{"id":1997,"date":"2018-09-18T00:36:06","date_gmt":"2018-09-18T00:36:06","guid":{"rendered":"https:\/\/in.nau.edu\/its\/program\/"},"modified":"2024-04-19T10:53:53","modified_gmt":"2024-04-19T17:53:53","slug":"info-security-program","status":"publish","type":"page","link":"https:\/\/in.nau.edu\/its\/info-security-program\/","title":{"rendered":"Information Security Program"},"content":{"rendered":"<h1>Information Security Program<\/h1>\n<p>The Northern Arizona University Information Security Program serves as the core of the University\u2019s information security activities. Information security resources impact nearly every aspect of the <a href=\"https:\/\/nau.edu\/president\/about\/mission-and-vision\/\">NAU mission, vision, and values<\/a> and as such, protection of those resources is critical to ensure NAU\u2019s continued success in meeting its mission, vision, and objectives.<\/p>\n<p><a href=\"https:\/\/public.powerdms.com\/ABOR\/documents\/1499441\">Arizona Board of Regents (ABOR) policy<\/a> states that NAU\u2019s Information Security Services is responsible for establishing and maintaining a <a href=\"https:\/\/www7.nau.edu\/its\/admin\/InfoSecProgram.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">University Information Security Program<\/a>. The NAU Information Security Policy states that the Program will provide university-wide guidance to ensure the confidentiality, integrity, and availability of the University IT Resources.<\/p>\n<ul>\n<li><a href=\"https:\/\/www7.nau.edu\/its\/admin\/InfoSecCommitteeCharter.pdf\">Information Security Committee Charter<\/a><\/li>\n<li><a href=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/162\/2022\/12\/InfoSecStratPlan1.pdf\">Information Security Strategic Plan<\/a><\/li>\n<\/ul>\n<!-- shortcode-right-column -->\n<div class=\"shortcode-right-column\" >\n    <div class=\"shortcode-right-column__container\">\n<!-- shortcode-button -->\n<div class=\"shortcode-button shortcode-button--center\">\n      <a class=\"main-button\" href=\"https:\/\/in.nau.edu\/its\/emailphishing\/\">Report a Phish<\/a>\n  <\/div>\n\n<hr role=\"separator\" class=\"hr--transparent hr--transparent-15px not-in-view\">\n<div class=\"shortcode-button shortcode-button--center\"><a class=\"main-button\" href=\"https:\/\/servicenow.nau.edu\/sp\" target=\"_blank\" rel=\"noopener noreferrer\">Request ITS Support<\/a><\/div>\n<div><hr role=\"separator\" class=\"hr--transparent hr--transparent-30px not-in-view\"><\/div>\n<div>\n<!-- shortcode-contact -->\n<div class=\"shortcode-contact\">\n    <div class=\"contact-header\">\n        <h3>Problems Logging In?<\/h3>\n    <\/div>\n    <div class=\"contact-body\">\n                <a href=\"mailto:ask-its@nau.edu\" aria-label=\"Problems Logging In?: Email Address\" title=\"Email Address\">\n            <div class=\"contact-icon-container\">\n                <i class=\"fas fa-envelope\" aria-hidden=\"true\"><\/i>\n                <span class=\"sr-only\">Email:<\/span>\n            <\/div>\n            <div class=\"contact-email\">ask-its&#8203;@nau.edu<\/div>\n        <\/a>\n                        <a href=\"tel:(928) 523-3335\" aria-label=\"Problems Logging In?: Telephone Number\" title=\"Telephone Number\">\n            <div class=\"contact-icon-container\">\n                <i class=\"fas fa-phone\" aria-hidden=\"true\"><\/i>\n                <span class=\"sr-only\">Call:<\/span>\n            <\/div>\n            <div class=\"contact-phone\">(928) 523-3335<\/div>\n        <\/a>\n            <\/div>\n<\/div>\n\n\n<\/div>\n<div>\n<!-- shortcode-contact -->\n<div class=\"shortcode-contact\">\n    <div class=\"contact-header\">\n        <h3>IT Security Questions\/Concerns<\/h3>\n    <\/div>\n    <div class=\"contact-body\">\n                <a href=\"mailto:its-soc@nau.edu\" aria-label=\"IT Security Questions\/Concerns: Email Address\" title=\"Email Address\">\n            <div class=\"contact-icon-container\">\n                <i class=\"fas fa-envelope\" aria-hidden=\"true\"><\/i>\n                <span class=\"sr-only\">Email:<\/span>\n            <\/div>\n            <div class=\"contact-email\">its-soc&#8203;@nau.edu<\/div>\n        <\/a>\n                    <\/div>\n<\/div>\n\n\n<\/div>\n<hr \/>\n<h4>Know the rules<\/h4>\n<p>All NAU employees and students should read and be familiar with the\u00a0<a href=\"https:\/\/nau.edu\/university-policy-library\/appropriate-use-of-information-technology-resources\/\">Appropriate Use of IT Resources<\/a>\u00a0policy.<\/p>\n<p><a href=\"https:\/\/nau.edu\/university-policy-library\/information-technology\/\">Information Technology Policy Manual<\/a><\/p>\n<hr \/>\n<\/div>\n<\/div>\n\n<!-- shortcode-right-column -->\n<div class=\"shortcode-right-column\" >\n    <div class=\"shortcode-right-column__container\">\n<h4><strong>Wi-Fi Map in Arizona<\/strong><\/h4>\n<p><a href=\"https:\/\/www.google.com\/maps\/d\/u\/0\/viewer?ll=34.08899753072786%2C-111.3971859&amp;z=7&amp;mid=1SGruUB2pUzitjv-NroY4pFh-NR0Gm8-1\">Interactive Map<\/a> for access to free Wi-Fi hotspots throughout the state.<\/p>\n<p><a href=\"https:\/\/www.google.com\/maps\/d\/u\/0\/viewer?ll=34.08899753072786%2C-111.3971859&amp;z=7&amp;mid=1SGruUB2pUzitjv-NroY4pFh-NR0Gm8-1\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-11409 size-uncropped-small\" src=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/162\/2021\/09\/Screen-Shot-2021-09-08-at-3.23.24-PM-300x112.png\" alt=\"\" width=\"300\" height=\"112\" srcset=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/162\/2021\/09\/Screen-Shot-2021-09-08-at-3.23.24-PM-300x112.png 300w, https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/162\/2021\/09\/Screen-Shot-2021-09-08-at-3.23.24-PM.png 336w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<\/div>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>Information Security Program The Northern Arizona University Information Security Program serves as the core of the University\u2019s information security activities. Information security resources impact nearly every aspect of the NAU mission, vision, and values and as such, protection of those resources is critical to ensure NAU\u2019s continued success in meeting its mission, vision, and objectives. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","ring_central_script_selection":"","footnotes":""},"class_list":["post-1997","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/in.nau.edu\/its\/wp-json\/wp\/v2\/pages\/1997","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/in.nau.edu\/its\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/in.nau.edu\/its\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/in.nau.edu\/its\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/in.nau.edu\/its\/wp-json\/wp\/v2\/comments?post=1997"}],"version-history":[{"count":23,"href":"https:\/\/in.nau.edu\/its\/wp-json\/wp\/v2\/pages\/1997\/revisions"}],"predecessor-version":[{"id":18731,"href":"https:\/\/in.nau.edu\/its\/wp-json\/wp\/v2\/pages\/1997\/revisions\/18731"}],"wp:attachment":[{"href":"https:\/\/in.nau.edu\/its\/wp-json\/wp\/v2\/media?parent=1997"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}