Security Policies
-
Each user shall be assigned an enterprise wide unique name.
-
Each user shall be assigned an enterprise wide unique UID number.
-
Each group shall be assigned an enterprise wide unique GID number.
-
MtXia Corporate security policy shall be observed and adhered to. This
policy can be reviewed by contacting the MtXia security officer.
-
Internal security audits shall minimally be performed quarterly on
all Unix Systems.
-
Administration passwords shall be changed according to MtXia's security
standards.
You are responsible for any misuse of your account, even if the
inappropriate activity was committed by a friend, family member, guest
or employee. Therefore, you must take steps to ensure that others do not
gain unauthorized access to your account. In addition, you may not use
your account to breach security of another account or attempt to gain
unauthorized access to another network or server.
- Your password provides access to your account. It is your
responsibility to keep your password secure.
- Sharing your password and account access with unauthorized users is
prohibited. You should take care to prevent others from using your
account since you will be held responsible for such use.
- Attempting to obtain another user's account password is strictly
prohibited, and may result in termination of service.
- You must adopt adequate security measures to prevent or minimize
unauthorized use of your account.
- You may not attempt to circumvent user authentication or security
of any host, network or account. This includes, but is not limited to,
accessing data not intended for you, logging into or making use of a
server or account you are not expressly authorized to access, or probing
the security of other networks. Use or distribution of tools designed
for compromising security is prohibited. Examples of these tools
include, but are not limited to, password guessing programs, cracking
tools or network probing tools.
- You may not attempt to interfere with service to any user, host or
network ("denial of service attacks"). This includes, but is not limited
to, "flooding" of networks, deliberate attempts to overload a service,
and attempts to "crash" a host.
- Users who violate systems or network security may incur criminal or
civil liability. Mt Xia will cooperate fully with investigations of
violations of systems or network security at other sites, including
cooperating with law enforcement authorities in the investigation of
suspected criminal violations.