University Policy Library
Virtual Visit Request info Apply
MENUMENU
  • Manuals
    • Academic and Faculty Affairs
    • Campus Operations
    • Equal Opportunity and Access
    • Financial Management
    • General Administration
    • Human Resources
    • Information Technology
    • Lumberjack Athletics
    • Marketing and Communications
    • Research
    • Student Affairs
  • Indexes
    • By Subject
    • By Responsible Office
    • By Responsible Executive
  • Process
    • Policy Development and Administration
    • Policy Process Diagram
    • Policy Impact Statement
    • Policy Template
    • Policy Development Queue
    • Policies Under Review
  • About
    • University Policy Program
    • Policy Advisory Committee
    • Policy Liaisons
    • Policy Hierarchy
    • Frequently Asked Questions
  • Search
  • NAU
  • University Policy Library
  • Web Application Security
If you have questions regarding ITS policies or services, visit the ITS website, call 928-523-3335, or email ITS@nau.edu

Quick Links

Appropriate Use of IT ResourcesData Classification and HandlingInformation SecurityWeb Application Security Standard
Use the feedback form to provide input about this policy.
Information Technology

Web Application Security

Common methods for accessing University Information include Web Applications. These computer software programs can be particularly susceptible to computer hacking attacks due to their public visibility and accessibility. This can result in the exposure or modification of University Information. To mitigate these risks, University Community Members responsible for creating, developing, updating, maintaining, or administering University Web Applications are required to implement appropriate classification and security procedures in accordance with this policy and its accompanying Web Application Security Standard.

Responsible Executive: Chief Information Officer
Responsible Office: Information Technology Services
Effective Date: June 21, 2005
Last Revised: August 19, 2022
Contact: Director, Information Security Services

View the Policy

 

Keywords:

IT resource
University information
Web application