Computing Passwords Policy
Example of Password Protection of Shared Confidential Documents
Department A has a need to work closely with Department B during the semester. Department A has two employees, Jeannie and Sue, who routinely send Brown Confidential Information to Joe, Tim and Grace in Department B via email.
The Data Owner, Katherine, has approved the sharing of the information between the two departments and has designated Sue to represent the Data Owner. Sue is therefore responsible for ensuring that a good, policy compliant password is being used to protect the Excel spreadsheets and Word documents that go back and forth between Departments A and B. She also keeps a list of who has the password, and ensures that it changes every semester.
Sue shares the new password with Jeannie, Joe, Tim and Grace, when it changes, over the phone. If any one of these folks leaves their position during the semester, Sue will make a password change then as well.