Search results

Jump to navigation Jump to search
  • ...protect and advance the public interest in the areas of health, safety and security, the quality of the environment, and the social and economic well-being of ...t charge the user (applicant) a fee are already required to have a service standard in place.
    28 KB (4,002 words) - 16:50, 24 August 2021
  • * 9.1. Security Management * Design and deliver standard, streamlined processes and common data structures
    11 KB (1,391 words) - 10:53, 2 December 2022
  • ...ada.ca/data/en/dataset/cd8fad92-b276-4250-972f-2d6c40ca04fa Reference data standard on Canadian provinces and territories - draft]</u> === This draft reference data provides a standard list of values for all Canadian provinces and territories. The list reflect
    13 KB (1,909 words) - 11:08, 20 June 2023
  • ..._Building_Security/Base_Building_Security_Standard |Base Building Security Standard]] ...ilding_Security/Base_Building_Security_Standard|The Base Building Security Standard]]
    27 KB (4,724 words) - 14:37, 16 June 2020
  • ...behalf of an organization for requirements definitions, service delivery, security and reliability *Conduct security assessments
    50 KB (6,570 words) - 13:58, 21 February 2023
  • ...n can regulate file access by classifying data according to their level of security and by defining a set of rules each user has to abide by. </li> ...ng to access sensitive data. By creating a baseline behavioural profile of standard patterns, the software can detect abnormal or suspicious user activity. Som
    36 KB (4,967 words) - 09:22, 4 February 2020
  • ...PIs facilitate a smoother transfer of data between applications there is a security risk since data ...eing used in almost all applications today. There is a need to measure the security implications brought forth by APIs
    9 KB (1,418 words) - 14:02, 25 October 2018
  • ...ne or many aspects of Business, Information/Data, Application, Technology, Security, and Privacy for reuse by departments with similar business processes or no ...PIs via interoperability standards. Governance manages exemptions from the Standard; however, a decentralized enterprise with multiple service delivery methods
    22 KB (3,060 words) - 10:00, 23 December 2020
  • ...ne or many aspects of Business, Information/Data, Application, Technology, Security, and Privacy for reuse by departments with similar business processes or no ...PIs via interoperability standards. Governance manages exemptions from the Standard; however, a decentralized enterprise with multiple service delivery methods
    23 KB (3,140 words) - 09:56, 23 December 2020
  • ...addition, direct costs are limited to costs that are measurable using the Standard Cost Model and other methodologies generally accepted to measure compliance ...f the risks associated with the flexible option for the health, safety and security of Canadians and/or the Canadian environment and economy should be included
    19 KB (2,763 words) - 22:18, 3 October 2021
  • ...f Information Officer (CIO) responsible for prescribing an enterprise-wide standard on data quality (subsection 4.3.1.1). The 2021-2024 Digital Operations Stra ...the government to avoid duplication and maximize utility, while respecting security and privacy requirements” (subsection 4.3.1.3).
    41 KB (5,794 words) - 16:27, 23 January 2024
  • ** Security clearances ** Sending out an official email response shortly to departments with standard, approved text, including how to contact IRCC directly
    8 KB (1,214 words) - 11:20, 31 August 2021
  • ...a variety of software, cameras, and sensors.<ref>Canadian Centre for Cyber Security. (2019).<i> [https://cyber.gc.ca/en/glossary Glossary]</i>. Retrieved from ...<p class="inline"> carbon monoxide detector, smoke alarm, and lights. Home security IoT systems include alarms, smart locks, garage door openers, baby monitors
    36 KB (5,326 words) - 14:13, 16 July 2019
  • * Security and privacy standards and guardrails ...ne or many aspects of Business, Information/Data, Application, Technology, Security, and Privacy for reuse by departments with similar business processes or no
    28 KB (3,825 words) - 14:22, 15 September 2021
  • ...gcpedia.gc.ca/wiki/Consultation_Standard_on_Managing_Metadata Consultation Standard on Managing Metadata (GCpedia)]</h3> ...the GC. You can share your ideas, comments and feedback to ensure that the Standard on Managing Metadata is complete, correct, understandable, useful, and real
    21 KB (3,110 words) - 14:10, 6 March 2023
  • ...and rules for the management of the availability, usability, integrity and security of the data and information to enable coherent implementation and co-ordina === Data security ===
    20 KB (2,748 words) - 14:43, 18 April 2023
  • ...o so will result in more failure occurrences and a higher vulnerability to security threats. The two largest benefits to SDE are cost optimization and manpower ...ane. The controller will also run several policy, traffic-engineering, and security applications to control the network elements via APIs. In addition, these A
    36 KB (5,093 words) - 11:03, 17 February 2020
  • ...ources and efforts are occupied with implementation challenges, as well as security concerns related to the protection of the information of Canadians.</p> ...github.com/kubernetes/kubernetes ]</i></ref> An application container is a standard unit of software that packages code and all its dependencies so the applica
    35 KB (4,861 words) - 15:11, 14 February 2020
  • ...ources and efforts are occupied with implementation challenges, as well as security concerns related to the protection of the information of Canadians.</p> ...ngton. Retrieved 19-July-2019. <i>[https://docs.microsoft.com/en-us/dotnet/standard/microservices-architecture/implement-resilient-applications/monitor-app-hea
    22 KB (2,988 words) - 14:59, 20 February 2020
  • ...cloud-based via a third party provider. The network makes use of industry standard protocols or manufacturing protocols. Both the RTUs and PLCs will operate a ...ntrol systems such as SCADA and IT assets.<ref> Industrial Control Systems Security Events (2019, Novemeber 12) <i>[https://www.publicsafety.gc.ca/cnt/ntnl-scr
    26 KB (3,669 words) - 15:44, 14 February 2020

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)