﻿{"id":906,"date":"2019-09-09T09:39:38","date_gmt":"2019-09-09T13:39:38","guid":{"rendered":"https:\/\/www.uqac.ca\/cybersecurite\/?p=906"},"modified":"2021-03-30T14:34:51","modified_gmt":"2021-03-30T18:34:51","slug":"mon-identifiant-ma-responsabilite","status":"publish","type":"post","link":"https:\/\/www.uqac.ca\/cybersecurite\/mon-identifiant-ma-responsabilite\/","title":{"rendered":"Mon identifiant, ma responsabilit\u00e9"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2018\/11\/identifiant.jpg\" alt=\"\" class=\"wp-image-240\" width=\"175\" height=\"175\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2018\/11\/identifiant.jpg 340w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2018\/11\/identifiant-150x150.jpg 150w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2018\/11\/identifiant-300x300.jpg 300w\" sizes=\"auto, (max-width: 175px) 100vw, 175px\" \/><\/figure><\/div>\n\n\n\n<table class=\"wp-block-table is-style-regular\"><tbody><tr><td><strong>Utilisation de votre identifiant UQAC<\/strong>   <strong>&nbsp;<\/strong><br>   <br>En ce d\u00e9but de session, il est important d\u2019effectuer un   rappel sur la responsabilit\u00e9 de l\u2019utilisation de votre identifiant UQAC   (compte d\u2019acc\u00e8s aux syst\u00e8mes d\u2019information).&nbsp;<br>Votre identifiant unique   vous permet d\u2019acc\u00e9der \u00e0 l\u2019information de l\u2019UQAC selon des droits qui vous ont   \u00e9t\u00e9 attribu\u00e9s et qui r\u00e9pondent \u00e0 votre fonction.&nbsp;    &nbsp;   Il est de votre responsabilit\u00e9&nbsp;:   <br><br>D\u2019attribuer   un mot de passe <strong>robuste<\/strong> \u00e0 votre identifiant;   <br>De   <strong>ne permettre<\/strong> \u00e0 quiconque de l\u2019utiliser;   <br>De   <strong>changer votre mot de passe imm\u00e9diatement<\/strong> si vous constatez que   quelqu\u2019un l\u2019utilise;   <br>De   <strong>d\u00e9clarer \u00e0 votre gestionnaire<\/strong> tout incident ou risque d\u2019incident   relatif \u00e0 la s\u00e9curit\u00e9 de l\u2019information.   &nbsp;   <br><br>L\u2019UQAC se r\u00e9serve le droit de suspendre votre acc\u00e8s aux   syst\u00e8mes d\u2019information si des activit\u00e9s qui compromettent la s\u00e9curit\u00e9 sont   observ\u00e9es.    &nbsp;   <br><br>Pour plus d\u2019information concernant l\u2019utilisation de votre   identifiant, consultez la <a href=\"https:\/\/www.uqac.ca\/direction_services\/sti\/capsules-securite\/CAP002%20-%20Identifiant%20UQAC.pdf\">capsule   d\u2019informations<\/a>.   <br>Pour plus d\u2019information concernant la cr\u00e9ation d\u2019un mot   de passe robuste, consultez la <a href=\"https:\/\/www.uqac.ca\/direction_services\/sti\/capsules-securite\/CAP001%20-%20Un%20mot%20de%20passe%20robuste.pdf\">capsule   d\u2019informations<\/a>.   <\/td><\/tr><\/tbody><\/table>\n","protected":false},"excerpt":{"rendered":"<p>Utilisation de votre identifiant UQAC &nbsp; En ce d\u00e9but de session, il est important d\u2019effectuer un rappel sur la responsabilit\u00e9 de l\u2019utilisation de votre identifiant UQAC (compte d\u2019acc\u00e8s aux syst\u00e8mes d\u2019information).&nbsp;Votre identifiant unique vous permet d\u2019acc\u00e9der \u00e0 l\u2019information de l\u2019UQAC selon des droits qui vous ont \u00e9t\u00e9 attribu\u00e9s et qui r\u00e9pondent \u00e0 votre fonction.&nbsp; &nbsp; [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":359,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3,12],"tags":[],"class_list":["post-906","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-formations-et-conseils","category-identifiant"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/906","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/comments?post=906"}],"version-history":[{"count":7,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/906\/revisions"}],"predecessor-version":[{"id":913,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/906\/revisions\/913"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/media\/359"}],"wp:attachment":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/media?parent=906"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/categories?post=906"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/tags?post=906"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}