Password Changer
Make sure you are familiar with the content of this page before proceeding. The Acceptable Use Policy can be found below.
Choose a Good Password
A password must be
- be at least 12 characters long,
- contain at least 3 character classes from digits, lowercase letters, uppercase letters, and punctuation or other special characters, and
- not be based on dictionary words.
Some hints for constructing a good password:
- A complete sentence is a good starting point. Systematically pick letters, e.g. first or last in each word.
- Using the above technique, use lowercase or uppercase letters based on some rule, e.g. word classes.
- You can mix in digits and special characters based on their alphabetical look-alikes, sound-likes, or other association.
Acceptable Use Policy
Version: 20200207
Overview
The intentions of this Acceptable Use Policy (AUP) are not to impose restrictions that are contrary to the Niels Bohr Institute's (NBI) established culture of openness, trust and integrity. NBI IT is committed to protecting NBI's employees, partners and the institute from illegal or damaging actions by individuals, either knowingly or unknowingly. Internet/Intranet/Extranet-related systems, including but not limited to computer equipment, software, operating systems, storage media, network accounts providing electronic mail, Web browsing, login accounts and VPN, are the property of NBI. These systems are to be used for business purposes in serving the interests of the institute, and of our collaborators and guests in the course of normal operations. Effective security is a team effort involving the participation and support of every NBI employee and affiliate who deals with information and/or information systems. It is the responsibility of every computer user to know these guidelines, and to conduct their activities accordingly.
Purpose
The purpose of this policy is to outline the acceptable use of computer equipment, services and infrastructure at NBI. These rules are in place to protect the employee and NBI. Inappropriate use exposes NBI to risks including virus attacks, ransomware, compromise of network systems and services, and legal issues.
Scope
This policy applies to the use of information, electronic and computing devices, services, and network resources to conduct NBI business or interact with internal networks and systems, whether owned or leased by NBI, the employee, or a third party. This policy applies to employees, students, guests, contractors, consultants, temporaries, and other workers at NBI, including all personnel affiliated with third parties. This policy applies to all equipment, services, and intellectual property that is owned or leased by NBI.
Policy
- You are responsible for exercising good judgment regarding appropriate use of information, electronic devices, and network resources in accordance with NBI policies and standards, and local laws and regulation.
- You shall not use NBI equipment, services, or accesses for any unlawful purpose and not (attempt to) breach or circumvent any administrative or security controls. You shall respect copyright and confidentiality agreements and protect your account and any sensitive data and files to which it gives access.
- NBI proprietary information and research data stored on electronic and computing devices whether owned or leased by NBI, the employee or a third party, must be classified according to the University of Copenhagen's (UCPH) policy. You must ensure through legal or technical means that proprietary information is protected in accordance with the UCPH Data Classification Standard[1].
- You have a responsibility to promptly report any known or suspected theft, loss, security breach, misuse, or unauthorized disclosure of NBI proprietary information or equipment to the NBI Security team: security@nbi.dk. Follow the procedure described in the handbook[2].
- You may access, use or share NBI proprietary information only to the extent it is authorized and necessary to fulfill your assigned duties.
- Any account or other access method is personal and may not be shared with others. Your password is personal and private and must never be divulged, even to NBI IT staff.
- Use of the services is at your own risk. There is no guarantee that a service will be available or that it will suit any purpose.
- You are responsible for exercising good judgment regarding the reasonableness of personal use.
- For security and network maintenance purposes, authorized individuals within NBI IT may monitor equipment, systems and network traffic at any time. Efforts are made to maintain confidentiality.
Compliance
NBI IT will verify compliance with this policy through various methods, including but not limited to: automated tools, internal and external audits, and logging. Exceptions to this policy must be approved by NBI IT in advance. Failure to comply with this policy may result in termination of access to resources, network and services.
Validity
These terms of services are subject to change.
Reference
Links are valid at the time of publication, but subject to change.
[1] https://kunet.ku.dk/employee-guide/Pages/Safety-and-Emergency-Preparedness/Information-Security.aspx
[2] https://wiki.nbi.ku.dk/handbook/Security