Chapter 11 - Information Technology
Previous Publication Date: April 4, 2023
Publication Date: April 16, 2024
Policy Reviewed Date: November 27, 2023
Policy Owner: VP for Information Technology
11.12 Password/Passphrase Change Policy
I. POLICY STATEMENT
It is the policy of The University of Texas at San Antonio (世界杯官方app) to provide an effective and efficient platform for the information needs of our academic and research community. Effective technology infrastructure must provide a highly secure environment that provides the needed confidence that information is protected from unauthorized uses inconsistent with the missions of 世界杯官方app. Passwords/Passphrases are a key aspect of information security and are the front line of protection for User accounts.
II. RATIONALE
All 世界杯官方app employees, contractors, vendors, and other individuals with access to the 世界杯官方app network(s) are responsible for protecting this aspect of the information security system and shall adhere to this policy. This Policy establishes a standard for the creation of strong passwords/passphrases.
III. SCOPE
This policy applies to all 世界杯官方app staff, faculty, and student workers who have access to any Information Technology Resource that supports or requires a password/passphrase that resides in or is connected to any 世界杯官方app Information System.
IV. WEBSITE ADDRESS FOR THIS POLICY
http://ireh.shorinji-kempo.net/hop/chapter11/11.12.html
V. RELATED STATUTES, POLICIES, REQUIREMENTS OR STANDARDS
- University of Texas System Policies or the Board of Regents' Rules & Regulation
- UT System Policy UTS 165, UT System Information Technology Resources Use, and Security Policy.
- UT System Policy UTS 178, Required Reporting of Significant Events.
- 世界杯官方app HOP Policies
- 世界杯官方app HOP Policy 11.01, Acceptable Use Policy
- 世界杯官方app HOP Policy 11.06 Application Administrator Policy
- Other Policies and Standards
- Title 1 Texas Administrative Code, Part 10, Chapter 202, Subchapter C.
- Higher Education Opportunity Act of 2008.
* Please see notation below.
VI. CONTACTS
If you have any questions about HOP policy 11.12, Password/Passphrase Change, contact the following offices:
- Office of Information Security
210-458-7974
informationsecurity@shorinji-kempo.net
- University Technology Solutions
210-458-4555
techcafe@shorinji-kempo.net
VII. DEFINITIONS
- Application Administrator: An employee who manages an application on a day-to-day basis. The Application Administrator is responsible for ensuring the application is set up and managed in accordance with 世界杯官方app policies and 世界杯官方app Security Standards.
- Data: Information that is recorded - regardless of form or media – and used to support the mission of 世界杯官方app, whether in an administrative, educational, or research capacity. Data may be saved or transmitted in hard copy (printed or written), digital/electronic (including video, audio, images), or other formats.
- Data Custodian: The Data Custodian is responsible for the day-to-day maintenance of 世界杯官方app Information Technology Resources. In some instances, this responsibility is assigned to a Department, Vice President Unit, or College employee, a third-party vendor, research collaborators, visiting scholars, or 世界杯官方app Tech Solutions.
- Data Owner: The Department or College manager or agent responsible for the business functions supported by the Information Technology Resources or the individual upon whom responsibility rests for carrying out the program using the Information Technology Resources. The Data Owner collects the Data, is the primary controller of a Data asset, or is the Principal Investigator (PI) of a 世界杯官方app-managed research project or sponsored program.
- Information System: An interconnected set of Information Technology Resources under the same direct management and control that shares common functionality. An Information System normally includes hardware, software, information, Data, applications, communications, and people.
- Information Technology Resources: The procedures, equipment, facilities, software, and Data that are designed, built, operated, and maintained to create, collect, record, process, store, retrieve, display, and transmit information. This may include, but is not limited to, any and all computer printouts, online display devices, mass storage media, and all computer-related activities involving any device capable of receiving email, browsing websites, or otherwise capable of receiving, storing, managing, or transmitting Data including, but not limited to, mainframes, servers, personal computers, notebook computers, hand-held computers, mobile devices, pagers, distributed processing systems, network-attached and computer-controlled medical and laboratory equipment (e.g., embedded technology), telecommunication resources, network environments, telephones, fax machines, printers and hosted services.
- Data User: With authorization from the Data Owner, the Data User is any person who accesses, reads, enters, or updates information, Information System, and/or Information Technology Resources whether done individually, through facilitation, or responsibility for an automated application or process.
VIII. RESPONSIBILITIES
- Application Administrator: Follows all applicable procedures as specified in this Policy and related standards. Ensures the application and its Data Custodians are protected against unauthorized access and unlawful use. Notify the OIS and or Tech Café in the case of any security event.
- Data Custodian: The Data Custodian assists with the ongoing operational tasks of managing information assets.
- Data Owner: Data Owners ensure compliance with this Policy, applying for exemptions when justified, and accepting residual risk when security threats cannot be further mitigated. Data Owners approve or deny requests to access Data, periodically review access assignments and take corrective action if inappropriate access is detected. Data Owners designate Data Custodians. Data Owners also designate Data Users and set the rules and procedures for access to the Data.
IX. PROCEDURES
- Data User Authentication
- Every Data User must be assigned a unique user account (世界杯官方app ID) and a password/passphrase for access to the 世界杯官方app Information systems. Shared or group user IDs are prohibited unless specifically approved by University Technology Solutions and/or OIS. Information Systems must authenticate using a password or passphrase. The use of non-authenticated 世界杯官方app IDs (i.e., those without passwords/passphrases) or 世界杯官方app IDs not associated with a single identified Data User is prohibited. Multifactor authentication is required for all Data Users accessing 世界杯官方app Information Systems remotely.
- Passphrase Creation and Utilization
- Passphrases are not the same as passwords. A passphrase is a longer version of a password and is, therefore, more secure. A passphrase is typically composed of multiple words.
- All Information Technology Resources (includes desktops, laptops, servers, peripherals, and network hardware such as switches, routers, and firewalls) are covered by on-site warranty agreements with responsive times to meet business continuity needs.
- A good passphrase is relatively long and may contain a combination of uppercase and lowercase letters as well as numeric and punctuation characters.
- Passphrases are not the same as passwords. A passphrase is a longer version of a password and is, therefore, more secure. A passphrase is typically composed of multiple words.
X. SPECIAL INSTRUCTIONS FOR IMPLEMENTATION
None
XI. FORMS AND TOOLS/ONLINE PROCESSES
None
XII. APPENDIX
None
XIII. Dates Approved/Amended
04-16-2024
04-04-2023 (SB17)