Passwords are a critical aspect of computer security forming the front line of protection for user accounts. A poorly chosen password can result in:
a. Loss or exposure of highly restricted and/or restricted data
b. Individual system compromise
c. Compromise of enterprise network
As such, all individuals with access to Illinois State University's information technology resources, computers, networking systems, information and data, collectively defined here as ISU Information Technology Resources and Systems are responsible for taking the appropriate steps, as outlined below, to select and secure passwords used to access ISU Information Technology Resources and Systems .
All system authentication credentials and passwords must be used in accordance with the University Appropriate Use Policy (9.2). This policy prohibits a user from sharing or allowing another individual to use their password.
A. All passwords must adhere to the following standards to ensure complexity and increase security:
B. Your account will be locked out for 15 minutes after 5 consecutive unsuccessful attempted logons.
C. All temporary passwords must be changed at first logon.
D. Default passwords will not be used on any University system. All administrators shall ensure default passwords are changed to ensure security of the systems.
E. Passwords must change every 180 days or the account will be locked.
F. If an account or password is suspected to have been compromised, report the incident to the Technology Support Center and immediately change all associated passwords.
G. If a breach occurs the offending account will be automatically locked and the password will need to be reset.
Note: For assistance with password-related issues contact the Technology Support Center at 309-438-HELP (4357) or supportcenter@ilstu.edu. For Guidelines and Best Practices see the Technology Support Center knowledge base article Guidance for setting strong passwords at http://helpdesk.illinoisstate.edu/kb/2057/Guidance_for_setting_strong_passwords/.
Any user of ISU Information Technology Resources and Systems who violates University policies, procedures or applicable local, state or federal laws may be subject to the appropriate disciplinary actions up to and including discharge, termination, or dismissal. Divisions and departments shall not adopt rules and regulations that reduce full compliance with applicable local, state or federal laws or the policies and procedures of the University.
Initiating Office: Information Security Office
Contact: Information Security Office, 438-4357
Created: 10/2017