Policy #: IT0002
Effective Date: 02/11/07
Last Revision Date: 1/27/15
UCSC PASSWORD POLICY
Vice Chancellor, Information Technology
The purpose of this policy is to establish the applicability of, and specific responsibilities relating to, the UCSC Password Strength and Security Standards (Password Standards ). This policy applies to all passwords that provide access to UCSC electronic information resources.
The following terms used in this policy are defined in the online Glossary of UCSC IT Policy-Related Terms, available at http://its.ucsc.edu/policies/glossary.html.
- Confidential Information
- Electronic Information Resources
- Restricted Data
- Subject Matter Expert
- System Steward
III. Detailed Policy Statement: Applicability and Responsibility
1. Compliance with the UCSC Password Standards is required for passwords that provide access to University restricted data , or where otherwise required by law, UC or campus policy, or contract.
2. The Password Standards are also recommended for passwords that provide access to other types of confidential information.
3. Passwords that do not provide access to confidential information, and do not share an Authentication System with ones that do, are not required to comply with the Password Standards.
System Stewards , in consultation with Subject Matter Experts , where appropriate, are responsible for determining the applicability of the Password Standards to systems or data for which they are responsible based on the above criteria . In situations where it is not clear whether the Password Standards apply to a certain type of data or system, the System Steward shall err on the side of more secure password requirements. System Stewards are also responsible for ensuring implementation and enforcement of the Password Standards where they are applicable. This includes informing users of password requirements.
System Stewards of authentication systems (e.g. systems, such as an identity management system, that allow the same username/password to be used for access to multiple services) are responsible for including in their service definition the minimum level of protection required for passwords provided by their system(s), and for communicating this information to other System Stewards.
All individuals are responsible for following the Password Standards where required. This includes not using passwords that provide access to confidential information with other systems or applications that do not adhere to the Password Standards.
The campus Vice Chancellor, Information Technology on behalf of the Office of the Chancellor and the Office of the Campus Provost and Executive Vice Chancellor (CP/EVC) is the campus authority for the UCSC Password Policy. This policy was initially reviewed and approved by the CP/EVC on 2/11/2007. Last update was 1/27/15. Next review date is January 2020.
V. Getting Help
VI. Related Policies/References for More Information
- UC Business and Finance Bulletins - Information Systems (IS) Series: http://policy.ucop.edu/manuals/business-and-finance-bulletins.html#current-is
Related Legislation and Policies
- Federal Privacy Act of 1974 - Public Law 93-579 (5 U.S.C. 552a) http://www.justice.gov/opcl/privacyact1974.htm
- State of California Information Practices Act of 1977 (Civil Code Section 1798 et seq.) http://www.leginfo.ca.gov/cgi-bin/calawquery?codesection=civ&codebody=&hits=20
- State of California Public Records Act (Gov. Code Section 6250 et seq.) http://leginfo.ca.gov/cgi-bin/displaycode?section=gov&group=06001-07000&file=6250-6270
- UC Business and Finance Bulletins - Records Management and Privacy (RMP) Series: http://www.ucop.edu/information-technology-services/policies/records-management-policies.html
VII. Related Standards
- UCSC Password Strength and Security Standards: http://its.ucsc.edu/policies/password.html
 The UCSC Password Strength and Security Standards are available at http://its.ucsc.edu/policies/password.html
 See Definitions
 If a System Steward relies on an Authentication System, e.g. an identity management system, it is the responsibility of the System Steward to include password protection requirements of the Authentication System in this assessment.