{"id":7785,"date":"2019-08-09T16:15:59","date_gmt":"2019-08-09T23:15:59","guid":{"rendered":"https:\/\/nau.edu\/university-policy-library\/?page_id=7785"},"modified":"2026-02-12T00:30:16","modified_gmt":"2026-02-12T00:30:16","slug":"web-application-security","status":"publish","type":"page","link":"https:\/\/legacy.nau.edu\/university-policy-library\/web-application-security\/","title":{"rendered":"Web Application Security"},"content":{"rendered":"<h5>Information Technology<\/h5>\n<h3>Web Application Security<\/h3>\n<p>Common methods for accessing University Information include Web Applications. These computer software programs can be particularly susceptible to computer hacking attacks due to their public visibility and accessibility. This can result in the exposure or modification of University Information. To mitigate these risks, University Community Members responsible for creating, developing, updating, maintaining, or administering University Web Applications are required to implement appropriate classification and security procedures in accordance with this policy and its accompanying Web Application Security Standard.<\/p>\n<p><strong>Policy Owner:<\/strong> Chief Information Officer<br \/>\n<strong>Responsible Office:<\/strong> Information Technology Services<br \/>\n<strong>Origination Date:<\/strong> June 21, 2005<br \/>\n<strong>Last Revised:<\/strong> February 11, 2026<br \/>\n<strong>Contact:<\/strong> Director, Information Security Services<\/p>\n<h4><a href=\"https:\/\/legacy.nau.edu\/wp-content\/uploads\/sites\/26\/Web-Application-Security.pdf\">View the Policy<\/a><\/h4>\n<h4><strong><a href=\"https:\/\/legacy.nau.edu\/wp-content\/uploads\/sites\/26\/Web-Application-Security-Standard.pdf\">View the Standard<\/a><\/strong><\/h4>\n<p>&nbsp;<\/p>\n<h5>Keywords:<\/h5>\n<p style=\"padding-left: 30px;\">IT resource<br \/>\nUniversity information<br \/>\nWeb application<\/p>\n<p>&nbsp;<\/p>\n<!-- shortcode-right-column -->\n<div class=\"shortcode-right-column\" >\n    <div class=\"shortcode-right-column__container\"><\/p>\n<p><strong>If you have questions regarding ITS policies or services, visit the ITS <a href=\"https:\/\/in.nau.edu\/its\/\">website<\/a>, call 928-523-3335, or email <a href=\"mailto:ITS@nau.edu\">ITS@nau.edu<\/a><\/strong><\/p>\n<hr \/>\n<h4>Quick Links<\/h4>\n<p><a href=\"https:\/\/legacy.nau.edu\/university-policy-library\/appropriate-use-of-information-technology-resources\/\">Appropriate Use of IT Resources<\/a><\/p>\n<p><a href=\"https:\/\/legacy.nau.edu\/university-policy-library\/data-classification-and-handling\/\">Data Classification and Handling<\/a><\/p>\n<p><a href=\"https:\/\/legacy.nau.edu\/university-policy-library\/information-security\/\">Information Security<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><\/div>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>Information Technology Web Application Security Common methods for accessing University Information include Web Applications. These computer software programs can be particularly susceptible to computer hacking attacks due to their public visibility and accessibility. This can result in the exposure or modification of University Information. To mitigate these risks, University Community Members responsible for creating, developing, [&hellip;]<\/p>\n","protected":false},"author":120,"featured_media":3416,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"ring_central_script_selection":""},"acf":[],"_links":{"self":[{"href":"https:\/\/legacy.nau.edu\/university-policy-library\/wp-json\/wp\/v2\/pages\/7785"}],"collection":[{"href":"https:\/\/legacy.nau.edu\/university-policy-library\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/legacy.nau.edu\/university-policy-library\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/legacy.nau.edu\/university-policy-library\/wp-json\/wp\/v2\/users\/120"}],"replies":[{"embeddable":true,"href":"https:\/\/legacy.nau.edu\/university-policy-library\/wp-json\/wp\/v2\/comments?post=7785"}],"version-history":[{"count":6,"href":"https:\/\/legacy.nau.edu\/university-policy-library\/wp-json\/wp\/v2\/pages\/7785\/revisions"}],"predecessor-version":[{"id":11419,"href":"https:\/\/legacy.nau.edu\/university-policy-library\/wp-json\/wp\/v2\/pages\/7785\/revisions\/11419"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/legacy.nau.edu\/university-policy-library\/wp-json\/wp\/v2\/media\/3416"}],"wp:attachment":[{"href":"https:\/\/legacy.nau.edu\/university-policy-library\/wp-json\/wp\/v2\/media?parent=7785"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}