Previous Topic: System ProgrammersNext Topic: Computer Operators


Passwords and User Accountability

Password research and evidence indicate:

Ensure that passwords conform to the following rules:

Provide password distribution for remote users through self‑sealed mailers. Establish a procedure that the user acknowledges receiving the password. Never communicate passwords over the telephone!

Implement a system that makes users responsible for their actions. By setting up penalties for security breaches, data integrity is less likely to be compromised.