpoint
Information security standard
IT resource
Personal device
Sensitive information
server
University IT resource