Changes

Jump to navigation Jump to search
Line 47: Line 47:  
==Privacy and Security of Collaborative Tools==
 
==Privacy and Security of Collaborative Tools==
 
Employees should always use department-sanctioned tools for collaboration with colleagues, starting with Microsoft Teams (at Protected B if your departmental tenancy has been accredited to that level, or unclassified otherwise), then moving to other sanctioned tools such as GCTools or WebEx. If those options aren’t available, then the [https://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=27122 Policy on Acceptable Network and Device Use] does allow usage of public cloud tools such as Slack, Zoom or Google Hangouts for '''unclassified''' work only. However, there are some privacy issues that need to be recognized before using these applications. It is important to remember that these applications are <u>never</u> to be used for any sensitive or classified work.  
 
Employees should always use department-sanctioned tools for collaboration with colleagues, starting with Microsoft Teams (at Protected B if your departmental tenancy has been accredited to that level, or unclassified otherwise), then moving to other sanctioned tools such as GCTools or WebEx. If those options aren’t available, then the [https://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=27122 Policy on Acceptable Network and Device Use] does allow usage of public cloud tools such as Slack, Zoom or Google Hangouts for '''unclassified''' work only. However, there are some privacy issues that need to be recognized before using these applications. It is important to remember that these applications are <u>never</u> to be used for any sensitive or classified work.  
 +
 +
Settings that can help keep a teleconferencing secure are:
 +
 +
*Disable guest screen sharing
 +
*Require the host to Be present
 +
*Secure the conference with a password
 +
*Enable a "Waiting Room"/Queue type feature, if available
 +
*Keep your personal meeting ID or invites private
    
===Slack===
 
===Slack===
Line 56: Line 64:     
When a meeting is created, Zoom generates a seemingly random ID that is 9 to 11 digits long. For someone with computing resources, this can easily be cracked allowing malicious actors to join the call.  
 
When a meeting is created, Zoom generates a seemingly random ID that is 9 to 11 digits long. For someone with computing resources, this can easily be cracked allowing malicious actors to join the call.  
  −
Settings that can help keep a conference secure are:
  −
  −
*Disable Guest Screen Sharing
  −
*Require the Host to Be Present
  −
*Secure the Conference with a Password
  −
*Enable the "Waiting Room" Feature
  −
*Keep Your Personal Meeting ID Private
      
For more information on using Zoom, please see the guide in the references section or [[:en:images/9/90/EN_-_Starter_guide_for_taking_part_in_a_Zoom_call.pdf|click here]].
 
For more information on using Zoom, please see the guide in the references section or [[:en:images/9/90/EN_-_Starter_guide_for_taking_part_in_a_Zoom_call.pdf|click here]].

Navigation menu

GCwiki