±«ÓãÖ±²¥

Academic

Christopher Manfredi, Provost and VP Academic

Professor Christopher P. Manfredi, Provost and Vice-Principal (Academic), describes the responsibility of all academics to uphold ±«ÓãÖ±²¥'s information security.Ìý

Academics and cybersecurity

Ensure cybersecure practices in all teaching and learning activities.Ìý

Access ±«ÓãÖ±²¥'s systems safely

  • Enable two-factor authentication on your ±«ÓãÖ±²¥ account. Two-factor authentication (2FA) is required on all ±«ÓãÖ±²¥ accounts because it helps verify that you are the person who is signing into your account. Don’t delay, enroll now at
  • ±«ÓãÖ±²¥'s (VPN) allows you to connect to restricted sites and resources.
  • Ensure your device is secure when connecting to ±«ÓãÖ±²¥ remotely (see Secure your devices section ).

Stay safe when working remotelyÌý

  • Preparing for remote workÌý- Follow these guidelines to ensure safe computing from a distance.
  • : Find valuable resources in Safe at home: a module in the online course IT Security Awareness EssentialsÌý(available on myCourses).

Protect your identity

  • that attempt to steal your personal information.
  • Strengthen and protect your password:
    • Your ±«ÓãÖ±²¥ password is for ±«ÓãÖ±²¥ systems. Do not use your ±«ÓãÖ±²¥ password on non-±«ÓãÖ±²¥ systems or websites.
    • .
    • Do not share your password with anyone.
    • Use a different password for each platform or system.
  • Do not overshare on social media: Tips for safe sharing

Safeguard student data

Only use ±«ÓãÖ±²¥-approved storage and collaboration solutions for storing students' personal data. All educational software used for teaching and learning must comply with the ±«ÓãÖ±²¥ Cloud Directive.

±«ÓãÖ±²¥ supports academic activities with a range of secure teaching and learning solutions. See the full list of ±«ÓãÖ±²¥-approved cloud services for software supporting secure data storage, file sharing, publishing and collaboration.

Software: considerations

Note that if you recommend a solution to students that is not ±«ÓãÖ±²¥-approved, you are legally responsible for any resulting consequences. For more information, see IT Policies, Regulations, Directives & Standards.

  • ±«ÓãÖ±²¥'s cloud services website provides additional information, including:
    • Cloud solution approval process
    • What is personal information? Types of data and what can be stored in the cloud
  • Software Piracy : Unauthorized software use can have serious consequences. Ensure that your software use complies with licensing agreements.

±«ÓãÖ±²¥-approved teaching solutions

Here is a sample of available tools and services available.Ìý

  • : ±«ÓãÖ±²¥'s learning management system for online teaching and learning
  • : Technology supporting live, interactive question and response and learning assessment.
  • : As part of the Microsoft Office 365 offering, Microsoft Forms allows users to quickly and easily create surveys, quizzes, registration forms, and polls.
  • : Allows users to create surveys and publish to a public or a private audience.
  • Teaching and learning technologies (±«ÓãÖ±²¥ Teaching and Learning Services site)

Secure your devices

Follow some basic safety tips to keep your devices safe:

  • Ìýand password-protect to help prevent unauthorized access.
  • Apply regular updates:
  • whenever possible.
  • Install antivirus software:

Ìý

Back to top