Appropriate Use of Electronic ResourcesNorthwestern makes available Electronic Resources to community members so that they can share and
store knowledge, communicate, and conduct business in support of the University’s mission. The
University is committed to maintaining an environment in which academic freedom thrives. At the same
time, the University needs to ensure the security and stability of the Electronic Resources it makes
available to community members. More about
Appropriate Use of Electronic Resources | Conduct, Computing and Device Management | Policy |
Authentication Requirements for University Software ApplicationsComputer applications deployed to members of the University community should use the University NetID as the person’s electronic identifier, and the corresponding password as a necessary (but not always sufficient) credential to authenticate each person. Where appropriate, and in keeping with policies, software applications may require additional credentials beyond the NetID and its password. More about
Authentication Requirements for University Software Applications | Privacy and Data Management | Policy |
Bulk Email Approval Policies and Procedures | Communication, Business and Purchasing | Policy |
Central Web ServerThe central Web server (called "NUInfo") comprises highly available, high-performance websites containing important information of general interest about the University. More about
Central Web Server | System Administration, Communication | Best Practice |
Cloud Computing GuidelinesThere are specific considerations for cloud as well as tools and services available that can be leveraged to support the maintenance of compliant environments. More about
Cloud Computing Guidelines | Privacy and Data Management, Computing and Device Management | Guideline |
Computer and Networking Purchases at Northwestern University | Network and Connectivity, Business and Purchasing, Computing and Device Management | Policy |
Contract Language for the Secure Handling of Sensitive Data | Privacy and Data Management, Communication | Guideline |
Data Access PolicyThe policy contained in this document will support and promote greater understanding of and appropriate use of data, and heightened awareness of the sensitive nature of data based on various risk factors. More about
Data Access Policy | Privacy and Data Management | Policy |
Disposal of Northwestern University ComputersIt is the responsibility of the department or individual in possession of Northwestern-owned computer(s) to ensure that data has been properly removed from the hard drives of computers before removal or redeployment. For equipment acquired using federal funds, you must get approval of Accounting Services for Research and Sponsored Programs (ASRSP) for disposal. More about
Disposal of Northwestern University Computers | Privacy and Data Management, Computing and Device Management | Policy |
Electronic Communications Standard This Electronic Communications Standard outlines the necessary actions each person or organization with access to Northwestern University electronic communications is responsible for taking to ensure the integrity of the systems and data for which Northwestern is responsible. More about
Electronic Communications Standard | Communication, Privacy and Data Management | Policy |
Email Distribution Through ListservThe purpose of listserv at Northwestern University is to facilitate and disseminate information to eligible members and affiliates of the University. Listserv services are available to current faculty, staff and student organizations. More about
Email Distribution Through Listserv | Communication | Policy |
Endpoint Security StandardThis Electronic Communications Standard outlines the necessary actions each person or organization with access to Northwestern University electronic communications is responsible for taking to ensure the integrity of the systems and data for which Northwestern is responsible. More about
Endpoint Security Standard | Computing and Device Management | Policy |
Firewall PolicyThis policy statement is designed to provide guidance on when firewalls are required or recommended, and to raise awareness on the importance of a properly configured (installed and maintained) firewall. More about
Firewall Policy | Network and Connectivity, System Administration, Privacy and Data Management | Policy |
Guidelines for Data File Transfers to and from Enterprise Systems | Network and Connectivity | Guideline |
Guidelines for Security and Confidentiality of Data Files | Computing and Device Management | Guideline |
Guide to Securing Web Applications | Privacy and Data Management | Guideline |
HIPAA/ISO Information Security GuidanceHIPAA/ISO information Security Guidance provides the required direction for an information security plan for any University school, department or business unit where operations are subject to HIPAA/HITECH regulations. More about
HIPAA/ISO Information Security Guidance | Privacy and Data Management | Guideline |
HIPAA Privacy & Security Awareness TrainingThe HIPAA Privacy and Security Rules dictate that all who may come into contact with protected health information undergo annual training on HIPAA policy, and that there is documentation to prove that the training has been completed. More about
HIPAA Privacy & Security Awareness Training | Privacy and Data Management | Guideline |
Hub/Repeater/Wireless Security Concerns | Network and Connectivity, Privacy and Data Management | Policy |
Incident Response ProtocolThe Incident Response Protocol establishes procedures in accordance with applicable legal and regulatory requirements and University policy to address instances of unauthorized access to or disclosure of University Information. More about
Incident Response Protocol | Privacy and Data Management, Communication | Guideline |
Information Security Policy and Standards: Data Encryption | System Administration, Privacy and Data Management | Policy |
Information Technology Acquisition, Development and DeploymentNUIT is the major consultative resource for division and school IT workers and end-users for all information technology systems, physical facilities related to such systems, and contractual relationships with vendors of such systems and services. In addition, NUIT has oversight and coordinating responsibility for all these systems and services. More about
Information Technology Acquisition, Development and Deployment | Business and Purchasing, System Administration | Policy |
Internet Addiction | Conduct | Guideline |
Management of Email on Central Service Hosts | System Administration | Policy |
Merchant Card Processing PolicyIn order to accept credit or debit card payments, a Northwestern University (NU) school, department, or
organization must: receive prior permission from e-Commerce Operations within Treasury Operations and ensure that the payment process and related record keeping adhere to university accounting guidelines, the Payment Card Industry Data Security Standard (PCI DSS), and all applicable legislation. More about
Merchant Card Processing Policy | Business and Purchasing | Policy |
Networked DevicesAll NU departments that use a networked device (i.e., printer, copier, scanner and fax) can find recommendations on
securing networked devices against unauthorized users and making enhancements to existing security measures. More about
Networked Devices | Network and Connectivity, Computing and Device Management, Privacy and Data Management | Guideline |
Non-University Owned Building Infrastructure Policy | System Administration | Policy |
Northwestern Guidance on the Use of Generative AIGenerative AI offers the potential for new capabilities in research, education, and productivity. Understanding what to look for when adopting generative AI tools and services is key to ensuring the intended use is met while protecting University data. More about
Northwestern Guidance on the Use of Generative AI | Privacy and Data Management | Guideline |
Northwestern NetID and Network Privileges | Privacy and Data Management, Network and Connectivity | Policy |
Northwestern Network PrivacyIt is the policy of Northwestern University to treat all transmissions over the Northwestern network as private; however, the use of the Northwestern network and of University computing resources is strictly by permission of the University and confidentiality is not guaranteed. More about
Northwestern Network Privacy | Privacy and Data Management, Network and Connectivity | Policy |
Northwestern University's Non-Disclosure AgreementsNon-Disclosure Agreements are binding contracts that should be signed by an authorized Northwestern University signatory. For all non-University Non-Disclosure Agreements, the University contract approval process must be followed; the agreement must be reviewed and approved by the University's Office of General Counsel before signing. More about
Northwestern University's Non-Disclosure Agreements | Conduct, Privacy and Data Management | Guideline |
Northwestern University Policy on Cable, Satellite, and IP Delivered Television Services | Communication, Conduct, Computing and Device Management | Policy |
Northwestern University User Authentication RequirementsAll systems must operate effectively within the authentication environment defined in these guidelines. This document is intended for use as an attachment, exhibit, or appendix to bid specifications for acquisition of software systems or services to be used at Northwestern University. More about
Northwestern University User Authentication Requirements | System Administration, Privacy and Data Management | Guideline |
Off-Site Data Protection Storage Guidelines | Privacy and Data Management | Guideline |
Online Harassment | Conduct | Guideline |
Patch Management StandardThe Patch Management Standard outlines the necessary actions each person or organization who is responsible for the protection of University IT assets and data is required to perform in order to protect the integrity of the systems and data for which Northwestern is responsible.
More about
Patch Management Standard | Privacy and Data Management | Policy |
Policy and Enforcement Plan for Unapproved Campus Network ExtensionsBecause of four issues - security, accountability, future network performance and reliability, and network operations - it is important that schools and departments remove network extensions (hublets, multi-port switches, wireless access points, and modems) from the University network in accordance with University policy. More about
Policy and Enforcement Plan for Unapproved Campus Network Extensions | Network and Connectivity | Policy |
Protocol for Exchange and Shared Responsibility for Institutional Data | System Administration | Guideline |
Reporting an IT Policy Violation | Communication, Conduct | Policy |
Requirements to Coordinate Acquisition, Authentication and Security for Online Services to the University Community | Privacy and Data Management | Guideline |
Rights and Responsibilities for the Use of Central Network and Computing Resources at Northwestern University | Network and Connectivity | Policy |
Rooftop Lease PolicyNorthwestern University Information Technology is responsible for the administrative, financial, and technical management of all airwave services and facilities on University rooftop spaces. More about
Rooftop Lease Policy | Business and Purchasing, Network and Connectivity | Policy |
Satellite-Delivered ServicesInstallation, engineering, maintenance, and operation of satellite downlink and uplink services serving on any property owned or tenanted by the University, shall be coordinated and meet the standards of quality set forth by NUIT. More about
Satellite-Delivered Services | System Administration | Policy |
Secure Handling of Social Security Numbers | Privacy and Data Management | Policy |
Server Certificate PolicyThis policy provides guidance on the selection of providers of trusted server-side third-party certificates, their implementation within University systems, applications, appliances and sites, and encryption of related communications.
More about
Server Certificate Policy | System Administration, Privacy and Data Management | Policy |
Server Security Requirements and ReferencesThese recommendations are meant as a guide to secure servers (a server being either a physical or virtual instance of an autonomous software system intended to connect with and provide services to other computers). The end goal is a secure server that meets the functional and business needs of each department. More about
Server Security Requirements and References | System Administration | Guideline |
System AdministrationThese guidelines provide non-technical, practical guidance to performing the duties and practices inherent in taking on the responsibilities for and maintaining a server. More about
System Administration | System Administration | Guideline |
Use and Copying of Computer SoftwareNo member of the Northwestern community may engage in any activity that violates federal, state, or local laws with respect to intellectual property rights; the terms of software license agreements; or other University policies pertaining to computer software, for any computer software owned by or licensed to the University and computer systems or hardware owned or operated by the University, Northwestern faculty, staff, and students. More about
Use and Copying of Computer Software | Conduct, Computing and Device Management | Policy |
Use of Computers, Systems, and NetworksNorthwestern University maintains access to local, national, and international networks for the purpose of supporting its fundamental activities of instruction, research, and administration. Users of the network are to take the necessary measures to safeguard the operating integrity of the systems and the accessibility of other users. More about
Use of Computers, Systems, and Networks | Privacy and Data Management, Network and Connectivity | Policy |
Use of Student Residence NetworksStudent residence networks are shared, finite resources installed by the University to promote scholarship and learning for all students. Accidental or intentional disruption of a residence network will deprive others of access to important University resources. Computers attached to student residence networks must adhere to specific guidelines. More about
Use of Student Residence Networks | Network and Connectivity | Policy |
Using Sensitive Data Search ToolsTechnology-oriented tools can be used to reduce the risk of exposing sensitive data. The programs and processes outlined within this guideline may be able to identify and protect personally identifiable information that resides on personal computers and servers. More about
Using Sensitive Data Search Tools | Privacy and Data Management, Computing and Device Management | Guideline |
WirelessNorthwestern's policy helps to provide the highest quality of wireless network service and to ensure wired and wireless network security and integrity.
More about
Wireless | Network and Connectivity | Policy |