Changes

Jump to navigation Jump to search
Line 45: Line 45:  
==Privacy==
 
==Privacy==
 
Employee's are encouraged to use approved software such as Zoom, Google Hangouts, and Slack to collaborate and communicate unclassified information. However there are some privacy issues that need to be recognized before using these applications. It is important to remember that these applications are not to be used for any classified work.  
 
Employee's are encouraged to use approved software such as Zoom, Google Hangouts, and Slack to collaborate and communicate unclassified information. However there are some privacy issues that need to be recognized before using these applications. It is important to remember that these applications are not to be used for any classified work.  
 +
 +
Some general things to consider for increasing privacy on these applications include:
 +
*Enabling two-factor authentication.
 +
*Post/Send things that you do not mind sharing with the employer and employee's.
    
===Slack===
 
===Slack===
Line 55: Line 59:  
Unless a meeting host is using Zoom's encrypted video chat option, the company could have access to the conference.  
 
Unless a meeting host is using Zoom's encrypted video chat option, the company could have access to the conference.  
 
===Google Hangouts===
 
===Google Hangouts===
While there are no glaring privacy concerns with Google Hangouts, it does require a Google account. It is best to use a work account if possible, to avoid details being linked together exposing private interests, and personal activity online when using that Google account. Details such as names, phone numbers, usernames and other information can be pieced together which can be exposed as a single entity.  
+
While there are no glaring privacy concerns with Google Hangouts, it does require a Google account. It is best to use a work account if possible, to avoid details being linked together exposing private interests, and personal activity online when using that Google account. Details such as names, phone numbers, usernames and other information can be pieced together which can be exposed as a single entity.
 +
 
 
== References ==
 
== References ==
 
*[https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2020-03.pdf Secure Teleworking Bulletin - NIST Publication]
 
*[https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2020-03.pdf Secure Teleworking Bulletin - NIST Publication]

Navigation menu

GCwiki