This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
policies:security:access [2018/01/05 14:02] – [28. BYOD] deul | policies:security:access [2018/01/12 10:42] (current) – [26. User security policy] deul | ||
---|---|---|---|
Line 4: | Line 4: | ||
New users are either students or institute members. Their enrolment in the courses or their appointment as member of the institute is regulated elsewhere. Once this has taken place, personal information of these persons are entered into the Person database by the institute secretariat. Once this is done system management can use a WEB forms system to generate an account. | New users are either students or institute members. Their enrolment in the courses or their appointment as member of the institute is regulated elsewhere. Once this has taken place, personal information of these persons are entered into the Person database by the institute secretariat. Once this is done system management can use a WEB forms system to generate an account. | ||
- | Detail of [[: | + | Detail of [[:strw: |
====21. External user access computerroom==== | ====21. External user access computerroom==== | ||
No one is allowed to access the computer server room without a IT Department person accompanying. | No one is allowed to access the computer server room without a IT Department person accompanying. | ||
Line 15: | Line 15: | ||
====24. Password requirements==== | ====24. Password requirements==== | ||
- | Passwords are not freely formatted, there are [[: | + | Passwords are not freely formatted, there are [[:strw: |
====25. Secure login==== | ====25. Secure login==== | ||
Line 21: | Line 21: | ||
====26. User security policy==== | ====26. User security policy==== | ||
- | Users have been [[: | + | Users have been [[:strw: |
All Linux and Windows systems have an automatic ' | All Linux and Windows systems have an automatic ' | ||
Line 30: | Line 30: | ||
External machines, not acquired through university funding or not maintained by system admin, can only obtain access to the wireless network to which [[: | External machines, not acquired through university funding or not maintained by system admin, can only obtain access to the wireless network to which [[: | ||
====29. Remote access critical applications==== | ====29. Remote access critical applications==== | ||
+ | Only system managers require remote access to critical applications. Critical applications are not accessible from selected devices inside the IT Department infrastructure. System managers both need to authenticate | ||
====30. Mobile equipment and concern data==== | ====30. Mobile equipment and concern data==== | ||
+ | There are no mobile devices storing concern information. |