Effective Date: January 22, 2015
Last Reviewed: March 14, 2025
Approval Date: June 17, 2025
Assigning unique individual logins and requiring password protection is one of several primary safeguards employed to restrict access to the Weill Cornell Medicine (WCM) networks, systems, applications, and data. If a password is compromised, inappropriate access might be obtained by an unauthorized individual. Workforce Members are responsible for safeguarding against unauthorized access to WCM accounts, and as such, must conform to this policy in order to ensure passwords are kept confidential and designed to be complex and difficult to guess. This policy is designed to comply with relevant legal and regulatory standards, including but not limited to the Health Insurance Portability and Accountability Act (HIPAA) and the Payment Card Industry Data Security Standard (PCI DSS).
This policy applies to all WCM and WCM-Qatar Workforce Members who utilize WCM information technology resources and those responsible for managing and safeguarding WCM data.
All Workforce Members are responsible for safeguarding Center Wide ID (“CWID”) and password credentials and must comply with the password standards identified in this policy. Passwords must not be used, stored, shared with, or made available to anyone in any manner that is not consistent with this policy.
Hashing: Is a way to change any piece of information into a shorter, unique representation of the original information.
Peppering: Technique used to protect passwords by adding a secret value to each password before it’s stored.
Salting: Technique used to protect passwords by adding a random string of characters to each password before it’s stored.
Workforce Members: Any faculty, staff, students, volunteers, trainees, and other persons whose conduct, in the performance of work for WCM, is under the direction and control of WCM, whether or not they are paid by WCM.
Workforce Members are responsible for keeping passwords secure and confidential. As such, the following principles must be adhered to for creating and safeguarding passwords:
All WCM systems—including, but not limited to, servers, applications, and websites that are hosted by or for WCM—must be able to accept, store, and transmit passwords with proper safeguards following this policy and industry best practices.
The following parameters indicate the minimum requirements for passwords for all accounts (except for passcodes defined in Service Accounts and Test Accounts below):
To create a password that is compliant with the standards specified in this policy, consider creating a passphrase. A passphrase is like a password, but it is generally longer and contains a sequence of words or other text to make the passphrase more memorable. A longer passphrase that is combined with a variety of character types is exponentially harder to breach than a shorter password. However, it is important to note that passphrases that are based on commonly referenced quotes, lyrics, or other sayings are easily guessable. While passphrases should not be famous quotes or phrases, they should also not be unique to the individual, such as city of birth, as this may make them more susceptible to compromise or password-guessing attacks.
Most Workforce Members are not required to change their passwords at fixed intervals. Some account types, such as privileged accounts, must still adhere to regular password changes as defined below.
In all cases, ITS reserves the right to immediately reset or expire an account’s password, without providing prior notice, in the event a compromise is suspected, reported, or confirmed. This helps prevent an attacker from making use of a password that may have been discovered or otherwise disclosed.
Standard accounts consist of members of the WCM community who do not have privileged access to networks, systems, applications.
Privileged accounts have elevated access to administer networks, systems, and applications. These are more valuable targets for threat actors and consequently have a higher risk for compromise.
To limit attempts at guessing passwords or compromising accounts, an account lockout policy is in effect for all systems. Account lockout thresholds and durations vary based on the type of account, as defined below.
Standard accounts have the following lockout policy:
Privileged accounts have the following lockout policy:
Workforce Members responsible for processing payments in WCM’s financial systems, such as Epic, must adhere to the Payment Card Industry’s (PCI) Data Security Standard for account lockout:
Service accounts are used by a system, task, process, or integration for a specific and individual purpose. Test accounts are used on a temporary basis to imitate a role, person, or training sessions. Service and Test accounts have the following lockout policy:
Mobile devices accessing, transmitting, or storing WCM data, such as smartphones and tablets, must be registered with ITS and managed by the mobile device management (MDM) platform.
The following minimum passcode policy is in effect for all mobile devices:
Biometric authentication (e.g., facial or fingerprint recognition) on mobile devices may be used to unlock the device, but a compliant passcode must still be established.
If a password is used in lieu of a passcode, the password must be at least 6 characters.
Pattern unlocks or other authentication methods are not permitted.
A mobile device must be configured to wipe/erase itself after ten (10) invalid passcode attempts. This will result in the device resetting to factory defaults with all applications and data lost in the process. The device manufacturer may automatically impose time limitations after several unsuccessful passcode attempts before the wipe is triggered. ITS Support can provide assistance in resetting device passcodes.
Various options are available to assist Workforce Members with changing a forgotten or expired password. The preferred and fastest method is through the use of MyAccount, the password management system. Workforce Members must be enrolled in multifactor authentication (MFA) and have a personal email address on file in order to use this system to reset their password. A Department Administrator or the ITS Service Desk may assist with updating a personal email address, but Workforce Members must provide proof of identity before any changes are made.
Workforce Members can change or reset their password in the myAccount system. Workforce Members who have forgotten their password will be required to complete extra steps, such as validating their personal email address and acknowledging an MFA prompt.
In the event a password cannot be reset via the myAccount system, Workforce Members must contact the ITS Service Desk using one of the methods below.
Workforce Members who are local to the New York City area can visit the SMARTDesk during normal business hours and present a non-expired, valid photo identification card, such as a driver license, passport, state identification, WCM identification, etc.) and supply a personal email address. ITS may assist the individual with updating their personal email address, initiating the password reset process, or escalating the case if necessary.
Workforce Members who are unable to visit the SMARTDesk in person or use myAccount to perform a self-service reset may conduct a video conference session with the ITS Service Desk if their computer or mobile device is equipped with a camera. Workforce Members must enable their video and be prepared to display a non-expired, valid photo identification card. ITS may assist the individual with updating their personal email address, initiating the password reset process, or escalating the case if necessary.
Workforce Members who believe their password has been compromised or have been asked to provide their password to another individual, including ITS, should promptly notify any of the following support teams:
Filing or reporting a security incident can be done without fear or concern for retaliation.
All WCM Workforce Members are responsible for adhering to this policy. Failure to comply will be evaluated on a case-by-case basis and could lead to corrective action, up to and including termination, consistent with other relevant WCM and University Policies. Instances of non-compliance that potentially involve a lapse of professionalism may lead to engagement of the Office of Professionalism for evaluation and intervention.
Direct any questions about this policy, ITS-500.15 – Password Policy, to the Office of the Chief Information Security Officer, using one of the methods below:
This policy was reviewed and approved by: