THE PENNSYLVANIA STATE UNIVERSITY OFFICE OF HUMAN RESOURCES PASSWORD USAGE POLICY
|
|
|
- Brian Grant
- 9 years ago
- Views:
Transcription
1 THE PENNSYLVANIA STATE UNIVERSITY OFFICE OF HUMAN RESOURCES PASSWORD USAGE POLICY 1.0 Purpose The purpose of this policy is to establish Office of Human Resources (OHR) standards for creation of strong passwords, the protection of those passwords, and their frequency of change in order to ensure the security of OHR networks and information systems. 2.0 Scope This policy applies to but is not limited to faculty, staff, students, vendor representatives, consultants, temporary staff, and other workers in OHR, including all personnel affiliated with third parties. This policy applies to but is not limited to all equipment that is connected to OHR networks, used in OHR facilities, or used outside OHR facilities to conduct OHR business. Note: All faculty, staff and students are bound by ITS policies regulating their Penn State Access Accounts. Those policies can be viewed at Exceptions to this policy may be necessary to perform security audits or other authorized purposes. Any exceptions must be coordinated through the OHR Information Technology (IT) Security Officer and approved by the Director or Associate Vice President for Human Resources. 3.0 Background Passwords are an important aspect of computer security. They are the front line of protection for user accounts. A poorly chosen password may result in the compromise of OHR computer networks and information systems. As such, all OHR employees (including contractors, temporary personnel, and vendors with access to OHR information systems) are responsible for taking the appropriate steps, as outlined below, to select and secure their passwords. 4.0 Policy 4.1 General All system-level passwords (e.g., root, enable, NT admin, application administration accounts, etc.) must be changed at least every three months. All user-level passwords (e.g., , web, desktop computer, etc.) must be changed at least every six months. The recommended change interval is every three months. All passwords must have a minimum of eight characters with a combination of letters, numbers, and special characters. Longer passwords are significantly more secure and recommended. User accounts that have system-level privileges granted through group memberships or programs such as "sudo" under UNIX and Mac OS X, or Run As under Windows must have a password different from passwords used with any other accounts held by that user. Page 1 of 5
2 Passwords must not be inserted into messages or other forms of electronic communication. Where System Network Management Protocol (SNMP) is used, the community strings must be defined as something other than the standard defaults of "public," "private" and "system" and must be different from the passwords used to log in interactively. A keyed hash should be used where available (e.g., SNMPv2). All user-level and system-level passwords must conform to the guidelines described below. 4.2 Guidelines A. General Password Construction Guidelines Passwords are used for various purposes within OHR networks and information systems. Some of the more common uses include: user-level accounts, web accounts, accounts, screen saver protection, voic password, and local network equipment logins. Everyone should be aware of how to select strong passwords since very few systems have support for one-time tokens (i.e., dynamic passwords which are used only once). Poor, weak passwords have the following characteristics: The password contains less than eight characters The password is a word found in a dictionary (English or foreign) The password is a common usage word such as: o Names of family, pets, friends, co-workers, fantasy characters, etc. o The user s ID or subset thereof o Computer terms and names, commands, sites, companies, hardware, or software o The words "Office of Human Resources", "OHR", "<Department Name>" or any derivation o Birthdays and other personal information such as addresses and phone numbers o Letter or number patterns like aaabbb, qwerty, zyxwvuts, , etc. o Any of the above spelled backwards o Any of the above preceded or followed by a digit (e.g., secret1, 1secret) Strong passwords have the following characteristics: Contain both upper and lower case characters (e.g., a-z, A-Z) Have digits and punctuation characters as well as letters (e.g., 0-9,!@#$%^&*()_+ ~-=\`{}[]:";'<>?,./) Are at least eight alphanumeric characters long Are not a word in any language, slang, dialect, jargon, etc. Are not based on personal information, names of family, etc. Page 2 of 5
3 Passwords should never be written down or stored on-line. Try to create passwords that can be easily remembered. One way to do this is create a password based on a song title, affirmation, or other phrase. For example, the phrase might be: "This May Be One Way To Remember" and the password could be: "TmB1w2R!" or "Tmb1W>r~" or some other variation. NOTE: Do not use either of these examples as passwords! B. Password Protection Standards Do not use the same password for OHR accounts as for other non-ohr access (e.g., personal ISP account, online banking, etc.). Where possible, don't use the same password for various OHR access needs. For example, select one password for OHR Windows Domain (Active Directory) systems and a separate password for any thirdparty hosted web services that have their own authentication system. Do not share OHR passwords with anyone, including staff support. All passwords are to be treated as sensitive, confidential OHR information. Here is a list of "don ts": Don't reveal a password over the phone to ANYONE Don't reveal a password in an message Don't reveal a password to supervisors, managers, or co-workers Don't talk about a password in front of others Don't hint at the format of a password (e.g., "my family name") Don't reveal a password on questionnaires or security forms Don't share a password with family members Don't reveal a password to others while on vacation Don t use the Remember Password feature of applications (e.g., Eudora, Outlook, Internet Explorer, Firefox, other web browsers, or any web sites) If someone demands a password, refer them to this document or have them contact the OHR Information Technology (IT) Security Officer or Security Operations and Services (SOS) Department. Again, do not write passwords and store them anywhere in your office. Do not store passwords in a file on ANY computer system (including Mobile Phones and devices) without encryption. If an account or password is suspected to have been compromised, immediately report the incident to OHR IT Security Officer and change all passwords. To ensure system security and policy compliance, password cracking or guessing may be performed on a periodic or random basis by the SOS Department, the OHR IT Security Officer, or their delegates. If a password is guessed or cracked during one of Page 3 of 5
4 these scans, the users will be required to change their passwords, and ensure it is compliant to all relevant policies. C. Application Development Standards Internal application developers must ensure their programs contain the following security precautions. Applications should: support authentication of individual users, not groups; not store passwords in clear text or in any easily reversible form; provide for role management, such that one user can take over the functions of another without having to know the other's password; and support Penn State Web Access standards, wherever possible. D. Passphrases Passphrases are generally used for public/private key authentication. A public/private key system defines a mathematical relationship between the public key that is known by all, and the private key that is known only to the user. Without the passphrase to "unlock" the private key, the user cannot gain access. Passphrases are not the same as passwords. A passphrase is a longer version of a password and is therefore, more secure. A passphrase is typically composed of multiple words. Because of this, a passphrase is more secure against "dictionary attacks". A good passphrase is relatively long and contains a combination of upper and lowercase letters and numeric and punctuation characters. An example of a good passphrase: "The*?#>*@TrafficOnThe101Was*&#!#ThisMorning" All of the rules above that apply to passwords apply to passphrases. E. Use of Passwords and Passphrases for Remote Access Users Access to the OHR networks via remote access is to be encrypted traffic, established using either a one-time password authentication or a public/private key system with a strong passphrase. A VPN is an example of a public/private key system. 5.0 Enforcement Any employee found to have violated this policy may be subject to disciplinary action by their Administrative unit or the University. Disciplinary action may include termination of employment. Page 4 of 5
5 6.0 Definitions Term Definition Application Administration Account Any account that is for the administration of an application (e.g., Oracle database administrator, ISSU administrator) sudo System-Level Users-Level VPN The sudo (stands for super user do) command is a program for some Unix and Unix-like computer operating systems that allows users to run programs with the security privileges of another user (normally the superuser, or root). Consists of several programs that help the local computer manage its own resources, such as manipulating files, running programs and controlling the keyboard and screen. Consists of program settings and data that help the user manage their resources, such as manipulating files, running productivity programs and provides access control to printers, or other network resources based on username. Virtual Private Network - provides secure tunnel for transmitting data through an unsecured network, usually network to network or client to network. 7.0 Resources For additional guidance, refer to PSU Policies: ADG01 Glossary of Computer Data and System Terminology AD20 Computer and Network Security AD22 HIPAA AD23 Use of Institutional Data AD35 University Archives and Records Management 8.0 Revision History This Version Effective Date 07/28/10 Policy s Initial Date (Interim Draft) 7/28/10 Original Draft 7/18/08 Page 5 of 5
CAPITAL UNIVERSITY PASSWORD POLICY
1.0 Overview Passwords are an important aspect of computer security. They are the front line of protection for user accounts. A poorly chosen password may result in the compromise of Capital University's
ICT Password Protection Policy
SH IG 30 Information Security Suite of Policies ICT Summary: Keywords (minimum of 5): (To assist policy search engine) Target Audience: Next Review Date: This document describes the information security
Cal State Fullerton Account and Password Guidelines
Cal State Fullerton Account and Password Guidelines Purpose The purpose of this guideline is to establish a standard for account use and creation of strong passwords which adheres to CSU policy and conforms
Ex Libris Group Password Management Policy
Ex Libris Group Password Management Policy CONFIDENTIAL INFORMATION The information herein is the property of Ex Libris Ltd. or its affiliates and any misuse or abuse will result in economic loss. DO NOT
Boston University Security Awareness. What you need to know to keep information safe and secure
What you need to know to keep information safe and secure Introduction Welcome to Boston University s Security Awareness training. Depending on your reading speed, this presentation will take approximately
Document Control Policy & Procedure 15
Bethany Care Ltd Document Control Policy & Procedure 15 Date Created 19/10/2007 Date Reviewed 12/02/2014 Document Review Details Reviewed by Brian Lynch (Quality Assurance) Date of next review February
PASSWORD MANAGEMENT POLICY OCIO-6012-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER PASSWORD MANAGEMENT POLICY OCIO-6012-09 Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: TABLE OF CONTENTS Section I. PURPOSE II. AUTHORITY
CITY OF BOULDER *** POLICIES AND PROCEDURES
CITY OF BOULDER *** POLICIES AND PROCEDURES CONNECTED PARTNER EFFECTIVE DATE: SECURITY POLICY LAST REVISED: 12/2006 CHRISS PUCCIO, CITY IT DIRECTOR CONNECTED PARTNER SECURITY POLICY PAGE 1 OF 9 Table of
Information Security Policy. Policy and Procedures
Information Security Policy Policy and Procedures Issue Date February 2013 Revision Date February 2014 Responsibility/ Main Point of Contact Neil Smedley Approved by/date Associated Documents Acceptable
CYBERSECURITY POLICY
* CYBERSECURITY POLICY THE CYBERSECURITY POLICY DEFINES THE DUTIES EMPLOYEES AND CONTRACTORS OF CU*ANSWERS MUST FULFILL IN SECURING SENSITIVE INFORMATION. THE CYBERSECURITY POLICY IS PART OF AND INCORPORATED
Password Expiration Passwords require a maximum expiration age of 60 days. Previously used passwords may not be reused.
DRAFT 6.1 Information Systems Passwords OVERVIEW Passwords are an important aspect of information security. They are the front line of protection for user accounts. A poorly chosen password may result
Password Standards Policy
Version 3.0 This policy maybe updated at anytime (without notice) to ensure changes to the HSE s organisation structure and/or business practices are properly reflected in the policy. Please ensure you
DHHS Information Technology (IT) Access Control Standard
DHHS Information Technology (IT) Access Control Standard Issue Date: October 1, 2013 Effective Date: October 1,2013 Revised Date: Number: DHHS-2013-001-B 1.0 Purpose and Objectives With the diversity of
SPICE EduGuide EG0015 Security of Administrative Accounts
This SPICE EduGuide applies to HSC information systems, specifically Administrative login accounts; (aka Admin accounts) and the faculty, staff and students who use them. Admin accounts are logon IDs and
1 Purpose... 3 2 Scope... 3 3 Document Owner... 3 4 Information Security Standard Document Review Cycle... 3 5 Revision History...
Info ormation Security Pro ogram Information Security Committee Approved Version: 20091021 This version: 20120104 This Standard falls under Columbus State Community College Information Technology Policy
The City of New York
The Policy All passwords and personal identification numbers (PINs) used to protect City of New York systems shall be appropriately configured, periodically changed, and issued for individual use. Scope
GENEVA COLLEGE INFORMATION TECHNOLOGY SERVICES. Password POLICY
GENEVA COLLEGE INFORMATION TECHNOLOGY SERVICES Password POLICY Table of Contents OVERVIEW... 2 PURPOSE... 2 SCOPE... 2 DEFINITIONS... 2 POLICY... 3 RELATED STANDARDS, POLICIES AND PROCESSES... 4 EXCEPTIONS...
IT ACCESS CONTROL POLICY
Reference number Approved by Information Management and Technology Board Date approved 30 April 2013 Version 1.0 Last revised Review date March 2014 Category Owner Target audience Information Assurance
RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2
RSA Authentication Manager 7.1 Security Best Practices Guide Version 2 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks
SANS Institute First Five Quick Wins
#1 QUICK WIN- APPLICATION WHITELISTING SANS Critical Controls: #2: Inventory of Authorized and Unauthorized Software 1) Deploy application whitelisting technology that allows systems to run software only
e-governance Password Management Guidelines Draft 0.1
e-governance Password Management Guidelines Draft 0.1 DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S.
Network Security Policy
KILMARNOCK COLLEGE Network Security Policy Policy Number: KC/QM/048 Date of First Issue: October 2009 Revision Number: 3 Date of Last Review: October 2011 Date of Approval \ Issue May 2012 Responsibility
Network and Workstation Acceptable Use Policy
CONTENT: Introduction Purpose Policy / Procedure References INTRODUCTION Information Technology services including, staff, workstations, peripherals and network infrastructures are an integral part of
PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:
A SYSTEMS UNDERSTANDING A 1.0 Organization Objective: To ensure that the audit team has a clear understanding of the delineation of responsibilities for system administration and maintenance. A 1.1 Determine
Pension Benefit Guaranty Corporation. Office of Inspector General. Evaluation Report. Penetration Testing 2001 - An Update
Pension Benefit Guaranty Corporation Office of Inspector General Evaluation Report Penetration Testing 2001 - An Update August 28, 2001 2001-18/23148-2 Penetration Testing 2001 An Update Evaluation Report
Network Password Management Policy & Procedures
Network Password Management Policy & Procedures Document Ref ISO 27001 Section 11 Issue No Version 1.3 Document Control Information Issue Date April 2009, June 2010, September 2011 Status Approved By FINAL
Musina Local Municipality. Information and Communication Technology User Account Management Policy -Draft-
Musina Local Municipality Information and Communication Technology User Account Management Policy -Draft- Version Control Version Date Author(s) Details V1.0 June2013 Perry Eccleston Draft Policy Page
ICT USER ACCOUNT MANAGEMENT POLICY
ICT USER ACCOUNT MANAGEMENT POLICY Version Control Version Date Author(s) Details 1.1 23/03/2015 Yaw New Policy ICT User Account Management Policy 2 Contents 1. Preamble... 4 2. Terms and definitions...
RemotelyAnywhere. Security Considerations
RemotelyAnywhere Security Considerations Table of Contents Introduction... 3 Microsoft Windows... 3 Default Configuration... 3 Unused Services... 3 Incoming Connections... 4 Default Port Numbers... 4 IP
Office of Information Technology Desktop Security and Best Practices
2013.06 All computer operating systems have vulnerabilities that are targeted by are subject to security risks. In a networked environment, such as a college campus, a compromised computer can affect other
State of South Carolina Policy Guidance and Training
State of South Carolina Policy Guidance and Training Policy Workshop All Agency Access Control Policy April 2014 Agenda Questions & Follow-Up Policy Overview: Access Control Policy Risk Assessment Framework
Setting Up Scan to SMB on TaskALFA series MFP s.
Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and
This chapter describes how to set up and manage VPN service in Mac OS X Server.
6 Working with VPN Service 6 This chapter describes how to set up and manage VPN service in Mac OS X Server. By configuring a Virtual Private Network (VPN) on your server you can give users a more secure
Health and Human Services Enterprise Information Technology Security Training Resource Guide
Health and Human Services Enterprise Information Technology Security Training Resource Guide Version 1.0 March 28, 2005 Table of Contents Section I Getting Started...1 Introduction... 1 Overview... 1 Information
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities
RELEASE NOTES. Release Notes. Introduction. Platform. Product/version/build: Remote Control 11.00 (2012027) ActiveX Guest 11.
Release Notes Product/version/build: Remote Control 11.00 (2012027) ActiveX Guest 11.00 (2012027) Shipping date: RELEASE NOTES 30 th January 2012 Introduction These release notes contain information relating
Privacy Policy. PortfolioTrax, LLC. 2015 v1.0. PortfolioTrax, LLC Privacy Policy 2
Privacy Policy 2015 v1.0 Privacy Policy 2 Document Controls and Review This document is to be reviewed once every two quarters and updated to account for any changes in privacy practices that may not have
Identification and Authentication on FCC Computer Systems
FCC Computer Security TABLE OF CONTENTS Desk Reference 1 INTRODUCTION...1 Identification and Authentication on FCC Computer Systems 1.1 PURPOSE...1 1.2 BACKGROUND...1 1.3 SCOPE...2 1.4 AUTHORITY...2 2
Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy
Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy Introduction This Telephone and Computer Information Access Policy (the "Policy") governs
ADMINISTRATIVE POLICY # 32 8 117 (2014) Remote Access. Policy Number: ADMINISTRATIVE POLICY # 32 8 117 (2014) Remote Access
Policy Title: Remote Access Policy Type: Administrative Policy Number: ADMINISTRATIVE POLICY # 32 8 117 (2014) Remote Access Approval Date: 05/20/2014 Revised Responsible Office: Office of Information
Security Maintenance Practices. IT 4823 Information Security Administration. Patches, Fixes, and Revisions. Hardening Operating Systems
IT 4823 Information Security Administration Securing Operating Systems June 18 Security Maintenance Practices Basic proactive security can prevent many problems Maintenance involves creating a strategy
USFSP Network Security Guidelines
USFSP Network Security Guidelines Table of Contents I. Access to Data II. Workstations and Personal Computers A. Computer Viruses B. Software C. Hardware D. Storage Media III. Local Area Networks (LANs)
ICT OPERATING SYSTEM SECURITY CONTROLS POLICY
ICT OPERATING SYSTEM SECURITY CONTROLS POLICY TABLE OF CONTENTS 1. INTRODUCTION... 3 2. LEGISLATIVE FRAMEWORK... 3 3. OBJECTIVE OF THE POLICY... 4 4. AIM OF THE POLICY... 4 5. SCOPE... 4 6. BREACH OF POLICY...
RSA Authentication Manager 7.1 Security Best Practices Guide. Version 5
RSA Authentication Manager 7.1 Security Best Practices Guide Version 5 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks
Endpoint Security Client for Mac
Endpoint Security Client for Mac E80.60 User Guide 23 December 2014 Classification: [Protected] 2014 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are
Smart Card Setup Guide
Smart Card Setup Guide K Apple Computer, Inc. 2006 Apple Computer, Inc. All rights reserved. Under the copyright laws, this manual may not be copied, in whole or in part, without the written consent of
The Security Behind Sticky Password
The Security Behind Sticky Password Technical White Paper version 3, September 16th, 2015 Executive Summary When it comes to password management tools, concerns over secure data storage of passwords and
Information Technology Security Procedures
Information Technology Security Procedures Prepared By: Paul Athaide Date Prepared: Dec 1, 2010 Revised By: Paul Athaide Date Revised: September 20, 2012 Version 1.2 Contents 1. Policy Procedures... 3
VoipSwitch Security Audit
VoipSwitch Security Audit Security audit was made at 1 st January 2013 (3.00 PM 10.00 PM UTC +1) by John Doe who is Security Advisor at VoipSwitch Company. Server's IP address : 11.11.11.11 Server has
HIPAA Assessment HIPAA Policy and Procedures
Sample Client HIPAA Assessment HIPAA Policy and Procedures Sample Client Prepared by: InhouseCIO, LLC CONFIDENTIALITY NOTE: The information contained in this report document is for the exclusive use of
RESOURCE AND PATIENT MANAGEMENT SYSTEM. Drug Accountability (PSA) GUI Invoice Upload Program Installation and Configuration Guide
RESOURCE AND PATIENT MANAGEMENT SYSTEM Drug Accountability (PSA) GUI Invoice Upload Program Installation and Configuration Guide Version 1.0 Office of Information Technology (OIT) Division of Information
NETWORK SECURITY GUIDELINES
NETWORK SECURITY GUIDELINES VIRUS PROTECTION STANDARDS All networked computers and networked laptop computers are protected by GST BOCES or district standard anti-virus protection software. The anti-virus
Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4
Contents Is Rumpus Secure? 2 Use Care When Creating User Accounts 2 Managing Passwords 3 Watch Out For Aliases 4 Deploy A Firewall 5 Minimize Running Applications And Processes 5 Manage Physical Access
Application Security Policy
Purpose This document establishes the corporate policy and standards for ensuring that applications developed or purchased at LandStar Title Agency, Inc meet a minimum acceptable level of security. Policy
Apollo Education Group Information Security
Document Type: Standard Document Serial No. [TBD per applicable matrix] Original Release: 12/13/2010 SME / Author Review Reboot File SME Reviewer: Review Date: Approval Date: B. Smathers, M. Hernandez
Policy Title: HIPAA Access Control
Policy Title: HIPAA Access Control Number: TD-QMP-7018 Subject: Ensuring that access to EPHI is only available to those persons or programs that have been appropriately granted such access. Primary Department:
RSA Authentication Manager 8.1 Help Desk Administrator s Guide
RSA Authentication Manager 8.1 Help Desk Administrator s Guide Contact Information Go to the RSA corporate website for regional Customer Support telephone and fax numbers: www.emc.com/domains/rsa/index.htm
BSHSI Security Awareness Training
BSHSI Security Awareness Training Originally developed by the Greater New York Hospital Association Edited by the BSHSI Education Team Modified by HSO Security 7/1/2008 1 What is Security? A requirement
ARMY PASSWORD STANDARDS Version 2.5
1. Overview: A. Since 31 JUL 06, access to all Army networks was mandated to be via the Common Access Card (CAC) only. Passwords remain an important aspect of computer security to achieve authenticated
Acceptable use policy
Acceptable use policy Issue sheet Document reference Document location Title Author Issued to Reason issued NHSBSAIGM008 S:\BSA\IGM\Mng IG\Developing Policy and Strategy\Develop or Review Acceptable Use
Procedure Title: TennDent HIPAA Security Awareness and Training
Procedure Title: TennDent HIPAA Security Awareness and Training Number: TD-QMP-P-7011 Subject: Security Awareness and Training Primary Department: TennDent Effective Date of Procedure: 9/23/2011 Secondary
H.I.P.A.A. Compliance Made Easy Products and Services
H.I.P.A.A Compliance Made Easy Products and Services Provided by: Prevare IT Solutions 100 Cummings Center Suite 225D Beverly, MA 01915 [email protected] 877-232-9191 Dear Health Care Professional,
Enterprise Security Critical Standards Summary
Enterprise Security Critical Standards Summary The following is a summary of key points in the Orange County Government Board of County Commissioners (OCGBCC) security standards. It is necessary for vendors
IT and Mobile Devices Security Policy
1. Introduction IT and Mobile Devices Security Policy 1.1 It is the responsibility of all Petroc IT system users to ensure they are familiar with the IT Security Policy. Student s must be made aware of
SECURING YOUR REMOTE DESKTOP CONNECTION
White Paper SECURING YOUR REMOTE DESKTOP CONNECTION HOW TO PROPERLY SECURE REMOTE ACCESS 2015 SecurityMetrics SECURING YOUR REMOTE DESKTOP CONNECTION 1 SECURING YOUR REMOTE DESKTOP CONNECTION HOW TO PROPERLY
BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide
BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry
Remote Desktop Administration
Remote Desktop Administration What is it? Remote Desktop Administration allows a user with appropriate privileges to connect to his/her computer at Rice from another computer, similar to the way one may
Quick Start Guide to Logging in to Online Banking
Quick Start Guide to Logging in to Online Banking Log In to Internet Banking: Note: The first time you log in you are required to use your Customer ID. Your Customer ID is the primary account holder s
Using PowerBroker Identity Services to Comply with the PCI DSS Security Standard
White Paper Using PowerBroker Identity Services to Comply with the PCI DSS Security Standard Abstract This document describes how PowerBroker Identity Services Enterprise and Microsoft Active Directory
MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)
MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...
Hang Seng HSBCnet Security. May 2016
Hang Seng HSBCnet Security May 2016 1 Security The Bank aims to provide you with a robust, reliable and secure online environment in which to do business. We seek to achieve this through the adoption of
