Professor Christopher P. Manfredi, Provost and Vice-Principal (Academic), describes the responsibility of all academics to uphold ±«ÓãÖ±²¥'s information security.Ìý
Academics and cybersecurity
Ensure cybersecure practices in all teaching and learning activities.Ìý
Access ±«ÓãÖ±²¥'s systems safely
- Enable two-factor authentication on your ±«ÓãÖ±²¥ account. Two-factor authentication (2FA) is required on all ±«ÓãÖ±²¥ accounts because it helps verify that you are the person who is signing into your account. Don’t delay, enroll now at
- ±«ÓãÖ±²¥'s (VPN) allows you to connect to restricted sites and resources.
- Ensure your device is secure when connecting to ±«ÓãÖ±²¥ remotely (see Secure your devices section ).
Stay safe when working remotelyÌý
- Preparing for remote workÌý- Follow these guidelines to ensure safe computing from a distance.
- : Find valuable resources in Safe at home: a module in the online course IT Security Awareness EssentialsÌý(available on myCourses).
Protect your identity
- that attempt to steal your personal information.
- Strengthen and protect your password:
- Your ±«ÓãÖ±²¥ password is for ±«ÓãÖ±²¥ systems. Do not use your ±«ÓãÖ±²¥ password on non-±«ÓãÖ±²¥ systems or websites.
- .
- Do not share your password with anyone.
- Use a different password for each platform or system.
- Do not overshare on social media: Tips for safe sharing
Safeguard student data
Only use ±«ÓãÖ±²¥-approved storage and collaboration solutions for storing students' personal data. All educational software used for teaching and learning must comply with the ±«ÓãÖ±²¥ Cloud Directive.
±«ÓãÖ±²¥ supports academic activities with a range of secure teaching and learning solutions. See the full list of ±«ÓãÖ±²¥-approved cloud services for software supporting secure data storage, file sharing, publishing and collaboration.
Software: considerations
Note that if you recommend a solution to students that is not ±«ÓãÖ±²¥-approved, you are legally responsible for any resulting consequences. For more information, see IT Policies, Regulations, Directives & Standards.
- ±«ÓãÖ±²¥'s cloud services website provides additional information, including:
- Cloud solution approval process
- What is personal information? Types of data and what can be stored in the cloud
- Software Piracy : Unauthorized software use can have serious consequences. Ensure that your software use complies with licensing agreements.
±«ÓãÖ±²¥-approved teaching solutions
Here is a sample of available tools and services available.Ìý
- : ±«ÓãÖ±²¥'s learning management system for online teaching and learning
- : Technology supporting live, interactive question and response and learning assessment.
- : As part of the Microsoft Office 365 offering, Microsoft Forms allows users to quickly and easily create surveys, quizzes, registration forms, and polls.
- : Allows users to create surveys and publish to a public or a private audience.
- Teaching and learning technologies (±«ÓãÖ±²¥ Teaching and Learning Services site)
Secure your devices
Follow some basic safety tips to keep your devices safe:
- Ìýand password-protect to help prevent unauthorized access.
- Apply regular updates:
- whenever possible.
- Install antivirus software:
Ìý