Search results

Jump to navigation Jump to search
  • ...e:230420 - LCCP CUB.odp|This]] is the test of this platform for sharing of protected A documents.
    103 bytes (18 words) - 14:30, 23 April 2020
  • ...tion-itsp40111 Cryptographic Algorithms for UNCLASSIFIED, PROTECTED A, and PROTECTED B Information]
    3 KB (364 words) - 09:00, 21 August 2020
  • There are different docs for Protected A or B. Complete docs as per your rating. The below is taken from the TC on ###For Systems rated Unclassified and Protected A:
    6 KB (885 words) - 11:11, 12 February 2019
  • For Protected A Data, it can reside outside of Canada, provided the country is listed in
    2 KB (322 words) - 15:31, 24 July 2020
  • ...PSPC #TranslationBureau’s new #GClingua solution? #GClingua is hosted on a Protected B cloud that is accessible from anywhere, which will allow for easy and sec ...sy-to-access interface, a secure environment that supports Protected A and Protected B documents, and many features designed to simplify request processing. Tra
    10 KB (1,403 words) - 15:24, 25 March 2022
  • '''Step 1: IT Infrastructure/Protected B cloud environment''' ...liverables for the project are highly dependent on successfully securing a protected B cloud environment.
    7 KB (1,005 words) - 10:50, 10 January 2022
  • ...pace with digital revolution and to help protect and enable visibility of PROTECTED B information transmitted to and from public cloud service. The implementation of SCED project will enable the use of PROTECTED B cloud.
    12 KB (1,788 words) - 12:16, 23 June 2023
  • ...mine any breaches of information and make sure confidential information is protected. In addition, the GC educates its employees on DLP strategies that they sho ...value for SSC. Much of the information SSC has access to is classified as protected. As such, SSC should take any measure possible to protect and monitor this
    6 KB (859 words) - 14:04, 25 October 2018
  • ...D C, CONFIDENTIAL, SECRET, TOP SECRET) cannot be deployed to public Cloud. Protected B and unclassified data are deemed appropriate for public Cloud deployment, '''Q:''' How is the security and confidentiality of data protected?
    28 KB (4,147 words) - 12:41, 26 November 2020
  • File sharing platform for sharing non-protected files externally. |File Sharing – Protected B
    13 KB (1,794 words) - 17:25, 17 February 2022
  • **Password protected pages
    3 KB (452 words) - 13:18, 23 November 2021
  • *Disable WPS (Wi-Fi Protected Setup). Tools can be used to leverage this feature in order to steal passwo ...adian Internet Registration Authority (CIRA) have recently launched a free protected DNS service that prevents users from connecting to malicious websites and h
    10 KB (1,518 words) - 11:13, 27 May 2020
  • ...ies. Common examples of protected attributes are race and gender. Relevant protected attributes for the application of the system must be identified in order to ...ce between the values of a metric applied across the groups defined by a ''protected attribute''.
    21 KB (3,183 words) - 12:44, 23 December 2022
  • ...lessons learned and their plan on migration their system to the cloud once Protected B cloud becomes available.</td><td style="width:25%">GAC</td><td style="wid
    9 KB (1,331 words) - 08:49, 6 September 2019
  • ...commercially available Public Cloud contracts for Unclassified Data and a Protected B Framework (IaaS/PaaS) with AWS and Microsoft that customers can utilize.
    3 KB (500 words) - 01:49, 8 April 2020
  • With the needs of securing protected B data in a Public cloud, the office of GC Chief Technology Officer develop
    4 KB (613 words) - 00:26, 21 January 2020
  • |PROTECTED "A" |PROTECTED "B"
    10 KB (1,407 words) - 12:06, 2 May 2024
  • | Road to Protected &lsquo;B&rsquo; Cloud || TBS/IMTD || Information
    6 KB (688 words) - 14:49, 27 December 2019
  • ...ling the secure sharing of audio, video, and documents in real-time (up to Protected B).  VidCruiter is a versatile platform, which allows users to schedule li ...and while MS Teams is available for internal HC/PHAC conversations at the Protected B level, any MS Teams meetings that include external participants are consi
    10 KB (1,445 words) - 09:52, 4 July 2022
  • ...acker to establish rogue websites that will appear to belong to the domain protected by the wildcard certificate. * Compromise of the private key renders all TLS sessions protected by that private key vulnerable; the use of a cipher suite supporting [https
    9 KB (1,365 words) - 18:13, 5 October 2022
  • *Ensure that teleconferences are set to private, as well as password protected. ...tools for collaboration with colleagues, starting with Microsoft Teams (at Protected B if your departmental tenancy has been accredited to that level, or unclas
    13 KB (1,884 words) - 10:25, 20 July 2020
  • All information provided to AISB is protected and can only be accessed as per the provisions of the Access to Information
    4 KB (571 words) - 09:12, 12 February 2024
  • * Forms will have protected B status, on forward agenda, but no specific updates at this time
    3 KB (543 words) - 14:05, 13 December 2023
  • | image = [[Image:protected.jpg|30px|Protected]] [[Category: Protected]]
    13 KB (2,003 words) - 17:38, 31 July 2019
  • * Design web services so that they are protected from common security vulnerabilities such as SQL injection and others descr
    5 KB (753 words) - 10:29, 8 February 2021
  • With the needs of securing protected B data in a Public cloud, the office of GC Chief Technology Officer develop
    6 KB (824 words) - 01:59, 8 April 2020
  • ** Capability for hosting Protected B content
    5 KB (723 words) - 13:07, 8 May 2024
  • ...accessible, infinitely scalable and secure by design. It's also the first Protected-B enterprise SAAS cloud-based solution in the Government of Canada. ...Under my leadership, the Cloud Competency Centre Division has delivered a Protected B Cloud environment on Amazon Web Services (AWS), migrated over 20 applicat
    11 KB (1,548 words) - 12:29, 12 April 2022
  • |Never share protected or sensitive information, unless you have express consent from your departm
    5 KB (789 words) - 09:04, 24 April 2020
  • ...rants authorization of a cloud-based service to process, store or transmit protected GC information''
    8 KB (993 words) - 11:56, 7 April 2021
  • * Challenge: external stakeholder sites that are password protected and how to meet policy requirements for these
    5 KB (741 words) - 14:26, 30 November 2021
  • * Design web services so that they are protected from common security vulnerabilities such as SQL injection and others descr
    6 KB (834 words) - 12:11, 5 November 2018
  • | image = [[Image:protected.jpg|30px|Protected]] [[Category: Protected]]
    16 KB (2,617 words) - 17:38, 31 July 2019
  • ...tutions that the rights and safety of Anglophones and Francophones must be protected even in emergencies.
    12 KB (1,658 words) - 07:51, 23 June 2022
  • ...ion and can be used in combination with other biometric technology to make protected systems more secure.
    8 KB (1,217 words) - 14:05, 25 October 2018
  • * If you have one, use BlackBerry Messenger Enterprise for up to Protected B work 
    7 KB (1,085 words) - 13:47, 20 May 2020
  • ...ell as democratic rights, mobility rights, legal rights and equality right protected in the Charter. It also informs youth of how these rights and freedoms are This [https://www.canada.ca/en/canadian-heritage/services/how-rights-protected/guide-canadian-charter-rights-freedoms.html online guide], revised in 2018,
    10 KB (1,549 words) - 16:15, 4 July 2019
  • ...including terrestrial (land and freshwater) and marine areas. They include protected areas as well as other effective area-based conservation measures.
    8 KB (1,188 words) - 18:42, 20 January 2022
  • ...ing with AWS to verify their ability to meet security assurance needed for protected B, medium integrity, and medium availability (PBMM) on the cloud. AWS is al
    9 KB (1,387 words) - 14:06, 25 October 2018
  • ...t/Cryptography Cryptographic Algorithms for Unclassified, Protected A, and Protected B Information]
    22 KB (3,507 words) - 11:24, 30 September 2019
  • Members should note that personal information is protected from disclosure under the ''Privacy Act'' and the ''Access to Information A
    9 KB (1,362 words) - 19:09, 27 September 2022
  • ...cision: MGen Stuart was Lee's cavalry commander who provided intelligence, protected the army's flanks and raided. Prior to Gettysburg, Stuart took his three b
    9 KB (1,374 words) - 09:39, 29 May 2023
  • ...e able to work on both personal and work devices with '''information up to Protected A.'''
    14 KB (1,767 words) - 14:53, 14 July 2020
  • ...ed at the beginning of the game. Share classified information only - up to Protected B.
    9 KB (1,443 words) - 20:15, 14 January 2023
  • ...so, we can ensure that the rights of Indigenous communities are upheld and protected.
    9 KB (1,284 words) - 09:45, 5 January 2024
  • | Canadian Digital Service Protected B Cloud – CRA Discovery || CDS || Consent <span style="color:red;">!</spa
    16 KB (1,914 words) - 14:48, 27 December 2019
  • * Data is protected both in transit and when presented in the user's web browser;
    12 KB (1,545 words) - 13:16, 23 October 2018
  • * Data is protected both in transit and when presented in the user's web browser;
    12 KB (1,546 words) - 14:50, 23 October 2018
  • ...arePoint) nor have a need to send and receive email with information above protected B.<br>
    12 KB (1,974 words) - 13:27, 21 May 2020
  • Any important links which do not need to protected can be shared directly in this section.
    12 KB (1,497 words) - 15:21, 28 April 2020
  • ...ts may offer application control to determine which application can access protected data.</li> ...The goal of this act is to assure citizens have their personal information protected by appropriate safeguards in accordance to their right to access their pers
    36 KB (4,967 words) - 09:22, 4 February 2020
  • ...ompromise of GC IT assets and infrastructures in a generic internet-facing Protected B environment.
    14 KB (1,958 words) - 09:41, 14 April 2021
  • ...structured in a way that required a discreet handling of the information. Protected B information was not provided to anyone without proof of cause.
    13 KB (2,092 words) - 15:35, 11 June 2020
  • ...tory of LLMC participants, grouped by Circle. This document is '''password protected''' and is searchable by typing Control+F on your keyboard. You have receive
    12 KB (1,733 words) - 10:58, 9 May 2024
  • * Data is protected both in transit and when presented in the user's web browser;
    15 KB (2,050 words) - 18:21, 5 October 2022
  • ...tory of LLMC participants, grouped by Circle. This document is '''password protected''' and is searchable by typing control+F on your keyboard. You have receive
    13 KB (1,908 words) - 21:28, 17 April 2024
  • *That are categorized at the protected B level or below‎ using a deployment model other than public cloud for ap
    12 KB (1,886 words) - 09:12, 7 October 2021
  • ...team to gather more information about their goals, standards and views on Protected “B” storage issues and future solutions (Monthly Reports.xlsx).  They I explored the availability of Protected “B” storage options in PHAC.  I found that decisions had not been made
    27 KB (4,423 words) - 09:42, 30 March 2020
  • ...ss-to-protected-b-cloud-services-pdf?language=en Enabling Secure Access to Protected B Cloud Services, 2019-09-19] ...ss-to-protected-b-cloud-services-pdf?language=en Enabling Secure Access to Protected B Cloud Services, 2019-09-19]
    50 KB (6,570 words) - 13:58, 21 February 2023
  • ...d in the TB Directive on Service and Digital. Sensitive data (Protected B, Protected C, or Classified) should be held in systems located within the geographic b
    41 KB (5,794 words) - 16:27, 23 January 2024
  • ...boundary in which servers containing the organization’s “crown jewels” are protected with an additional layer – though distributed data and the cloud make thi
    18 KB (2,647 words) - 13:47, 17 July 2019
  • 4.1.1.2.4That are categorized at the protected B level or below‎ using a deployment model other than public cloud for ap
    17 KB (2,676 words) - 13:20, 30 January 2023
  • ...Viva Insights helps people and businesses thrive with data-driven, privacy-protected insights and recommendations to improve productivity and well-being.
    27 KB (3,893 words) - 14:03, 5 October 2023
  • ...ensure that the confidentiality of specific stakeholder comments has been protected? ...ensure that the confidentiality of specific stakeholder comments has been protected?
    60 KB (8,991 words) - 22:36, 3 October 2021
  • ...<b>11:30-12:30</b> || style="background-color:#F7DCF0;"| <b>The Journey to Protected B Cloud</b><br> <i>Tyler Moule (CCCS)</i><br> <i>Pat Nadarajah (SSC)</i><br ...padding:2px; border: 1px solid black;">'''Session Title:''' The Journey to Protected B Cloud</span>
    76 KB (11,707 words) - 14:11, 9 February 2020
  • ...be devised to make these sources accessible to all employees and keep them protected according to existing security and privacy policies. Data architecture iden Keeping data protected in a company is important to keep sensitive information such as industry kn
    40 KB (5,780 words) - 16:59, 22 February 2023
  • ...cations and/or Systems with Information Classification of "Top Secret" or "Protected C"?'''</div> ...ns and/or Systems with Information Classification at or below "Secret" or "Protected B" should be included.
    91 KB (13,904 words) - 14:31, 26 November 2019
  • ...hared and used. The federal government must ensure that data is secure and protected against threats while leveraging it for public good. Can sound management s
    33 KB (4,736 words) - 10:46, 21 December 2022
  • ...st provide reasonable assurance that all obligations in relation to rights protected by section 35 of the Constitution Act, 1982, and international human rights ...y, environment and the social and economic well-being of Canadians remains protected.
    52 KB (7,313 words) - 02:25, 3 November 2022
  • ::<b>4.1.1.2.4</b> That are categorized at the protected B level or below‎ using a deployment model <u><b> other than </u></b> pub
    21 KB (3,384 words) - 14:08, 22 February 2023
  • ...tablished for “unclassified” data, and in 2019 the procurement vehicle for Protected “B” will be in place, dramatically increasing the usage of Cloud Servic
    33 KB (4,467 words) - 15:21, 14 February 2020
  • ...ss-to-protected-b-cloud-services-pdf?language=en Enabling Secure Access to Protected B Cloud Services, 2019-09-19]
    32 KB (4,247 words) - 18:17, 7 March 2022
  • # Equity in the Federal Public Service is Substantive Equality as protected by the Charter
    26 KB (3,994 words) - 09:19, 2 March 2023
  • ...lift off phase. We discuss Cloud Adoption, Workload Migration, Launching a protected-B application (before SCED), partnerships, taking risks, automation and sha ...ough all the paperwork, infrastructure setup and approvals for collecting “Protected B” information. For our small project we estimate it's been over $500,000
    31 KB (4,478 words) - 10:46, 7 October 2020
  • ...Kubernetes]</i></ref> This is a great value to developers as their work is protected and an audit trail of changes is available.</p>
    35 KB (4,861 words) - 15:11, 14 February 2020
  • ...round that is being implemented for applications and platforms that handle Protected B data. Working with SSC, TC has implemented SCED as a pilot project for tw * Completed implementation of security controls required for Protected-B Cloud environment.
    191 KB (27,163 words) - 10:49, 16 June 2023
  • ...original governments and ensure that all obligations in relation to rights protected by section 35 of the Constitution Act, 1982, are met.
    40 KB (5,493 words) - 11:44, 18 August 2021
  • ...o-operatively with other stakeholders to ensure the safety of Canadians is protected while balancing economic interests of the marketplace.</li>
    37 KB (5,322 words) - 12:49, 6 March 2020
  • ...information including server IP addresses might not remain confidential or protected. Rigorous use of guidelines, procedures, and frameworks should be used to h
    37 KB (5,007 words) - 10:12, 5 December 2019
  • ...being collected, compiled, and used for projects, the information must be protected and anonymized before the data sets can be published. The digital governanc
    33 KB (4,853 words) - 10:44, 22 July 2019
  • ...haring, and that sensitive information should continue to be appropriately protected.
    45 KB (6,005 words) - 14:47, 28 February 2022
  • ...n complianceweek-accelerating-protected-workloads-sept-2020fr Accelerating Protected Workloads (Sept 2020)]
    65 KB (9,597 words) - 12:16, 26 May 2022
  • ...ensure that they meet all obligations that may exist in relation to rights protected by section 35 of the ''Constitution Act, 1982''.
    59 KB (8,381 words) - 13:56, 14 September 2021
  • ...ic cloud is the recommended architecture for solutions that are considered Protected B or below from an identified security level.</p> <p>Solutions above Protected B must use Enterprise Data Centres. </p>
    115 KB (17,317 words) - 13:22, 21 July 2021
  • ...nments to ensure that all obligations that may exist in relation to rights protected by section 35 of the Constitution Act, 1982 are met. Further guidance on Ab
    97 KB (14,669 words) - 11:42, 14 September 2021