![]() ![]() Prior to being granted access to SPC information technology resources, the needs of Well as notifying Data Owners and SPC-IS of the termination of access to information Systems and approving user access privileges based upon their assigned duties, as SPC managers/supervisors have the responsibility of requesting access to information Access control is providedĪt the firewall, network, operating system, and application levels. Requirements for the authorization and management of user accounts, providing userĪuthentication (any or all of the basic authentication methods), and implementingĪccess controls on SPC information technology resources. SPC shall require that systems are protected from unauthorized access by establishing The Identification/Authentication Policy applies to all individuals granted access The risk of unauthorized access of information, as well as establish user accountability To information technology resources is properly controlled. If user identities are not properly authenticated, SPC has no assurance that access To SPC information technology resources and access only resources which they have To ensure the security and integrity of SPC data, identified users will securely authenticate The purpose of the Identification/Authentication Policy is to ensure the securityĪnd integrity of SPC data and information technology resources by ensuring controlsįor securing user identification and authentication credentials. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |