Passwords must Sample Clauses

Passwords must. 1.1. Be 8 digits in length
AutoNDA by SimpleDocs
Passwords must. ✓ be changed immediately after first use ✓ where stored, be stored in irreversibly strong hashed form ✓ be changed immediately whenever accounts have, or are suspected of, been compromised Passwords must not be: ▪ sent in the same email or other communication as the username to which they relate. Ideally, the username and password should be sent by two different methods e.g. email and SMS text message ▪ blank ▪ the same as or derivation of (e.g. Password123): your Username any part of your name password Venom IT be viewable when entered be written down be shared with anyone be used by unauthorised users to access systems / information they are not authorised to access be based on friends, family, pets, favourite hobbies, bands, sports teams, films etc Passwords on standard user accounts must: ✓ have a minimum password length of 12 case-sensitive alphanumeric characters ✓ be used when carrying out normal day to day work e.g. email or word processing ✓ not use password expiration. The ICO recommends: “As a general rule, get your users to create a strong initial password and only change them if there are pressing reasons, such as a personal data breach,” otherwise, frequent password expiry “causes people to change a single strong password for a series of weak passwords.” System / administrator level accounts must: ✓ have a minimum password length of 15 case-sensitive alphanumeric characters, including at least one special character (e.g. &%$ etc.) where possible ✓ only be used when those privileges are required for the user to carry out their normal role as recorded on the Access Control Matrix ✓ not use password expiration. The ICO recommends: “As a general rule, get your users to create a strong initial password and only change them if there are pressing reasons, such as a personal data breach,” otherwise, frequent password expiry “causes people to change a single strong password for a series of weak passwords.”

Related to Passwords must

  • Passwords Passwords are an important aspect of computer security. A poorly chosen password may result in unauthorized access and/or exploitation of Placer County’s resources. All users, including contractors and vendors with access to the County’s systems, are responsible for the creation and protection of passwords and additionally any updates to County Password policies must be followed. Users must not use the same password for Placer County accounts and personal accounts. The reliability of passwords for maintaining confidentiality cannot be guaranteed. Always assume that someone, in addition to the intended or designated recipient, may read any and all messages and files. Any user suspecting that his/her password may have been compromised must, without delay, report the incident to Placer County IT.

  • Password To enable you, and only you, to use the Service, you will be asked to choose a password when you register and are accepted as a customer of the Service. This password is stored in encrypted form by us. You are responsible for maintaining the confidentiality of your Funds Transfer user ID and password. No one at Arizona State Credit Union has access to your user ID or passwords. You are responsible for uses of the Service whether or not actually or expressly authorized by you. Therefore, it is important that you DO NOT SHARE YOUR ACCOUNT NUMBER OR PASSWORD WITH ANYONE FOR ANY REASON. No one at Arizona State Credit Union will know or need to know your password, and Arizona State Credit Union employees will never ask for your password. If you wish to make a transfer to an Account of another person, you will be asked to provide a separate code word or phrase (the "Shared Secret") that is known only to you and to the person to whom you are transferring the funds (the "Recipient"). We recommend that you do not use commonly used words, phrases or dates. In order to complete the transfer, the Recipient must provide the Shared Secret and certain other identifying information. YOU AGREE THAT YOU WILL NOT GIVE THE SHARED SECRET TO ANYONE EXCEPT THE RECIPIENT FOR ANY REASON. YOU FURTHER AGREE THAT YOU WILL INSTRUCT THE RECIPIENT NOT TO GIVE THE SHARED SECRET TO ANYONE ELSE FOR ANY REASON. Contact in the Event of Unauthorized Transfer If you believe your password or Shared Secret has been lost or stolen, or that someone has transferred or may transfer money from your Account without your permission, contact us immediately. Contact information is available in the Contact Us section of our website at xxx.xxxxxx.xxx.

  • HOW WE MAY USE YOUR PERSONAL INFORMATION 12.1. How we may use your personal information. We will only use your personal information as set out in our privacy policy which is available on our Website.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Emergency Contact Information Resident must complete and provide to University an emergency contact information form provided by University Housing before Resident will be allowed to move into the Residence Facility.

  • Keys Keys with tags attached indicating number and/or description of door or room each key is intended to fit attached to each key shall be delivered to the Owner. Contractor shall prepare and furnish with the keys an itemized key schedule in quintuplicate listing the door or room number and/or description, serial number of key, and number of keys being delivered for each door or lock.

Time is Money Join Law Insider Premium to draft better contracts faster.