Changes

Line 25: Line 25:  
From an IT Security standpoint, connections to external tools and services carry the same risks as other connections to the
 
From an IT Security standpoint, connections to external tools and services carry the same risks as other connections to the
 
internet. However, departments should take into account that usage of these sites may require some form of identification of the individual and consequently, their association with an organization (e.g. a GC department or agency).
 
internet. However, departments should take into account that usage of these sites may require some form of identification of the individual and consequently, their association with an organization (e.g. a GC department or agency).
 +
 +
Departments should consider the following:
 +
 +
*Posting of information on external tools and web services will likely divulge the origin of the
 +
information;
 +
*All information posted on the internet, regardless of the amount of time it is available, is effectively
 +
permanently recorded. There are no control provisions for any information once posted;
 +
*The nature of external tools and web services like social networking sites makes them appealing
 +
targets for malicious exploitation. These sites are inherently prone to malicious users providing links to
 +
malware content that can propagate to a department’s infrastructure;
 +
*Content on external tools such as Trello, Slack etc. may be stored on servers located outside Canada
 +
thus the content along with associated user metadata can be monitored by non-Canadian and /or
 +
third party products, services or businesses;
 +
*Everything that is shared using external tools and web services could be subject to Access to
 +
Information and Privacy (ATIP). Public servants must ensure that information related to the mandate
 +
of the organisation and/or contains decisions on government activities is properly captured and
 +
managed, following information management best practices; and
 +
*Public servants are encouraged to verify data retention requirements when using external tools, in
 +
accordance with the TBS Policy on Information Management. Some externally provided tools will
 +
retain your information even after you have deactivated your account
    
==Heading 3==
 
==Heading 3==