SlideShare a Scribd company logo
LSR Tech Solutions Password Policy<br />LSR Tech Solutions Password Policy<br />______________________________________________________<br />Lisa Wessel<br />Prepared by<br />Lisa Wessel<br />______________________________________________________<br />Rick Kramer President<br />PREFACE<br />LSR Tech Solutions passwords are designed to secure LSR Tech Solutions computer systems. A poor password makeup may result in easy access and can compromise the entire computer network. Absence of a well defined policy leaves the company open to numerous vulnerabilities, including employees having access to the appropriate systems for their job duties and responsibilities to keep LSR Tech Solutions against any inhabited systems restrictions.<br />TABLE OF CONTENTS<br /> TOC  quot;
1-1quot;
    quot;
Heading x,2,Heading y,3quot;
 PREFACE1 PAGEREF _Toc211069269  3<br />1.0SCOPE & PURPOSE PAGEREF _Toc211069270  5<br />1.1 Scope PAGEREF _Toc211069271  5<br />1.2 Purpose PAGEREF _Toc211069272  5<br />2.0JOB TITLES, REFERENCES, DEFINITIONS and ACRONYMS PAGEREF _Toc211069273  5<br />2.1 Job Titles Workflow PAGEREF _Toc211069274  5<br />2.2 Definitions PAGEREF _Toc211069275  6<br />2.3 Acronyms PAGEREF _Toc211069276  6<br />Process PAGEREF _Toc211069277  7<br />Process Flowchart<br /> SCOPE & PURPOSE<br />1.1 Scope<br />This document is designed for all personnel of LSR Tech Solutions who have or responsible for access that requires a password.<br />1.2 Purpose<br />The purpose of this policy is to establish a standard for strong password and protection of password and the changing of passwords. This is all set to protect LSR Tech Solutions systems.<br /> JOB TITLES, REFERENCES, DEFINITIONS and ACRONYMS<br />2.1 Job Titles<br />2.2 Definitions<br />Software Systems DefinitionWeb PasswordsAny sign on or membership on the internet.VoicemailTelephone security for messages left over the phoneEmailCommunication electronically through computer<br />2.3 Acronyms<br />AcronymDescriptionITInformation Technology<br />Process <br />All employees are required to have passwords to gain access to all computer systems that are available on the LSR Tech Solutions systems.<br />All system levels passwords must be changed every 90 days.<br />All user level passwords must be changed every 90 days.<br />User accounts accessed through websites must have unique password and should be changed periodically. <br />Passwords must not be sent in an email<br />All passwords us be use the preferred guidelines.<br />Guidelines<br /> Common usage of password include: user, web, email and voicemails.<br />Passwords should contain eight to fifteen characters both upper and lowercase characters along with a symbol ($, #, !).<br />Passwords should not use words in the dictionary.<br />Do not use personal information in your password.<br />Password should never be written down.<br />Do not user the remember password option when prompted.<br />If your password is compromised please report to Network Administrator and they can reset your password to change to new secure password.<br />                  <br />
Level 3 lsr tech solutions password
Level 3 lsr tech solutions password
Level 3 lsr tech solutions password
Level 3 lsr tech solutions password
Level 3 lsr tech solutions password
Level 3 lsr tech solutions password
Level 3 lsr tech solutions password

More Related Content

What's hot

A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...
A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...
A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...
IRJET Journal
 
Strategies for Data Leakage Prevention
Strategies for Data Leakage PreventionStrategies for Data Leakage Prevention
Strategies for Data Leakage Prevention
IRJET Journal
 
Prompt Detection of Transformed Data Brench
Prompt Detection of Transformed Data BrenchPrompt Detection of Transformed Data Brench
Prompt Detection of Transformed Data Brench
IRJET Journal
 
03 police administrative system @ egsp 12.07.2013
03 police administrative system @ egsp 12.07.201303 police administrative system @ egsp 12.07.2013
03 police administrative system @ egsp 12.07.2013
VinothkumaR Ramu
 
Resume
ResumeResume
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...
IRJET Journal
 
The Constrained Method of Accessibility and Privacy Preserving Of Relational ...
The Constrained Method of Accessibility and Privacy Preserving Of Relational ...The Constrained Method of Accessibility and Privacy Preserving Of Relational ...
The Constrained Method of Accessibility and Privacy Preserving Of Relational ...
IJERA Editor
 
Generic Authentication System
Generic Authentication SystemGeneric Authentication System
Generic Authentication System
IRJET Journal
 

What's hot (10)

Broadus Resume
Broadus ResumeBroadus Resume
Broadus Resume
 
A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...
A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...
A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...
 
Strategies for Data Leakage Prevention
Strategies for Data Leakage PreventionStrategies for Data Leakage Prevention
Strategies for Data Leakage Prevention
 
Prompt Detection of Transformed Data Brench
Prompt Detection of Transformed Data BrenchPrompt Detection of Transformed Data Brench
Prompt Detection of Transformed Data Brench
 
03 police administrative system @ egsp 12.07.2013
03 police administrative system @ egsp 12.07.201303 police administrative system @ egsp 12.07.2013
03 police administrative system @ egsp 12.07.2013
 
Resume
ResumeResume
Resume
 
2007
20072007
2007
 
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...
 
The Constrained Method of Accessibility and Privacy Preserving Of Relational ...
The Constrained Method of Accessibility and Privacy Preserving Of Relational ...The Constrained Method of Accessibility and Privacy Preserving Of Relational ...
The Constrained Method of Accessibility and Privacy Preserving Of Relational ...
 
Generic Authentication System
Generic Authentication SystemGeneric Authentication System
Generic Authentication System
 

Similar to Level 3 lsr tech solutions password

PASSWORD BEST PRACTICES
PASSWORD BEST PRACTICESPASSWORD BEST PRACTICES
PASSWORD BEST PRACTICES
Razorpoint Security
 
Epas - Enterprise Password Assessment Solution
Epas - Enterprise Password Assessment SolutionEpas - Enterprise Password Assessment Solution
Epas - Enterprise Password Assessment Solution
Seamus Hoole
 
3_Network Policies_MDR.pdf
3_Network Policies_MDR.pdf3_Network Policies_MDR.pdf
3_Network Policies_MDR.pdf
MILDREDRODRIGUEZ28
 
Cisco iron port_email_data_loss_prevention_overview
Cisco iron port_email_data_loss_prevention_overviewCisco iron port_email_data_loss_prevention_overview
Cisco iron port_email_data_loss_prevention_overviewIlyanna
 
Email Retention Policy1.0 PurposeThe Email Retention Polic.docx
Email Retention Policy1.0 PurposeThe Email Retention Polic.docxEmail Retention Policy1.0 PurposeThe Email Retention Polic.docx
Email Retention Policy1.0 PurposeThe Email Retention Polic.docx
christinemaritza
 
2014 WordCamp Columbus - Dealing with a lockout
2014 WordCamp Columbus - Dealing with a lockout2014 WordCamp Columbus - Dealing with a lockout
2014 WordCamp Columbus - Dealing with a lockout
John Parkinson
 
Password cracking and brute force
Password cracking and brute forcePassword cracking and brute force
Password cracking and brute force
vishalgohel12195
 
Rajesh Update Resume in wipro
Rajesh Update Resume in wiproRajesh Update Resume in wipro
Rajesh Update Resume in wiproRajesh Sr
 
Password Strength Policy Query
Password Strength Policy QueryPassword Strength Policy Query
Password Strength Policy Query
Gloria Stoilova
 
Rajesh update resume in wipro
Rajesh update resume in wiproRajesh update resume in wipro
Rajesh update resume in wipro
Rajesh Sr
 
Racf psw enhancement
Racf psw enhancementRacf psw enhancement
Racf psw enhancement
Luigi Perrone
 
Sever-based Password Synchronization: Managing Multiple Passwords
Sever-based Password Synchronization: Managing Multiple PasswordsSever-based Password Synchronization: Managing Multiple Passwords
Sever-based Password Synchronization: Managing Multiple Passwords
PortalGuard
 
Anzsco codes for acs rpl
Anzsco codes for acs rplAnzsco codes for acs rpl
Anzsco codes for acs rpl
acsrplwriting
 
8 passwordsecurity
8 passwordsecurity8 passwordsecurity
8 passwordsecurityricharddxd
 
System security by Amin Pathan
System security by Amin PathanSystem security by Amin Pathan
System security by Amin Pathanaminpathan11
 
Emilio Alvarez Iii July 2010
Emilio Alvarez Iii July 2010Emilio Alvarez Iii July 2010
Emilio Alvarez Iii July 2010
EAlvarez23
 
Emilio Alvarez Iii July 2010
Emilio Alvarez Iii July 2010Emilio Alvarez Iii July 2010
Emilio Alvarez Iii July 2010
EAlvarez23
 
Password Synchronization
Password SynchronizationPassword Synchronization
Password Synchronization
PortalGuard dba PistolStar, Inc.
 

Similar to Level 3 lsr tech solutions password (20)

PASSWORD BEST PRACTICES
PASSWORD BEST PRACTICESPASSWORD BEST PRACTICES
PASSWORD BEST PRACTICES
 
Epas - Enterprise Password Assessment Solution
Epas - Enterprise Password Assessment SolutionEpas - Enterprise Password Assessment Solution
Epas - Enterprise Password Assessment Solution
 
3_Network Policies_MDR.pdf
3_Network Policies_MDR.pdf3_Network Policies_MDR.pdf
3_Network Policies_MDR.pdf
 
Cisco iron port_email_data_loss_prevention_overview
Cisco iron port_email_data_loss_prevention_overviewCisco iron port_email_data_loss_prevention_overview
Cisco iron port_email_data_loss_prevention_overview
 
Email Retention Policy1.0 PurposeThe Email Retention Polic.docx
Email Retention Policy1.0 PurposeThe Email Retention Polic.docxEmail Retention Policy1.0 PurposeThe Email Retention Polic.docx
Email Retention Policy1.0 PurposeThe Email Retention Polic.docx
 
2014 WordCamp Columbus - Dealing with a lockout
2014 WordCamp Columbus - Dealing with a lockout2014 WordCamp Columbus - Dealing with a lockout
2014 WordCamp Columbus - Dealing with a lockout
 
Password cracking and brute force
Password cracking and brute forcePassword cracking and brute force
Password cracking and brute force
 
Rajesh Update Resume in wipro
Rajesh Update Resume in wiproRajesh Update Resume in wipro
Rajesh Update Resume in wipro
 
Password Strength Policy Query
Password Strength Policy QueryPassword Strength Policy Query
Password Strength Policy Query
 
Rajesh update resume in wipro
Rajesh update resume in wiproRajesh update resume in wipro
Rajesh update resume in wipro
 
Racf psw enhancement
Racf psw enhancementRacf psw enhancement
Racf psw enhancement
 
shyam
shyamshyam
shyam
 
Sever-based Password Synchronization: Managing Multiple Passwords
Sever-based Password Synchronization: Managing Multiple PasswordsSever-based Password Synchronization: Managing Multiple Passwords
Sever-based Password Synchronization: Managing Multiple Passwords
 
Anzsco codes for acs rpl
Anzsco codes for acs rplAnzsco codes for acs rpl
Anzsco codes for acs rpl
 
8 passwordsecurity
8 passwordsecurity8 passwordsecurity
8 passwordsecurity
 
System security by Amin Pathan
System security by Amin PathanSystem security by Amin Pathan
System security by Amin Pathan
 
Emilio Alvarez Iii July 2010
Emilio Alvarez Iii July 2010Emilio Alvarez Iii July 2010
Emilio Alvarez Iii July 2010
 
Emilio Alvarez Iii July 2010
Emilio Alvarez Iii July 2010Emilio Alvarez Iii July 2010
Emilio Alvarez Iii July 2010
 
Password Synchronization
Password SynchronizationPassword Synchronization
Password Synchronization
 
SAParameshwarappa_YV
SAParameshwarappa_YVSAParameshwarappa_YV
SAParameshwarappa_YV
 

Recently uploaded

CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
goswamiyash170123
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 

Recently uploaded (20)

CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 

Level 3 lsr tech solutions password

  • 1. LSR Tech Solutions Password Policy<br />LSR Tech Solutions Password Policy<br />______________________________________________________<br />Lisa Wessel<br />Prepared by<br />Lisa Wessel<br />______________________________________________________<br />Rick Kramer President<br />PREFACE<br />LSR Tech Solutions passwords are designed to secure LSR Tech Solutions computer systems. A poor password makeup may result in easy access and can compromise the entire computer network. Absence of a well defined policy leaves the company open to numerous vulnerabilities, including employees having access to the appropriate systems for their job duties and responsibilities to keep LSR Tech Solutions against any inhabited systems restrictions.<br />TABLE OF CONTENTS<br /> TOC quot; 1-1quot; quot; Heading x,2,Heading y,3quot; PREFACE1 PAGEREF _Toc211069269 3<br />1.0SCOPE & PURPOSE PAGEREF _Toc211069270 5<br />1.1 Scope PAGEREF _Toc211069271 5<br />1.2 Purpose PAGEREF _Toc211069272 5<br />2.0JOB TITLES, REFERENCES, DEFINITIONS and ACRONYMS PAGEREF _Toc211069273 5<br />2.1 Job Titles Workflow PAGEREF _Toc211069274 5<br />2.2 Definitions PAGEREF _Toc211069275 6<br />2.3 Acronyms PAGEREF _Toc211069276 6<br />Process PAGEREF _Toc211069277 7<br />Process Flowchart<br /> SCOPE & PURPOSE<br />1.1 Scope<br />This document is designed for all personnel of LSR Tech Solutions who have or responsible for access that requires a password.<br />1.2 Purpose<br />The purpose of this policy is to establish a standard for strong password and protection of password and the changing of passwords. This is all set to protect LSR Tech Solutions systems.<br /> JOB TITLES, REFERENCES, DEFINITIONS and ACRONYMS<br />2.1 Job Titles<br />2.2 Definitions<br />Software Systems DefinitionWeb PasswordsAny sign on or membership on the internet.VoicemailTelephone security for messages left over the phoneEmailCommunication electronically through computer<br />2.3 Acronyms<br />AcronymDescriptionITInformation Technology<br />Process <br />All employees are required to have passwords to gain access to all computer systems that are available on the LSR Tech Solutions systems.<br />All system levels passwords must be changed every 90 days.<br />All user level passwords must be changed every 90 days.<br />User accounts accessed through websites must have unique password and should be changed periodically. <br />Passwords must not be sent in an email<br />All passwords us be use the preferred guidelines.<br />Guidelines<br /> Common usage of password include: user, web, email and voicemails.<br />Passwords should contain eight to fifteen characters both upper and lowercase characters along with a symbol ($, #, !).<br />Passwords should not use words in the dictionary.<br />Do not use personal information in your password.<br />Password should never be written down.<br />Do not user the remember password option when prompted.<br />If your password is compromised please report to Network Administrator and they can reset your password to change to new secure password.<br /> <br />