Welcome to the Online Account Activation/Password Reset Site at Purchase College.
|
Please note:
Students: Purchase College login credentials will never expire. However, once you leave the College, the email
mailbox will be deactivated 18 months after your last course registration.
Faculty and staff: Faculty and staff credentials expire at the close of business on their last day of
service – unless extension of email privileges is requested by their supervisor when their end-of-service PAF is
submitted and the extension request is approved by their sector officer. Active employees without a PAF
(Research Foundation, PCA etc.) should have a valid P-dash(today’s date is between begin date and end date of P-dash)
to retain their Purchase College login and Email privilege. Faculty and Staff who were previously students will retain
their login credentials as students do, but their email mailbox will still be removed on COB LDOS.
Before changing your Purchase College Email Account Password, please review the policy below
and agree at bottom.
Purchase College Computer Ethics and Usage Policy
Purchase College network is a private network for the use of our students,
faculty, staff, and administrators. With very limited exceptions where special
open access is provided to the Internet anyone using our network must
authenticate with a Purchase College user name and password.
Users of computer systems and networks at Purchase College must read,
understand, and agree to comply with the Purchase College Computing Ethics
Policy. You are responsible for your actions. That responsibility exists
regardless of what security mechanisms are in place. Unauthorized use of
computing facilities will lead to suspension or loss of privilege, and may lead
to more serious penalties. All rules and policies of Purchase College must be
adhered to by all users of computing and information services at Purchase
College. All rights and privileges of all users should be protected.
Do not consider e-mail private or secure. Purchase College does not encrypt
e-mail. Mail can be easily intercepted at any machine that it passes through.
Mail can be altered and copies can be made and forwarded. Messages sent to
nonexistent or incorrect addresses may be delivered to an unintended
destination.
The systems administrator(s) at Purchase College has the right to monitor the
computer system. The systems administrator has the right to examine user files
to diagnose system problems or investigate security breaches.
Internet is not secure. If you are going to transmit sensitive data or files
across the Internet you must take precautions to protect it on your own. Data
and files can easily be intercepted and read, altered, misused or destroyed at
any machine on the Internet that they pass through. In addition, machines
attached to Internet are vulnerable. Do not assume your data is safe on your
computer if it is directly connected to Internet. Do not store valuable or
privileged information on these systems without applying security. If you can't
afford to lose it, back it up. If it is information that should never see the
light of day, don't store it on a networked computer.
Keep all valuable diskettes and tapes in a secure place. Secure backup copies of
valuable files or data off site. When throwing out old diskettes or tapes make
sure no sensitive information can be found on them.
Whenever you are shipping software from one place to another, you must consider
intellectual property and license issues. The Internet is a global network, and
the importing and exporting of software may fall under the jurisdiction of the
United States Department of Commerce. Exporting anything may require a license.
A general license covers anything that is not explicitly restricted, and is
readily available in public forums in the United States. The exportation of
networking code or encryption code is restricted. You may not allow access to a
restricted machine to persons or entities outside of the United States. Please
be aware when posting information to a bulletin board, that data will probably
cross the border. If you have any questions on the legality of transmissions
over the borders of the United States, please seek legal counsel.
Purchase College has joined Internet via an educational connection. Use of the
Internet for commercial purposes is not allowed.
The following are considered unacceptable uses of computer systems, and are
strictly prohibited
- Deceiving a machine. (i.e.: mimicking, imitating or attempting to use an ID
other than your own).
- Computer fraud (with and without intent to deceive).
- Computer damage or destruction.
- Offenses against computer users including, but not limited to, harassment.
- Unauthorized use of any system.
- Modification or destruction of programs or data other than your own personal
files.
- Use of computer to commit crime (embezzlement, harassment, blackmail etc.)
- Tampering or alteration of computer, computer systems, programs or files.
- Unauthorized access or attempted unauthorized access to a computer or network.
- Causing denial of computer services (ex: run a virus that renders a network
unusable).
- Preventing others from using computer services.
- Causing deterioration of system performance (e.g. playing Doom over a network).
- Computer trespass. This includes remote systems as well as secured areas of this
system.
- Theft of computer related materials.
- Theft of computer services. For example you may not use any pay service without
paying.
- Computer invasion of privacy - unauthorized examination of files.
- Computer caused physical injury.
- Copying licensed software.
- Violation of any interstate laws applying to electronic transmissions.
- Violation of any import/export laws applying to electronic transmissions.
- Posting confidential information such as Social Security Numbers or Phone
numbers.
- Cracking passwords.
- Even if a file is readable, do not assume you may read it unless explicitly
granted authority to do so.
- Even if a file is updatable, do not modify it unless explicitly granted
authority to do so.
- You may not share your account.
- You may not use any computer resource without prior permission.
- If a Purchase College systems administrator asks you to cease an activity on the
computer, you must stop that activity immediately.
Password Policy
Your password is the only means you have of keeping your account and files
secure. The algorithm that encrypts passwords has not been broken, however, it
is possible for your password to be stolen when using the Internet so you are
encouraged to change it often. More than 80% of computer break-ins are because
passwords can be easily derived by hackers.
The following requirements must be met when choosing a password:
- Your password must be kept secret and changed often.
- Your password must contain at least 12 keystrokes, including the following in any order;
choose at least 1 character from 3 of the four groups below:
- One or more uppercase letters (‘A’ through ‘Z’)
- One or more lowercase letters (‘a’ through ‘z’)
- One or more numerals (0 through 9).
- One or more non-alphanumeric keystrokes (Special Characters), including
punctuation marks
(including ` ~ ! @ # $ % ^ & * ( ) _ - [ ] { } ’ ” ~ / ? , . < > | ).
(it is best to include both numerals and punctuation marks.)
- The space may be used in creating a password, or pass phrase. The space is not
required and does not count as a Special Character, but does improve the
complexity of a password. Most people find it easier to remember pass phrases
than complex passwords. Combining words, spaces, digits and special characters
can make a pass phrase that is both easy to remember and hard to guess.
We encourage users to not use dictionary words.
- Select a secure password that you are guaranteed to remember. An easy way to
accomplish this is to join unrelated words, syllables, and/or letters that have
special meaning only to you. Place non-alphabetic keystrokes between parts of
words, syllables, or letters in your password. For example, “my Dog likes to eat
Bananas and Strawberries” (note capitalized nouns) becomes “myD@wgl2eB&S”.
- Do not use consecutive keys on the keyboard to form any
significant part of a password (e.g. “ASD”, “qwerty”, “1234abcd”, “!@#”).
- Do not use your login name to form any part of a password, nor
use any common name, such as the name of a person or pet, nor any personal
information (date, license number, etc...). Reversing these words is ineffective
as well (e.g. the password “John.Smith” and “htimS.nhoJ” are equally
ineffective, as is “1491/7/ceD”, or any form of a date).
Data Policy
Individuals who are authorized to access sensitive or institutional data are
prohibited from divulging that data to any other individual, unless that
individual is also authorized to use the data. Individuals are only permitted to
access data as authorized.
Game Playing Policy
Game playing is allowed on student systems as long as:
- It does not deteriorate system performance.
- The computer is not needed for school work, research or any other legitimate
purpose.
Hardware Policy
- You may not move or take any hardware without explicit permission from the
designated owner of that hardware.
- You may not destroy or vandalize any hardware, cable or service provided by the
campus.
Denial of Service
- You may not disable the network by means of any computer program.
- You may not disable the network by rendering any equipment unusable.
Security Policy
You are responsible for the security of your account. Please read the policy on
passwords. The following are symptoms of unauthorized trespass of your account.
If you become aware of the following please contact the computer security team
at X6460.
- New, unexplained files found in your directory.
- Changes in file lengths or dates.
- Unexplained data modification or deletion.
- Unable to login to your account.
- Suspicious beeps, messages or pictures.
VIOLATION OF THESE POLICIES WILL LEAD TO SUSPENSION OR LOSS OF PRIVILEGE, AND
MAY LEAD TO MORE SERIOUS PENALTIES
By clicking on the words "I Agree" below, you signify that you
have read, understand, and agree to comply with these terms.