Ex Libris Group Password Management Policy
|
|
- Miles Taylor
- 8 years ago
- Views:
Transcription
1 Ex Libris Group Password Management Policy
2 CONFIDENTIAL INFORMATION The information herein is the property of Ex Libris Ltd. or its affiliates and any misuse or abuse will result in economic loss. DO NOT COPY UNLESS YOU HAVE BEEN GIVEN SPECIFIC WRITTEN AUTHORIZATION FROM EX LIBRIS LTD. This document is provided for limited and restricted purposes in accordance with a binding contract with Ex Libris Ltd. or an affiliate. The information herein includes trade secrets and is confidential. DISCLAIMER The information in this document will be subject to periodic change and updating. Please confirm that you have the most current documentation. There are no warranties of any kind, express or implied, provided in this documentation, other than those expressly agreed upon in the applicable Ex Libris contract. This information is provided AS IS. Unless otherwise agreed, Ex Libris shall not be liable for any damages for use of this document, including, without limitation, consequential, punitive, indirect or direct damages. Any references in this document to third-party material (including third-party Web sites) are provided for convenience only and do not in any manner serve as an endorsement of that third-party material or those Web sites. The third-party materials are not part of the materials for this Ex Libris product and Ex Libris has no liability for such materials. TRADEMARKS "Ex Libris," the Ex Libris bridge, Primo, Aleph, Alephino, Voyager, SFX, MetaLib, Verde, DigiTool, Preservation, URM, Voyager, ENCompass, Endeavor ezconnect, WebVoyage, Citation Server, LinkFinder and LinkFinder Plus, and other marks are trademarks or registered trademarks of Ex Libris Ltd. or its affiliates. The absence of a name or logo in this list does not constitute a waiver of any and all intellectual property rights that Ex Libris Ltd. or its affiliates have established in any of its products, features, or service names or logos. Trademarks of various third-party products, which may include the following, are referenced in this documentation. Ex Libris does not claim any rights in these trademarks. Use of these marks does not imply endorsement by Ex Libris of these third-party products, or endorsement by these third parties of Ex Libris products. Oracle is a registered trademark of Oracle Corporation. UNIX is a registered trademark in the United States and other countries, licensed exclusively through X/Open Company Ltd. Microsoft, the Microsoft logo, MS, MS-DOS, Microsoft PowerPoint, Visual Basic, Visual C++, Win32, Microsoft Windows, the Windows logo, Microsoft Notepad, Microsoft Windows Explorer, Microsoft Internet Explorer, and Windows NT are registered trademarks and ActiveX is a trademark of the Microsoft Corporation in the United States and/or other countries. Unicode and the Unicode logo are registered trademarks of Unicode, Inc. Google is a registered trademark of Google, Inc. Web address: 2
3 Table of Contents 1 Overview 5 2 Purpose 5 3 Scope 5 4 Policy 6 General 6 Guidelines 6 Password Protection 7 5 Enforcement 8
4 Record of Changes Type of Information Document Title: Document Owner: Approved by: Issued: Reviewed & Revised: Document Data Ex Libris Group Password Management Policy Tomer Shemesh Ex Libris Security Officer Eyal Alkalay Ex Libris Cloud Engineering Director 01-March Apr-2015 Document Distribution and Review The document owner will distribute this document to all approvers when it is first created and as changes or updates are made. This document will be reviewed and updated annually or upon written request by an approver or stakeholder. Questions or feedback about this document can be directed to the owner or a listed approver. 4
5 Overview Ex Libris is committed to providing its customers with a highly secure and reliable environment for hosting and cloud-based applications. Therefore, Ex Libris has developed a strict and secure password policy and procedures that covers all aspects of IT, including hosting and cloud-based Ex Libris systems and services. Passwords are an important aspect of computer security. They are the front line of protection for user accounts. A poorly chosen password may result in the compromise of Ex Libris entire corporate network. For this reason, all Ex Libris employees (including contractors and vendors with access to Ex Libris systems) are responsible for taking the appropriate steps, as outlined below, to select and secure their passwords. Passwords not only protect Ex Libris and its information, but you as well. If somebody uses your account, you may be held responsible for their actions if you revealed your password to that person. Purpose The purpose of this policy is to establish a standard for the creation of strong passwords, the protection and appropriate use of these passwords to protect customer information, and to maintain data privacy by defining the frequency with which passwords should be changed. Scope The scope of this policy includes all personnel who have or are responsible for an account (or any form of access that supports or requires a password) on any system that resides at any Ex Libris facility, has access to the Ex Libris network, or stores non-public Ex Libris information. 5
6 Policies General The following are general password policies: All user-level passwords (such as , Web, workstation, server account, and so forth) must be changed at least every 90 days. However, when the user password is part of a multifactor authentication mechanism (such as SSH key), a one year change period is acceptable. A user account that has system-level privileges granted through group memberships or programs such as sudo must have a password that is different than the password used for all other accounts held by this user. Passwords must not be inserted into messages or other forms of electronic communication. Communication of passwords must take place orally. All user-level passwords must conform to the guidelines described below. A new user will be created with the change password next logon option enabled. All system-level passwords (such as root, NT admin, application administration account, service account, and so forth) must be changed at least every 6 months. In a new installation of an Ex Libris product at a customer site, the application password must be changed. When providing an internal application user name/password to an external resource (supplier, external developer, distributors, and so forth), a change of password needs to be performed immediately after the session. Guidelines Passwords that are used must be strong passwords. Strong passwords have the following characteristics: Complex: Contain both uppercase and lowercase characters Have digits, punctuation, or Unicode characters as well as letters (for example, 0-9, (ڑßא(/.,?<>';":[]{}`\=-~ +_()*&^%$#@! Must be at least 8 characters long. System passwords must be at least 12 characters long Enforce password history at least 8 change cycles before a password can be reused Lockout user accounts are blocked after 10 consecutive failed password entries Must be a non-trivial combination 6
7 Must not be a word in any language, slang, dialect, or jargon Must not be based on personal information Must never be written down or stored unencrypted Try to create passwords that can be easily remembered. One way to do this is to create a password based on a song title, affirmation, or other phrase. For example, the phrase might be This may be one way to remember my password and the password could be TmB1w2Rmp! or Tmb1W>rmp@s. Rename the system-level privilege user name if possible. Do not use the product name or a name that someone can easily guess as the system-level privilege user name. In contrast, the following are characteristics of poor passwords and forbidden to use: The default password A password that is a common usage word such as: Names of family, pets, friends, co-workers, fictional characters, and so forth Computer terms, commands, names of companies, hardware, or software Birthdays and other personal information, such as addresses and phone numbers Word or number patters such as aaabbb, qwerty, zyxwvuts, , and so forth. Any of the above preceded or followed by a digit Any of the above transformed by simple character substitutions (1 for for a, 3 for E, and so forth) Password Protection The following policies help protect your password: Do not share your user-level Ex Libris password with anyone, including administrative assistants or Cloud and IT employees (unless you change the password after the problem has been solved). Do not open a case or ticket with your user name and password in it. Instead, ask for remote assistance and type the password separately. All user-level and system-level passwords are to be treated as sensitive, confidential Ex Libris information. All passwords must be saved on Ex Libris password protection encrypted systems. If cloud /IT employees need access to a system using your password, they should change your password to perform the required work and then allow you to reset your password when they have completed the task. Avoid using the Remember Password feature of applications such as PuTTY, SecureCRT, Internet Explorer and others applications. Do not install or use store password software on Ex Libris computers. 7
8 Do not write passwords down and store them in your office or near your workstation. Do not store passwords on ANY computer system (including mobile phones, tablets, or similar devices) without appropriate encryption. If you have to deliver a password: Do it by phone and replace the password after you finish. Be aware of who is listening around you. If an account or password is suspected of having been compromised, report the incident to Ex Libris Security Officer and change all your passwords on the compromised systems. Enforcement Password cracking or guessing may be performed on a semiannual security audit review performed by company security officer or its delegates. Password cracking or guessing may be performed on an annual security penetration tests performed by external security company and ISO audit process. If a password is guessed or cracked during one of these scans, this will be considered a security violation and will be handled according to the security disciplinary policy. 8
November 2015. Ex Libris Certified Third-Party Software and Security Patch Release Notes
November 2015 Ex Libris Certified Third-Party Software and Security Patch Release Notes CONFIDENTIAL INFORMATION The information herein is the property of Ex Libris Ltd. or its affiliates and any misuse
More informationServer Access for Ex Libris Support. August 2015
Server Access for Ex Libris Support August 2015 CONFIDENTIAL INFORMATION The information herein is the property of Ex Libris Ltd. or its affiliates and any misuse or abuse will result in economic loss.
More informationHow to Configure the Web Services Server in Aleph. Versions 22 and later
How to Configure the Web Services Server in Aleph Versions 22 and later CONFIDENTIAL INFORMATION The information herein is the property of Ex Libris Ltd. or its affiliates and any misuse or abuse will
More informationRequirements for Upgrading from MetaLib 3.13 to MetaLib 4. Version 4
Requirements for Upgrading from MetaLib 3.13 to MetaLib 4 Version 4 CONFIDENTIAL INFORMATION DISCLAIMER The information herein is the property of Ex Libris Ltd. or its affiliates and any misuse or abuse
More informationSFX KnowledgeBase eservice. Versions 3 and 4
SFX KnowledgeBase eservice Versions 3 and 4 CONFIDENTIAL INFORMATION DISCLAIMER The information herein is the property of Ex Libris Ltd. or its affiliates and any misuse or abuse will result in economic
More informationPrimo Online End User Help. Version 4.x
Version 4.x CONFIDENTIAL INFORMATION DISCLAIMER The information herein is the property of Ex Libris Ltd. or its affiliates and any misuse or abuse will result in economic loss. DO NOT COPY UNLESS YOU HAVE
More informationStaff User s Guide Task Manager. Version 20
Staff User s Guide Task Manager Version 20 CONFIDENTIAL INFORMATION The information herein is the property of Ex Libris Ltd. or its affiliates and any misuse or abuse will result in economic loss. DO NOT
More informationVoyager-L Mailing List
Voyager-L Mailing List CONFIDENTIAL INFORMATION The information herein is the property of Ex Libris Ltd. or its affiliates and any misuse or abuse will result in economic loss. DO NOT COPY UNLESS YOU HAVE
More informationHow to Upgrade Oracle Software and Databases from Oracle Version 9.2.0.x to 9.2.0.8 for Ex Libris Applications
How to Upgrade Oracle Software and Databases from Oracle Version 9.2.0.x to 9.2.0.8 for Ex Libris Applications CONFIDENTIAL INFORMATION The information herein is the property of Ex Libris Ltd. or its affiliates
More informationURM and Its Benefits FAQ
URM and Its Benefits FAQ CONFIDENTIAL INFORMATION The information herein is the property of Ex Libris Ltd. or its affiliates and any misuse or abuse will result in economic loss. DO NOT COPY UNLESS YOU
More informationAll You Wanted To Know About the Management of Digital Resources in Alma
All You Wanted To Know About the Management of Digital Resources in Alma CONFIDENTIAL INFORMATION The information herein is the property of Ex Libris Ltd. or its affiliates and any misuse or abuse will
More informationRosetta 5.0.1 Service Pack Installation Guide
Rosetta 5.0.1 Service Pack Installation Guide CONFIDENTIAL INFORMATION The information herein is the property of Ex Libris Ltd. or its affiliates and any misuse or abuse will result in economic loss. DO
More informationSalesforce CRM Customer Portal Documentation
Salesforce CRM Customer Portal Documentation CONFIDENTIAL INFORMATION The information herein is the property of Ex Libris Ltd. or its affiliates and any misuse or abuse will result in economic loss. DO
More informationAleph Requirements for EDI -Outgoing and Incoming Messages
Aleph Requirements for EDI -Outgoing and Incoming Messages CONFIDENTIAL INFORMATION The information herein is the property of Ex Libris Ltd. or its affiliates and any misuse or abuse will result in economic
More informationSetting Up SSL / HTTPS for Local Primo Customers
Setting Up SSL / HTTPS for Local Primo Customers CONFIDENTIAL INFORMATION The information herein is the property of Ex Libris Ltd. or its affiliates and any misuse or abuse will result in economic loss.
More informationEx Libris Cloud Service Packages. Version 2.0
Ex Libris Cloud Service Packages Version 2.0 CONFIDENTIAL INFORMATION The information herein is the property of Ex Libris Ltd. or its affiliates and any misuse or abuse will result in economic loss. DO
More informationEx Libris Patch Instructions for Oracle 10 CPUs for Voyager Windows Servers 10.2.0.4
Ex Libris Patch Instructions for Oracle 10 CPUs for Voyager Windows Servers 10.2.0.4 CONFIDENTIAL INFORMATION The information herein is the property of Ex Libris Ltd. or its affiliates and any misuse or
More informationEx Libris Patch Instructions for Oracle 10 CPUs for Voyager Windows Servers 10.2.0.4
Ex Libris Patch Instructions for Oracle 10 CPUs for Voyager Windows Servers 10.2.0.4 CONFIDENTIAL INFORMATION The information herein is the property of Ex Libris Ltd. or its affiliates and any misuse or
More informationICT Password Protection Policy
SH IG 30 Information Security Suite of Policies ICT Summary: Keywords (minimum of 5): (To assist policy search engine) Target Audience: Next Review Date: This document describes the information security
More informationSMS Proxy User s Guide. Version 1.0
SMS Proxy User s Guide Version 1.0 CONFIDENTIAL INFORMATION The information herein is the property of Ex Libris Ltd. or its affiliates and any misuse or abuse will result in economic loss. DO NOT COPY
More informationCAPITAL UNIVERSITY PASSWORD POLICY
1.0 Overview Passwords are an important aspect of computer security. They are the front line of protection for user accounts. A poorly chosen password may result in the compromise of Capital University's
More informationEx Libris Patch Instructions for Oracle 10 CPUs for Voyager Solaris/AIX Servers 10.2.0.4
Ex Libris Patch Instructions for Oracle 10 CPUs for Voyager Solaris/AIX Servers 10.2.0.4 CONFIDENTIAL INFORMATION The information herein is the property of Ex Libris Ltd. or its affiliates and any misuse
More informationHow to Change the Server Hostname
How to Change the Server Hostname CONFIDENTIAL INFORMATION The information herein is the property of Ex Libris Ltd. or its affiliates and any misuse or abuse will result in economic loss. DO NOT COPY UNLESS
More informationTHE PENNSYLVANIA STATE UNIVERSITY OFFICE OF HUMAN RESOURCES PASSWORD USAGE POLICY
THE PENNSYLVANIA STATE UNIVERSITY OFFICE OF HUMAN RESOURCES PASSWORD USAGE POLICY 1.0 Purpose The purpose of this policy is to establish Office of Human Resources (OHR) standards for creation of strong
More informationOracle 10g ODBC Installation Guide. Voyager 7.2.1 Version 9.0+
Oracle 10g ODBC Installation Guide Voyager 7.2.1 Version 9.0+ CONFIDENTIAL INFORMATION DISCLAIMER The information herein is the property of Ex Libris Ltd. or its affiliates and any misuse or abuse will
More informationCal State Fullerton Account and Password Guidelines
Cal State Fullerton Account and Password Guidelines Purpose The purpose of this guideline is to establish a standard for account use and creation of strong passwords which adheres to CSU policy and conforms
More informationRequirements for Rosetta Installation. Version 4.2
Requirements for Rosetta Installation Version 4.2 CONFIDENTIAL INFORMATION DISCLAIMER The information herein is the property of Ex Libris Ltd. or its affiliates and any misuse or abuse will result in economic
More informationPOLICY. Number: 7311-25-003 Title: Password Policy
POLICY Number: 7311-25-003 Title: Password Policy Authorization [ ] President and CEO [X] Vice President, Finance and Corporate Services Source: Director, Information Technology Services Cross Index: 7311-25-002,
More informationDocument Control Policy & Procedure 15
Bethany Care Ltd Document Control Policy & Procedure 15 Date Created 19/10/2007 Date Reviewed 12/02/2014 Document Review Details Reviewed by Brian Lynch (Quality Assurance) Date of next review February
More informationCITY OF BOULDER *** POLICIES AND PROCEDURES
CITY OF BOULDER *** POLICIES AND PROCEDURES CONNECTED PARTNER EFFECTIVE DATE: SECURITY POLICY LAST REVISED: 12/2006 CHRISS PUCCIO, CITY IT DIRECTOR CONNECTED PARTNER SECURITY POLICY PAGE 1 OF 9 Table of
More informationEx Libris Group Cloud Services Business Continuity Plan
Ex Libris Group Cloud Services Business Continuity Plan CONFIDENTIAL INFORMATION The information herein is the property of Ex Libris Ltd. or its affiliates and any misuse or abuse will result in economic
More informationState of Vermont. User Password Policy and Guidelines
State of Vermont User Password Policy and Guidelines Date of Rewrite Approval: 10/2009 Originally Approved: 4/08/2005 Approved by: Neale F. Lunderville Policy Number: fib lleul~ 1.0 Introduction... 3 1.1
More informationWork Space Manager for BES12 26387_449
Work Space Manager for BES12 26387_449 About this document This guide contains fixed and known issues for version 26387_449 of Work Space Manager for BES12. To see previous versions of the release notes,
More informationBlackBerry Business Cloud Services. Version: 6.1.7. Release Notes
BlackBerry Business Cloud Services Version: 6.1.7 Release Notes Published: 2015-04-02 SWD-20150402141754388 Contents 1 Related resources...4 2 What's new in BlackBerry Business Cloud Services 6.1.7...
More informationBES10 Self-Service. Version: 10.2. User Guide
BES10 Self-Service Version: 10.2 User Guide Published: 2014-09-10 SWD-20140908171306471 Contents 1 BES10 Self-Service overview... 4 2 Log in to BES10 Self-Service... 5 3 Activating your device...6 Create
More informationUser Accounts and Password Standard and Procedure
Office of the Vice President for Operations / CIO User Accounts and Password Standard and Procedure Issue Date: January 1, 2011 Information Security Office Effective Date: November 21, 2014 User Account
More informationTechnical Help Desk Terms of Service
Technical Help Desk Terms of Service This esecuritel Technical Help Desk Terms of Service (the Agreement ) is provided in connection with the eligible tablet enrolled in either the Advanced Protection
More informationEx Libris Patch Instructions for Oracle 10 CPUs for Voyager Linux Servers 10.2.0.4
Ex Libris Patch Instructions for Oracle 10 CPUs for Voyager Linux Servers 10.2.0.4 CONFIDENTIAL INFORMATION The information herein is the property of Ex Libris Ltd. or its affiliates and any misuse or
More informationPassword Expiration Passwords require a maximum expiration age of 60 days. Previously used passwords may not be reused.
DRAFT 6.1 Information Systems Passwords OVERVIEW Passwords are an important aspect of information security. They are the front line of protection for user accounts. A poorly chosen password may result
More informationCYBERSECURITY POLICY
* CYBERSECURITY POLICY THE CYBERSECURITY POLICY DEFINES THE DUTIES EMPLOYEES AND CONTRACTORS OF CU*ANSWERS MUST FULFILL IN SECURING SENSITIVE INFORMATION. THE CYBERSECURITY POLICY IS PART OF AND INCORPORATED
More informationPASSWORD MANAGEMENT POLICY OCIO-6012-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER PASSWORD MANAGEMENT POLICY OCIO-6012-09 Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: TABLE OF CONTENTS Section I. PURPOSE II. AUTHORITY
More informationNew Security Features
New Security Features BlackBerry 10 OS Version 10.3.2 Published: 2015-06-08 SWD-20150608104314635 Contents About this guide... 4 What's new... 4 NFC smart card support... 5 OCSP stapling support in the
More informationBoston University Security Awareness. What you need to know to keep information safe and secure
What you need to know to keep information safe and secure Introduction Welcome to Boston University s Security Awareness training. Depending on your reading speed, this presentation will take approximately
More informationNew Security Features
New Security Features BlackBerry 10 OS Version 10.3.1 Published: 2014-12-17 SWD-20141211141004210 Contents About this guide... 4 Advanced data at rest protection... 5 System requirements... 6 Managing
More informationDHHS Information Technology (IT) Access Control Standard
DHHS Information Technology (IT) Access Control Standard Issue Date: October 1, 2013 Effective Date: October 1,2013 Revised Date: Number: DHHS-2013-001-B 1.0 Purpose and Objectives With the diversity of
More informationActive Directory Change Notifier Quick Start Guide
Active Directory Change Notifier Quick Start Guide Software version 3.0 Mar 2014 Copyright 2014 CionSystems Inc., All Rights Reserved Page 1 2014 CionSystems Inc. ALL RIGHTS RESERVED. This guide may not
More informationBlackBerry Web Desktop Manager. User Guide
BlackBerry Web Desktop Manager User Guide Published: 2012-01-26 SWD-1952106-0126040849-001 Contents 1 About the BlackBerry Web Desktop Manager... 3 About the BlackBerry Business Cloud Services... 3 2 Getting
More informationAn Oracle White Paper December 2010. Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance
An Oracle White Paper December 2010 Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance Executive Overview... 1 Health Information Portability and Accountability Act Security
More informationSecure Configuration Guide
Secure Configuration Guide Oracle Health Sciences Empirica Healthcare 1.0 Part number: E49242-01 Copyright 2013, Oracle and/or its affiliates. All rights reserved. The Programs (which include both the
More informationUser Guide. BES12 Self-Service
User Guide BES12 Self-Service Published: 2016-01-27 SWD-20160127153905522 Contents About BES12 Self-Service...4 Log in to BES12 Self-Service... 4 Forgot your login password?... 4 Change your login password...5
More informationCompatibility Matrix. VPN Authentication by BlackBerry. Version 1.7.1
Compatibility Matrix VPN Authentication by BlackBerry Version 1.7.1 Published: 2015-07-09 SWD-20150709134854714 Contents Introduction... 4 Legend...5 VPN Authentication server... 6 Operating system...6
More informationBlackBerry Desktop Manager Version: 1.0.1. User Guide
BlackBerry Desktop Manager Version: 1.0.1 User Guide SWD-857131-0929025909-001 Contents Basics... 2 About BlackBerry Desktop Manager... 2 System requirements: BlackBerry Desktop Manager... 2 Set up your
More informationSAMPLE RETURN POLICY
DISCLAIMER The sample documents below are provided for general information purposes only. Your use of any of these sample documents is at your own risk, and you should not use any of these sample documents
More informationNetwork Password Management Policy & Procedures
Network Password Management Policy & Procedures Document Ref ISO 27001 Section 11 Issue No Version 1.3 Document Control Information Issue Date April 2009, June 2010, September 2011 Status Approved By FINAL
More informationBlackBerry Enterprise Server. BlackBerry Administration Service Roles and Permissions Version: 5.0 Service Pack: 4.
BlackBerry Enterprise Server BlackBerry Administration Service Roles and Permissions Version: 5.0 Service Pack: 4 Reference Guide Published: 2013-03-28 SWD-20130328143914668 Contents 1 Administrative s
More informationPassword Standards Policy
Version 3.0 This policy maybe updated at anytime (without notice) to ensure changes to the HSE s organisation structure and/or business practices are properly reflected in the policy. Please ensure you
More informationInformation Security Policy. Policy and Procedures
Information Security Policy Policy and Procedures Issue Date February 2013 Revision Date February 2014 Responsibility/ Main Point of Contact Neil Smedley Approved by/date Associated Documents Acceptable
More informationBlackBerry Professional Software For Microsoft Exchange Compatibility Matrix January 30, 2009
BlackBerry Professional Software For Microsoft Exchange Compatibility Matrix January 30, 2009 2008 Research In Motion Limited. All rights reserved. www.rim.com Page: 1 RECOMMENDED SUPPORTED SUPPORTED BEST
More informationRSA Authentication Manager 7.1 Security Best Practices Guide. Version 2
RSA Authentication Manager 7.1 Security Best Practices Guide Version 2 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks
More informationNetwork Security Policy
Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus
More informationBusiness Internet Banking Agreement Effective November 12, 2012
Business Internet Banking Agreement Effective November 12, 2012 PRINT AND RETAIN THIS FOR YOUR RECORDS 1. AGREEMENT This Agreement is a contract that establishes the rules that cover your electronic access
More informationIntegration Guide. Enterprise Identity by BlackBerry
Integration Guide Enterprise Identity by BlackBerry Published: 2015-10-13 SWD-20151013141946897 Contents About Enterprise Identity... 4 Configure a new SAML connection in the SaaS client...5 Create a SaaS
More informationCITRUS COMMUNITY COLLEGE DISTRICT GENERAL INSTITUTION COMPUTER AND NETWORK ACCOUNT AND PASSWORD MANAGEMENT
CITRUS COMMUNITY COLLEGE DISTRICT GENERAL INSTITUTION AP 3721 COMPUTER AND NETWORK ACCOUNT AND PASSWORD MANAGEMENT 1.0 Purpose The purpose of this procedure is to establish a standard for the administration
More informationSelf Help Guides. Create a New User in a Domain
Self Help Guides Create a New User in a Domain Creating Users & Groups This document is to be used as a guide to creating users and/or groups in a Domain Server environment; 1. Windows Server Domain exists,
More informationNetwork Security Policy
KILMARNOCK COLLEGE Network Security Policy Policy Number: KC/QM/048 Date of First Issue: October 2009 Revision Number: 3 Date of Last Review: October 2011 Date of Approval \ Issue May 2012 Responsibility
More informationAddressing the United States CIO Office s Cybersecurity Sprint Directives
RFP Response Addressing the United States CIO Office s Cybersecurity Sprint Directives How BeyondTrust Helps Government Agencies Address Privileged Account Management and Improve Security July 2015 Addressing
More informationBlackBerry Enterprise Server Resource Kit BlackBerry Analysis, Monitoring, and Troubleshooting Tools Version: 5.0 Service Pack: 2.
BlackBerry Enterprise Server Resource Kit BlackBerry Analysis, Monitoring, and Troubleshooting Tools Version: 5.0 Service Pack: 2 Release Notes Published: 2010-06-04 SWD-1155103-0604111944-001 Contents
More informationRethinking Schools Limited Institutional Site License
Rethinking Schools Limited Institutional Site License This License Agreement ( License ) is entered into the day of [20 ] ( Effective Date ) between Rethinking Schools Limited, a Wisconsin Corporation,
More informationCovered California. Terms and Conditions of Use
Terms and Conditions of Use Contents: Purpose Of This Agreement Privacy Policy Modification Of This Agreement Permission To Act On Your Behalf How We Identify You Registration Additional Terms For Products
More informationADP Ambassador /Referral Rewards Program. Terms and Conditions of Use
ADP Ambassador /Referral Rewards Program Terms and Conditions of Use These Terms and Conditions ("Terms") are an agreement between ADP, LLC ("ADP"), on behalf of its Major Accounts Services Division ("MAS"),
More informationCompatibility Matrix BES12. September 16, 2015
Compatibility Matrix BES12 September 16, 2015 Published: 2015-09-16 SWD-20150916153710116 Contents Introduction... 4 Legend...5 BES12 server... 6 Operating system...6 Database server...6 Browser... 8 Mobile
More informationBlackBerry Enterprise Server for Microsoft Exchange. Compatibility Matrix January 31, 2011
BlackBerry Enterprise Server for Microsoft Exchange Compatibility Matrix January 31, 2011 2010 Research In Motion Limited. All rights reserved. www.rim.com Page: 1 Operating Systems: BlackBerry Enterprise
More informationBlackBerry Web Desktop Manager. Version: 5.0 Service Pack: 4. User Guide
BlackBerry Web Desktop Manager Version: 5.0 Service Pack: 4 User Guide Published: 2012-10-03 SWD-20121003174218242 Contents 1 Basics... 5 Log in to the BlackBerry Web Desktop Manager... 5 Connect your
More informationCompatibility Matrix March 05, 2010
BlackBerry Enterprise Server Express Compatibility Matrix March 05, 2010 2010 Research In Motion Limited. All rights reserved. www.rim.com Page: 1 Operating Systems - BlackBerry Enterprise Server Express
More informationPA-DSS Implementation Guide for. Sage MAS 90 and 200 ERP. Credit Card Processing
for Sage MAS 90 and 200 ERP Credit Card Processing Version 4.30.0.18 and 4.40.0.1 - January 28, 2010 Sage, the Sage logos and the Sage product and service names mentioned herein are registered trademarks
More informationSANS Institute First Five Quick Wins
#1 QUICK WIN- APPLICATION WHITELISTING SANS Critical Controls: #2: Inventory of Authorized and Unauthorized Software 1) Deploy application whitelisting technology that allows systems to run software only
More informationModule 1: Introduction to Designing Security
Module 1: Introduction to Designing Security Table of Contents Module Overview 1-1 Lesson 1: Overview of Designing Security for Microsoft Networks 1-2 Lesson 2: Introducing Contoso Pharmaceuticals: A Case
More informationEND USER LICENSE AGREEMENT ( EULA )
END USER LICENSE AGREEMENT ( EULA ) PLEASE READ CAREFULLY THIS EULA IS A LEGAL AGREEMENT BETWEEN YOU, EITHER AS AN INDIVIDUAL, COMPANY OR OTHER LEGAL ENTITY (IN ANY CAPACITY REFERRED TO HEREIN AS END USER,
More informationBlackBerry Enterprise Server Express for Microsoft Exchange
BlackBerry Enterprise Server Express for Microsoft Exchange Compatibility Matrix December 19, 2013 2013 BlackBerry. All rights reserved. Page: 1 Operating Systems: BlackBerry Enterprise Server and BlackBerry
More informationIT ACCESS CONTROL POLICY
Reference number Approved by Information Management and Technology Board Date approved 30 April 2013 Version 1.0 Last revised Review date March 2014 Category Owner Target audience Information Assurance
More informationOpen Data Center Alliance Usage: Provider Assurance Rev. 1.1
sm Open Data Center Alliance Usage: Provider Assurance Rev. 1.1 Legal Notice This Open Data Center Alliance SM Usage:Provider Assurance is proprietary to the Open Data Center Alliance, Inc. NOTICE TO USERS
More informationSecurity Guide for the BD Remote Instrument Support Solution BD Biosciences workstations
Security Guide for the BD Remote Instrument Support Solution BD Biosciences workstations 11/2010 This document includes the following topics: About this guide (page 2) TeamViewer remote desktop support
More informationSiena College Password Management Policy
Siena College Password Management Policy Updated: 5/29/14 Note: Status: Approved. I. Purpose: The purpose of this policy is to establish a standard for the creation of strong passwords, the protection
More informationDISCLAIMER, TERMS & CONDITIONS OF USE
DISCLAIMER, TERMS & CONDITIONS OF USE Welcome to Universal Devices, Inc.'s online website. By accessing and using this website, you acknowledge that you have read, agree to, and are aware of the following
More informationBBM for Android. Version: 1.0. User Guide
BBM for Android Version: 1.0 User Guide Published: 2013-07-30 SWD-20130730124958121 Contents About BBM...4 Get started using BBM... 6 Navigating BBM...6 Signing in with your BlackBerry ID... 6 Change your
More informationSAAS SERVICES ORDER FORM
SAAS SERVICES ORDER FORM Customer: Address: Contact: Phone: E-Mail: Services: CloudBerry Managed Backup Service allows you to offer managed online backup services under your own brand powered by the CloudBerry
More informationBlackBerry Mobile Conferencing
BlackBerry Mobile Conferencing BlackBerry Device Software 5.0 User Guide Version: 3.0 SWD-1908281-0130021643-001 Contents Conference call basics... 2 About BlackBerry Mobile Conferencing... 2 Join a conference
More informationADP Ambassador / Referral Rewards Program Terms and Conditions of Use
ADP Ambassador / Referral Rewards Program Terms and Conditions of Use These Terms and Conditions ("Terms") constitute an agreement between ADP Canada Co. ("ADP"), and You and apply to the ADP Canada Ambassador/Referral
More informationAcceptable Use of Computing and Information Technology Resources
Acceptable Use of Computing and Information Technology Resources Version 1.0, February2, 2010 General Statement As part of its educational mission, Hocking College acquires, develops, and maintains computers,
More informationBlackBerry Mobile Voice System - BlackBerry MVS Client
BlackBerry Mobile Voice System - BlackBerry MVS Client BlackBerry Device Software 5.0 User Guide Version: 5.2 SWD-1249531-0316085151-001 Contents Basics... 2 About the BlackBerry MVS Client... 2... 3 basics...
More informationPointCentral Subscription Agreement v.9.2
PointCentral Subscription Agreement v.9.2 READ THIS SUBSCRIPTION AGREEMENT ( AGREEMENT ) CAREFULLY BEFORE INSTALLING THIS SOFTWARE. THIS AGREEMENT, BETWEEN CALYX TECHNOLOGY, INC., DBA CALYX SOFTWARE (
More informationBlackBerry Enterprise Server for Microsoft Office 365. Version: 1.0.3. Release Notes
BlackBerry Enterprise Server for Microsoft Office 365 Version: 1.0.3 Release Notes Published: 2013-11-21 SWD-20131121133951605 Contents 1 Fixed issues...4 2 Known issues...5 3 Legal notice...8 Fixed issues
More informationZIMPERIUM, INC. END USER LICENSE TERMS
ZIMPERIUM, INC. END USER LICENSE TERMS THIS DOCUMENT IS A LEGAL CONTRACT. PLEASE READ IT CAREFULLY. These End User License Terms ( Terms ) govern your access to and use of the zanti and zips client- side
More informationOdessa College Use of Computer Resources Policy Policy Date: November 2010
Odessa College Use of Computer Resources Policy Policy Date: November 2010 1.0 Overview Odessa College acquires, develops, and utilizes computer resources as an important part of its physical and educational
More informationEnd User License Agreement South Jersey CrashPlan: Managed Backup Solutions Last Updated 4/14/2011
End User License Agreement South Jersey CrashPlan: Managed Backup Solutions Last Updated 4/14/2011 We appreciate your selection of South Jersey CrashPlan, the premier online/offsite backup service offered
More informationSecurity Guide. BES12 Cloud
Security Guide BES12 Cloud Published: 2015-08-20 SWD-20150812133927242 Contents Security features of BES12 Cloud...4 How BES12 Cloud protects data stored in BlackBerry data centers...4 How BES12 Cloud
More informationTERMS AND CONDITIONS
TERMS AND CONDITIONS These Terms and Conditions are applicable to the use of this website (the Website ), regardless of how You accessed it. You or any derivation thereof, as used herein refers to a user
More informationStorageTek Library Attach for Window Servers
StorageTek Library Attach for Window Servers Release Notes Version 1.4.3 Part Number: 316138001 May 2010, Revision AA Submit comments about this document by clicking the Feedback [+] link at: http://docs.sun.com
More informationOracle Enterprise Manager
Oracle Enterprise Manager System Monitoring Plug-in Installation Guide for Microsoft Active Directory Release 12.1.0.1.0 E28548-04 February 2014 Microsoft Active Directory, which is included with Microsoft
More informationIf you contact us orally, we may require that you send us your complaint or question in writing within 10 business days.
Please read the 1 st Equity Bank Online Banking Service Agreement and Disclosure. It includes disclaimers of liability and other matters of interest to users. By pressing the ''I Agree'' button, you agree
More information