{"id":147,"date":"2013-07-09T11:51:04","date_gmt":"2013-07-09T15:51:04","guid":{"rendered":"http:\/\/blog.uvm.edu\/whysecurity\/?p=147"},"modified":"2013-07-09T12:07:31","modified_gmt":"2013-07-09T16:07:31","slug":"is-it-ever-okay-to-share-my-password","status":"publish","type":"post","link":"https:\/\/blog.uvm.edu\/whysecurity\/2013\/07\/09\/is-it-ever-okay-to-share-my-password\/","title":{"rendered":"Is it ever okay to share my password?"},"content":{"rendered":"<p>One&#8217;s UVM password must never be shared with anyone \u2014 not even with trusted family members, the boss, or information technology personnel. \u00a0Our passwords protect our personal information and assets, and because we&#8217;re each responsible for all use of our accounts, keeping the passwords secret protects us from any liability for others&#8217; actions. \u00a0Please report any attempt to obtain your password to\u00a0the ISO Team at <a href=\"mailto:iso@uvm.edu\">iso@uvm.edu<\/a>.<\/p>\n<p>Some UVM Net-ID accounts are provided for departments and recognized organizations. \u00a0While a carefully controlled small group of people may know the password to such an account, each person is responsible for all use of the account. \u00a0 The password must be changed immediately when any member of the group leaves or changes roles. \u00a0Department accounts are sometimes used for managing external social media, such as Facebook and Twitter; the Social Media University Operating Procedure spells out registration and management of those account and passwords.<\/p>\n<p>Additional Resources:<\/p>\n<p style=\"padding-left: 30px\"><a title=\"Computer Use \" href=\"http:\/\/www.uvm.edu\/policies\/cit\/compuse.pdf\" target=\"_blank\">Computer, Communication, and Network Technology Acceptable Use policy<\/a> [PDF]<\/p>\n<p style=\"padding-left: 30px\"><a title=\"Social Media\" href=\"http:\/\/www.uvm.edu\/policies\/cit\/socialmedia.pdf\" target=\"_blank\">Social Media University Operating Procedure<\/a> [PDF]<\/p>\n<p style=\"padding-left: 30px\">&#8220;Ouch!&#8221; newsletter,\u00a0May 2013, &#8220;<a title=\"Passwords\" href=\"http:\/\/www.securingthehuman.org\/resources\/newsletters\/ouch\/2013#may2013\" target=\"_blank\">Passwords<\/a>&#8220;<\/p>\n<p style=\"padding-left: 30px\">Why?security blog, May 21, 2013, &#8220;<a title=\"Please don\u2019t make me change my password. It\u2019s the one I use everywhere.\" href=\"http:\/\/blog.uvm.edu\/whysecurity\/2013\/05\/21\/please-dont-make-me-change-my-password-its-the-one-i-use-everywhere\/\" target=\"_blank\">Please don\u2019t make me change my password. It\u2019s the one I use everywhere<\/a>.&#8221;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>One&#8217;s UVM password must never be shared with anyone \u2014 not even with trusted family members, the boss, or information technology personnel. \u00a0Our passwords protect our personal information and assets, and because we&#8217;re each responsible for all use of our accounts, keeping the passwords secret protects us from any liability for others&#8217; actions. \u00a0Please report &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/blog.uvm.edu\/whysecurity\/2013\/07\/09\/is-it-ever-okay-to-share-my-password\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Is it ever okay to share my password?&#8221;<\/span><\/a><\/p>\n","protected":false},"author":252,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-147","post","type-post","status-publish","format-standard","hentry","category-uncategorized","entry"],"featured_image_src":null,"featured_image_src_square":null,"author_info":{"display_name":"Dean","author_link":"https:\/\/blog.uvm.edu\/whysecurity\/author\/djw\/"},"_links":{"self":[{"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/posts\/147","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/users\/252"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/comments?post=147"}],"version-history":[{"count":6,"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/posts\/147\/revisions"}],"predecessor-version":[{"id":153,"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/posts\/147\/revisions\/153"}],"wp:attachment":[{"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/media?parent=147"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/categories?post=147"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/tags?post=147"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}