5) Information obtained through privileged access is privileged and should not be repeated. You are personally responsible for ensuring that all information obtained through privileged access is not used by yourself or anyone else. Just forget you`ve seen it before. Preferred access allows a person to take actions that could affect computer systems, network communications or other users` accounts, files, data or processes. Preferred access is generally granted to system administrators, network administrators, employees who manage computer accounts, or other employees whose tasks require special permissions for a computer system or network. I have read and understood this agreement and I am over 18 years old. 2) Your password must be changed at least once a year, or immediately if it is guessed by a password cracker or seen by another person (even partial). Make sure you never change your password via an unencrypted network connection. You need to select a password that is difficult to guess, which is not based on a dictionary word and contains small words, numbers and/or mixed punctuations. You must use another password on non-CAIDA machines (z.B.
SDSC, UCSD, Google, etc.). Many systems do not require secure login mechanisms like ssh, and as a result, passwords can be intercepted during normal use. By using different passwords in separate domains, you prevent an intruder from accessing CAIDA machines, even if they have already compromised other systems. In particular, the principles of academic freedom, freedom of expression and privacy of information have a significant impact on the management of computer systems at UBC. Individuals with privileged access must follow existing guidelines, laws, rules, precedents and procedures, while taking the necessary steps to provide quality, timely and reliable IT services. For example, individuals must comply with the provisions of the University of California (UC) Electronic Communication Policy (ECP), which require the slightest review of content and the least necessary measures to resolve a situation. Authorization In most cases, the holder of an electronic communication protocol (see ECP`s definitions of ANNEXE A) must be obtained before accessing his files or affecting his or her processes. If consent is not obtained, the conditions of access without consent of the ECP must be met.