Security - Data protection
Here you'll find everything you need to know about information system security and data protection: documents (charters, etc.) and information (phishing, passwords, etc.).
- Computer traces policy The institution has the legal obligation to set up a logging system of the Internet accesses, of the messaging and of the exchanged data. It reserves the right to set up traceability tools on all information systems.Find out more
- How to change my password? Your password must be changed at least annually to keep your account as secure as possible.Find out more
- How to generate a secure password? Having a strong password difficult to guess is essential to the security of your professional and personal accounts.Find out more
- How to recognize a phishing email? Among many spam emails some are more dangerous than others because they will try to steal personal information. They can for example impersonate you. This is the reason why you need to learn how to identify them.Find out more
- IT charter The IT charter provides the legal framework for the use of the UGA information system.Find out more
- My consents Your consent for the use of your personal data is necessary to make sure the IT services are running smoothly.Find out more
- System and network administrators charter The system and network administrators charter is intended to specify the duties and rights of all those responsible for the management of IT resources, telecommunications or software.Find out more
Published on December 10, 2020
Updated on January 11, 2024
Updated on January 11, 2024