University Policy Library
Virtual Visit Request info Apply
MENUMENU
  • Manuals
    • Academic and Faculty Affairs
    • Campus Operations
    • Equal Opportunity and Access
    • Financial Management
    • Freedom of Expression
    • General Administration
    • Human Resources
    • Information Technology
    • Marketing and Communications
    • Research
    • Student Affairs
  • Indexes
    • By Subject
  • Process
    • Policy Development and Administration
    • Policy Template
  • About
    • University Policy Program
    • Frequently Asked Questions
  • Access Management
If you have questions regarding ITS policies or services, visit the ITS website, call 928-523-3335, or email ITS@nau.edu

Quick Links

Appropriate Use of IT Resources Electronic Mail Policy Information Security
Use the feedback form to provide input about this policy.
Information Technology

Access Management

Northern Arizona University owns or controls, and acts as custodian for, a broad array of information, including Sensitive Information protected by law. Maintaining the confidentiality and integrity of this data and the information systems where it is stored is an important University function. This policy is one component of the University’s program and strategy for Identity and Access Management (“IAM”), which includes access, Authentication, and audit controls. All units and University Community Members are responsible for the protection of University Information Technology (“IT”) Resources, including their NAU User ID (“UID”) and all other IT Account types under their control.

Responsible Executive: Chief Information Officer
Responsible Office: Information Technology Services
Effective Date: June 21, 2005
Last Revised: August 19, 2022
Contact: Director, Information Security Services

View the Policy

View the Standard

View the Authentication Standard

View the User Account Types Standard

Keywords:

Appropriate Use
Appropriate Use Standards
IT Resource