Authentication Policy For Authors and Other Staff

Last updated on December 20th, 2024 at 05:51 pm

Zany news cat logo

Zany Progressive Authentication Policy Statement

Purpose: Your identity at Zany Progressive is comprised of many elements including your phone number, your username, and your office location. All of these are protected by some form of authentication that proves who you are. To get into the office, you may have to use a badge or key. To use your computer, you need to log in with a username and password. This policy governs the authentication processes in Zany Progressive and serves to help make our company more secure through better authentication practices.

  Scope: This policy applies to all of Zany Progressive employees and contractors accessing Zany Progressive systems, networks, and information, whether Zany Progressive’s devices or personal devices.

Definition: Authentication is a key part of the process of allowing the right people to access the right systems, resources, and information, as needed. Key aspects of authentication include passwords, security questions, and biometrics (e.g., fingerprint scans, facial recognition).

Authentication Policy: Employees and contractors of Zany Progressive must adhere to the Zany Progressive authentication policy:

1. Use passwords or PINs on all devices, including your personal phone and tablet.

2.  Use passphrases instead of passwords. A passphrase is a string of words or characters.

3.  Passphrases must be at least 64 characters in length. They do not need to include numerals, special characters, or a combination of lower and upper case.

4.  Never use the same passphrase for business or personal purposes.

5. Passphrases must be changed if there has been a cyber incident.

6.  Never use or reuse the same passphrase on two (or more) systems at the same time.

7.  Never share accounts among multiple people.

8.  Always enable two-factor authentication if it is supported and offered on any application used on company devices or personal devices used for business.

9.  Access to our data and systems is limited to the people that need it to do their job.

By volunteering or working with our organization, you are agreeing to abide by these rules to keep our cyber property safe.