快活app

Requirements for Secure Computing Policy

Many 快活app offices deal with private information on a daily basis. The University's , , and rules such as and HIPAA cover these practices.

These additional requirements are intended to assure that protected information remains private. Employees who fail to follow these requirements may be subject to disciplinary action.

Computer Access

  1. University-owned computers must be .
  2. Computers must require a username and a strong password on start up. (Strong passwords are at least 6 characters long and consist of a mixture of upper letters, lowercase letters, digits and special characters.)
  3. Each person who uses a computer must have a separate login. (This can be effected by requiring users to log onto a Windows Domain). Sharing logins among computer users is prohibited.
  4. Computers must be password-protected when left unattended. (Log off, lock your computer, and/or set up a password-protected screen-saver with a time-out of 10 minutes or less.)

Software

  1. Computers must run an operating system approved by IT.
  2. Security patches to computer operating systems and application software must be kept up to date.
  3. An anti-virus program approved by IT must be installed and in operation at all times. Virus signatures must be updated at least weekly. Computers should be scanned for viruses at least weekly.
  4. An anti-spyware program approved by IT must be installed and in operation at all times. Spyware signatures must be updated at least weekly. Installation of software that monitors activities is prohibited. Computers should be scanned for spyware at least weekly. Programs that record activities must be removed.
  5. A personal firewall approved by IT must be run at all times.

Electronic Data Protection

  1. Protected information may be stored only in approved storage locations.
  2. Protected information stored on office computers, home computers and laptops must be encrypted. (See Software and Procedures Approved by Information Technology for an approved, easy-to-use encryption tool).
  3. Before computers and rewritable storage media (e.g., hard disks, other magnetic media, and flash memory devices such as key chain storage devices) are transferred between University departments or to different employees within a University department, all files that the recipients are not explicitly authorized to access must be deleted and free space must be erased. (See Software and Procedures Approved by Information Technology for an approved tool for erasing free space).
  4. When computers and rewritable storage media are discarded or sold outside the University, rewritable storage media must be erased by overwriting with meaningless data. (See and Software and Procedures Approved by Information Technology for additional information).
  5. Media such as CDs and DVDs that are not rewritable must be physically destroyed before they are discarded.

Additional Recommendations

  1. Password lists, if they are used at all, should be adequately protected. One way to do this is to use free open source program for Windows to keep an encrypted list of your passwords. (Do not attach lists of passwords to your computer.)
  2. Avoid saving passwords in web browsers.
  3. Use your 快活app password(s) only for accessing 快活app services. Use different passwords for accessing services at other Internet sites.
  4. Disable file sharing and other network services unless they are needed to support programmatic work. File-shares or folders that contain private information should be protected by strong passwords.
  5. Use encrypted protocols in preference to unencrypted protocols for transferring information across the network. (E.g., When possible, use protocols like ssh and sftp instead of telnet and ftp.)