Information Resources
Information Resources > Password Policy
Information Resources > Password Policy
Principle
Password protection is one of the most important principles of computer security, as passwords represent the primary and often only line of defense against unauthorized or inappropriate access to the University's business, research or academic information and system.
Purpose
The purpose of this policy is to establish the standards for creation and management of passwords used on any University or UKP computing system or application.
Resources Covered By This Policy
Applies to all electronic devices connected to the University network including but not limited to computer workstations and servers, network switches and routers, specialized medical devices, etc.
Individuals and Groups Covered By This Policy
Everyone who holds, or wishes to acquire, a valid account on the University's network, e-mail and/or voice mail systems is covered by this policy. This policy covers users on the Kansas City and Wichita campuses as well as users who access these systems from an off-campus location. There are no exemptions.
Definitions
Password: A series of letters, numbers and\or symbols that is used to authenticate an individual's identity and which is used to grant access to the University of Kansas Medical Center's computing and voicemail resources.
Password lifetime: The length of time a password may be used before it can be changed.
Password history: A list of previous passwords used by a specific user account.
User: Anyone who holds a valid account on the University's network, e-mail and/or voice mail systems.
Responsibilities
System administrators and users assume the following responsibilities:
I. Password Standards
Passwords for access to the KUMC network and computer systems must meet the following requirements:
| ! | " | # | $ | % | & | ' | ( | ) | * | + | , | - | . | / | : |
| ; | < | = | > | ? | @ | [ | \ | ] | ^ | _ | ' | { | | | } | ~ |
To minimize the risk of someone guessing your password:
II. Password Protection Requirements
Procedures
Procedures for processing password requests strive to balance security requirements and user convenience. These procedures will be followed by Customer Support staff for all password requests (including new, changed or forgotten passwords) for access to the University's network, e-mail or voice mail resources.
1. Account owners are encouraged to answer several password challenge questions which will allow them to reset their own password in the event that they have forgotten it. To setup their personalized challenge questions and answers, users should login to the myKUMC portal and select "Change your password challenge questions" from the Computing tab.
2. Customer Support staff will be pleased to handle requests made in one of the following ways:
3. New or existing passwords will be revealed by telephone only if the following conditions are met:
4. The Director of Information Security must approve any password change requested by a user's supervisor. Confirmation will be sent to user when a password change is completed at the request of a supervisor.
Exceptions
Requests for exceptions to this Policy may be granted only under special circumstances. Any requests must be submitted in writing to the Director of Information Security for approval. The KUMC Information Security Exception Form is available for this purpose.
Exceptions will be permitted only on receipt of written approval from Information Security. Information Security will retain documentation of currently permitted exceptions and will review them on an annual basis.
Contact Information
For information on this policy, please contact:
Steffani Webb
Associate Vice Chancellor for Information Resources
Chief Information Officer
University of Kansas Medical Center
1014 Taylor, 3901 Rainbow Blvd
Kansas City, Kansas 66160
(913) 588-7300
Sherry Callahan
Director of Information Security
Department of Information Resources
University of Kansas Medical Center
1020 Taylor, 3901 Rainbow Blvd
Kansas City, Kansas 66160
(913) 588-0966
Last Review Date: March 13, 2011
Last Revision Date: March 13, 2011