Password Changer

Make sure you are familiar with the content of this page before proceeding. The Acceptable Use Policy can be found below.

*
*
*

Choose a Good Password

A password must be

Some hints for constructing a good password:

Acceptable Use Policy

Version: 20200207

Overview

The intentions of this Acceptable Use Policy (AUP) are not to impose restrictions that are contrary to the Niels Bohr Institute's (NBI) established culture of openness, trust and integrity. NBI IT is committed to protecting NBI's employees, partners and the institute from illegal or damaging actions by individuals, either knowingly or unknowingly. Internet/Intranet/Extranet-related systems, including but not limited to computer equipment, software, operating systems, storage media, network accounts providing electronic mail, Web browsing, login accounts and VPN, are the property of NBI. These systems are to be used for business purposes in serving the interests of the institute, and of our collaborators and guests in the course of normal operations. Effective security is a team effort involving the participation and support of every NBI employee and affiliate who deals with information and/or information systems. It is the responsibility of every computer user to know these guidelines, and to conduct their activities accordingly.

Purpose

The purpose of this policy is to outline the acceptable use of computer equipment, services and infrastructure at NBI. These rules are in place to protect the employee and NBI. Inappropriate use exposes NBI to risks including virus attacks, ransomware, compromise of network systems and services, and legal issues.

Scope

This policy applies to the use of information, electronic and computing devices, services, and network resources to conduct NBI business or interact with internal networks and systems, whether owned or leased by NBI, the employee, or a third party. This policy applies to employees, students, guests, contractors, consultants, temporaries, and other workers at NBI, including all personnel affiliated with third parties. This policy applies to all equipment, services, and intellectual property that is owned or leased by NBI.

Policy

Compliance

NBI IT will verify compliance with this policy through various methods, including but not limited to: automated tools, internal and external audits, and logging. Exceptions to this policy must be approved by NBI IT in advance. Failure to comply with this policy may result in termination of access to resources, network and services.

Validity

These terms of services are subject to change.

Reference

Links are valid at the time of publication, but subject to change.

[1] https://kunet.ku.dk/employee-guide/Pages/Safety-and-Emergency-Preparedness/Information-Security.aspx

[2] https://wiki.nbi.ku.dk/handbook/Security