Dop Email Policy V1 0
Dop Email Policy V1 0
The competent authority has approved the Email Policy of Department of Posts (version 1.0) along
with its annexures which is published for information and compliance by all the email users of DoP.
w
\I
IK Balasubramanian]
Qeneral Manager, CEPT
E-mail Policy Of
Department of Posts
October 2015
Version 1.0
Department of Posts
Ministry of Communications & Information Technology
Government of India
New Delhi - 110001
Page 1 of 14
Table of Contents
1. Introduction ................................................................................................. 3
2. Scope ............................................................................................................ 3
3. Objective ...................................................................................................... 3
GLOSSARY .......................................................................................................... 12
Page 2 of 14
1. Introduction:
1.1 Email communication that includes data transmission between users,[1] located
both within the country and outside, is being widely used by the Department of
Posts [DoP] as an official communication.
1.2 Through this document the DoP is laying down the “E-mail Policy”[2] for “DoP e-
mail Services”[3] . The Implementing Agency (IA)[4] for the DoP email service shall
be CSI Vendor of India Post IT Modernization Project.
2. Scope:
2.1 All government employees working within the DoP shall use DoP email services for
all the official communication apart from the written official communication. The
use of e-mail service of other private service providers shall be strictly limited to
unofficial/personal communication and shall not be used for any official
communication.
2.2. This email policy shall be applicable to all those employees of the Department of
Posts who have been provided with an official email ID under India Post Domain
i.e. email id ending with @indiapost.gov.in and those who use the email services
of the department. The directives contained in this policy are to be followed by all
such employees without any exception.
3. Objective:
3.1 The objective of this policy is to ensure secure access and usage of DoP e-mail
services by its users[1]. Users have the responsibility to use this resource in an
efficient, effective, lawful and ethical manner. Use of the DoP e-mail service
amounts to the user's agreement to be governed by this policy.
3.2 All services under e-mail are offered free of cost to the employees of the DoP.
More information about the DoP Email Services are annexed (Annexure -1) to this
“Email Policy”.
3.3 This policy supersedes any other email policy previously laid down by the DoP.
Page 3 of 14
4. Roles specified for implementation of the Policy:
4.1 The following roles are specified in DoP with regard to email services. The
individual identified for the task will be responsible for the management of the
entire user base configured under the India Post domain.
4.1.1 Competent Authority[5]: An officer nominated for this purpose by the
Department of Posts.
4.1.2 Designated Nodal Officer[6]: An officer nominated by the Competent
Authority.
4.1.3 Controlling Officer[7]: An officer who is immediate superior/reporting
officer/disciplinary authority for the user.
4.1.4 Implementing Agency (IA)[4]: IA for DoP email service is CSI Vendor
of IT Modernization Project of DoP.
5.1 Security:
5.1.1 Considering the security concerns, there shall be single official email
service of Department of Posts under India Post domain and all official
communications should be exchanged through official email id only.
ii. Use of ‘Digital Signature Certificate (DSC)’ [8] and ‘E-mail Encryption’[9]
shall be mandatory for sending e-mails deemed as classified and
sensitive in accordance with relevant policies of Ministry of Home
Affairs.
Page 4 of 14
iv. Users shall not download/forward/redirect e-mails from their official
e-mail account, configured on the DoP mail server, to their personal
email accounts outside DoP email servers.
x. The email ids of DoP email service must not be used to subscribe to
any service or any website other than the GoI websites & services
because non GoI websites may try to flood the inbox with mails
which may contain viruses, Trojans, worms/other unsafe contents or
spammers may try to send bulk SPAM.
Page 5 of 14
xi. Auto-save of password in the DoP e-mail service shall not be
permitted due to security reasons.
5.3.1 All users accessing the DoP e-mail services must adhere to the “Password
Policy” for setting a password to their email account which guarantees
their mail account are more secured. More details about the Password
Policy are annexed (Annexure -3) to this “E-mail Policy”.
5.4 Privacy:
5.4.1 Users should ensure that official e-mails of the DoP are kept confidential.
Users must also ensure that information regarding their password or any
other personal information which may lead to the compromise of the
email account is not shared with anyone.
6. Responsibilities of DoP:
6.1.2 Nodal officer shall ensure resolution of all incidents related to the
security aspects of the e-mail policy through IA.
6.1.3 The training wing of DoP shall ensure that training and awareness
programs on e-mail security are organized at regular intervals.
Implementing Agency shall provide the required support.
Page 6 of 14
6.2 Policy Dissemination:
6.2.1 Email Policy dissemination activity involves distribution of the policy and
all its relevant documents to the respective users. Competent Authority
should ensure dissemination of the e-mail policy.
6.2.2 The email policy should be made available to the users for viewing
/download. Read only access should be given to the intended users.
7. Responsibilities of Users:
7.1.2 The email service should not be put to any use which is considered
inappropriate or impinges on National Security or violates any policy of
the Department of Posts and/or GoI. Examples of inappropriate uses are:
Page 7 of 14
iii. Unauthorized access of the services. This includes, for example, the
distribution of e-mails anonymously, use of other officers' user ids or
using a false identity.
viii. Use or attempt to use the email accounts of other users without their
permission.
xi. Use of ‘Distribution Lists’ [13] for the purpose of sending e-mails that
are personal in nature, such as personal functions etc.
7.2.1 The User is responsible for any data/e-mail that is transmitted using
his/her email account over the DoP e-mail system. All e-mails/data sent
through the mail server are the sole responsibility of the user owning the
email account used for sending it.
7.2.3 Each individual is responsible for his/her email account, including the
safeguarding of access to the email account. An email originating from
an account is deemed to be authorized by the email account owner. It is
the responsibility of the email account owner to ensure compliance with
DoP email Policy guidelines.
Page 8 of 14
7.2.4 The user’s responsibility shall extend to the following:
i. Users shall be responsible for the activities carried out on their client
systems/other systems, using the email accounts assigned to them.
ii. The ‘reply all’ and the use of ‘distribution lists’ should be used with
caution to reduce the risk of sending e-mails to wrong people.
v. Users shall not delete any email conversation in their functional email
ids provided to their designation once they get transfer orders or at
the time of their retirement, to ensure that the institutional memory,
in the form of emails in their functional email id is passed on to the
next incumbent.
8.1 The IA shall provide the e-mail services to the DoP based on the “Service
Level Agreement (SLA)” as per the contract.
9.2 The Department of Posts will provide the necessary cooperation to such agencies
when approached through authorized channel. The consent of the user in this
regard shall not be taken.
9.3 The IA shall neither accept nor act on the request from any other organization,
save as provided in this clause, for scrutiny of e-mails or release of logs.
Page 9 of 14
10. Security Incident Management Process:
10.2 A security incident is defined as any adverse event which occurs on any part of
the email services and that can impact the availability, integrity, confidentiality
and authority of Government data. Security incidents can be due to factors like
compromise of a user account, spread of SPAM[14]/Virus that affects the system &
service. Detection of a Phishing[15] site of the email service of DoP, Loss of a
portable storage media containing government data, violation of policy thereby
causing a security breach, other consequences affecting security of email services
etc.
10.3 DoP through the IA reserves the right to deactivate/remove any feature of the
Email service if it is deemed as a threat and can lead to a compromise of the
service.
11.1 Material accessible through the DoP e-mail service and resources may be subject
to protection under privacy, publicity or other personal rights and intellectual
property rights, including but not limited to, copyrights and laws protecting
patents, trademarks, trade secrets or other proprietary information. Users shall
not use the Government service and resources in any manner that would
infringe, dilute, misappropriate, or otherwise violate any such rights.
12. Enforcement:
12.1 This “E-mail Policy” is applicable to all employees of DoP & those who uses the
DoP email services as specified in clause 2.2.
12.2 It is mandatory for all users to adhere to the guidelines of this policy without
exception. Violation of this Policy will amount to misconduct under CCS (Conduct)
Rules.
Page 10 of 14
12.3 DoP shall be responsible for ensuring compliance with the provisions of this policy.
The Implementing Agency would provide necessary technical assistance in this
regard.
13.1 For any exception/deviation, the user shall take approval from the Competent
Authority of DoP. The request will be processed through the Service Desk being
operated by IA and will be executed only after approval from the Competent
Authority of DoP.
14.1 The competent authority shall ensure that security audit of DoP email services is
conducted periodically by an agency empaneled by the Government of India.
15. Review:
15.1 This Policy shall be reviewed at the time of any change in the IT environment or
once every year, whichever is earlier. The review shall be carried out for
assessing the following:
15.1.1 Impact on the risk profile due to, but not limited to, the changes in the
deployed technology/network security architecture, regulatory and/or
legal requirements.
15.2 This review shall be made by DoP Competent Authority in consultation with
various stakeholders as deemed necessary. As a result of the review, the existing
policy may be updated or modified.
===/===
Page 11 of 14
List of Annexures
GLOSSARY
SL Term Definition
Refers to DoP employees and those who are accessing the DoP email
1 Users
services.
Refers to the Policy document that lays down the guidelines with respect
2 Email Policy
to use of e-mail services.
Implementing For the purpose of this policy, the implementing agency is CSI Vendor of
4 Agency (IA) IT Modernization Project of DoP.
Officer responsible for taking and approving all decisions relating to DoP
Competent
5 email services which will be nominated for this purpose by the
Authority
Department of Posts.
Officer responsible for all matters relating to this policy who will
6 Nodal Officer coordinate on behalf of DoP. It will be nominated by Competent
Authority.
Page 12 of 14
Email encryption is encryption (a process of encoding messaged or
information in such a way that only authorized person can read it) of
9 Email Encryption email messages to protect the content from being read by other entities
than the intended recipients. Email encryption may also include
authentication.
An user can be sure that his/her email account has been compromised if
he/she experiences the following issues :
Refers to a list of more than one email ids grouped for convenience in
sending mails. Using distribution list a user can send a particular mail to
13 Distribution List
more than one email ids using the list name. Mail will be sent to all the
email ids listed under a particular distribution list.
Phishing e-mails will almost always tell a user to click a link that takes
the user to a site from where the personal information is requested.
Legitimate organizations would never request this information via e-
mail. Users should never click on a link. A user should always type a URL
in the browser even if the link appears genuine.
Page 13 of 14
END OF DOCUMENT
Page 14 of 14
Annexure 1 to DoP Email Policy V.1.0
Department of Posts (DoP) provides a range of services under “DoP email services” to its users.
Key services offered are:
1. E-mail Services: DoP provides the E-mail services to its users to send and receive
emails from anywhere in the internet space and / or within DoP Intranet.
1.1 However Users shall note that the size of the Mail Box over DoP Mail Server
is limited to 100 MB only and hence users, in order to manage the mail
exchanges within the allocated size, shall configure Outlook Client
(available along with MS Office Suite) to their mail box. Users shall ensure
that all mail exchanges is available in the respective Outlook Data file.
1.2 User shall also ensure that periodical backup of the Outlook Data file is
taken and kept in a secured manner to avoid loss of email messages in the
event of any unforeseen irreparable damage to the Desktop/laptop in which
the mail box is configured to Outlook Client. In such circumstances the
email messages can be restored from the backed up Outlook Data file.
Users are recommended to take weekly backup of the Outlook Data file.
2. Instant Messaging: DoP provides the Instant Messaging services to its users coupled
with the email service. User of DoP email services will be able to send instant messages
to a single individual user or to a group of users. Users will also be able to send and
receive files from within IM conversations.
Page 1 of 3
4. Mail Gateway Service: Gateway services offered by DoP through CSI vendor ensures
that any mail traffic, whether inbound or outbound from DoP Mail Servers, shall be
scanned by the DoP SMTP gateways for scrubbing for any possible SPAM, Malwares,
Trojans & Viruses. This is extremely necessary as scanning of traffic ensures that
infections do not reach the DoP network. This also enables DoP for content management
of the messages being exchanged.
5. Email Distribution List Services: This service is offered using the concept of
Distribution Lists (DLs). A DL enables an user to send mails to all email ids which are
members of the DL using the DL email id instead of individual email ids. Users of DoP
email services may avail this service to create customized distribution lists based on their
requirements. This service allows the end user to manage their own customized DLs
locally at their account level. Additionally standard server level DLs viz. All CPMG, All
PMG, All DPS etc. has also been created and rights to use these DLs are being allowed
on need basis after request from the user concerned. Users may send mails for rights
to use a particular server level DL to IA’s Service Desk.
6. Secure Authentication: For the purpose of secure authentication, users of DoP email
services may use Digital Signature Certificate (DSC).
9. Forgot Password: In order to empower a user to reset his / her password, IA will
provide the “Forgot password” service. This service allows a user to reset the password
without the intervention of IA’s Support / Service Desk.
10. Calendar Service: This service enables users to record events and tasks, share
calendar with others, view others’ calendars, invite other calendar users to events and
set reminders and notifications for an event.
11. SMS and Email notification alerts: IA will send the following notifications:
Page 2 of 3
11.1 SMS Alerts: In case a password compromise of an user id is detected, a
SMS alerts will be send on the registered mobile number of the user. This
is done, as security regarding a critical service like Messaging is extremely
important. If a user does not follow the instructions given in the SMS even
after 5 alerts the password shall be reset by the IA. The user will need to
call the IA’s Service Desk to get a new password or use the “Forgot
Password” option to set a new password.
11.2 Email alerts: In case 3 failed login attempts are detected for an user id
an email will be sent containing the IP details, Location and Time Stamp of
the failed attempts. This mail is to be sent to alert the user as these
attempts may be efforts by unauthorized person to compromise the
password.
=== /= ==
Page 3 of 3
Annexure 2 to DoP Email Policy V.1.0
October 2015
Version 1.0
Department of Posts
Ministry of Communications & Information Technology
Government of India
New Delhi - 110001
Page 1 of 15
Table of Contents
1. Introduction ..................................................................................................... 3
GLOSSARY ................................................................................................................ 14
Page 2 of 15
1. Introduction:
2.1.1 Email IDs (Name Based) will be created for all employees of DoP under Group
‘A’ & Group ‘B’ (Gazetted) and Inspector Posts category.
2.1.2 For other categories of employees the name based email IDs will be created on
need basis.
2.1.3 Functional Email Ids (Designation Based) shall be created for all the standard
designations available in the department. Other functional email ids shall also
be created on need basis.
2.1.4 Email accounts shall also be created for all the functional units like Post Offices
and RMS Offices.
2.1.5 Accounts for “Outsourced / Contractual Employees”[1] shall also be created after
due authorization from the competent authority. These accounts will be created
with a predefined expiry date and shall be governed by the “Email Policy of
Department of Posts”.
2.2.1 An e-mail account will be created upon user request by filling out the prescribed
“Email Account Creation Form” (Annexure 2A) and sending it to the Nodal
Officer. The details of Nodal Officer & manner of submission of form will be
furnished on the email website and on the said form. The Nodal Officer shall
authorize creation of new e-mail accounts.
Page 3 of 15
2.2.2 Forms should be complete in all respects for the account to be created. After
authorization, Nodal Officer will send this form to IA for creation of email
account.
2.2.3 Upon creation of the email account, the IA will store the documents in a secured
manner as per the workflow notified.
2.2.4 Time taken to create a single account by IA is one working day. For bulk
creation of accounts (up to 20) IA will take a maximum of 2 working days and
if the list of accounts to be created exceeds 100, IA can take up to a maximum
of 5 working days to create all the accounts.
2.2.5 The email account is created based on “E-mail Addressing Policy of Department
of Posts” given below :
2.2.5.1 Name Based email IDs will be created with their first name and last
name separated by a dot (.) for example,
[email protected]. Email will not contain the
middle name of the employee. However the Display Name of the email
Id will be the complete name of the employee.
2.2.5.2 In case, more than one Group A / Group B employee exists with same
name, numerals will be put after the first name, for example,
[email protected].
2.2.5.4 Employees who already have by name email IDs (migrated from NIC
servers to DoP servers) have the option to retain the existing email
ID or switch over to new email Id as per the new naming policy.
2.2.5.5 The various categories of functional email ids (e.g. Designation based,
Office based, specific purpose based etc.) will be created with easy to
understand nomenclature and Display Name.
Page 4 of 15
2.3 Process of Handover of Functional E-mail Ids:
2.3.1 The Functional E-mail Id (Designation Based, Office Based, Unit based, Specific
Purpose etc.) should be handed over by the user to their successor prior to
moving out of the office. The word “handover” implies that the user will supply
not only the ‘email login credentials’ but also the latest backed up ‘outlook data
file’ in restorable condition, wherever the id was configured to the MS Outlook,
to the successor prior to moving out of the office.
2.3.2 The successor shall need to get the password reset and outlook data file
restored, wherever applicable, after taking over the post.
2.3.3 The Relieving Officer [in case no substitute is posted, the immediate
subordinate authority with whom the charge of the office is going to rest] need
to ensure that the assigned email id along with login credentials and respective
latest Outlook data file, wherever applicable, is handed over and due mention
to this effect shall be made in the Charge Report.
2.3.5 However the user can continue to use his/her by name email id during his/her
entire service/tenure in Department of Posts.
2.3.6 In case on transfer and/or moving from one position to another, user shall
notify such move so that the sender is aware of such change.
2.3.7 In respect of ‘by name’ email id, if user on transfer and after relinquishing
charge receives any mail related to the previous post held, he/ she should
transfer the mail to the successor without fail and delay.
2.4.1 Users are responsible for e-mails saved in their folders as they deem
appropriate for e.g. Inbox, Sent Mail, any other folder created by the user. E-
mails shall be automatically purged from “Junk Email\Trash” and “Probably
Spam” folders after a specified time period by the IA.
Page 5 of 15
2.4.2 Department of Posts reserves the right to revise the above retention policy with
appropriate approvals and advance notice to the users.
2.5.1 The backup of the email data available at Data Centre shall be done on a regular
basis as per the DoP Backup Policy by the IA to ensure timely recovery from a
system failure/crash/loss impacting the service.
2.5.2 However each user is responsible for the individual emails stored in their
desktops or in the relevant webmail folders. The DoP will not be responsible for
any accidental deletion of e-mails by the user either stored in their desktops or
by accessing their mail account stored in the email server.
2.5.3 E-mails lost as a result of wrong configuration of the local mail clients (e.g.
Outlook/Eudora/Thunderbird etc.) will not be the responsibility of the DoP and
it does not offer any service for restoration of lost data due to an action
committed by the user. Hence users shall take due precaution.
2.6.1 Spam filters and anti-virus filters have been configured at the e-mail gateways
by the IA. These filters are there to protect the e-mail setup from viruses and
unsolicited e-mails. Whilst these filters are constantly updated, the IA cannot
guarantee that it shall provide 100% protection against all viruses and spam.
Hence users are advised to mark as Junk or SPAM using this option available in
the email application, if they consider so, any mail received in their mail box
and also forward such mails to [email protected] for further
necessary action by IA.
Page 6 of 15
2.6.3 If email clients like outlook, thunderbird etc. are used, the user should take
proper care of the desktop/laptop/mobile or other device in such a way that
he/she shall comply with the terms and conditions of the DOP email Policy.
2.7.1 In case of threat to the security of the Government service, the e-mail id being
used to impact the service may be suspended or deactivated immediately by
the IA. Subsequent to deactivation, the concerned user and the competent
authority/nodal officer shall be informed.
2.7.2 A user account will be deactivated under the following circumstances and
handled as stated below:
i. The officer retires from service: The officer would need to surrender
his/her name based email account prior to getting relieved from the service.
The IA based on the DoB given in the service book should identify the date
of superannuation. However in case of resignation and voluntary retirement
it is mandatory for the officer to inform the implementing agency of his/her
resignation/voluntary retirement at least one week before the date of
voluntary retirement/resignation.
Page 7 of 15
ii. The officer resigns from service: The officer would need to surrender
his/her name based email account prior to getting relieved from the
service. Department of Posts will introduce a component of getting
clearance from the Nodal Officer identified for the purpose of e-mail
service as part of their “No-Dues” form that is submitted by the individual
prior to his/her resignation.
iv. Inactive Account: Any account which is inactive for a period of 90 days
will be deactivated. The user id along with the data will be removed from
the e-mail system after a period of 180 days & archived, if no request for
activation is received during this period. Subsequently, all formalities will
need to be completed for reopening of the said account with the same
ID, subject to availability. In such cases, data from the backup may not
be restored.
2.7.3 Based on the conditions above, and as per the status of the officer, Competent
Authority shall introduce a process to ensure that e-mail id is either
deactivated/password changed, prior to giving “no-dues” to a user.
2.8.1 The implementing agency would take action and accordingly change the user’s
by name email account status as “Superannuated/Resigned” as the case may
be, after receiving the information and/or based on the data available in the
system, with effect from date next to the date of superannuation/Resignation
and without waiting for the completion of the retention period. The Controlling
Officer should confirm from the IA before giving a No-Due certificate to the
officer and the retirement benefits are processed.
Page 8 of 15
2.8.2 The functional email ids assigned to the officer superannuating/retiring shall
be processed as mentioned in Para 2.3 above.
3. Recommended Best Practices: Users are advised to adopt the following best practices for
safe usage of e-mail services:
3.1 All users must check their last login details while accessing their e-mail accounts by
using the application created for this purpose. More details are available in Annexure -
1 to the DoP Email Policy. This application helps in making users aware of any
unauthorized access to their account.
3.2 Users are strongly recommended to change their passwords on a periodic basis or as
per the Password Policy.
3.3 Users must logout from their mail accounts whenever they leave the computer
unattended for a considerable period of time. The user should log out from web based
services like web email before closing the browser session. The email application has
an auto logout feature that is triggered after a pre-defined period of inactivity.
3.4 The files downloaded from the internet or accessed from the portable storage media
should be scanned for malicious contents before use. To ensure integrity of the
downloaded files, digital signatures/hash values should be verified wherever possible.
3.5 Before accepting an SSL[2] Certificate, the user should verify the authenticity of the
certificate. User should type the complete URL[3] for accessing the emails rather than
click on a mail link for access. This is recommended to avoid phishing attacks.
3.6 Users should disregard any mail that requests details like login ID and password and
should refrain from sharing such details over mail or otherwise with anyone.
3.7 After completing the activity in the current web based application, the browser session
should be closed.
3.8 Emails identified as SPAM are delivered in the “Probably Spam” folder that exists in the
user’s mail box. Hence, users are advised to check the “Probably Spam” folder on a
daily basis.
Page 9 of 15
3.9 Sending an email with an infected attachment is the most common means adopted by
a hacker to send malicious content. Hence it is mandatory to install and maintain anti-
virus software on the computer to prevent infection from USB drives, CDs or DVDs. It
is also mandatory to ensure that the desktop operating system has the latest operating
system patches for all software loaded. Such anti-viruses must be updated regularly.
All attachments must be scanned with an anti-virus program before they are
downloaded / executed, even if such e-mails are received from a familiar source.
3.10 Attachments should be opened only when the user is sure of the nature of the email.
If any doubt exists, the user should contact the sender to verify the authenticity of the
e-mail and/or the attachment.
3.11 It is strongly recommended that the users use the latest version of their internet
browser for safe browsing. The “save password” and auto complete features of the
browser should be disabled.
3.12 User should exercise caution while forwarding mails as they may contain malware.
User should ensure authenticity of the source and safe nature of the attachments
before forwarding any mail.
3.13 User should use due discretion while creating classified and sensitive document. Unless
required otherwise, the documents should be created in a manner that it cannot be
edited.
3.15 User should exercise caution in opening mails where links are embedded in the mail.
The authenticity and the safe nature of the link should be ascertained before clicking
the link.
3.17 Users should take periodical (recommended weekly) backup of the Outlook Data file of
their mail box and keep it in such a secured manner so that it can be used for
restoration of email messages in the event of any unforeseen irreparable damage to
the Desktop/laptop in which the mail box is configured to Outlook Client.
===/===
Page 10 of 15
Annexure 2A
GOVERNMENT OF INDIA
MINISTRY OF INFORMATION & COMMUNICATION TECHNOLOGY
DEPARTMENT OF POSTS
Application Form for Creation of Email Account over India Post Domain
a) First Name:…………………………………………………………………………………………………………
b) Middle Name:………………………………………………………………………………………………………
c) Last Name:…………………………………………………………………………………………………………
v. Designation:……………………………………………………………………………………………………………..
……………………………………………………………………………………………………………………………….
5. Circle Name:……….................................................................................................................
8. Remarks, if any:……………………………………………………………………………………………………………….
9. Declaration: This is to declare that I have read & understand the Email Policy of Department of
Posts along with its Annexures (revised from time to time) and I agree to be abide by it.
(Signature of Applicant)
Designation Seal of Applicant:………………………….
Page 11 of 15
For Use by Controlling Officer:
……………………………………………………………………………………………………………………………………….
11. It is certified that all the details mentioned by the applicant is correct as per records.
………………………………………………………………………………………………………………………………………..
………………………………………………………………………………………………………………………………………..
20. Status in respect of Other Action Items along with Date: ………………………………………………………
Page 12 of 15
Guidelines / Terms & Conditions
1. All concerned may please use only CAPITAL LETTERS while filling up this form.
3. The nomenclature & display name of the email id shall be decided by the Nodal Officer based on the
current email policy. Applicant may refer to the email policy for details.
5. The User shall be abide by all the terms & conditions of the DoP Email Policy revised from time to
time without any exception unless an exception is otherwise approved by the Competent Authority.
===/===
Page 13 of 15
GLOSSARY
Sl Term Definition
The Secure Socket Layer (SSL) is the most widely deployed security
protocol used today. It is essentially a protocol that provides a secure
channel between two machines operating over the Internet or an internal
2 SSL
network. In today’s Internet focused world, the SSL protocol is typically
used when a web browser needs to securely connect to a web server over
the inherently insecure Internet.
Page 14 of 15
END OF DOUCMENT
Page 15 of 15
Annexure - 3 to the DoP Email Policy V.1.0
1. Purpose: The purpose of this policy is to establish a standard for creation of strong passwords,
the protection of those passwords, and the frequency of change of the passwords.
2. Scope: The scope of this policy includes all end-users of DoP email services and personnel who
have or are responsible for an account (or any form of access that supports or requires a
password) on any system/service in the India Post domain. These include personnel with
their designated desktop systems/laptops. The scope also includes designers and
developers of individual applications.
3. Policy:
3.1.1.1 Users shall be responsible for all activity performed with their
personal user Ids. Users shall not permit others to perform any
activity with their user Ids or perform any activity with Ids belonging
to other users.
3.1.1.2 All user-level passwords (e.g. email, web, desktop computer etc.)
shall be changed periodically. Presently the email password expiry
period is configured as 90 days. Similar expiry limit will be imposed
on other applications in future. The IA of the respective application
will suitably notify to the users about expiry of the password well in
advance. In such case the users are required to change the
password. Users shall not be able to reuse previous passwords.
3.1.1.4 For Password Change Control, both the old and new passwords are
required to be given whenever a password change is required.
Page 1 of 4
3.1.1.6 All access codes including user ID passwords, network passwords,
PINs etc. shall be treated as sensitive and confidential information
and not be shared with anyone, including personal assistants or
secretaries.
3.1.1.11 The same password shall not be used for each of the systems /
applications to which an user has been granted access e.g. separate
password to be used for a Windows account and an UNIX account.
3.1.1.13 Users shall refuse all offers by software to place a cookies on their
computer such that they can automatically log on the next time when
they visit a particular Internet site.
3.1.1.17 Users must not be able to reuse their last 5 passwords when choosing
a new password.
3.1.1.18 Users must be locked out for next 30 minutes after 5 successive failed
logon attempts due to incorrect user id/password.
Page 2 of 4
3.1.1.19 Password should comply with the standards as specified in Para 3.2.
3.1.2.1 No password shall be traveling in clear text; the hashed form of the
password should be used. To get around the possibility of replay of
the hashed password, it shall be used along with a randomization
parameter.
3.1.2.2 The backend database shall store hash of the individual passwords
and never passwords in readable form.
3.1.2.3 Password should comply with the standards as specified in Para 3.2.
3.1.2.5 For Password Change Control, both the old and new passwords are
required to be given whenever a password change is required.
3.2 Policy for constructing a password: All user-level and system-level passwords
must conform to the following general guidelines described below:
3.2.2 The password shall be a combination of upper and lower case characters
(e.g. a-z, A-Z), digits (e.g. 0-9) and punctuation characters as well and
other characters (e.g., !@# $%^&*()_+|~-=\`{}[]:";'<>?,./).
3.2.3 The password shall not be a word found in a dictionary (English or foreign).
3.2.4 The password shall never be the same as the Login Id / User Name as well
as not be a derivative of the user ID, e.g. <username>123. It should also
not contain the user's account name or parts of the user's full name that
exceed two consecutive characters.
3.2.6 The password shall not be a common usage word such as names of family,
pets, friends, co-workers, fantasy characters etc.
3.2.7 The password shall not be based on computer terms and names,
commands, sites, companies, hardware and software.
3.2.8 The password shall not be based on birthdays and other personal
information such as addresses and phone numbers.
Page 3 of 4
3.2.9 The password shall not be a word or number pattern like aaabbb, qwerty,
zyxwvuts, 123321 etc. or any of the above spelled backwards.
3.2.10 The password shall not be any of the above preceded or followed by a digit
(e.g., secret1, 1secret).
3.2.11 Passwords shall not be such that they combine a set of characters that do
not change with a set of characters that predictably change.
3.3 Suggestions for choosing passwords: Passwords may be chosen such that they
are difficult-to-guess yet easy-to-remember. Methods such as the following may be
employed:
3.3.2 Transform a regular word according to a specific method e.g. making every
other letter a number reflecting its position in the word.
3.3.4 Create acronyms from words in a song, a poem or any other known
sequence of words.
3.3.6 Shift a word up, down, left or right one row on the keyboard.
4 Responsibilities:
4.1 All individual users having accounts for accessing systems/services in the India
Post domain and system/network administrators of DoP servers/network
equipments shall ensure implementation of and compliance to this policy.
5 Compliance:
5.1 Personnel authorized as Internal Audit shall periodically review the adequacy of such
controls and their compliance.
5.2 Personnel authorized as Application Audit shall check respective applications for
password complexity and password policy incorporation.
===/===
Page 4 of 4