Thank you for considering Fireside Analytics Academy, (“Fireside Analytics”) to support you in your technology education. We are excited that you are learning data science skills and we believe you will be able to use these in your career, no matter what you choose to do.

Please read the terms and conditions carefully.

Terms and Conditions

We have taken steps to vigorously protect your confidential information and the Learning Management System (LMS) we use has done so as well. To this end, we will not disclose your confidential information to any external parties without your prior consent, except when we are legally compelled to do so.

Fireside Analytics has developed the first curriculum in Data Science for High School participants. We are required by law in Ontario, Canada to submit enrollment data to the Ministry of Education.

Subsection 16(5) of the Act requires private schools to submit statistical information regarding enrolment, staff, courses of study and other information as and when required by the Minister. See Section 3 of this manual, “Cyclical Requirements for All Private Schools”, for more information.

Subsection 16(6) of the Act authorizes the inspection of private schools, which are conducted by Ministry staff who are members of the Ontario College of Teachers and have Supervisory Officer qualifications.

Course Materials & Adult Learners

Fireside Analytics Academy – Computer Security

Computer security controls are based on the construct that the data on an individual machine/device influences the classification of that machine/device and, in turn, the multi-layer security strategy for defense against unauthorized access.

  1. Safeguarding Computers for Individual Use

This section describes measures to safeguard computers typically used by individuals in Fireside Analytics Academy related activities. As used in these operational specifications, “computers” include but are not limited to desktops or laptop computers, smartphones and cellphones, USB flash memory drives, or similar devices.

  1. Physical Security
  2. Do not give physical access to computers to unauthorized persons.
    ii. Take appropriate precautions to prevent theft and damage.
    iii. Where possible, position monitors to prevent casual viewing by visitors or passersby.
  3. System Security
  4. Install anti-virus software and keep virus definitions up to date.
    ii. Install operating system and software patches and take other recommended steps to mitigate known vulnerabilities of the computer in a timely manner.
    iii. Do not download unauthorized software.
    iv. Use a locking screensaver or other mechanism to prevent unauthorized use of the computer.
    v. Do not leave your computer unattended without locking it or logging off.
    vi. Avoid Peer-to-Peer file sharing software; these programs typically enable unauthorized remote access without any password to the contents of the computer.
    vii. Do not install or run software that requires a license without that license. Respect license agreements and do not infringe on the copyright of others. (See section A.5)
    viii. Respond promptly to notices from authorized University staff that vulnerabilities have been detected in your computer’s system.
    ix. Take particular care to secure your Fireside Analytics Academy access information (e.g., log-ins, passwords) on home computers from unauthorized use by others.
    x. Do not install unsecured third-party applications that may deliver malware to a personal device on which you may have Restricted Data, thereby putting Fireside Analytics Academy at breach risk.
  5. Passwords
  6. Where possible, secure all computer accounts with passwords, and use passwords to protect all file sharing.
    ii. Use strong complex passwords in your passwords. Strong passwords consist of at least eight (8) characters. They should not be dictionary words or readily guessable. They should include at least three (3) of the following four (4) characteristics in any order: upper case letters, lower case letters, numbers, and symbols.
    iii. Change passwords periodically. Avoid reusing a password for at least several change iterations. If you have multiple accounts, avoid using the same password for those accounts.

Do not keep passwords in plain text in a computer file or in plain sight on paper. Passwords should neither be sent in an email nor provided verbally by telephone. If you must communicate account access information in order to ensure business continuity, you should communicate it in a secure manner. Supervisors and managers should make certain that offices have plans for access to files and data for business continuity.
v. Keep a well-secured copy of your passwords available for emergency access. Encrypt any computer file containing passwords. Keep any written file of passwords in a physically secure location, preferably separate from the computer or application they secure.
vi. Passwords for sensitive websites or email accounts should not be saved on the computer.
vii. Where possible, do not configure programs to automatically store passwords.
viii. Shut down web browsers, email programs, or other applications that might store passwords temporarily when they are not in use.

  1. Safeguarding Computers Used by Multiple Individuals
    The section covers additional measures for safeguarding computers used by multiple individuals.  All the operational specifications set forth above apply, as well as the following additional measures to safeguard such computers.
  2. Secure all computer accounts with passwords.
    b. Give accounts to authorized persons only; provide individual log-ins. If you share a computer with others, take appropriate precautions to safeguard sensitive data that others may not be authorized to access and, where possible, create separate accounts for each person who is authorized to use the computer, setting appropriate permissions.
    c. Where possible, enforce use of strong passwords and periodic password changes.
    d. Make every effort to maintain computer logs and review them on a regular basis.
    e. Stay familiar with best practices for administering the particular computer and use them.