Search results

Jump to navigation Jump to search
  • *Ensure that teleconferences are set to private, as well as password protected. ...tools for collaboration with colleagues, starting with Microsoft Teams (at Protected B if your departmental tenancy has been accredited to that level, or unclas
    13 KB (1,884 words) - 10:25, 20 July 2020
  • All information provided to AISB is protected and can only be accessed as per the provisions of the Access to Information
    4 KB (571 words) - 09:12, 12 February 2024
  • * Forms will have protected B status, on forward agenda, but no specific updates at this time
    3 KB (543 words) - 14:05, 13 December 2023
  • | image = [[Image:protected.jpg|30px|Protected]] [[Category: Protected]]
    13 KB (2,003 words) - 17:38, 31 July 2019
  • * Design web services so that they are protected from common security vulnerabilities such as SQL injection and others descr
    5 KB (753 words) - 10:29, 8 February 2021
  • With the needs of securing protected B data in a Public cloud, the office of GC Chief Technology Officer develop
    6 KB (824 words) - 01:59, 8 April 2020
  • ** Capability for hosting Protected B content
    5 KB (723 words) - 13:07, 8 May 2024
  • ...accessible, infinitely scalable and secure by design. It's also the first Protected-B enterprise SAAS cloud-based solution in the Government of Canada. ...Under my leadership, the Cloud Competency Centre Division has delivered a Protected B Cloud environment on Amazon Web Services (AWS), migrated over 20 applicat
    11 KB (1,548 words) - 12:29, 12 April 2022
  • |Never share protected or sensitive information, unless you have express consent from your departm
    5 KB (789 words) - 09:04, 24 April 2020
  • ...rants authorization of a cloud-based service to process, store or transmit protected GC information''
    8 KB (993 words) - 11:56, 7 April 2021
  • * Challenge: external stakeholder sites that are password protected and how to meet policy requirements for these
    5 KB (741 words) - 14:26, 30 November 2021
  • * Design web services so that they are protected from common security vulnerabilities such as SQL injection and others descr
    6 KB (834 words) - 12:11, 5 November 2018
  • | image = [[Image:protected.jpg|30px|Protected]] [[Category: Protected]]
    16 KB (2,617 words) - 17:38, 31 July 2019
  • ...tutions that the rights and safety of Anglophones and Francophones must be protected even in emergencies.
    12 KB (1,658 words) - 07:51, 23 June 2022
  • ...ion and can be used in combination with other biometric technology to make protected systems more secure.
    8 KB (1,217 words) - 14:05, 25 October 2018
  • * If you have one, use BlackBerry Messenger Enterprise for up to Protected B work 
    7 KB (1,085 words) - 13:47, 20 May 2020
  • ...ell as democratic rights, mobility rights, legal rights and equality right protected in the Charter. It also informs youth of how these rights and freedoms are This [https://www.canada.ca/en/canadian-heritage/services/how-rights-protected/guide-canadian-charter-rights-freedoms.html online guide], revised in 2018,
    10 KB (1,549 words) - 16:15, 4 July 2019
  • ...including terrestrial (land and freshwater) and marine areas. They include protected areas as well as other effective area-based conservation measures.
    8 KB (1,188 words) - 18:42, 20 January 2022
  • ...ing with AWS to verify their ability to meet security assurance needed for protected B, medium integrity, and medium availability (PBMM) on the cloud. AWS is al
    9 KB (1,387 words) - 14:06, 25 October 2018
  • ...t/Cryptography Cryptographic Algorithms for Unclassified, Protected A, and Protected B Information]
    22 KB (3,507 words) - 11:24, 30 September 2019

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)