University Policy Library
Virtual Visit Request info Apply
MENUMENU
  • Manuals
    • Academic and Faculty Affairs
    • Campus Operations
    • Equal Opportunity and Access
    • Financial Management
    • General Administration
    • Human Resources
    • Information Technology
    • Lumberjack Athletics
    • Marketing and Communications
    • Research
    • Student Affairs
  • Indexes
    • By Subject
    • By Responsible Office
    • By Responsible Executive
  • Process
    • Policy Development and Administration
    • Policy Process Diagram
    • Policy Impact Statement
    • Policy Template
    • Policy Development Queue
    • Policies Under Review
  • About
    • University Policy Program
    • Policy Advisory Committee
    • Policy Liaisons
    • Policy Hierarchy
    • Frequently Asked Questions
  • Search
  • NAU
  • University Policy Library
  • Information Technology
These policies are overseen by the Chief Information Officer.If you have questions regarding ITS policies or services, visit the ITS website, call 928-523-3335, or email ITS@nau.edu
  • Purchasing Technology at Northern Arizona Univeristy
  • University Policy Report Archive

All NAU employees and students should read and be familiar with the Appropriate Use of IT Resources policy
All NAU employees and students should read and be familiar with the Electronic Mail policy
View the FAQ for quick answers to common questions about University Policies
Use the feedback form to provide input about a policy document or this library

Information Technology
Policy Manual


Northern Arizona University’s information technology policies are set forth below. Entries in blue represent policies that conform to the new University Policy formatting standards and have been moved to the University Policy Library. Entries in purple indicate policies that await the development or conversion process.

  1. Access Management
  2. Affiliate Management
  3. Appropriate Use of Information Technology Resources
  4. Computer Purchasing
  5. Data Classification and Handling
  6. Device Configuration Management
  7. Domain Name Registration
  8. Electronic Mail
  9. Electronic Signatures
  10. Information Security
  11. Information Security Awareness Training
  12. Information Technology Incident Management
  13. Web Application Security
  14. Web Creation & Usage