Segment and Separate Information

Do you know where and how your information is stored on your networks? Learn more about why this is important.

Watch more of our Top 10 video series.

Segment and Separate Information - HTML5 Transcript/Captions

(This video opens to the Communications Security Establishment logo on a black background. Cutting through a small public square, a man walks his bicycle beside him while typing on his smartphone.)

We use technology and networks to do Government of Canada business everyday….

(He passes a young woman on a bench, the title appears: “Communications Security Establishment - Top 10 IT Security Actions - Segment and Separate Information.”)

But if you’re not properly protecting your networks, they’re vulnerable. That’s where the Communications Security Establishment comes in. We’re here to give you the support and advice you need.

(The man places his smartphone in a holder on his bike’s handle bars. Now wearing his helmet, he rides towards downtown using the reserved bike lane. Now on the sidewalk, the rider comes to a full stop, then leans his bike against a metal fence and secures it in place using a flexible combination lock. He picks up his smartphone and places it inside his satchel.)

You store and protect your belongings based on their importance and value.

( The man enters a government building; he walks next to office workers at their workstations.)

Why should this be any different at work?

(He arrives at his desk and takes off his satchel.)

Know the value of your files. They are not all created equal.

(He sits, unlocks a desk drawer using a key, and then opens it to pull out a folder.)

Know what information is sensitive. Where it’s located, and how to protect it.

(He places the file on his desk and starts working at his computer.)

Budgets, personnel files, and key operational information are all sensitive documents that

(He receives a text message from a colleague. The message reads: “Working from home today. Send me the security strategy doc.”)

need added security. How are you protecting them?

(After picking up his phone, our protagonist replies: “No can do. It’s classified. Sad emoji.”)

Put security first. Whether you’re working at the office or from home, avoid workarounds that can put Government of Canada information at risk.

(He gets up from his work chair, puts his smartphone in his pocket, picks up the folder and removes his key from the locked drawer before leaving. He walks down a hallway past a conference room and enters a glass-walled meeting room where colleagues await.)

If you properly classify your files and store them in the right places using a segregated

(A woman is standing in front of the room’s writing board showing the words: “Encryption, Network Zoning, Employee Training.”)

network, you’ll be making it harder for a threat actor to find and access your department’s most sensitive information. Segmenting and separating information is just

(The CSE building exterior is shown in its entirety. Multicolored triangles reminiscent of the CSE building’s triangular windows appear to form a motif. Inside it, the words: “Advice Guidance Services” emerge.)

one of CSE’s Top Ten IT Security Actions. Protect your networks. Protect Canada’s

(The words are then replaced with the CSE internet Web site address: “”.)

information. Visit CSE online to learn more about the Top 10.