{"id":2251,"date":"2018-02-20T14:23:23","date_gmt":"2018-02-20T21:23:23","guid":{"rendered":"https:\/\/nau.edu\/university-policy-library\/?page_id=2251"},"modified":"2026-02-11T23:49:50","modified_gmt":"2026-02-11T23:49:50","slug":"information-security","status":"publish","type":"page","link":"https:\/\/legacy.nau.edu\/university-policy-library\/information-security\/","title":{"rendered":"Information Security"},"content":{"rendered":"<h5>Information Technology<\/h5>\n<h3>Information Security<\/h3>\n<p>This policy establishes the comprehensive security framework that Northern Arizona University uses to protect its University Information and information technology (\u201cIT\u201d) systems on which access to and the safeguarding of these resources depends. All University community members share the collective responsibility to protect University Information and IT Resources from harm through careful adherence to these requirements, which are designed to support the information-sharing needs of an academic culture. Failure to comply with these standards and requirements may result in denial of access to University Information and\/or IT Resources and significant disciplinary action that could include civil and criminal liability.<\/p>\n<p><strong>Policy Owner:<\/strong> Chief Information Officer<br \/>\n<strong>Responsible Office:<\/strong> Information Technology Services<br \/>\n<strong>Origination Date:<\/strong> June 21, 2005<br \/>\n<strong>Last Revised:<\/strong> February 11, 2026<br \/>\n<strong>Contact:<\/strong>\u00a0Director, Information Security Services<\/p>\n<h4><a href=\"https:\/\/legacy.nau.edu\/wp-content\/uploads\/sites\/26\/Information-Security.pdf\"><strong>View the Policy<\/strong><\/a><\/h4>\n<h4>View the Information Security Standards:<\/h4>\n<ul>\n<li><a href=\"https:\/\/legacy.nau.edu\/wp-content\/uploads\/sites\/26\/Auditing-Logging-and-Monitoring.pdf\">Auditing, Logging, and Monitoring<\/a><\/li>\n<li><a href=\"https:\/\/legacy.nau.edu\/wp-content\/uploads\/sites\/26\/Data-Backup-and-Disaster-Recovery.pdf\">Data Backup and Disaster Recovery<\/a><\/li>\n<li><a href=\"https:\/\/legacy.nau.edu\/wp-content\/uploads\/sites\/26\/Enterprise-System-Change-Management.pdf\">Enterprise System Change Management<\/a><\/li>\n<li><a href=\"https:\/\/legacy.nau.edu\/wp-content\/uploads\/sites\/26\/Information-Technology-Risk-Assessment.pdf\">Information Technology Risk Assessment<\/a><\/li>\n<li><a href=\"https:\/\/legacy.nau.edu\/wp-content\/uploads\/sites\/26\/Secure-Data-Center-Physical-Security.pdf\">Secure Data Center Physical Security<\/a><\/li>\n<li><a href=\"https:\/\/legacy.nau.edu\/wp-content\/uploads\/sites\/26\/Software-Patch-Management.pdf\">Software Patch Management<\/a><\/li>\n<li><a href=\"https:\/\/legacy.nau.edu\/wp-content\/uploads\/sites\/26\/Vulnerability-Management-and-Scanning.pdf\">Vulnerability Management and Scanning<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h5>Keywords:<\/h5>\n<p style=\"padding-left: 30px;\">Information security<br \/>\nInformation Security Committee<br \/>\nInformation Security Office<br \/>\nInformation Security Officer<br \/>\nInformation security standards<br \/>\nUniversity information<\/p>\n<!-- shortcode-right-column -->\n<div class=\"shortcode-right-column\" >\n    <div class=\"shortcode-right-column__container\"><\/p>\n<p><strong>All NAU community members are required to immediately report any IT security issue, such a suspected or actual release of University data or a breach of University IT resources, devices, or systems. Dial 928-523-1511 to make a report.<\/strong><\/p>\n<hr \/>\n<p>If you have questions regarding this policy, contact Information Security Services at <a href=\"mailto:its-soc@nau.edu\">its-soc@nau.edu<\/a>.<\/p>\n<hr \/>\n<p><a href=\"https:\/\/in.nau.edu\/its\/security\/\">Information Security Program<\/a><\/p>\n<hr \/>\n<p>&nbsp;<\/p>\n<p><\/div>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>Information Technology Information Security This policy establishes the comprehensive security framework that Northern Arizona University uses to protect its University Information and information technology (\u201cIT\u201d) systems on which access to and the safeguarding of these resources depends. All University community members share the collective responsibility to protect University Information and IT Resources from harm through [&hellip;]<\/p>\n","protected":false},"author":120,"featured_media":3416,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"ring_central_script_selection":""},"acf":[],"_links":{"self":[{"href":"https:\/\/legacy.nau.edu\/university-policy-library\/wp-json\/wp\/v2\/pages\/2251"}],"collection":[{"href":"https:\/\/legacy.nau.edu\/university-policy-library\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/legacy.nau.edu\/university-policy-library\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/legacy.nau.edu\/university-policy-library\/wp-json\/wp\/v2\/users\/120"}],"replies":[{"embeddable":true,"href":"https:\/\/legacy.nau.edu\/university-policy-library\/wp-json\/wp\/v2\/comments?post=2251"}],"version-history":[{"count":10,"href":"https:\/\/legacy.nau.edu\/university-policy-library\/wp-json\/wp\/v2\/pages\/2251\/revisions"}],"predecessor-version":[{"id":11414,"href":"https:\/\/legacy.nau.edu\/university-policy-library\/wp-json\/wp\/v2\/pages\/2251\/revisions\/11414"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/legacy.nau.edu\/university-policy-library\/wp-json\/wp\/v2\/media\/3416"}],"wp:attachment":[{"href":"https:\/\/legacy.nau.edu\/university-policy-library\/wp-json\/wp\/v2\/media?parent=2251"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}