Penn Computing

Penn Computing

Computing Menu Computing A-Z
Computing Home Information Systems & Computing Penn

Access Policy

You may use only those computer accounts which have been authorized for your use. The unauthorized use of another's account, as well as the providing of false or misleading information for the purpose of obtaining access to computing facilities is prohibited.

You may not authorize anyone to use your account(s) for any reason. You are responsible for all use of your accounts. You must take all reasonable precautions, including password maintenance and file protection measures, to prevent use of your accounts by unauthorized persons.

You may not use password guessing or password sniffing programs, nor may you use any other techniques to gain unauthorized access to other user accounts or systems accounts.

You should make reasonable efforts to select and use a secure password as well as protect your password.

Maintaining the privacy of your password

  1. Don't tell anyone your password. Not even a systems administrator.
  2. Don't let anyone see your password or watch as you type it in.
  3. Don't let anyone else use your account.
  4. If for some reason you must share your password, never send it via e-mail and avoid writing it. Change your password as soon after as possible.
Having a vulnerable password is not only a danger to you and your files; it is a danger to our entire network of systems, and to some extent, a danger to the entire worldwide Internet.

Related Resources

Policy on Acceptable Use of Electronic Resources
Rules for Users of Penn's Electronic Resources
Guidelines for Administrators of Penn's E-mail Systems
top

Information Systems and Computing
University of Pennsylvania
Comments & Questions


Penn Computing University of Pennsylvania
Information Systems and Computing, University of Pennsylvania