Changes

no edit summary
Line 1: Line 1:  
__NOTOC__
 
__NOTOC__
   
[[File:telework-nobg.png|top|center|frameless]]
 
[[File:telework-nobg.png|top|center|frameless]]
 
{| class="wikitable" style="align:center; border-top: #000000 2px solid; border-bottom: #000000 2px solid; border-left: #000000 2px solid; border-right: #000000 2px solid" width="1125px"
 
{| class="wikitable" style="align:center; border-top: #000000 2px solid; border-bottom: #000000 2px solid; border-left: #000000 2px solid; border-right: #000000 2px solid" width="1125px"
 
|-
 
|-
! style="background: #2e73b6; color: white" width="250px" height="40px" scope="col" |[[Secure Teleworking |Overview and User Considerations]]
+
! style="background: #2e73b6; color: white" width="250px" height="40px" scope="col" |[[Secure Remote Working - Overview|Overview and User Considerations]]
! style="background: #2e73b6; color: white" width="250px" height="40px" scope="col" |[[Secure Teleworking Technical Considerations|Technical Considerations]]
+
! style="background: #2e73b6; color: white" width="250px" height="40px" scope="col" |[[Secure Remote Work Technical Considerations|Technical Considerations]]
 
! style="background: #2e73b6; color: red" width="250px" height="40px" scope="col" |[[Secure Use of Collaboration Tools|Secure Use of Collaboration Tools]]
 
! style="background: #2e73b6; color: red" width="250px" height="40px" scope="col" |[[Secure Use of Collaboration Tools|Secure Use of Collaboration Tools]]
 +
! style="background: #2e73b6; color: white" width="250px" height="40px" scope="col" |[[Secure Remote Working - Device Considerations|Device Considerations]]
 
|}
 
|}
 
{| style="width:1125px;"
 
{| style="width:1125px;"
Line 31: Line 31:  
*All information posted on the internet, regardless of the amount of time it is available, is effectively permanently recorded. There are no control provisions for any information once posted;
 
*All information posted on the internet, regardless of the amount of time it is available, is effectively permanently recorded. There are no control provisions for any information once posted;
 
*The nature of external tools and web services like social networking sites makes them appealing targets for malicious exploitation. These sites are inherently prone to malicious users providing links to malware content that can propagate to a department’s infrastructure;  
 
*The nature of external tools and web services like social networking sites makes them appealing targets for malicious exploitation. These sites are inherently prone to malicious users providing links to malware content that can propagate to a department’s infrastructure;  
*Content on external tools such as Trello, Slack etc. may be stored on servers located outside Canada thus the content along with associated user metadata
+
*Content on external tools such as Trello, Slack etc. may be stored on servers located outside Canada thus the content along with associated user metadata can be monitored by non-Canadian and /or third party products, services or businesses;
can be monitored by non-Canadian and /or third party products, services or businesses;
   
*Everything that is shared using external tools and web services could be subject to Access to Information and Privacy (ATIP). Public servants must ensure that information related to the mandate of the organisation and/or contains decisions on government activities is properly captured and managed, following information management best practices; and  
 
*Everything that is shared using external tools and web services could be subject to Access to Information and Privacy (ATIP). Public servants must ensure that information related to the mandate of the organisation and/or contains decisions on government activities is properly captured and managed, following information management best practices; and  
*Public servants are encouraged to verify data retention requirements when using external tools, in accordance with the TBS Policy on Information Management. Some externally provided tools will retain your information even after you have deactivated your account
+
*Public servants are encouraged to verify data retention requirements when using external tools, in accordance with the [https://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=12742 TBS Policy on Information Management]. Some externally provided tools will retain your information even after you have deactivated your account
   −
==Heading 3==
+
==Do's and Don'ts==
 +
{| class="wikitable"
 +
|+
 +
!Do's
 +
!Don'ts
 +
|-
 +
|Protect your identity by using privacy settings on all tools and devices, and limit the amount of information you provide on your profile page.
 +
|Never share protected or sensitive information, unless you have express consent from your departmental information technology group.
 +
|-
 +
|Use strong authentication mechanisms (for example, multi-factor authentication) where possible to protect from unauthorized access and enable auto-lock of your device.
 +
|Open unsolicited links, attachments, or when prompted to install any software. If you don’t know the sender or were not expecting to receive a link or attachment, think twice before opening.
 +
|-
 +
|Use unique passwords for every account, especially separate passwords for personal and work accounts.
 +
|Do not re-use the same passwords that are used for your internal corporate credentials.
 +
|-
 +
|Be conscious of what you are sharing and with whom and assume that everything you share could be made public
 +
|Use caution and avoid using untrusted networks or free Wi-Fi.
 +
|-
 +
|Use modern operating systems and web browsers that are maintained with up-to-date software and configured with appropriate hostbased protections.
 +
|Never post or share passwords or credentials on web services and tools
 +
|-
 +
|Report any suspicious activity or security incidents so that your departmental security team can address the issue.
 +
|Do not ignore SSL certificate errors and unsecure (e.g. HTTP) websites
 +
|}
    
== References ==
 
== References ==
*[[:en:images/0/09/FR_-_Guide_de_démarrage_pour_participer_un_appel_Zoom.pdf|Guide de démarrage pour participer un appel Zoom - FR]]
+
*[https://www.gcpedia.gc.ca/gcwiki/images/2/28/Guidance_for_the_Secure_Use_of_Collaboration_Tools.pdf Guidance for the Secure Use of Collaboration Tools]
 
|}
 
|}