|
|
|
|
|
Security Guidelines
-
Where possible all users should be managed by LDAP.
-
Each client or business unit should have independent organizational
units within LDAP.
You are responsible for any misuse of your account, even if the
inappropriate activity was committed by a friend, family member, guest
or employee. Therefore, you must take steps to ensure that others do not
gain unauthorized access to your account. In addition, you may not use
your account to breach security of another account or attempt to gain
unauthorized access to another network or server.
- Your password provides access to your account. It is your
responsibility to keep your password secure.
- Sharing your password and account access with unauthorized users is
prohibited. You should take care to prevent others from using your
account since you will be held responsible for such use.
- Attempting to obtain another user's account password is strictly
prohibited, and may result in termination of service.
- You must adopt adequate security measures to prevent or minimize
unauthorized use of your account.
- You may not attempt to circumvent user authentication or security
of any host, network or account. This includes, but is not limited to,
accessing data not intended for you, logging into or making use of a
server or account you are not expressly authorized to access, or probing
the security of other networks. Use or distribution of tools designed
for compromising security is prohibited. Examples of these tools
include, but are not limited to, password guessing programs, cracking
tools or network probing tools.
- You may not attempt to interfere with service to any user, host or
network ("denial of service attacks"). This includes, but is not limited
to, "flooding" of networks, deliberate attempts to overload a service,
and attempts to "crash" a host.
- Users who violate systems or network security may incur criminal or
civil liability. Capgemini will cooperate fully with investigations of
violations of systems or network security at other sites, including
cooperating with law enforcement authorities in the investigation of
suspected criminal violations.
|
|
|
|
|
|
|