Here you'll find everything you need to know about information system security and data protection: documents (charters, etc.) and information (phishing, passwords, etc.).
The institution has the legal obligation to set up a logging system of the Internet accesses, of the messaging and of the exchanged data. It reserves the right to set up traceability tools on all information systems.
Among many spam emails some are more dangerous than others because they will try to steal personal information. They can for example impersonate you. This is the reason why you need to learn how to identify them.
The system and network administrators charter is intended to specify the duties and rights of all those responsible for the management of IT resources, telecommunications or software.
Share the linkCopyCopiedClose the modal windowShare the URL of this pageI recommend:Consultable at this address:La page sera alors accessible depuis votre menu "Mes favoris".Stop videoPlay videoMutePlay audioChat: A question? Chatbot Robo FabricaMatomo traffic statisticsX (formerly Twitter)