SlideShare a Scribd company logo
1 of 2
Download to read offline
Password Policy
Effective: 3/1/2014
Updated: N/A
Pages: 3
I. Overview
a. Passwords are an important aspect of computer security. Operating without a password
may result in unauthorized access to sensitive client information or exploitation of
HAVEN’s resources, whether purposefully or accidentally. All users are responsible for
taking the appropriate steps, as outlined below, to select and secure their passwords.
II. Purpose
a. The purpose of this policy is to establish a standard for creation of passwords, the
protection of those passwords, and the frequency of change.
III. Policy
a. General
i. All user-level passwords (e.g., email, web applications, desktop computer, etc.)
must be changed at least every six months.
ii. All passwords must be part of an administered global password management
database available to the Executive Director and/or Direct Service Supervisor.
iii. All user-level and system-level passwords must conform to the guidelines
described below.
b. Guidelines
i. General Password Construction Guidelines
1. All users at HAVEN should be aware of how to select strong passwords.
2. Strong passwords have the following characteristics:
a. Lower case characters
b. Upper case characters
c. Numbers
d. Punctuation
e. “Special” characters (e.g. @#$%^&*()_+|~-=`{}[]:";'<>/ etc)
f. Contain at least fifteen alphanumeric characters.
3. Try to create passwords that can be easily remembered. One way to do
this is create a password based on a song title, affirmation, or other
phrase. For example, the phrase might be: "I got the eye of the tiger"
and the password could be: "IgTEoftT!" or "IgotTIoftT~" or some other
variation.
ii. Password Protection Standards
1. Always use different passwords for HAVEN accounts from other non-
<Company Name> access (e.g., personal ISP account, option trading,
benefits, etc.).
2. Always use different passwords for various HAVEN access needs
whenever possible.
3. Do not share HAVEN passwords with anyone, including administrative
assistants or secretaries. All passwords are to be treated as sensitive,
confidential HAVEN information.
4. Passwords should never be written down or stored on-line without
encryption.
5. Do not reveal a password in email, chat, or other electronic
communication.
6. Do not speak about a password in front of others.
7. Do not hint at the format of a password (e.g., "my family name")
8. Do not reveal a password on questionnaires or security forms
9. If someone demands a password, refer them to this document and
direct them to the Information Security Department.
10. Always decline the use of the "Remember Password" feature of
applications (e.g., Eudora, OutLook, Netscape Messenger).
iii. If an account or password compromise is suspected, report the incident to the
Information Security Department.
c. Enforcement
i. Any employee found to have violated this policy may be subject to disciplinary
action, up to and including termination of employment. Password cracking or
guessing may be performed on a periodic or random basis by the Information
Security Department or its delegates. If a password is guessed or cracked during
these exercises, the user/owner will be required to change it.

More Related Content

What's hot

Internet Safety Techniques
Internet Safety TechniquesInternet Safety Techniques
Internet Safety TechniquesAnup Dixit
 
Cyber security cdg.io
Cyber security   cdg.ioCyber security   cdg.io
Cyber security cdg.ioCyberGroup
 
The Internet of things paradox
The Internet of things paradoxThe Internet of things paradox
The Internet of things paradoxGolden Locksmith
 
Introduction to Information security
Introduction to Information securityIntroduction to Information security
Introduction to Information securityRashad Aliyev
 
Cyber security
Cyber securityCyber security
Cyber securityPrem Raval
 
Cyber security
Cyber securityCyber security
Cyber securityRIPPER95
 
Cyber security snowe vazeer
Cyber security snowe vazeerCyber security snowe vazeer
Cyber security snowe vazeersnowe123
 
Smartphone security
Smartphone securitySmartphone security
Smartphone securityMuthu Kumar
 
NormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk BriefNormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk BriefNormShield
 
Smartphone security
Smartphone  securitySmartphone  security
Smartphone securityManish Gupta
 
Cyber Security Analytics – The Weapon to Fight Cyber Crime
Cyber Security Analytics – The Weapon to Fight Cyber Crime Cyber Security Analytics – The Weapon to Fight Cyber Crime
Cyber Security Analytics – The Weapon to Fight Cyber Crime Happiest Minds Technologies
 
10 steps to cyber security
10 steps to cyber security10 steps to cyber security
10 steps to cyber securityTevfik Üret
 
Presentation network security
Presentation network securityPresentation network security
Presentation network securitycegonsoft1999
 
cyber-security course outline
cyber-security course outlinecyber-security course outline
cyber-security course outlineShoaibBhattiM
 
Cyber crime final
Cyber crime finalCyber crime final
Cyber crime finalHIRA BARLAS
 

What's hot (20)

Internet Safety Techniques
Internet Safety TechniquesInternet Safety Techniques
Internet Safety Techniques
 
Cyber security cdg.io
Cyber security   cdg.ioCyber security   cdg.io
Cyber security cdg.io
 
The Internet of things paradox
The Internet of things paradoxThe Internet of things paradox
The Internet of things paradox
 
Introduction to Information security
Introduction to Information securityIntroduction to Information security
Introduction to Information security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Internet security
Internet securityInternet security
Internet security
 
Network security
Network securityNetwork security
Network security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Poicy 121
Poicy 121Poicy 121
Poicy 121
 
Cyber security snowe vazeer
Cyber security snowe vazeerCyber security snowe vazeer
Cyber security snowe vazeer
 
Smartphone security
Smartphone securitySmartphone security
Smartphone security
 
NormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk BriefNormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk Brief
 
Smartphone security
Smartphone  securitySmartphone  security
Smartphone security
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Internet security
Internet securityInternet security
Internet security
 
Cyber Security Analytics – The Weapon to Fight Cyber Crime
Cyber Security Analytics – The Weapon to Fight Cyber Crime Cyber Security Analytics – The Weapon to Fight Cyber Crime
Cyber Security Analytics – The Weapon to Fight Cyber Crime
 
10 steps to cyber security
10 steps to cyber security10 steps to cyber security
10 steps to cyber security
 
Presentation network security
Presentation network securityPresentation network security
Presentation network security
 
cyber-security course outline
cyber-security course outlinecyber-security course outline
cyber-security course outline
 
Cyber crime final
Cyber crime finalCyber crime final
Cyber crime final
 

Similar to HAVEN Password Policy

Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101mateenzero
 
Discussion Post an article review (minimum of 200 words) relat
Discussion Post an article review (minimum of 200 words) relatDiscussion Post an article review (minimum of 200 words) relat
Discussion Post an article review (minimum of 200 words) relatLyndonPelletier761
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness TrainingJen Ruhman
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight BackMTG IT Professionals
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02amiinaaa
 
BLOCK CHAIN- SECURE ONLINE CHAT NETWORK FROM SPAM BOT
BLOCK CHAIN- SECURE ONLINE CHAT NETWORK FROM SPAM BOTBLOCK CHAIN- SECURE ONLINE CHAT NETWORK FROM SPAM BOT
BLOCK CHAIN- SECURE ONLINE CHAT NETWORK FROM SPAM BOTIRJET Journal
 
Elementary-Information-Security-Practices
Elementary-Information-Security-PracticesElementary-Information-Security-Practices
Elementary-Information-Security-PracticesOctogence
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness TrainingJen Ruhman
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4leahg118
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security SeminarJeremy Quadri
 
Cyber privacy and password protection
Cyber privacy and password protectionCyber privacy and password protection
Cyber privacy and password protectionsajeena81
 
Cybersecurity for CRM v0219-3
Cybersecurity for CRM v0219-3Cybersecurity for CRM v0219-3
Cybersecurity for CRM v0219-3Caston Thomas
 
FCC Guidelines on Cyber Security
FCC Guidelines on Cyber SecurityFCC Guidelines on Cyber Security
FCC Guidelines on Cyber SecurityMeg Weber
 
A Guide to Cyber Etiquette.pdf
A Guide to Cyber Etiquette.pdfA Guide to Cyber Etiquette.pdf
A Guide to Cyber Etiquette.pdfInfosec Train
 
10 Best Password Managers for a Secure Digital Life in 2024.pdf
10 Best Password Managers for a Secure Digital Life in 2024.pdf10 Best Password Managers for a Secure Digital Life in 2024.pdf
10 Best Password Managers for a Secure Digital Life in 2024.pdfMr. Business Magazine
 
10 Best Password Managers for a Secure Digital Life in 2024.pdf
10 Best Password Managers for a Secure Digital Life in 2024.pdf10 Best Password Managers for a Secure Digital Life in 2024.pdf
10 Best Password Managers for a Secure Digital Life in 2024.pdfMr. Business Magazine
 

Similar to HAVEN Password Policy (20)

Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Discussion Post an article review (minimum of 200 words) relat
Discussion Post an article review (minimum of 200 words) relatDiscussion Post an article review (minimum of 200 words) relat
Discussion Post an article review (minimum of 200 words) relat
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
BLOCK CHAIN- SECURE ONLINE CHAT NETWORK FROM SPAM BOT
BLOCK CHAIN- SECURE ONLINE CHAT NETWORK FROM SPAM BOTBLOCK CHAIN- SECURE ONLINE CHAT NETWORK FROM SPAM BOT
BLOCK CHAIN- SECURE ONLINE CHAT NETWORK FROM SPAM BOT
 
Elementary-Information-Security-Practices
Elementary-Information-Security-PracticesElementary-Information-Security-Practices
Elementary-Information-Security-Practices
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4
 
IT Shivanshi Tiwari.pptx
IT Shivanshi Tiwari.pptxIT Shivanshi Tiwari.pptx
IT Shivanshi Tiwari.pptx
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
 
3 steps security
3 steps security3 steps security
3 steps security
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security Seminar
 
Cyber privacy and password protection
Cyber privacy and password protectionCyber privacy and password protection
Cyber privacy and password protection
 
Cybersecurity for CRM v0219-3
Cybersecurity for CRM v0219-3Cybersecurity for CRM v0219-3
Cybersecurity for CRM v0219-3
 
FCC Guidelines on Cyber Security
FCC Guidelines on Cyber SecurityFCC Guidelines on Cyber Security
FCC Guidelines on Cyber Security
 
A Guide to Cyber Etiquette.pdf
A Guide to Cyber Etiquette.pdfA Guide to Cyber Etiquette.pdf
A Guide to Cyber Etiquette.pdf
 
10 Best Password Managers for a Secure Digital Life in 2024.pdf
10 Best Password Managers for a Secure Digital Life in 2024.pdf10 Best Password Managers for a Secure Digital Life in 2024.pdf
10 Best Password Managers for a Secure Digital Life in 2024.pdf
 
10 Best Password Managers for a Secure Digital Life in 2024.pdf
10 Best Password Managers for a Secure Digital Life in 2024.pdf10 Best Password Managers for a Secure Digital Life in 2024.pdf
10 Best Password Managers for a Secure Digital Life in 2024.pdf
 
Secure End User
Secure End UserSecure End User
Secure End User
 

HAVEN Password Policy

  • 1. Password Policy Effective: 3/1/2014 Updated: N/A Pages: 3 I. Overview a. Passwords are an important aspect of computer security. Operating without a password may result in unauthorized access to sensitive client information or exploitation of HAVEN’s resources, whether purposefully or accidentally. All users are responsible for taking the appropriate steps, as outlined below, to select and secure their passwords. II. Purpose a. The purpose of this policy is to establish a standard for creation of passwords, the protection of those passwords, and the frequency of change. III. Policy a. General i. All user-level passwords (e.g., email, web applications, desktop computer, etc.) must be changed at least every six months. ii. All passwords must be part of an administered global password management database available to the Executive Director and/or Direct Service Supervisor. iii. All user-level and system-level passwords must conform to the guidelines described below. b. Guidelines i. General Password Construction Guidelines 1. All users at HAVEN should be aware of how to select strong passwords. 2. Strong passwords have the following characteristics: a. Lower case characters b. Upper case characters c. Numbers d. Punctuation e. “Special” characters (e.g. @#$%^&*()_+|~-=`{}[]:";'<>/ etc) f. Contain at least fifteen alphanumeric characters.
  • 2. 3. Try to create passwords that can be easily remembered. One way to do this is create a password based on a song title, affirmation, or other phrase. For example, the phrase might be: "I got the eye of the tiger" and the password could be: "IgTEoftT!" or "IgotTIoftT~" or some other variation. ii. Password Protection Standards 1. Always use different passwords for HAVEN accounts from other non- <Company Name> access (e.g., personal ISP account, option trading, benefits, etc.). 2. Always use different passwords for various HAVEN access needs whenever possible. 3. Do not share HAVEN passwords with anyone, including administrative assistants or secretaries. All passwords are to be treated as sensitive, confidential HAVEN information. 4. Passwords should never be written down or stored on-line without encryption. 5. Do not reveal a password in email, chat, or other electronic communication. 6. Do not speak about a password in front of others. 7. Do not hint at the format of a password (e.g., "my family name") 8. Do not reveal a password on questionnaires or security forms 9. If someone demands a password, refer them to this document and direct them to the Information Security Department. 10. Always decline the use of the "Remember Password" feature of applications (e.g., Eudora, OutLook, Netscape Messenger). iii. If an account or password compromise is suspected, report the incident to the Information Security Department. c. Enforcement i. Any employee found to have violated this policy may be subject to disciplinary action, up to and including termination of employment. Password cracking or guessing may be performed on a periodic or random basis by the Information Security Department or its delegates. If a password is guessed or cracked during these exercises, the user/owner will be required to change it.