Policies
Information Security Policies
The Office of Information Security contributes to several university policies in order to maintain the security and integrity of Northeastern information and assets. All members of the Northeastern community are expected to comply with university policies and conduct themselves according to the highest ethical standards.

Appropriate Use Policy
Review the requirements for the use of all Northeastern computing and network resources.
Data Protection
Review policies related to the safe and confidential use of Northeastern data.


Privacy Policy
Review Northeastern’s Privacy Statement and related policies regarding your data.
Copyright Infringement
Review Northeastern’s process to manage copyright infringement complaints and potential legal actions.
