| Line 35: | Line 35: | 
|  | *Public servants are encouraged to verify data retention requirements when using external tools, in accordance with the [https://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=12742 TBS Policy on Information Management]. Some externally provided tools will retain your information even after you have deactivated your account |  | *Public servants are encouraged to verify data retention requirements when using external tools, in accordance with the [https://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=12742 TBS Policy on Information Management]. Some externally provided tools will retain your information even after you have deactivated your account | 
|  |  |  |  | 
| − | ==Heading 3== | + | ==Do's and Don'ts== | 
|  | + | {| class="wikitable" | 
|  | + | |+ | 
|  | + | !Do's | 
|  | + | !Don'ts | 
|  | + | |- | 
|  | + | |Protect your identity by using privacy settings on all tools and devices, and limit the amount of information you provide on your profile page. | 
|  | + | |Never share protected or sensitive information, unless you have express consent from your departmental information technology group. | 
|  | + | |- | 
|  | + | |Use strong authentication mechanisms (for example, multi-factor authentication) where possible to protect from unauthorized access and enable auto-lock of your device. | 
|  | + | |Open unsolicited links, attachments, or when prompted to install any software. If you don’t know the sender or were not expecting to receive a link or attachment, think twice before opening. | 
|  | + | |- | 
|  | + | |Use unique passwords for every account, especially separate passwords for personal and work accounts. | 
|  | + | |Do not re-use the same passwords that are used for your internal corporate credentials. | 
|  | + | |- | 
|  | + | |Be conscious of what you are sharing and with whom and assume that everything you share could be made public | 
|  | + | |Use caution and avoid using untrusted networks or free Wi-Fi.  | 
|  | + | |- | 
|  | + | |Use modern operating systems and web browsers that are maintained with up-to-date software and configured with appropriate hostbased protections.  | 
|  | + | |Never post or share passwords or credentials on web services and tools  | 
|  | + | |- | 
|  | + | |Report any suspicious activity or security incidents so that your departmental security team can address the issue. | 
|  | + | |Do not ignore SSL certificate errors and unsecure (e.g. HTTP) websites  | 
|  | + | |} | 
|  |  |  |  | 
|  | == References == |  | == References == | 
|  | *[[:en:images/0/09/FR_-_Guide_de_démarrage_pour_participer_un_appel_Zoom.pdf|Guide de démarrage pour participer un appel Zoom - FR]] |  | *[[:en:images/0/09/FR_-_Guide_de_démarrage_pour_participer_un_appel_Zoom.pdf|Guide de démarrage pour participer un appel Zoom - FR]] | 
|  | |} |  | |} |