CAPITAL UNIVERSITY PASSWORD POLICY
|
|
|
- Cathleen Benson
- 10 years ago
- Views:
Transcription
1 1.0 Overview Passwords are an important aspect of computer security. They are the front line of protection for user accounts. A poorly chosen password may result in the compromise of Capital University's entire university network. As such, all Capital University computer and network account holders are responsible for taking the appropriate steps, as outlined below, to select and secure their passwords. 2.0 Purpose The purpose of this policy is to establish a standard for creation of strong passwords, the protection of those passwords, and the frequency of change. 3.0 Scope The scope of this policy includes all users who have or are responsible for an account (or any form of access that supports or requires a password) on any system that resides at any Capital University facility, has access to the Capital University network, or stores any non-public Capital University information. 4.0 Policy 4.1 General User-level accounts All user-level passwords (e.g., , Colleague, desktop computer, etc.) must be changed at least every 90 days. Passwords must not be inserted into messages or other forms of electronic communication. All user-level passwords must conform to the guidelines described in the Appendix System Administration Accounts All system-level passwords (e.g., root, enable, NT admin, application administration accounts, etc.) are changed based on a frequency defined for the specific system, but at a minimum must be changed on at least an annual basis. Where practical, system-level passwords will be changed quarterly. All production system-level passwords must be documented and secured in the Capital University IT-administered and encrypted global password management database. User accounts that have system-level privileges granted through group memberships or programs such as "sudo" must have a unique password from all other accounts held by that user. Where SNMP is used, the community strings must be defined as something other than the standard defaults of "public," "private" and "system" and must be different from the passwords used to log in interactively. A keyed hash must be used where available (e.g., SNMPv2). All system-level passwords must conform to the guidelines described in the Appendix. 4.2 Password Maintenance CAPITAL UNIVERSITY Password Policy Page 1 of 5
2 4.2.1 Forgotten Passwords all users are required to maintain and protect their own account passwords. If a user has forgotten their password, they must contact the IT Helpdesk during normal hours of operation to have the password reset Account Locks if an incorrect password is entered ten (10) times within ten (10) minutes, the system will automatically lock the account for thirty (30) minutes Compromised Passwords - If a password is suspected to have been compromised, report the incident to the IT Helpdesk and immediately change all passwords Password Resets Per the Capital University User Account Policy, account access is terminated for users who are no longer in good standing with the university, and passwords will be immediately changed by the IT Department to prevent continued account access Password Validation - Password audits may be performed periodically by the Information Technology Department to assure adherence to password complexity standards. Audits will not reveal actual passwords, but will alert when a non-secure password exists. Users will be notified if their password does not pass a complexity standard audit. 5.0 Enforcement Accounts that have not had their password changed within the required change timeframe will be disabled until the user has been contacted by IT and given an opportunity to update their account. Violation of this policy may result in disciplinary action consistent with the Acceptable Use Policy and other University policies, including provisions in relevant handbooks (student, faculty, administrator, and support staff). 6.0 Definitions Terms Keyed hash SNMP SNMP Community String sudo Definitions A keyed hash is a type of message authentication code (MAC) calculated using a specific algorithm involving a cryptographic hash function in combination with a secret key. Simple Network Management Protocol (SNMP) is used in network management systems to monitor network-attached devices for conditions that warrant administrative attention. It consists of a set of standards for network management, including an Application Layer protocol, a database schema, and a set of data objects. A SNMP community string is a text string that acts as a password. It is used to authenticate messages that are sent between the management station (the SNMP manager) and the device (the SNMP agent). The community string is included in every packet that is transmitted between the SNMP manager and the SNMP agent. A unix command, the sudo command stands for "superuser do". It prompts for a personal password and confirms the request to CAPITAL UNIVERSITY Password Policy Page 2 of 5
3 execute a command by checking a file, called sudoers, which the system administrator configures. Using the sudoers file, system administrators can give certain users or groups access to some or all commands without those users having to know the root password. It also logs all commands and arguments so there is a record of who used it for what, and when. 7.0 Revision History 5/27/08 Draft submitted to legal for review. 6/2/08 Comments received from legal. 6/3/08 Approved by President s Cabinet. Appendix A. General Password Construction Guidelines Passwords are used for various purposes at Capital University. Some of the more common uses include: user level accounts, web accounts, accounts, screen saver protection, voic password, and local router logins. Capital University systems do not currently have support for one-time tokens (i.e., dynamic passwords which are only used once), therefore, everyone should be aware of how to select strong passwords. Most Capital University passwords are required to have these complexities: Minimum length of seven (7) characters The current and past seven (7) passwords are not eligible for re-use Passwords will expire 90 days after each change You may only change your password once a day Passwords are case-sensitive (TmB1w2R! is different than tmb1w2r!) May not contain your name or username Passwords must contain three (3) or more of the following: o At least one upper-case letter o At least one lower-case letter o At least one numeric digit o At least one special character, such as:! # $ ^ * - _ = ; : " ( ) { } [ ] ` ~ Avoid using the following % &? / \ + since they may not work with all university systems Strong passwords have the following characteristics: Contain both upper and lower case characters (e.g., a-z, A-Z) Have digits and punctuation characters as well as letters e.g., 0-9,!@#$%^&*()_+ ~- =\`{}[]:";'<>?,./) Are at least seven alphanumeric characters long (b0rn2w!n). Are not a word in any language, slang, dialect, jargon, etc. Are not based on personal information, names of family, etc. CAPITAL UNIVERSITY Password Policy Page 3 of 5
4 Passwords should never be written down or stored on-line. Try to create passwords that can be easily remembered. One way to do this is create a password based on a song title, affirmation, or other phrase. For example, the phrase might be: "This May Be One Way To Remember" and the password could be: "TmB1w2R!" or "Tmb1W>r~" or some other variation. NOTE: Do not use either of these examples as passwords! Poor, weak passwords have the following characteristics: The password contains less than seven characters (unless the system is restricted to less than seven, such as NIS+) The password is a word found in a dictionary (English or foreign) The password is a common usage word such as: o Names of family, pets, friends, co-workers, fantasy characters, etc. o Computer terms and names, commands, sites, companies, hardware, software. o The words Capital University ", "bexleyoh", "coloh", columbusoh or any derivation. o Birthdays and other personal information such as addresses and phone numbers. o Word or number patterns like aaabbb, qwerty, zyxwvuts, , etc. o Any of the above spelled backwards. o Any of the above preceded or followed by a digit (e.g., secret1, 1secret) B. Password Protection Standards Do not use the same password for Capital University accounts as for other non-capital University access (e.g., personal ISP account, Facebook or MySpace, online banking, benefits, etc.). Do not share Capital University passwords with anyone, including roommates, student workers, family members, co-workers, administrative assistants or consultants. All passwords are to be treated as sensitive, confidential Capital University information. Here is a list of "dont's": Don't reveal a password over the phone to ANYONE Don't reveal a password in an message Don't reveal a password to the boss Don't talk about a password in front of others Don't hint at the format of a password (e.g., "my family name") Don't reveal a password on questionnaires or security forms Don't share a password with family members Don't reveal a password to co-workers while on vacation If someone demands a password, refer them to this document or have them call someone in the Information Technology Department. Do not use the "Remember Password" feature of applications (e.g., Explorer, Outlook, Instant Messenger, etc). Do not write passwords down and store them anywhere in your office. Do not store passwords in a file on ANY computer system (including smart phones, PDAs, or similar devices) unless that file is encrypted. Change passwords at least once every 90 days. CAPITAL UNIVERSITY Password Policy Page 4 of 5
5 If an account or password is suspected to have been compromised, report the incident to the Helpdesk and change all passwords. C. Application Development Standards Application developers must ensure their programs contain the following security precautions. Applications: should support authentication of individual users, not groups. should not store passwords in clear text or in any easily reversible form. should provide for some sort of role management, such that one user can take over the functions of another without having to know the other's password. should support AD integration / Kerberos, TACACS+, RADIUS and/or X.509 with LDAP security retrieval, wherever possible. CAPITAL UNIVERSITY Password Policy Page 5 of 5
THE PENNSYLVANIA STATE UNIVERSITY OFFICE OF HUMAN RESOURCES PASSWORD USAGE POLICY
THE PENNSYLVANIA STATE UNIVERSITY OFFICE OF HUMAN RESOURCES PASSWORD USAGE POLICY 1.0 Purpose The purpose of this policy is to establish Office of Human Resources (OHR) standards for creation of strong
Cal State Fullerton Account and Password Guidelines
Cal State Fullerton Account and Password Guidelines Purpose The purpose of this guideline is to establish a standard for account use and creation of strong passwords which adheres to CSU policy and conforms
ICT Password Protection Policy
SH IG 30 Information Security Suite of Policies ICT Summary: Keywords (minimum of 5): (To assist policy search engine) Target Audience: Next Review Date: This document describes the information security
Ex Libris Group Password Management Policy
Ex Libris Group Password Management Policy CONFIDENTIAL INFORMATION The information herein is the property of Ex Libris Ltd. or its affiliates and any misuse or abuse will result in economic loss. DO NOT
PASSWORD MANAGEMENT POLICY OCIO-6012-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER PASSWORD MANAGEMENT POLICY OCIO-6012-09 Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: TABLE OF CONTENTS Section I. PURPOSE II. AUTHORITY
Document Control Policy & Procedure 15
Bethany Care Ltd Document Control Policy & Procedure 15 Date Created 19/10/2007 Date Reviewed 12/02/2014 Document Review Details Reviewed by Brian Lynch (Quality Assurance) Date of next review February
Password Expiration Passwords require a maximum expiration age of 60 days. Previously used passwords may not be reused.
DRAFT 6.1 Information Systems Passwords OVERVIEW Passwords are an important aspect of information security. They are the front line of protection for user accounts. A poorly chosen password may result
Password Standards Policy
Version 3.0 This policy maybe updated at anytime (without notice) to ensure changes to the HSE s organisation structure and/or business practices are properly reflected in the policy. Please ensure you
Boston University Security Awareness. What you need to know to keep information safe and secure
What you need to know to keep information safe and secure Introduction Welcome to Boston University s Security Awareness training. Depending on your reading speed, this presentation will take approximately
1 Purpose... 3 2 Scope... 3 3 Document Owner... 3 4 Information Security Standard Document Review Cycle... 3 5 Revision History...
Info ormation Security Pro ogram Information Security Committee Approved Version: 20091021 This version: 20120104 This Standard falls under Columbus State Community College Information Technology Policy
Information Security Policy. Policy and Procedures
Information Security Policy Policy and Procedures Issue Date February 2013 Revision Date February 2014 Responsibility/ Main Point of Contact Neil Smedley Approved by/date Associated Documents Acceptable
CYBERSECURITY POLICY
* CYBERSECURITY POLICY THE CYBERSECURITY POLICY DEFINES THE DUTIES EMPLOYEES AND CONTRACTORS OF CU*ANSWERS MUST FULFILL IN SECURING SENSITIVE INFORMATION. THE CYBERSECURITY POLICY IS PART OF AND INCORPORATED
CITY OF BOULDER *** POLICIES AND PROCEDURES
CITY OF BOULDER *** POLICIES AND PROCEDURES CONNECTED PARTNER EFFECTIVE DATE: SECURITY POLICY LAST REVISED: 12/2006 CHRISS PUCCIO, CITY IT DIRECTOR CONNECTED PARTNER SECURITY POLICY PAGE 1 OF 9 Table of
Identification and Authentication on FCC Computer Systems
FCC Computer Security TABLE OF CONTENTS Desk Reference 1 INTRODUCTION...1 Identification and Authentication on FCC Computer Systems 1.1 PURPOSE...1 1.2 BACKGROUND...1 1.3 SCOPE...2 1.4 AUTHORITY...2 2
DHHS Information Technology (IT) Access Control Standard
DHHS Information Technology (IT) Access Control Standard Issue Date: October 1, 2013 Effective Date: October 1,2013 Revised Date: Number: DHHS-2013-001-B 1.0 Purpose and Objectives With the diversity of
e-governance Password Management Guidelines Draft 0.1
e-governance Password Management Guidelines Draft 0.1 DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S.
IT ACCESS CONTROL POLICY
Reference number Approved by Information Management and Technology Board Date approved 30 April 2013 Version 1.0 Last revised Review date March 2014 Category Owner Target audience Information Assurance
Network Password Management Policy & Procedures
Network Password Management Policy & Procedures Document Ref ISO 27001 Section 11 Issue No Version 1.3 Document Control Information Issue Date April 2009, June 2010, September 2011 Status Approved By FINAL
The City of New York
The Policy All passwords and personal identification numbers (PINs) used to protect City of New York systems shall be appropriately configured, periodically changed, and issued for individual use. Scope
Chapter 6 Using Network Monitoring Tools
Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your Wireless-G Router Model WGR614v9. You can access these features by selecting the items under
Likewise Security Benefits
Likewise Enterprise Likewise Security Benefits AUTHOR: Manny Vellon Chief Technology Officer Likewise Software Abstract This document describes how Likewise improves the security of Linux and UNIX computers
GENEVA COLLEGE INFORMATION TECHNOLOGY SERVICES. Password POLICY
GENEVA COLLEGE INFORMATION TECHNOLOGY SERVICES Password POLICY Table of Contents OVERVIEW... 2 PURPOSE... 2 SCOPE... 2 DEFINITIONS... 2 POLICY... 3 RELATED STANDARDS, POLICIES AND PROCESSES... 4 EXCEPTIONS...
RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2
RSA Authentication Manager 7.1 Security Best Practices Guide Version 2 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks
RSA Authentication Manager 7.1 Security Best Practices Guide. Version 5
RSA Authentication Manager 7.1 Security Best Practices Guide Version 5 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks
Chapter 6 Using Network Monitoring Tools
Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your RangeMax Wireless-N Gigabit Router WNR3500. You can access these features by selecting the items
Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4
Contents Is Rumpus Secure? 2 Use Care When Creating User Accounts 2 Managing Passwords 3 Watch Out For Aliases 4 Deploy A Firewall 5 Minimize Running Applications And Processes 5 Manage Physical Access
SPICE EduGuide EG0015 Security of Administrative Accounts
This SPICE EduGuide applies to HSC information systems, specifically Administrative login accounts; (aka Admin accounts) and the faculty, staff and students who use them. Admin accounts are logon IDs and
IT and Mobile Devices Security Policy
1. Introduction IT and Mobile Devices Security Policy 1.1 It is the responsibility of all Petroc IT system users to ensure they are familiar with the IT Security Policy. Student s must be made aware of
Account Management Standards
Account Management Standards Overview These standards are intended to guide the establishment of effective account management procedures that promote the security and integrity of University information
The Security Behind Sticky Password
The Security Behind Sticky Password Technical White Paper version 3, September 16th, 2015 Executive Summary When it comes to password management tools, concerns over secure data storage of passwords and
PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:
A SYSTEMS UNDERSTANDING A 1.0 Organization Objective: To ensure that the audit team has a clear understanding of the delineation of responsibilities for system administration and maintenance. A 1.1 Determine
Franciscan University of Steubenville Information Security Policy
Franciscan University of Steubenville Information Security Policy Scope This policy is intended for use by all personnel, contractors, and third parties assisting in the direct implementation, support,
Smart Card Setup Guide
Smart Card Setup Guide K Apple Computer, Inc. 2006 Apple Computer, Inc. All rights reserved. Under the copyright laws, this manual may not be copied, in whole or in part, without the written consent of
SANS Institute First Five Quick Wins
#1 QUICK WIN- APPLICATION WHITELISTING SANS Critical Controls: #2: Inventory of Authorized and Unauthorized Software 1) Deploy application whitelisting technology that allows systems to run software only
NeoMail Guide. Neotel (Pty) Ltd
NeoMail Guide Neotel (Pty) Ltd NeoMail Connect Guide... 1 1. POP and IMAP Client access... 3 2. Outlook Web Access... 4 3. Outlook (IMAP and POP)... 6 4. Outlook 2007... 16 5. Outlook Express... 24 1.
Office of Information Technology Desktop Security and Best Practices
2013.06 All computer operating systems have vulnerabilities that are targeted by are subject to security risks. In a networked environment, such as a college campus, a compromised computer can affect other
Enhanced Password Security - Phase I
Enhanced Password Security - Phase I Feature History 120(18)S This feature was introduced This document describes the Enhanced Password Security feature in It includes the following sections: Feature Overview,
ARMY PASSWORD STANDARDS Version 2.5
1. Overview: A. Since 31 JUL 06, access to all Army networks was mandated to be via the Common Access Card (CAC) only. Passwords remain an important aspect of computer security to achieve authenticated
PA-DSS Implementation Guide for. Sage MAS 90 and 200 ERP. Credit Card Processing
for Sage MAS 90 and 200 ERP Credit Card Processing Version 4.30.0.18 and 4.40.0.1 - January 28, 2010 Sage, the Sage logos and the Sage product and service names mentioned herein are registered trademarks
RESOURCE AND PATIENT MANAGEMENT SYSTEM. Drug Accountability (PSA) GUI Invoice Upload Program Installation and Configuration Guide
RESOURCE AND PATIENT MANAGEMENT SYSTEM Drug Accountability (PSA) GUI Invoice Upload Program Installation and Configuration Guide Version 1.0 Office of Information Technology (OIT) Division of Information
For the protocol access paths listed in the following table, the Sentry firmware actively listens on server ports to provide security for the CDU.
CDU Security This provides a quick reference for access paths to Server Technology s Cabinet Distribution Unit (CDU) products, shows if the access path is secure, and if so, provides an overview of how
Enhanced Password Security - Phase I
Enhanced Password Security - Phase I Feature History 120(18)S 121(8a)E 122(14)S This feature was introduced Support for this feature was integrated into Cisco IOS Release 121(8a)E This feature was integrated
86-10-15 The Self-Hack Audit Stephen James Payoff
86-10-15 The Self-Hack Audit Stephen James Payoff As organizations continue to link their internal networks to the Internet, system managers and administrators are becoming increasingly aware of the need
Information Security
Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff
Password Self-Service for Novell edirectory. Brent McCormick Novell Corporate Technology Strategist
Password Self-Service for Novell edirectory Brent McCormick Novell Corporate Technology Strategist Audience by Industry Government Healthcare Financial Services Education Telecommunications Manufacturing
How To Check If Your Router Is Working Properly
Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your RangeMax Dual Band Wireless-N Router WNDR3300. You can access these features by selecting the
Musina Local Municipality. Information and Communication Technology User Account Management Policy -Draft-
Musina Local Municipality Information and Communication Technology User Account Management Policy -Draft- Version Control Version Date Author(s) Details V1.0 June2013 Perry Eccleston Draft Policy Page
Virtual Cabinet Document Portal User Guide
Virtual Cabinet Document Portal User Guide Contents / Introduction Introduction... 2 What to expect when publishing a document... 3 Having difficulty? Troubleshooting guide.... 7 The Virtual Cabinet Document
Electronic Questionnaires for Investigations Processing (e-qip)
January 2016 Electronic Questionnaires for Investigations Processing (e-qip) Login Instructions for first-time users OR users that have had their accounts reset Step 1 Access the e-qip Login screen at
www.xceedium.com 2: Do not use vendor-supplied defaults for system passwords and other security parameters
2: Do not use vendor-supplied defaults for system passwords and other security parameters 2.1: Always change vendor-supplied defaults and remove or disable unnecessary default accounts before installing
CREDIT CARD SECURITY POLICY PCI DSS 2.0
Responsible University Official: University Compliance Officer Responsible Office: Business Office Reviewed Date: 10/29/2012 CREDIT CARD SECURITY POLICY PCI DSS 2.0 Introduction and Scope Introduction
Online Banking. Customer Information
Online Banking Customer Information PRIVACY & SECURITY FOR YOUR NETTELLER ACCOUNT Protect Your NetTeller Online Banking Account Information While Farmers Bank & Trust works to protect your banking privacy,
This chapter describes how to set up and manage VPN service in Mac OS X Server.
6 Working with VPN Service 6 This chapter describes how to set up and manage VPN service in Mac OS X Server. By configuring a Virtual Private Network (VPN) on your server you can give users a more secure
ICT USER ACCOUNT MANAGEMENT POLICY
ICT USER ACCOUNT MANAGEMENT POLICY Version Control Version Date Author(s) Details 1.1 23/03/2015 Yaw New Policy ICT User Account Management Policy 2 Contents 1. Preamble... 4 2. Terms and definitions...
Supplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
RemotelyAnywhere. Security Considerations
RemotelyAnywhere Security Considerations Table of Contents Introduction... 3 Microsoft Windows... 3 Default Configuration... 3 Unused Services... 3 Incoming Connections... 4 Default Port Numbers... 4 IP
AESDIRECT ACCOUNT ADMINISTRATION USER GUIDE
AESDIRECT ACCOUNT ADMINISTRATION USER GUIDE Updated June 24, 2014 Table of Contents OVERVIEW... 3 AESDirect Roles Defined... 3 Account Administrator... 3 User Managers... 3 Users... 4 AESDIRECT RULES...
Secure Configuration Guide
Secure Configuration Guide Oracle Health Sciences Empirica Healthcare 1.0 Part number: E49242-01 Copyright 2013, Oracle and/or its affiliates. All rights reserved. The Programs (which include both the
HIPAA Assessment HIPAA Policy and Procedures
Sample Client HIPAA Assessment HIPAA Policy and Procedures Sample Client Prepared by: InhouseCIO, LLC CONFIDENTIALITY NOTE: The information contained in this report document is for the exclusive use of
How to Resolve Login Errors with Business Objects XI
How to Resolve Login Errors with Business Objects XI 1. In Internet Explorer, navigate to https://reports.case.edu 2. Ensure that User name is set to your Case network ID (i.e. krm33) 3. Ensure that Password
PCI Training for Retail Jamboree Staff Volunteers. Securing Cardholder Data
PCI Training for Retail Jamboree Staff Volunteers Securing Cardholder Data Securing Cardholder Data Introduction This PowerPoint presentation is designed to educate Retail Jamboree Staff volunteers on
SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
Barracuda Networks Technical Documentation. Barracuda SSL VPN. Administrator s Guide. Version 2.x RECLAIM YOUR NETWORK
Barracuda Networks Technical Documentation Barracuda SSL VPN Administrator s Guide Version 2.x RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks, Inc. www.barracuda.com v20-110511w-02-110915jc
Acceptable use policy
Acceptable use policy Issue sheet Document reference Document location Title Author Issued to Reason issued NHSBSAIGM008 S:\BSA\IGM\Mng IG\Developing Policy and Strategy\Develop or Review Acceptable Use
Implementation Guide
Implementation Guide PayLINK Implementation Guide Version 2.1.252 Released September 17, 2013 Copyright 2011-2013, BridgePay Network Solutions, Inc. All rights reserved. The information contained herein
Apollo Education Group Information Security
Document Type: Standard Document Serial No. [TBD per applicable matrix] Original Release: 12/13/2010 SME / Author Review Reboot File SME Reviewer: Review Date: Approval Date: B. Smathers, M. Hernandez
Procedure Title: TennDent HIPAA Security Awareness and Training
Procedure Title: TennDent HIPAA Security Awareness and Training Number: TD-QMP-P-7011 Subject: Security Awareness and Training Primary Department: TennDent Effective Date of Procedure: 9/23/2011 Secondary
Endpoint Security Client for Mac
Endpoint Security Client for Mac E80.60 User Guide 23 December 2014 Classification: [Protected] 2014 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are
Configuring and Monitoring Citrix Branch Repeater
Configuring and Monitoring Citrix Branch Repeater eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of
Digital Signatures on iqmis User Access Request Form
Digital Signatures on iqmis User Access Request Form When a user clicks in the User Signature block on the iqmis Access Form, the following window appears: Click Save a Copy and rename it with your name,
Use of EASE Code of Practice. This code of practice is also qualified by The University of Edinburgh computing regulations, found at:
Use of EASE Code of Practice Introduction This code of practice is intended to support the Information Security Policy of the University and should be read in conjunction with this document. http://www.ed.ac.uk/schools-departments/information-services/about/policiesandregulations/security-policies/security-policy
Business ebanking - User Sign On & Set Up
About Sign On Business ebanking has two authentication methods that reduce the risk of online identity theft: secure token authentication and out-of-band authentication. The authentication method companies
Information Security Policy
Information Security Policy Policy Contents I. POLICY STATEMENT II. REASON FOR POLICY III. SCOPE IV. AUDIENCE V. POLICY TEXT VI. PROCEDURES VII. RELATED INFORMATION VIII. DEFINITIONS IX. FREQUENTLY ASKED
Instructions For Opening UHA Encrypted Email
Receiving Encrypted Email You have received a secure, encrypted message from UHA. The message will contain the following notice and an attachment named SecureMessageAtt.hml. The attachment is shown circled
Pension Benefit Guaranty Corporation. Office of Inspector General. Evaluation Report. Penetration Testing 2001 - An Update
Pension Benefit Guaranty Corporation Office of Inspector General Evaluation Report Penetration Testing 2001 - An Update August 28, 2001 2001-18/23148-2 Penetration Testing 2001 An Update Evaluation Report
Managing Users and Identity Stores
CHAPTER 8 Overview ACS manages your network devices and other ACS clients by using the ACS network resource repositories and identity stores. When a host connects to the network through ACS requesting
BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide
BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry
Virtual Code Authentication User s Guide. June 25, 2015
Virtual Code Authentication User s Guide June 25, 2015 Virtual Code Authentication User s Guide Overview of New Security Modern technologies call for higher security standards as practiced among many other
