McCorvey Companies Safe Password Policy

Last Updated: 7/23/2021



1. Policy Statement


1.1 - All individuals are responsible for safeguarding their login(s) and password(s) to any company related system and must comply with the password standards identified in this policy. Passwords must meet the complexity requirements outlined and must not be shared with or made available to anyone in any manner that is not consistent with this policy and procedure.


2. Entities Affected by this Policy


2.1 - Any individual, system, or company that has access to any McCorvey Companies internal system or Software as a Service (SaaS) application(s).


3. Contacts


3.1 - Direct any questions about this policy to [email protected]


4. Individual Responsibilities


4.1 Individuals are responsible for keeping passwords secure and confidential. As such, the following principles must be adhered to for creating and safeguarding passwords:

4.1a

5. Password Requirements


5.1 - User Level Accounts


5.1a - The following parameters indicate the minimum requirements for passwords for all user level accounts. User level accounts consist of McCorvey Companies staff (including temps and consultants) that are not Systems Administrators.

5.2 - System/Administrative Accounts


5.2a - The following parameters indicate the minimum requirements for passwords for all system/administrative level accounts. System/administrative users consist of users with elevated access to administer information systems and applications, most often in the Information Technology Department. Such users have administrator access and these accounts are at a higher risk for compromise.

6. Recommendations for Creating Compliant Passwords


6.1 - To create a password that is compliant with the parameters specified in this policy, use one of the three methods below.

6.1a Use a Passphrase


A passphrase is like a password, but it is generally longer and contains a sequence of words or other text to make the passphrase more memorable. A longer passphrase that is combined with a variety of character types is exponentially harder to breach than a shorter password. However, it is important to note that passphrases that are based on commonly referenced quotes, lyrics, or other sayings are easily guessable. Passphrases should be unique to you. Example:
Phrase: “When I was five, I learned how to ride a bike.”
Password: When I was 5, I learned to ride a bike.

6.1b Use an Acronym


An acronym can be used to constitute a strong and compliant password by taking the first letter of each word in a phrase (including punctuation) to form the password. Example:
Phrase: “When I was five, I learned how to ride a bike.”
Password: WIw5,Ilhwrab.

6.1c Use a Secret Code


A secret code can be used in conjunction with the previous methods simply by substituting letters for other numbers or symbols. Combining these methods will make it easy to incorporate the four-character types to meet the password complexity requirements. Example:
Phrase: “When I was five, I learned how to ride a bike.”
Password: WhenIwa$5,Ilh0wt0rab1k3.