The IT division (ITD) of the Ministry of Central Services offers a variety of programs and self-help tools to support government employees. These services are meant to support and enhance government’s IT resources and operations.
To learn more about this service, use the links below to jump to the content:
Executive government employees may be required to access their workplace email outside of the workplace and the Government of Saskatchewan network. As of 2016, Outlook Web Access (OWA) is automatically enabled for all government employees who have a user account. If you do not have OWA access and you require it please submit a Service Request checking off the access to OWA option.
OWA allows you to access and use your Government of Saskatchewan email address anywhere that you have internet access. To learn how to access OWA, please read the Outlook Web Access User Guide.
When you first set up your computer network password, you will need to set up a password manager profile, just in case you forget your password to log into the network. This process will ask you to list multiple security questions and answers that you will be prompted to answer if you ever forget your password. To set up your password manager profile visit the Password Manager page. This page is also where you go to retrieve a lost password after setting up a profile and can be accessed by clicking the “Forgot My Password” link on your login screen.
Please see the Self-Service Password Manager Guide for step-by-step instructions on setting up your password manager profile and retrieving a lost password.
You can also set up a Pass Phrase to reset a network or account password by calling the IT Service Desk at 306-787-5000. Your Pass Phrase is a confidential question that only you and the IT Service Desk will know. It is a way to verify your identity when you call in. The Pass Phrase is not the same as your password. To set up a Pass Phrase, please see the Pass Phrase Form.
At times, Government employees require remote access in order to do their jobs. There are different types of remote access:
1. Remote access from a GOS computer:
Employees with a GOS ID can remote access their desktop, files, applications and emails from their GOS computer when away from the workplace.
A VPN tool is installed by default on all GOS laptops, however, you do require access in order to be able to connect to this. To obtain access you must submit a Service Request Form checking off remote access and follow the GOS Asset User Guide once your access is granted.
2. Remote access from a non GOS computer:
This remote service allows you to connect to your GOS account and GOS servers from anywhere with an internet connection.
This service requires a token as it authenticates through two-factor authentication. There are two types of tokens, hard and soft, both have a cost associated with them. A hard token is a small, portable device that plugs into a computer’s USB port, whereas a soft token is installed directly onto the following devices:
- Apple iPhone/iPod Tough/iPad
- Windows Mobile
- Java Phone
To obtain two-factor authentication access you must submit a Service Request Form checking off remote access from a non GOS computer and state whether you want a hard or soft token. Follow the Non-GOS Asset VPN User Guide for hard token access once your access is granted. For soft token access, please see the Entrust Soft Token User Guide.
Government employees sometimes deal with confidential information. It is important to keep this mind while printing anything with confidential and sensitive information.
In order to print securely, please:
- Be aware of what you are printing to a common printer that can be accessed by many employees.
- When possible, use secure print mode (learn how using our guide for Windows 7 or Windows 10) when printing document with confidential information.
- Uninstall printers (learn how using our guide for Windows 7 users or Windows 10) on your computer after a printer is removed from a workplace.
- Ensure you choose the right printer if you have multiple installed on your computer.
Information Security Policies
When in doubt reference the policy. Policies are in place to help us govern IT security issues and make the best possible decisions when it comes to protecting government data.
- Government’s Information Security policy is intended to help safeguard the confidentiality, integrity and availability of the government’s information and systems. Users are bound by this policy, and should understand and abide by it.
- Government’s IT Acceptable Usage policy is the main IT policy that applies to users and is administered by the Public Service Commission. Users should understand and abide by it.
- Government has a Social Media policy that governs government employee use of social media, be it for government business or personal use that is administered by Executive Council. Users should understand and abide by it.
IT Security Educational Resources
For some tips and tricks to stay IT safe, check out this poster series below. Please distribute these posters around your work place to increase IT safety awareness.
Password help, forgot password, outlook access, email access, self service access, windows login, SharePoint, SharePoint request, IT tools and resources, IT tools, IT resources, IT guide, New Employee, employee onboarding, email, ITO, ITD, IT service request, ServiceNow
Get IT support; Request network access; Reset my password