Line 35: |
Line 35: |
| *Public servants are encouraged to verify data retention requirements when using external tools, in accordance with the [https://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=12742 TBS Policy on Information Management]. Some externally provided tools will retain your information even after you have deactivated your account | | *Public servants are encouraged to verify data retention requirements when using external tools, in accordance with the [https://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=12742 TBS Policy on Information Management]. Some externally provided tools will retain your information even after you have deactivated your account |
| | | |
− | ==Heading 3== | + | ==Do's and Don'ts== |
| + | {| class="wikitable" |
| + | |+ |
| + | !Do's |
| + | !Don'ts |
| + | |- |
| + | |Protect your identity by using privacy settings on all tools and devices, and limit the amount of information you provide on your profile page. |
| + | |Never share protected or sensitive information, unless you have express consent from your departmental information technology group. |
| + | |- |
| + | |Use strong authentication mechanisms (for example, multi-factor authentication) where possible to protect from unauthorized access and enable auto-lock of your device. |
| + | |Open unsolicited links, attachments, or when prompted to install any software. If you don’t know the sender or were not expecting to receive a link or attachment, think twice before opening. |
| + | |- |
| + | |Use unique passwords for every account, especially separate passwords for personal and work accounts. |
| + | |Do not re-use the same passwords that are used for your internal corporate credentials. |
| + | |- |
| + | |Be conscious of what you are sharing and with whom and assume that everything you share could be made public |
| + | |Use caution and avoid using untrusted networks or free Wi-Fi. |
| + | |- |
| + | |Use modern operating systems and web browsers that are maintained with up-to-date software and configured with appropriate hostbased protections. |
| + | |Never post or share passwords or credentials on web services and tools |
| + | |- |
| + | |Report any suspicious activity or security incidents so that your departmental security team can address the issue. |
| + | |Do not ignore SSL certificate errors and unsecure (e.g. HTTP) websites |
| + | |} |
| | | |
| == References == | | == References == |
| *[[:en:images/0/09/FR_-_Guide_de_démarrage_pour_participer_un_appel_Zoom.pdf|Guide de démarrage pour participer un appel Zoom - FR]] | | *[[:en:images/0/09/FR_-_Guide_de_démarrage_pour_participer_un_appel_Zoom.pdf|Guide de démarrage pour participer un appel Zoom - FR]] |
| |} | | |} |