|
Protecting Your Information
At the BCMEA, the security of your personal and private information is of
utmost concern. We are committed to keeping your confidential information as
safe as possible. While the BCMEA utilizes strong internal measures to protect
the security and privacy of your information, there are important steps you
should take to help protect your information when using the BCMEA
website(s).
THIS SECURITY INFORMATION MAKES RECOMMENDATIONS AND SUGGESTS BEST PRACTICES
WHICH USERS MAY FOLLOW AT THEIR OWN DISCRETION. ALL TERMS OF THE WEBSITE USAGE
POLICY GOVERNING THIS SITE ARE STILL APPLICABLE.
You play a critical role in keeping your personal information protected. Please
review each security section below and become familiar with the measures taken
to protect your on-line information as well as the steps you can take to help
secure your on-line experience.
Strong Encryption Requirements
The BCMEA web systems require that you have 128-bit encryption, the highest
level of encryption generally available today, installed on your browser. When
using this encryption, all data sent to the BCMEA website(s) is scrambled and
then de-coded. We do not transmit personal and/or private data over any
non-encrypted connections.
Your BCMEA website(s) session is protected in a "secured" network environment
through Secured Socket Layer (SSL) encryption. SSL technology is used within
your session to encrypt your personal information before it leaves your
computer to help ensure no one else can read it. Depending on your browser
setting, a pop-up window will appear to notify you that you will be entering a
secured page. You will know when you are on a secured BCMEA page when you see
the "https://" before the web address. A padlock symbol in the lower right hand
corner of your browser window will also be present. This padlock indicates
that your BCMEA on-line session is in a "secured" environment.
Protecting Our Internal Systems
The BCMEA protects the security of your personal information at all
times. We have taken reasonable measures to protect our internal computer
systems from unauthorized access. To protect our systems from public Internet
traffic, firewalls are used. Firewalls are a combination of computer hardware
and software that separate the Internet from the BCMEA's internal web servers
and computer systems. Firewalls prevent unauthorized Internet traffic from
accessing our web servers and internal systems, thereby protecting your
information and transactions.
Limiting Unauthorized Access To Your On-Line Session
The BCMEA web systems use "timed log-outs" on all of our websites. This means
that on-line sessions are terminated after 20 minutes of inactivity. Once the
BCMEA website has ended your session, you will be required to re-enter your
username and password. "Timed Log-Outs" protect you against unauthorized
access.
Intrusion Detection Systems
The BCMEA websites employ state-of-the-art network based IDS (Intrusion
Detection Systems) to secure the integrity of our network by ensuring that
unauthorized traffic cannot pass though our systems undetected.
What Can You Do To Protect Your Information?
As an Internet website user, you play an important role in protecting your
personal and private information. In addition to a myriad of website
technologies we use for secure exchange of personal data, you play a
significant role in configuring your own computer to maximize its security
environment. The following is a checklist to ensure that your system conforms
to known "security best practices".
 |
Two pieces of key information must
remain confidential to you - your username and password. Passwords must be kept
confidential at all times and not be disclosed to anyone. BCMEA staff and
related personnel will NEVER ask for your passwords.
|
 |
The auto-complete function on your
browser should be disabled to avoid the automatic completion of your username
and password when you type in the relevant fields.
|
 |
Passwords should be changed on a
regular basis (at least once every 30-60 days).
|
 |
Passwords should be memorized and NOT
be written down or stored in the computer hard disk, diskettes or other
insecure devices.
|
 |
Ensure that the browser and
application software used is upgraded to support 128-bit encryption or a higher
encryption standard.
|
 |
Whenever you are logged-on to a secured BCMEA website(s), check that the bottom
right corner of the screen shows a secure symbol of the lock.
|
 |
If you suspect any unusual account
activity or that your password confidentiality has been compromised, please
change your password immediately and contact our Support line.
|
 |
Before you logon to BCMEA websites,
for security purposes, ensure all other Internet sessions, i.e. browser
windows, are closed.
|
 |
Always remember to log out properly
(by clicking on "Log out" instead of simply closing the window with the x on
the top right corner of the screen) from your BCMEA session before visiting
other websites.
|
 |
Remember to close the browser window
after you have logged-out of your session.
|
 |
Whenever security updates and patches
are made available by your computer or browser vendor, always ensure that you
download and apply them as they are designed to provide you with protection
from known possible security problems.
|
Use "Supported" Products To Access BCMEA Systems
The BCMEA Development team performs security audits of our applications,
operating systems and services on an on-going basis to ensure that all
components comply with the highest standards of security and best practices. We
do not recommend accessing our systems with "unsupported" products.
| "Supported" Products are: |
|
Examples of "Unsupported" Products are: |
|
 |
Microsoft Internet Explorer© 5.x or higher |
 |
Microsoft Windows© NT, 98, 2000, ME, XP |
|
|
 |
Mozilla Firefox© Internet Browser |
 |
Netscape© Internet Browser |
 |
Apple Macintosh© Operating Systems |
 |
Linux Operating Systems |
|
|
Keep Your Computer Secure
Installing virus detection software on your computer is a good computing
practice that protects your information from being corrupted or accessed by
unauthorized users. This software needs to be updated often to ensure you have
the most current protection available. To further protect yourself from viruses
or other unwanted problems, do not open e-mail attachments from unknown or
untrustworthy sources. Do not install unlicenced software, or software from an
unknown source. Make sure you know anyone who uses your computer and limit
unauthorized access.
Logon and Password Feature
To help make accessing your BCMEA website account more secure, we require you
to obtain your personal and confidential password to logon to the BCMEA secured
website(s). This information is then authenticated by the BCMEA website(s) to
verify who you are before providing access to the system.
Should too many failed login attempts be detected, the account will be locked
automatically and you may have to contact the password reset telephone line to
have the lock cleared. This step is required to protect your account from
random password attempts.
Your Password
Your password is the key to your on-line account information. Protect and
change your password on a regular basis every 30-60 days is recommended.
Create a password that is unique to you and that cannot be easily guessed by
someone else. Create a password that contains a combination of both letters and
numbers. Do not associate your password with anything personal such as names,
birthdates, telephone numbers, or other familiar words. Memorize your password
and never write it down, electronically store, or reveal it to anyone.
Note: No one at BCMEA will ever ask you for your password. Never give out
personal information to anyone on the telephone or from a website unless you
have verified the credibility of the source and/or have initiated the call to a
trusted source.
Disable The Autocomplete Feature On Your Browser
Disable the 'AutoComplete' function to prevent others from seeing your logon
information each time you use the web site(s). On Internet Explorer for
example, the 'AutoComplete' function remembers data you have input including
your passwords on frequently used sites. Check the User Guide for your computer
setup to get instructions, or go on-line to the manufacturer's website.
Instructions on disabling the
"AutoComplete" on Internet Explorer.
Protecting Your Identity On-line
Install commercial-grade firewall software on your computer to help prevent
unauthorized individuals or information from entering your computer system.
This is especially important on computers that use a broadband connection to
access the Internet (Cable modems or DSL). Since your Internet connection is
alive when your computer is on, the risk for malicious activity to your
computer increases.
Run a current updated anti-virus program on your computer frequently.
Anti-virus software can scan your incoming and outgoing e-mail and attachments
for computer infections like worms, viruses, Trojan Horses and other malicious
code that can affect your computer files and operation.
Keep your software current and apply all security patches for your computer
operating system (e.g. Microsoft Windows) to keep security information current.
Be aware that there are phony websites designed to trick consumers and collect
personal information. Verify the source of your e-mails and only open e-mail
that you expect. Always run anti-virus software before opening e-mail.
"Password protect" your computer to prevent unauthorized individuals from
accessing your information.
How Do I Know If I Am Connecting To The BCMEA And Not To Other Parties?
You may check the validity and owner of the encryption certificate. Using the
"supported" Internet Explorer browser, double-click the security lock icon
at the bottom right of your session window (you may need to enable the status
bar if it cannot be seen). In the General tab, the Certificate Information
should state who it is issued to (e.g. employers.bcmea.com) and when it is
valid for. The certificate should still be within the valid period.
Using The BCMEA Website(s) Via A Public And/Or Shared Computer
Avoid using the BCMEA website(s) at Internet cafes, libraries, and other public
sites to avoid your information from being copied, traced, or re-entered after
you leave.
If you must use a public computer, please take the following precautions:
Disable the "AutoComplete" on Internet
Explorer.
Please remember to log-out of your session and close all browser windows.
Why Do I Need To Accept "Cookies" To Access The BCMEA Website(S)?
A cookie is a text file that resides on your computer. In order to provide a
more stable and personalized experience, BCMEA website(s) use two types of
cookies as part of the interaction between your browser and the websites:
Persistent Cookies:
A "Persistent Cookie" is used frequently throughout the website(s) to track
usage of our latest information, news bulletins and to ensure that users are
receiving personalized and up-to-date information. This cookie does not contain
any private information.
Per-Session Cookies:
A "Per-Session Cookie" assigns a session id when you log-on and stores it in
your PC's temporary memory (RAM). This session ID is used to establish and
validate your PC during your session. When you log-off from the website(s), the
"Per-session Cookie" is removed. These cookies also do not contain any private
information.
If your browser prompts you when a cookie is "served", you must accept it in
order to access BCMEA website(s). Since cookies are site-specific, only BCMEA
website(s) can access, decode and make use of the information.
Logoff And Close Browser
Always remember to log-off from the website(s) and to close your browser when
you have finished visiting secure websites. Please ensure that you use the
"Logout" functionality of the websites and not the [x] button on the top right
corner of the browser window. This may help prevent others from being able to
view your on-line information at a later time. Please contact us immediately if
you suspect any unusual account activity.
Test Your Computer For Security Vulnerabilities Regularly
There are several commercial tools currently available on the Web that you can
use to test your computer system for security vulnerabilities. For example, if
your system is not configured properly, it may be easier for hackers and
intruders to break in.
Stay up-to-date with the latest security events and incidents and make sure
that you stay current with all security updates/patches and fixes that become
available from the vendors.
For further details of how to protect your computer systems please visit the
Microsoft security web site.
Terms and Definitions
Anti-virus Software
Commercial-grade anti-virus software should be installed on your home computer
and laptop to scan e-mail and files on your computer for potential viruses that
may be attached. If a virus is detected, you are notified immediately and the
anti-virus software will prevent the e-mail or file from being sent to you
before it's opened. You should run your anti-virus software frequently to
prevent computer infections like viruses, worms, or Trojan Horses from entering
your computer system. Purchase a program that automatically upgrades your virus
protection on a regular basis.
Browsers
A browser is a software application that works with the Internet to provide a
way to view, find and interact with websites and web pages. As new versions of
browsers are developed, users will be able to experience a full multimedia
spectrum, including text, graphics, sound, and video.
Cable Modem
Cable modems provide high-speed Internet access using cable television
networks. They use either the traditional coaxial cables or newer fiber optic
cables for the transmission of data. Cable modems offer continuous connection
to the Internet without having to dial into an Internet Service Provider (ISP)
each time you wish to connect to the Internet.
Cookies
Cookies are pieces of information stored directly on the computer and provide a
more efficient and more personalized experience at a website. The BCMEA
website(s) do not store any personal information in the cookies.
Digital Certificates
Like a driver's license or passport, Digital Certificates allow individuals or
organizations on the Internet to verify each other's identity to prevent
unauthorized access. A Digital Certificate is a randomly generated set of
characters that a computer sends to your browser. The browser on your computer
stores this information and uses it as a digital stamp to certify the
authenticity of the information sent to you and as a means of establishing
identity. You may see a Digital Certificate issuer logo at the bottom of a
browser page for your reference.
Encryption
When you establish a connection to the BCMEA secured website(s) the information
you enter on-line is "encrypted" or transformed into a string of unrecognizable
characters before being sent over the Internet, likewise information coming
from the BCMEA websites are encoded and decoded by your browser. This helps to
keep the information between the BCMEA computer system and your Internet
browser private. Your session is in a secured "encrypted" environment when you
see "https://" in the web address and/or when you see the locked "padlock"
symbol at the bottom right corner of your browser window.
Firewall
Firewall software can be installed on company and home computers as a barrier
against hackers and viruses. Firewalls are used to filter potentially
destructive information or prevent unauthorized access. This is especially
important on computers that use a broadband connection to access the Internet
(Cable modems or DSL). Since your Internet connection is on when your computer
is on, the risk for malicious activity to your computer increases.
Keystroke Capturing
Keystroke Capturing or "keystroke logging" is a surveillance tool that
is used to record the keystrokes of unsuspecting victims in order to
determine password and logon information which can be used for fraudulent
purposes.
Plug-in
A plug-in is a software module that adds a specific functionality to the web
browser. Plug-ins for Internet Explorer allow the browser to display various
types of audio and video messages. For example, the popular Adobe Acrobat
(PDF) Plug-in is used for viewing files and reports.
Secure Sessions
Your on-line sessions are protected in a "secured" environment which use Secure
Socket Layer (SSL) technology to encrypt your personal information before it
leaves your computer to help ensure that no one else can read it. You will know
that you are on a "secured" page when you see the "https://" before the web
address. You will also see a padlock symbol in the lower right hand corner of
your browser window. Commonly, a closed padlock indicates that your on-line
session is "secured" by encryption to protect your personal information.
Server Authentication
When you logon to the BCMEA website(s) that requires authentication, you
usually input a specific username and password to gain access to your personal
information. The encrypted information then passes through a rigorous test on
BCMEA computer systems to ensure proper authorization before your personal
information is displayed.
Security Holes/Bugs
Security holes/bugs are often faults, defects or programming errors exploited
by unauthorized users to access computer networks or web servers from the
Internet. As these holes or bugs become known, software publishers develop
"patches," "fixes" or "updates" users can download that usually fix the
problems.
Session Time-outs
For your added on-line security, BCMEA uses a session time-out feature. If your
BCMEA Internet session is idle for a given amount of time, it is ended
automatically. This helps ensure that your on-line session is in a "secured"
environment and that the personal information you enter is protected.
Social Engineering
Social engineering is an identity theft process that relies on human
interaction and often involves tricking an unsuspecting individual into
providing personal information like bank account details or passwords. Social
engineers search dumpsters for valuable information, memorize access codes by
looking over someone's shoulder, or take advantage of people's natural
inclination to choose passwords that are meaningful to them and can be easily
guessed (children's names, addresses, or birthdates). The personal information
discovered is then used illegally to apply for credit, purchase goods and
services, or gain access to funds.
Spam
Sometimes companies or individuals purchase e-mail address lists to send
unsolicited ads for products and services. The unsolicited e-mail is defined as
"spam," and it fills up e-mail files and could add additional pop-up windows on
your computer screen. You can purchase anti-spam software to filter unwanted
e-mail or spam from your e-mail list until you delete it.
SSL
Secure Socket Layer (SSL) protocol provides a high-level of security for
Internet communications. SSL provides an encrypted communications session
between your web browser and a web server. SSL helps verify that sensitive
information (e.g. credit card numbers, account balances and other financial and
personal data) sent over the Internet between your browser and a web server
remains confidential during on-line transactions.
Trojan Horse
A Trojan Horse is the name of another type of virus, which is simply a computer
program that masks itself as another program. Trojan Horses are usually sent as
an e-mail file attachment. For example, it may claim to be a game, but once
opened, can cause damage to your computer, from erasing files to changing your
desktop. It then sends itself to other people in your address book to propagate
itself.
Virus
Often through e-mail, file sharing and downloaded programs, computer viruses
are sent as attachments. A virus is a small program that piggybacks onto e-mail
and program files. For example, a virus might attach itself to a program or a
game. Each time the program is opened, the virus runs and can infect other
programs or damage your computer. Some viruses move around through e-mail then
replicate by automatically mailing to the victim's entire e-mail address book.
Never open an e-mail attachment unless first scanned through anti-virus
software.
Worm
A worm is a specialized virus that searches through networks to find security
holes to replicate itself from machine to machine. Worms use up computer time,
space, and speed when replicating, with a malicious intent to slow or bring
down entire web servers and halt Internet use.
Adobe© and Acrobat© are registered trademarks, and Acrobat
Reader is a trademark, of Adobe Systems Incorporated. Macintosh© is a
registered trademark of Apple Computer, Inc. Microsoft© and Windows© are
registered trademarks of Microsoft Corporation. Firefox is a trademark of the
Mozilla Foundation. Netscape© and Mozilla© are registered trademarks of
Netscape Communications Corporation. Norton AntiVirus© is a registered
trademark of Symantec Corporation. All other trademarks and service marks are
the property of their respective owners.
Copyright © 2005 British Columbia Maritime Employers Association. All rights
reserved.
|