THE PRACTICE OF SAFE COMPUTING : INVITED PAPER / PREPARED AND SUBMITTED BY EDUARDO GELBSTEIN
Once inside someone else’s computer or network, they can steal data,
including legitimate passwords, plant malicious code or simply cause chaos by modifying users’ access
names and passwords, corporate data, websites.
36. (...) Memorising multiple passwords becomes a bigger headache unless you create a personal mnemonic
system to assist in this.
(...) Hiding your text or files with a password is a good practice but not necessarily a highly secure one.
Language:English
Score: 990265
-
daccess-ods.un.org/acce...t?open&DS=CES/SEM.47/11&Lang=E
Data Source: ods
PROTECTION OF CONFIDENTIAL DATA IN PRATICAL WORK OF STATE STATISTICAL BODIES OF UKRAINE : SUPPORTING PAPER / SUBMITTED BY THE STATE STATISTICS COMMITTEE OF UKRAINE
Autonomous local networks providing access to databases through separate servers using a
relevant system of passwords, thus eliminating access to the data from the outside, are developed for
the purpose of automated processing of confidential information. In order to ensure sound data
protection, special system tools and programs are used, in particular:
· establishing service units for administration of networks, databases and data security with clear
identification of their functions on the basis of relevant regulations on these units and job
descriptions;
· classification of users of the automated system by set of information, which prevents different users
from working with the same set of data;
· allocation of a unique code to each user and providing users with passwords for authorized access,
coding of user’s passwords (number of symbols in password code and password itself could be
different, thus preventing anyone who may possess the password code, even a system
administrator, from identifying the original password);
· restricting users’ possibilities in employing only those technical operations, which are specified for
corresponding user category (e.g. only users from the group “scanning operator” could start
modules for scanning and recording of document images);
· registration of all user’s requests to databases;
· central storage of copies of primary data at a separate server, putting a ban on downloading
information from databases into PCs, excluding cases requesting implementation of concrete tasks
linked with the technological process.
27.

Language:English
Score: 983443.2
-
daccess-ods.un.org/acce...get?open&DS=CES/2003/32&Lang=E
Data Source: ods
REPORT : CONFERENCE OF THE PARTIES TO THE CONVENTION ON THE TRANSBOUNDARY EFFECTS OF INDUSTRIAL ACCIDENTS : 3RD CONSULTATION AND A TRAINING SESSION FOR POINTS OF CONTACT FOR THE PURPOSE OF ACCIDENT NOTIFICATION AND MUTUAL ASSISTANCE DESIGNATED WITHIN THE UNECE INDUSTRIAL ACCIDENT NOTIFICATION SYSTEM, SIBIU (ROMANIA), 1-3 APRIL 2008
You should receive an e-mail in a few days with a password.
Once you have received your password it is advised that after logging in to the IAN System that you
immediately change your password by clicking on the “Edit Account” link found at the top
navigation section.
(...) Scroll to the bottom of the form and click on the button “Change Password”.
3. Enter your current password in the first box.
4. Enter the new password.
5. Enter the new password again.
6. Press the button to change your password.
Language:English
Score: 977718.4
-
daccess-ods.un.org/acce...CE/CP.TEIA/SEM.6/2008/2&Lang=E
Data Source: ods
REPORTING PURSUANT TO ARTICLE 15 OF THE CONVENTION
Each Party to the Convention has been assigned two individual accounts and passwords in order
to access the electronic system for reporting. (...) The Secretariat has provided the individual user names and passwords of the relevant accounts
to those Parties that have nominated official contact points pursuant to decision SC-2/16 on official
communications with Parties and observers. (...) Four Parties out of the 55 Parties that were provided with individual user identifications and
passwords reported difficulties when trying to use the electronic system for reporting.
Language:English
Score: 977007.2
-
daccess-ods.un.org/acce...n&DS=UNEP/POPS/COP.3/21&Lang=E
Data Source: ods
LINK TO THE EUROSTAT COMEXT DATABASE USING THE ISDN CONNECTION (PILOT PROJECT) : CONTRIBUTED PAPER / SUBMITTED BY THE STATISTICAL OFFICE OF THE REPUBLIC OF SLOVENIA
• Chap protocol is used on the router.
• Usual USERID/Password for the connection to the database.
• Virtual Network Computing (VNC from ATT) is used at the communication server. (...) The user must then enter the usual
USERID/password and if it is correct, he/she can start using the COMEXT program to
access the COMEXT database, which is designed as a user-friendly spreadsheet program
connected to the database.
7. (...) If all information is correct so far, the user is asked to login with the
USERID/password. After a successful login, the user can start using the COMEXT
database.
8.
Language:English
Score: 974880.5
-
daccess-ods.un.org/acce...t?open&DS=CES/SEM.43/31&Lang=E
Data Source: ods
USING THE WEB IN COLLECTING DATA FOR BUSINESS STATISTICS IN FINLAND : INVITED PAPER / SUBMITTED BY STATISTICS FINLAND
Some examples are as follows:
· new user IDs and passwords are given every year (old ones are discarded);
· user IDs and passwords are initially sent in a letter. (...) In less repetitive
surveys, testing with respondents is not viable;
· the persons administering user IDs and passwords must be trained properly. Special
attention should be placed on the design of the administration of user IDs, because each
month there will be 1 to 3 per cent of the respondents who displace their user IDs and
passwords;
· the collection application should allow work to stop and continue later on. (...) User IDs and passwords are stored on a separate directory services server.
Language:English
Score: 973938.7
-
daccess-ods.un.org/acce.../get?open&DS=CES/2005/8&Lang=E
Data Source: ods
On 12 September
2006, when asked by IGO, the Head of the North Africa Desk stated that she had
given the password to her email account to her secretary, the Applicant and the
Translated from French
Case No. (...) At the time the events took place, there was no procedure
governing the use of passwords.
Despite the loopholes in the electronic
security system at UNHCR, neither IGO nor the JDC considered the
hypothesis that the password of the Head of the North Africa Desk had
been misused by someone else.
23. (...) If, as the Applicant maintains,
the fact that he had not installed a screen saver with a password meant that a third
party entering his office could use his computer without his knowledge, the
objection referred to above, that such third party would also have had to know his
supervisor’s password, is equally valid here.
Language:English
Score: 971760.6
-
www.un.org/en/internalj...t/judgments/undt-2011-056e.pdf
Data Source: oaj
FROM THE OPTICAL DISK SYSTEM TO THE OFFICIAL DOCUMENTS SYSTEM (ODS) : STATUS OF IMPLEMENTATION AND EVALUATION / PREPARED BY LOUIS-DOMINIQUE OUEDRAOGO
Since ODS has become fully operational, access to the system has been granted by way of user/subscriber
registration and the allocation of a password. Access to the system is free for staff members of the Secretariat and for
permanent missions, observer missions and other government offices of Member States, within a maximum allotment per
Member State currently set at 40 passwords. Other United Nations system organizations have a very limited number of free
passwords. For other users, access is available on a fee-for-service basis, as prescribed by General Assembly resolution
51/211 F of 15 September 1997 (paras. 29-31).
(...) As of 28 August 2001, the limit on the number
of allocated passwords went up from 10 to 20 per Member State, and it has recently been increased again to 40.
Language:English
Score: 962058.1
-
daccess-ods.un.org/acce...?open&DS=JIU/REP/2003/3&Lang=E
Data Source: ods
REPORT OF THE JOINT INSPECTION UNIT ON "FROM THE OPTICAL DISK SYSTEM TO THE OFFICIAL DOCUMENT SYSTEM (ODS) : STATUS OF IMPLEMENTATION AND EVALUATION" : NOTE / BY THE SECRETARY-GENERAL
Since ODS has become fully operational, access to the system has been granted by way of user/subscriber
registration and the allocation of a password. Access to the system is free for staff members of the Secretariat and for
permanent missions, observer missions and other government offices of Member States, within a maximum allotment per
Member State currently set at 40 passwords. Other United Nations system organizations have a very limited number of free
passwords. For other users, access is available on a fee-for-service basis, as prescribed by General Assembly resolution
51/211 F of 15 September 1997 (paras. 29-31).
(...) As of 28 August 2001, the limit on the number
of allocated passwords went up from 10 to 20 per Member State, and it has recently been increased again to 40.
Language:English
Score: 962058.1
-
daccess-ods.un.org/acce...sf/get?open&DS=A/58/435&Lang=E
Data Source: ods
Later that day,
UNICEF changed the Applicant’s email account password and restricted the
account to receiving and reading emails.
4. (...) The Respondent’s primary contentions may be summarized as follows:
Prima facie unlawfulness
a. Changing the password to access the Applicant’s official email account
and limiting said account to receiving and reading email is not prima facie
unlawful because these decisions resulted from the Applicant sending “highly
inappropriate emails to (all) her UNICEF colleagues in the Private
Fundraising and Partnerships Division (PFP)”;
Case No. (...) Moreover, the matter is moot because appropriate action was taken to
inform the Applicant of how to proceed to reset her password and regain
access to her official email account; and
Urgency and irreparable damage
c.
Language:English
Score: 957517.4
-
www.un.org/en/internalj...s/undt/orders/gva-2018-095.pdf
Data Source: oaj