捆绑SM社区
Why is this important?
Visitors need to be confident our sites are secure and their privacy is protected.
Legislation and policy
捆绑SM社区 staff are subject to Quebec and Canadian laws and 捆绑SM社区鈥檚 policies concerning information security and maintaining the confidentiality of personal information.
In addition, anyone who processes, transmits or stores credit cards information in an unsecure and unauthorized manner may be found in violation of financial confidentiality laws and expose themselves to legal liability. If you need to collect payment, please get in touch with Financial Services.
Christopher Manfredi, Provost and Vice-Principal Academic, describes the responsibility of all academics to uphold 捆绑SM社区's information security
Visit 捆绑SM社区鈥檚 cybersecurity website听Secure your journey听for additional tools and resources.
Checklist of things to do
- Create secure webpages and webforms that properly protect users' personal data (e.g. use secure formats and platforms like https, adhere to recommendations for building secure webforms)
- Don't display or email people's confidential information (unless it's using 捆绑SM社区's official email).
- Don't identify student names without their written consent, e.g. on Research web pages, do not list student participants.
- Don't share sensitive or restricted data on unauthorized generative AI tools.
- Microsoft Copilot is currently the only authorized generative AI tool at 捆绑SM社区. Refer to the to learn what is acceptable and not acceptable to enter into a prompt.
- If you become aware of unsafe practices or vulnerabilities, .
- Keep web systems and tools up to date.
- Ensure your site has a designated sponsor/asset steward.
- Delete/decommission websites when they become inactive and/or are no longer of value.
- Update website access permissions accordingly when your web team members change roles, leave your department or leave the university.
- Use 捆绑SM社区 usernames and passwords for authentication on 捆绑SM社区 websites and systems (where possible).
- If authentication is required on 捆绑SM社区 websites, it should be performed using one of our preferred Single Sign On (SSO) methods, such as SAML, 听with 捆绑SM社区鈥檚 central identity provider.
- Limit data collection for analytics and user research to interactions around links, buttons and page elements only.
- If linking to information in a cloud service, adhere to instructions in 捆绑SM社区's Cloud Directive which describes when and where you can process, transmit and store听捆绑SM社区 data
Supporting resources
Related sites
How to create secure webforms
听
Privacy and security policies and guidelines
捆绑SM社区 policies and guidelines site owners and managers should be aware of.
Use of information technology
- Policy on the Responsible Use of Information Technology at 捆绑SM社区, IT Services
- IT Policies, Directives, Regulations and Standards
- IT Security Incident Response
- Guide to secure web service/servers
- Cloud Services at 捆绑SM社区 - When acquiring or using a new software app, here's what you need to know...
- Domains and URLs for 捆绑SM社区 websites
Privacy and personal information
- Cloud Services at 捆绑SM社区
- Guidance for safe use of cloud applications at 捆绑SM社区
- Information Security Reminder, Enrolment Services
- Information security, IT Services
- IT Governance - Data Classification Document from the Secretary General
- 捆绑SM社区's Cloud Directive
- Privacy Notice, 捆绑SM社区
- Protection of Personal Information, Student Rights and Responsibilities