Skip to main content

Multi-Factor Authentication

Version 1.0

Purpose

The purpose of this policy is to ensure identification verification by using two or more factors to access University IT Resources.

Scope

This IT policy, and all policies referenced herein, shall apply to all members of the University community, including faculty, students, administrative officials, staff, alumni, authorized guests, delegates, and independent contractors (the “User(s)” or “you”) who use, access, or otherwise employ, locally or remotely, the University’s IT Resources, whether individually controlled, shared, stand-alone, or networked.

Policy Statement

  • Users must utilize Multi-Factor Authentication (MFA) to access all IT Resources (e.g., University portal, Blackboard®, email, Google Drive, Zoom®).
  • Users must not share individual account access methods (e.g., DUO passcodes, passwords) with others.
  • Users may authenticate via push notifications to smartphones and tablets, mobile passcode, SMS passcode, telephone callbacks, or hardware tokens. Should these methods not be available to the User, they should contact IT Customer Care at 718-817-3999.
  • The University Information Security Office must approve access to IT Resources that cannot support MFA.

Definitions

IT Resources include computing, networking, communications, application, and telecommunications systems, infrastructure, hardware, software, data, databases, personnel, procedures, physical facilities, cloud-based vendors, Software as a Service (SaaS) vendors, and related materials and services.

Multi-Factor Authentication is an electronic authentication method in which a user is granted access to a website or application only after successfully presenting two or more pieces of evidence to an authentication mechanism: knowledge, possession, and inherence.

Related Policies and Procedures

Implementation Information

Review Frequency: Triennial
Responsible Person: Director, Application Security
Approved By: CISO
Approval Date: August 16, 2021

Revision History

Version: Date: Description:
1.0 08/19/2021 Initial document

Policy Disclaimer Statement

Deviations from policies, procedures, or guidelines published and approved by the University Information Security Office (UISO) may only be done cooperatively between the UISO and the requesting entity with sufficient time to allow for appropriate risk analysis and documentation and possible presentation to authorized University representatives. Failure to adhere to UISO written policies may be met with University sanctions.