ÎÛÎÛ²ÝÝ®ÊÓƵ

Safeguard ÎÛÎÛ²ÝÝ®ÊÓƵ's data

Only use ÎÛÎÛ²ÝÝ®ÊÓƵ-approved storage and collaboration solutions for storing ÎÛÎÛ²ÝÝ®ÊÓƵ organizational data. All software solutions must comply with the ÎÛÎÛ²ÝÝ®ÊÓƵ Cloud Directive .

For more information, see IT Policies, Regulations, Directives & Standards.

Software: considerations

³§±ð±ðÌý²Ñ³¦³Ò¾±±ô±ô'²õÌýcloud services website for details, such as: 

  • Cloud solution approval process
  • Types of data and what can be stored in the cloud 

Protect websites and users' data

If you design or manage a website at ÎÛÎÛ²ÝÝ®ÊÓƵ, ensure that it is secure and that your visitors' privacy is protected. 

Prevent fraud

Be aware that hackers often study an organization, learn its financial approval processes, and target approvers. Some signs of attempted fraud may include: 

  • An urgent email asking you to approve a request without going through the standard process
  • The email address of a message appears to be from ÎÛÎÛ²ÝÝ®ÊÓƵ but is not - see  in the IT Knowledge base.

For more information, the following resources are available: 

  •  Government of Canada - 

IT Security Awareness: online training and workshops

Learn about key threats and behaviours that create risks to our organization and how to protect against these. Register online through myCourses or request a customized training session for your team.

Report security incidents 

Remain vigilant against cyber threats by staying informed and reporting any suspicious activity to the IT Service Desk. 

Back to top