| Line 25: | Line 25: | 
|  | From an IT Security standpoint, connections to external tools and services carry the same risks as other connections to the |  | From an IT Security standpoint, connections to external tools and services carry the same risks as other connections to the | 
|  | internet. However, departments should take into account that usage of these sites may require some form of identification of the individual and consequently, their association with an organization (e.g. a GC department or agency). |  | internet. However, departments should take into account that usage of these sites may require some form of identification of the individual and consequently, their association with an organization (e.g. a GC department or agency). | 
|  | + |  | 
|  | + | Departments should consider the following: | 
|  | + |  | 
|  | + | *Posting of information on external tools and web services will likely divulge the origin of the | 
|  | + | information; | 
|  | + | *All information posted on the internet, regardless of the amount of time it is available, is effectively | 
|  | + | permanently recorded. There are no control provisions for any information once posted; | 
|  | + | *The nature of external tools and web services like social networking sites makes them appealing | 
|  | + | targets for malicious exploitation. These sites are inherently prone to malicious users providing links to | 
|  | + | malware content that can propagate to a department’s infrastructure;  | 
|  | + | *Content on external tools such as Trello, Slack etc. may be stored on servers located outside Canada | 
|  | + | thus the content along with associated user metadata can be monitored by non-Canadian and /or | 
|  | + | third party products, services or businesses; | 
|  | + | *Everything that is shared using external tools and web services could be subject to Access to | 
|  | + | Information and Privacy (ATIP). Public servants must ensure that information related to the mandate | 
|  | + | of the organisation and/or contains decisions on government activities is properly captured and | 
|  | + | managed, following information management best practices; and  | 
|  | + | *Public servants are encouraged to verify data retention requirements when using external tools, in | 
|  | + | accordance with the TBS Policy on Information Management. Some externally provided tools will | 
|  | + | retain your information even after you have deactivated your account | 
|  |  |  |  | 
|  | ==Heading 3== |  | ==Heading 3== |