RPE Home Timesheets Authorize Export Reports Admin
 

Technical Support
How to get Help?
Website Feedback
Contact Us
Quick Links
FAQ
Protecting Your Information
Security
Security

Protecting Your Information

At the BCMEA, the security of your personal and private information is of utmost concern. We are committed to keeping your confidential information as safe as possible. While the BCMEA utilizes strong internal measures to protect the security and privacy of your information, there are important steps you should take to help protect your information when using the BCMEA website(s).

THIS SECURITY INFORMATION MAKES RECOMMENDATIONS AND SUGGESTS BEST PRACTICES WHICH USERS MAY FOLLOW AT THEIR OWN DISCRETION. ALL TERMS OF THE WEBSITE USAGE POLICY GOVERNING THIS SITE ARE STILL APPLICABLE.

You play a critical role in keeping your personal information protected. Please review each security section below and become familiar with the measures taken to protect your on-line information as well as the steps you can take to help secure your on-line experience.

Strong Encryption Requirements

The BCMEA web systems require that you have 128-bit encryption, the highest level of encryption generally available today, installed on your browser. When using this encryption, all data sent to the BCMEA website(s) is scrambled and then de-coded. We do not transmit personal and/or private data over any non-encrypted connections.

Your BCMEA website(s) session is protected in a “secured” network environment through Secured Socket Layer (SSL) encryption. SSL technology is used within your session to encrypt your personal information before it leaves your computer to help ensure no one else can read it. Depending on your browser setting, a pop-up window will appear to notify you that you will be entering a secured page. You will know when you are on a secured BCMEA page when you see the “https://” before the web address. A padlock symbol in the lower right hand corner of your browser window will also be present. This padlock indicates that your BCMEA on-line session is in a “secured” environment.

Protecting Our Internal Systems

The BCMEA protects the security of your personal information at all times.  We have taken reasonable measures to protect our internal computer systems from unauthorized access. To protect our systems from public Internet traffic, firewalls are used. Firewalls are a combination of computer hardware and software that separate the Internet from the BCMEA’s internal web servers and computer systems. Firewalls prevent unauthorized Internet traffic from accessing our web servers and internal systems, thereby protecting your information and transactions.

Limiting Unauthorized Access To Your On-Line Session

The BCMEA web systems use “timed log-outs” on all of our websites. This means that on-line sessions are terminated after 20 minutes of inactivity. Once the BCMEA website has ended your session, you will be required to re-enter your username and password. “Timed Log-Outs” protect you against unauthorized access.

Intrusion Detection Systems

The BCMEA websites employ state-of-the-art network based IDS (Intrusion Detection Systems) to secure the integrity of our network by ensuring that unauthorized traffic cannot pass though our systems undetected.

What Can You Do To Protect Your Information?

As an Internet website user, you play an important role in protecting your personal and private information. In addition to a myriad of website technologies we use for secure exchange of personal data, you play a significant role in configuring your own computer to maximize its security environment. The following is a checklist to ensure that your system conforms to known “security best practices”.

Two pieces of key information must remain confidential to you - your username and password. Passwords must be kept confidential at all times and not be disclosed to anyone. BCMEA staff and related personnel will NEVER ask for your passwords.
The auto-complete function on your browser should be disabled to avoid the automatic completion of your username and password when you type in the relevant fields.
Passwords should be changed on a regular basis (at least once every 30-60 days).
Passwords should be memorized and NOT be written down or stored in the computer hard disk, diskettes or other insecure devices.
Ensure that the browser and application software used is upgraded to support 128-bit encryption or a higher encryption standard.
Whenever you are logged-on to a secured BCMEA website(s), check that the bottom right corner of the screen shows a secure symbol of the lock.
If you suspect any unusual account activity or that your password confidentiality has been compromised, please change your password immediately and contact our Support line.
Before you logon to BCMEA websites, for security purposes, ensure all other Internet sessions, i.e. browser windows, are closed.
Always remember to log out properly (by clicking on “Log out” instead of simply closing the window with the x on the top right corner of the screen) from your BCMEA session before visiting other websites.
Remember to close the browser window after you have logged-out of your session.
Whenever security updates and patches are made available by your computer or browser vendor, always ensure that you download and apply them as they are designed to provide you with protection from known possible security problems.

Use “Supported” Products To Access BCMEA Systems

The BCMEA Development team performs security audits of our applications, operating systems and services on an on-going basis to ensure that all components comply with the highest standards of security and best practices. We do not recommend accessing our systems with “unsupported” products.

"Supported" Products are:   Examples of "Unsupported" Products are:
Microsoft Internet Explorer® 5.x or higher
Microsoft Windows® NT, 98, 2000, ME, XP
 
Mozilla Firefox® Internet Browser
Netscape® Internet Browser
Apple Macintosh® Operating Systems
Linux Operating Systems

Keep Your Computer Secure

Installing virus detection software on your computer is a good computing practice that protects your information from being corrupted or accessed by unauthorized users. This software needs to be updated often to ensure you have the most current protection available. To further protect yourself from viruses or other unwanted problems, do not open e-mail attachments from unknown or untrustworthy sources. Do not install unlicenced software, or software from an unknown source. Make sure you know anyone who uses your computer and limit unauthorized access.

Logon and Password Feature

To help make accessing your BCMEA website account more secure, we require you to obtain your personal and confidential password to logon to the BCMEA secured website(s). This information is then authenticated by the BCMEA website(s) to verify who you are before providing access to the system.

Should too many failed login attempts be detected, the account will be locked automatically and you may have to contact the password reset telephone line to have the lock cleared. This step is required to protect your account from random password attempts.

Your Password

Your password is the key to your on-line account information. Protect and change your password on a regular basis — every 30-60 days is recommended. Create a password that is unique to you and that cannot be easily guessed by someone else. Create a password that contains a combination of both letters and numbers. Do not associate your password with anything personal such as names, birthdates, telephone numbers, or other familiar words. Memorize your password and never write it down, electronically store, or reveal it to anyone.

Note: No one at BCMEA will ever ask you for your password. Never give out personal information to anyone on the telephone or from a website unless you have verified the credibility of the source and/or have initiated the call to a trusted source.

Disable The Autocomplete Feature On Your Browser

Disable the 'AutoComplete’ function to prevent others from seeing your logon information each time you use the web site(s). On Internet Explorer for example, the ‘AutoComplete’ function remembers data you have input including your passwords on frequently used sites. Check the User Guide for your computer setup to get instructions, or go on-line to the manufacturer's website.

Instructions on disabling the "AutoComplete" on Internet Explorer.

Protecting Your Identity On-line

Install commercial-grade firewall software on your computer to help prevent unauthorized individuals or information from entering your computer system. This is especially important on computers that use a broadband connection to access the Internet (Cable modems or DSL). Since your Internet connection is alive when your computer is on, the risk for malicious activity to your computer increases.

Run a current updated anti-virus program on your computer frequently. Anti-virus software can scan your incoming and outgoing e-mail and attachments for computer infections like worms, viruses, Trojan Horses and other malicious code that can affect your computer files and operation.

Keep your software current and apply all security patches for your computer operating system (e.g. Microsoft Windows) to keep security information current.

Be aware that there are phony websites designed to trick consumers and collect personal information. Verify the source of your e-mails and only open e-mail that you expect. Always run anti-virus software before opening e-mail.

“Password protect” your computer to prevent unauthorized individuals from accessing your information.

How Do I Know If I Am Connecting To The BCMEA And Not To Other Parties?

You may check the validity and owner of the encryption certificate. Using the "supported" Internet Explorer browser, double-click the security lock icon at the bottom right of your session window (you may need to enable the status bar if it cannot be seen). In the General tab, the Certificate Information should state who it is issued to (e.g. employers.bcmea.com) and when it is valid for. The certificate should still be within the valid period.

Using The BCMEA Website(s) Via A Public And/Or Shared Computer

Avoid using the BCMEA website(s) at Internet cafés, libraries, and other public sites to avoid your information from being copied, traced, or re-entered after you leave.

If you must use a public computer, please take the following precautions:

Disable the "AutoComplete" on Internet Explorer.

Please remember to log-out of your session and close all browser windows.

Why Do I Need To Accept “Cookies” To Access The BCMEA Website(S)?

A cookie is a text file that resides on your computer. In order to provide a more stable and personalized experience, BCMEA website(s) use two types of cookies as part of the interaction between your browser and the websites:

Persistent Cookies:

A “Persistent Cookie” is used frequently throughout the website(s) to track usage of our latest information, news bulletins and to ensure that users are receiving personalized and up-to-date information. This cookie does not contain any private information.

Per-Session Cookies:

A “Per-Session Cookie” assigns a session id when you log-on and stores it in your PC’s temporary memory (RAM). This session ID is used to establish and validate your PC during your session. When you log-off from the website(s), the “Per-session Cookie” is removed. These cookies also do not contain any private information.

If your browser prompts you when a cookie is “served”, you must accept it in order to access BCMEA website(s). Since cookies are site-specific, only BCMEA website(s) can access, decode and make use of the information.

Logoff And Close Browser

Always remember to log-off from the website(s) and to close your browser when you have finished visiting secure websites. Please ensure that you use the “Logout” functionality of the websites and not the [x] button on the top right corner of the browser window. This may help prevent others from being able to view your on-line information at a later time. Please contact us immediately if you suspect any unusual account activity.

Test Your Computer For Security Vulnerabilities Regularly

There are several commercial tools currently available on the Web that you can use to test your computer system for security vulnerabilities. For example, if your system is not configured properly, it may be easier for hackers and intruders to break in.

Stay up-to-date with the latest security events and incidents and make sure that you stay current with all security updates/patches and fixes that become available from the vendors.

For further details of how to protect your computer systems please visit the Microsoft security web site.







Terms and Definitions

Anti-virus Software

Commercial-grade anti-virus software should be installed on your home computer and laptop to scan e-mail and files on your computer for potential viruses that may be attached. If a virus is detected, you are notified immediately and the anti-virus software will prevent the e-mail or file from being sent to you before it’s opened. You should run your anti-virus software frequently to prevent computer infections like viruses, worms, or Trojan Horses from entering your computer system. Purchase a program that automatically upgrades your virus protection on a regular basis.

Browsers

A browser is a software application that works with the Internet to provide a way to view, find and interact with websites and web pages. As new versions of browsers are developed, users will be able to experience a full multimedia spectrum, including text, graphics, sound, and video.

Cable Modem

Cable modems provide high-speed Internet access using cable television networks. They use either the traditional coaxial cables or newer fiber optic cables for the transmission of data. Cable modems offer continuous connection to the Internet without having to dial into an Internet Service Provider (ISP) each time you wish to connect to the Internet.

Cookies

Cookies are pieces of information stored directly on the computer and provide a more efficient and more personalized experience at a website. The BCMEA website(s) do not store any personal information in the cookies.

Digital Certificates

Like a driver’s license or passport, Digital Certificates allow individuals or organizations on the Internet to verify each other's identity to prevent unauthorized access. A Digital Certificate is a randomly generated set of characters that a computer sends to your browser. The browser on your computer stores this information and uses it as a digital stamp to certify the authenticity of the information sent to you and as a means of establishing identity. You may see a Digital Certificate issuer logo at the bottom of a browser page for your reference.

Encryption

When you establish a connection to the BCMEA secured website(s) the information you enter on-line is “encrypted” or transformed into a string of unrecognizable characters before being sent over the Internet, likewise information coming from the BCMEA websites are encoded and decoded by your browser. This helps to keep the information between the BCMEA computer system and your Internet browser private. Your session is in a secured “encrypted” environment when you see “https://” in the web address and/or when you see the locked “padlock” symbol at the bottom right corner of your browser window.

Firewall

Firewall software can be installed on company and home computers as a barrier against hackers and viruses. Firewalls are used to filter potentially destructive information or prevent unauthorized access. This is especially important on computers that use a broadband connection to access the Internet (Cable modems or DSL). Since your Internet connection is on when your computer is on, the risk for malicious activity to your computer increases.

Keystroke Capturing

Keystroke Capturing or “keystroke logging” is a surveillance tool that is used to record the keystrokes of unsuspecting victims in order to determine password and logon information which can be used for fraudulent purposes.

Plug-in

A plug-in is a software module that adds a specific functionality to the web browser. Plug-ins for Internet Explorer allow the browser to display various types of audio and video messages. For example, the popular Adobe® Acrobat® (PDF) Plug-in is used for viewing files and reports.

Secure Sessions

Your on-line sessions are protected in a “secured” environment which use Secure Socket Layer (SSL) technology to encrypt your personal information before it leaves your computer to help ensure that no one else can read it. You will know that you are on a “secured” page when you see the “https://” before the web address. You will also see a padlock symbol in the lower right hand corner of your browser window. Commonly, a closed padlock indicates that your on-line session is “secured” by encryption to protect your personal information.

Server Authentication

When you logon to the BCMEA website(s) that requires authentication, you usually input a specific username and password to gain access to your personal information. The encrypted information then passes through a rigorous test on BCMEA computer systems to ensure proper authorization before your personal information is displayed.

Security Holes/Bugs

Security holes/bugs are often faults, defects or programming errors exploited by unauthorized users to access computer networks or web servers from the Internet. As these holes or bugs become known, software publishers develop “patches,” “fixes” or “updates” users can download that usually fix the problems.

Session Time-outs

For your added on-line security, BCMEA uses a session time-out feature. If your BCMEA Internet session is idle for a given amount of time, it is ended automatically. This helps ensure that your on-line session is in a “secured” environment and that the personal information you enter is protected.

Social Engineering

Social engineering is an identity theft process that relies on human interaction and often involves tricking an unsuspecting individual into providing personal information like bank account details or passwords. Social engineers search dumpsters for valuable information, memorize access codes by looking over someone's shoulder, or take advantage of people's natural inclination to choose passwords that are meaningful to them and can be easily guessed (children’s names, addresses, or birthdates). The personal information discovered is then used illegally to apply for credit, purchase goods and services, or gain access to funds.

Spam

Sometimes companies or individuals purchase e-mail address lists to send unsolicited ads for products and services. The unsolicited e-mail is defined as “spam,” and it fills up e-mail files and could add additional pop-up windows on your computer screen. You can purchase anti-spam software to filter unwanted e-mail or spam from your e-mail list until you delete it.

SSL

Secure Socket Layer (SSL) protocol provides a high-level of security for Internet communications. SSL provides an encrypted communications session between your web browser and a web server. SSL helps verify that sensitive information (e.g. credit card numbers, account balances and other financial and personal data) sent over the Internet between your browser and a web server remains confidential during on-line transactions.

Trojan Horse

A Trojan Horse is the name of another type of virus, which is simply a computer program that masks itself as another program. Trojan Horses are usually sent as an e-mail file attachment. For example, it may claim to be a game, but once opened, can cause damage to your computer, from erasing files to changing your desktop. It then sends itself to other people in your address book to propagate itself.

Virus

Often through e-mail, file sharing and downloaded programs, computer viruses are sent as attachments. A virus is a small program that piggybacks onto e-mail and program files. For example, a virus might attach itself to a program or a game. Each time the program is opened, the virus runs and can infect other programs or damage your computer. Some viruses move around through e-mail then replicate by automatically mailing to the victim’s entire e-mail address book. Never open an e-mail attachment unless first scanned through anti-virus software.

Worm

A worm is a specialized virus that searches through networks to find security holes to replicate itself from machine to machine. Worms use up computer time, space, and speed when replicating, with a malicious intent to slow or bring down entire web servers and halt Internet use.




Adobe® and Acrobat® are registered trademarks, and Acrobat Reader™ is a trademark, of Adobe Systems Incorporated. Macintosh® is a registered trademark of Apple Computer, Inc. Microsoft® and Windows® are registered trademarks of Microsoft Corporation. Firefox™ is a trademark of the Mozilla Foundation. Netscape® and Mozilla® are registered trademarks of Netscape Communications Corporation. Norton AntiVirus® is a registered trademark of Symantec Corporation. All other trademarks and service marks are the property of their respective owners.

Copyright © 2007 British Columbia Maritime Employers Association. All rights reserved.
 
 
contact privacy