Changes

Line 35: Line 35:  
*Public servants are encouraged to verify data retention requirements when using external tools, in accordance with the [https://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=12742 TBS Policy on Information Management]. Some externally provided tools will retain your information even after you have deactivated your account
 
*Public servants are encouraged to verify data retention requirements when using external tools, in accordance with the [https://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=12742 TBS Policy on Information Management]. Some externally provided tools will retain your information even after you have deactivated your account
   −
==Heading 3==
+
==Do's and Don'ts==
 +
{| class="wikitable"
 +
|+
 +
!Do's
 +
!Don'ts
 +
|-
 +
|Protect your identity by using privacy settings on all tools and devices, and limit the amount of information you provide on your profile page.
 +
|Never share protected or sensitive information, unless you have express consent from your departmental information technology group.
 +
|-
 +
|Use strong authentication mechanisms (for example, multi-factor authentication) where possible to protect from unauthorized access and enable auto-lock of your device.
 +
|Open unsolicited links, attachments, or when prompted to install any software. If you don’t know the sender or were not expecting to receive a link or attachment, think twice before opening.
 +
|-
 +
|Use unique passwords for every account, especially separate passwords for personal and work accounts.
 +
|Do not re-use the same passwords that are used for your internal corporate credentials.
 +
|-
 +
|Be conscious of what you are sharing and with whom and assume that everything you share could be made public
 +
|Use caution and avoid using untrusted networks or free Wi-Fi.
 +
|-
 +
|Use modern operating systems and web browsers that are maintained with up-to-date software and configured with appropriate hostbased protections.
 +
|Never post or share passwords or credentials on web services and tools
 +
|-
 +
|Report any suspicious activity or security incidents so that your departmental security team can address the issue.
 +
|Do not ignore SSL certificate errors and unsecure (e.g. HTTP) websites
 +
|}
    
== References ==
 
== References ==
 
*[[:en:images/0/09/FR_-_Guide_de_démarrage_pour_participer_un_appel_Zoom.pdf|Guide de démarrage pour participer un appel Zoom - FR]]
 
*[[:en:images/0/09/FR_-_Guide_de_démarrage_pour_participer_un_appel_Zoom.pdf|Guide de démarrage pour participer un appel Zoom - FR]]
 
|}
 
|}