Search results

Jump to navigation Jump to search

Page title matches

Page text matches

  • * [https://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=16578 Policy on Government Security] ...ps://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=16579 Directive on Departmental Security Management]
    3 KB (364 words) - 09:00, 21 August 2020
  • ...ab.ca/Government_of_Canada_Architectural_Standards Enterprise Architecture Standard main page>>]</b></span> =5. Security & Privacy Architecture=
    2 KB (322 words) - 15:31, 24 July 2020
  • ...the [[Base_Building_Security/Base_Building_Security_Standard|Base Building Security ]] (BBS) page.</span><br> ...mation, links or relevant resources to help everyone improve Base Building Security <br><br>
    6 KB (852 words) - 14:19, 11 June 2020
  • ...ilding_Security/Base_Building_Security_Standard|The Base Building Security Standard]]== ...ilding_Security/Base_Building_Security_Standard|The Base Building Security Standard]]''' ===
    4 KB (627 words) - 15:09, 11 June 2020
  • ...ilding_Security/Base_Building_Security_Standard|The Base Building Security Standard]]</span> ...ilding_Security/Base_Building_Security_Standard|The Base Building Security Standard]] and Mandatory Controls =
    5 KB (700 words) - 14:59, 11 June 2020
  • ...clearances. We have included elements that will be helpful to both IT and Security practitioners, as well. ...owever, the temporary variation will allow departments to grant conditions security statuses in those circumstances where fingerprinting cannot be conducted du
    3 KB (369 words) - 13:12, 14 December 2023
  • ...ilding_Security/Base_Building_Security_Standard|the Base Building Security Standard]] == The following aspects of base building security fall clearly within the scope of PSPC or its sub-organizations:
    4 KB (593 words) - 15:21, 11 June 2020
  • ...e="background: rgb(248, 224, 224); color: black;" scope="col" | [[GC Cyber Security Event Management|Overview]] ...e="background: rgb(248, 224, 224); color: black;" scope="col" | [[GC Cyber Security Event Management Documentation|Documentation]]
    5 KB (631 words) - 09:34, 14 April 2021
  • ...curity-risk-management-approach-procedures.html Government of Canada cloud security risk management approach and procedures] ...security-control-profile-cloud-based-it-services.html Government of Canada Security Control Profile for Cloud-based GC Services]
    10 KB (1,154 words) - 01:19, 8 April 2020
  • Editing GC Cyber Security Event Management Tools and Templates ...d: rgb(248, 224, 224); color: black;" width="16%" scope="col" | [[GC Cyber Security Event Management|Overview]]
    7 KB (1,007 words) - 09:32, 14 April 2021
  • ...e_Building_Security/Base_Building_Security_Standard|Base Building Security Standard]] == === What is base building security vs tenant security? ===
    13 KB (2,092 words) - 15:35, 11 June 2020
  • .../ss/programs-and-services/financial-operations/procurement-and-contracting/security-contracts Mysource Link]</font> = Security in Contracts =
    10 KB (1,407 words) - 12:06, 2 May 2024
  • ...color: #0000EE">Office of the Chief Information Officer (TBS): Information Security</span></u>] (.pdf) ...ment_report_Standard_on_Email_Mgmt_EN.docx <u><span style="color: #0000EE">Standard on Email Management</span></u>] (.docx),
    7 KB (1,007 words) - 13:46, 17 March 2021
  • ...color: #0000EE">Office of the Chief Information Officer (TBS): Information Security</span></u>] (.pdf) ...ment_report_Standard_on_Email_Mgmt_EN.docx <u><span style="color: #0000EE">Standard on Email Management</span></u>] (.docx),
    7 KB (1,007 words) - 13:49, 17 March 2021
  • #Ensure implementation of HTTPS meets the secure connection standard: Departments should consider an HTTPS architecture that allows network security services to function, including web application firewalls (WAF) and network
    2 KB (356 words) - 08:47, 30 March 2020
  • ...ilding_Security/Base_Building_Security_Standard|The Base Building Security Standard]] == ...ontrolling accesses to occupied building areas, normally starting at their Security Operations Zones, either through the use of turnstiles or floor level
    7 KB (1,071 words) - 15:48, 11 June 2020
  • ...rix of required documents for contract initiation and the expected service standard timelines.<h2>[[Tools and Templates]]</h2>Includes a variety of tools, temp [[Security in Contracts]]
    2 KB (218 words) - 14:43, 6 May 2024
  • GC Cloud Security Risk Management Approach for Adopting Cloud ...protection of government data and infrastructure in public cloud. GC Cloud Security Risk Management Approach for adopting Cloud is one of the initiative develo
    4 KB (613 words) - 00:26, 21 January 2020
  • ...S will establish a “Hypertext Transfer Protocol Secure (HTTPS) everywhere” standard that will require departments and agencies to use the [https://www.canada.c [[Category:Government of Canada Enterprise Security Architecture (ESA) Program]]
    4 KB (485 words) - 14:41, 25 August 2020
  • * [https://canadabuys.canada.ca/en/tender-opportunities/unspsc United Nations Standard Products and Services Code (UNSPSC) | CanadaBuys] :<small>The SRCL form must include CISD signature and the applicable security clauses</small><br>
    5 KB (606 words) - 14:41, 7 May 2024
  • == '''Base Building Security Standard''' == This standard is issued under the authority of the Assistant Deputy Minister (ADM), [http
    22 KB (3,221 words) - 15:04, 11 June 2020
  • ..._Building_Security/Base_Building_Security_Standard| Base Building Security Standard]]== ...rogram as it contributes to reducing and delineating costs associated with security measures in real property assets and infrastructure. The levels defined bel
    11 KB (1,523 words) - 15:30, 11 June 2020
  • == GC Cloud Security Risk Management Approach for Adopting Cloud == ...ive#GC_Cloud_Security_Risk_Management_Approach_for_Adopting_Cloud GC Cloud Security Risk Management Approach for adopting Cloud] is one of the initiatives deve
    6 KB (824 words) - 01:59, 8 April 2020
  • ...www.gcpedia.gc.ca/wiki/Cloud_Security_Initiative <span style="color: Snow">Security</span>]] ''' ...security-control-profile-cloud-based-it-services.html Government of Canada Security Control Profile for Cloud-Based GC IT Services]
    12 KB (1,403 words) - 11:47, 9 April 2020
  • ==HTTP Strict Transport Security (HSTS)== HSTS is a simple and widely supported standard to protect visitors by ensuring that their browsers always connect to a web
    7 KB (1,053 words) - 16:01, 4 November 2019
  • ...S will establish a “Hypertext Transfer Protocol Secure (HTTPS) everywhere” standard that will require departments and agencies to use the HTTPS protocol for ex ...d activities for an enterprise-wide implementation of the HTTPS everywhere standard within the GC that will support the provision of secure and reliable web se
    12 KB (1,545 words) - 13:16, 23 October 2018
  • ...S will establish a “Hypertext Transfer Protocol Secure (HTTPS) everywhere” standard that will require departments and agencies to use the HTTPS protocol for ex ...d activities for an enterprise-wide implementation of the HTTPS everywhere standard within the GC that will support the provision of secure and reliable web se
    12 KB (1,546 words) - 14:50, 23 October 2018
  • ...he public service during COVID-19, covering topics like virtual workplace, security and information management, public service values and wellness in the workp ...and the proper management of information. Online courses cover topics like security awareness, the Canada Labour Code, and Access to Information and Privacy.
    6 KB (855 words) - 14:25, 2 March 2021
  • =Part 2: Pay, Equipment, Access & Security= ...: Rehiring current and former students, hiring new students, and obtaining security statuses
    12 KB (1,974 words) - 13:27, 21 May 2020
  • == Standard Documents for Contract Initiation == ....ca/sites/default/files/non-standard_it_approval_request_en.xlsm GOV - Non Standard IT Request Form]
    19 KB (2,611 words) - 15:45, 10 May 2024
  • ...s various considerations related to implementation of the HTTPS everywhere standard for the GC. ...gov/ncas/tips/ST18-006 Compensating website controls] provide services the security required to maintain operations and user trust.
    5 KB (725 words) - 12:25, 5 November 2018
  • ...S will establish a “Hypertext Transfer Protocol Secure (HTTPS) everywhere” standard that will require departments and agencies to use the HTTPS protocol for ex ...d activities for an enterprise-wide implementation of the HTTPS everywhere standard within the GC that will support the provision of secure and reliable web se
    15 KB (2,050 words) - 18:21, 5 October 2022
  • ...estions_and_Answers_guide_for_Departmental_Representatives_-_v1.0.pdf PSPC Standard Protocols for Real Property Construction Projects - Questions & Answers gui ...Standard_Protocols_for_Real_Property_Construction_Projects-V1.2.1.pdf PSPC Standard Protocols for Real Property Construction Projects, December 15 2020, Englis
    13 KB (1,850 words) - 14:16, 20 March 2024
  • ...rix of required documents for contract initiation and the expected service standard timelines.<h2>[[Tools and Templates]]</h2>Includes a variety of tools, temp [[Security in Contracts]]
    3 KB (415 words) - 15:33, 10 May 2024
  • ...s in it, it will represent the bulk of the GC's data holdings. SSC and its security partners spent a lot of time with these providers. ...sumer market than the enterprise market. They often may not hold that same security accreditation as the hyperscales. This is not the market SSC has captured.
    12 KB (1,788 words) - 12:16, 23 June 2023
  • .../www.gcpedia.gc.ca/wiki/Cloud_Security_Initiative<span style="color: Snow">Security</span>]] ''' ...security-control-profile-cloud-based-it-services.html Government of Canada Security Control Profile for Cloud-Based GC IT Services]
    16 KB (1,963 words) - 17:46, 19 April 2024
  • ...needs to be available for reuse across departments, and to be scanned for security vulnerabilities. ...tion and leveraging corporate level tools like automated scanning of known security vulnerabilities and legal compliance.
    6 KB (881 words) - 15:22, 6 December 2018
  • Version anglaise: [[Base_Building_Security | Base Building Security ]] <br /> ...ntation_-_October_2019_to_now.docx Presentation on Base Building Security Standard from October 2019 to today] - Presentation Powerpoint qui survole la[[NSIB/
    7 KB (1,281 words) - 14:22, 11 June 2020
  • ...onnex.png|link=https://gcconnex.gc.ca/groups/profile/2785549/gc-enterprise-security-architecture-gc-esa]]<br />[[File:ESAcontactus.png|link=mailto:ZZTBSCYBERS@ ...or: black" width="175px" scope="col" " | [[Government of Canada Enterprise Security Architecture (ESA) Program|ESA Program Overview]]
    14 KB (1,958 words) - 09:41, 14 April 2021
  • ...Canadian intelligence analysts and their managers. It also aims to set the standard for professional development in the intelligence analysis community in Cana ...y clearance, whose responsibilities include the formal analysis and use of security and intelligence products, and whose organizations are represented on the S
    8 KB (1,151 words) - 09:25, 26 November 2020
  • A commercially available offering procured and security-assessed for the use of all government organizations. In this deployment mo * Security Monitoring
    28 KB (4,147 words) - 12:41, 26 November 2020
  • The GC Enterprise Architecture standard is part of the [https://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=15249 Directi ...re data is stored in a secure manner in accordance with the National Cyber Security Strategy and the Privacy Act
    9 KB (1,208 words) - 14:47, 15 February 2021
  • |'''Security Requirement Checklist (SRCL) signed by Security Contracting''' A service standard is a public commitment to a measureable level of performance that clients c
    7 KB (975 words) - 13:50, 6 May 2024
  • ===TBS-RAS Service Standard === ===Security Classification===
    27 KB (3,874 words) - 12:22, 4 October 2021
  • ...ness, information/data, application and technology architecture (including security and privacy) for the solution - in as much detail as is required to move to ...he reference architecture documents available, informing architects of the standard patterns and considerations for preparing architecture in particular define
    17 KB (2,199 words) - 16:11, 30 October 2020
  • ...would be to protect and advance the public interest in health, safety and security, the quality of the environment, and the social and economic well-being of ...nd Canadians, and minimize adverse impacts on competition, health, safety, security, the environment or the economy.
    14 KB (2,027 words) - 23:32, 3 October 2021
  • <li><strong>[https://www.tbs-sct.canada.ca/pol/doc-eng.aspx?id=32716 Standard on Systems that Manage Information and Data]</strong></li> ...walk: Standard on Electronic Documents and Records Management Solutions to Standard on Systems that Manage Information and Data (in English only)]</strong></li
    18 KB (2,540 words) - 12:16, 6 February 2023
  • | The Digital/Architectural Standard || TBS || Information | width=50%| Standard on Automated Decision Making and Algorithmic Assessment || width=25% | TBS
    16 KB (1,914 words) - 14:48, 27 December 2019
  • For standard furniture requirements (excluding office chairs), the BAO will contact [[Ma ...[[Mailto:security.contracting-soustrait.securite@hc-sc.gc.ca|Contracting Security]] or clearly define that the delivery is to be made to the loading dock onl
    8 KB (1,164 words) - 14:52, 6 May 2024
  • ...behalf of an organization for requirements definitions, service delivery, security and reliability •       Conduct security assessments
    32 KB (4,247 words) - 18:17, 7 March 2022
  • ...protect and advance the public interest in the areas of health, safety and security, the quality of the environment, and the social and economic well-being of ...t charge the user (applicant) a fee are already required to have a service standard in place.
    28 KB (4,002 words) - 16:50, 24 August 2021
  • * 9.1. Security Management * Design and deliver standard, streamlined processes and common data structures
    11 KB (1,391 words) - 10:53, 2 December 2022
  • ...ada.ca/data/en/dataset/cd8fad92-b276-4250-972f-2d6c40ca04fa Reference data standard on Canadian provinces and territories - draft]</u> === This draft reference data provides a standard list of values for all Canadian provinces and territories. The list reflect
    13 KB (1,909 words) - 11:08, 20 June 2023
  • ..._Building_Security/Base_Building_Security_Standard |Base Building Security Standard]] ...ilding_Security/Base_Building_Security_Standard|The Base Building Security Standard]]
    27 KB (4,724 words) - 14:37, 16 June 2020
  • ...behalf of an organization for requirements definitions, service delivery, security and reliability *Conduct security assessments
    50 KB (6,570 words) - 13:58, 21 February 2023
  • ...n can regulate file access by classifying data according to their level of security and by defining a set of rules each user has to abide by. </li> ...ng to access sensitive data. By creating a baseline behavioural profile of standard patterns, the software can detect abnormal or suspicious user activity. Som
    36 KB (4,967 words) - 09:22, 4 February 2020
  • ...PIs facilitate a smoother transfer of data between applications there is a security risk since data ...eing used in almost all applications today. There is a need to measure the security implications brought forth by APIs
    9 KB (1,418 words) - 14:02, 25 October 2018
  • ...ne or many aspects of Business, Information/Data, Application, Technology, Security, and Privacy for reuse by departments with similar business processes or no ...PIs via interoperability standards. Governance manages exemptions from the Standard; however, a decentralized enterprise with multiple service delivery methods
    22 KB (3,060 words) - 10:00, 23 December 2020
  • ...ne or many aspects of Business, Information/Data, Application, Technology, Security, and Privacy for reuse by departments with similar business processes or no ...PIs via interoperability standards. Governance manages exemptions from the Standard; however, a decentralized enterprise with multiple service delivery methods
    23 KB (3,140 words) - 09:56, 23 December 2020
  • ...addition, direct costs are limited to costs that are measurable using the Standard Cost Model and other methodologies generally accepted to measure compliance ...f the risks associated with the flexible option for the health, safety and security of Canadians and/or the Canadian environment and economy should be included
    19 KB (2,763 words) - 22:18, 3 October 2021
  • ...f Information Officer (CIO) responsible for prescribing an enterprise-wide standard on data quality (subsection 4.3.1.1). The 2021-2024 Digital Operations Stra ...the government to avoid duplication and maximize utility, while respecting security and privacy requirements” (subsection 4.3.1.3).
    41 KB (5,794 words) - 16:27, 23 January 2024
  • ** Security clearances ** Sending out an official email response shortly to departments with standard, approved text, including how to contact IRCC directly
    8 KB (1,214 words) - 11:20, 31 August 2021
  • ...a variety of software, cameras, and sensors.<ref>Canadian Centre for Cyber Security. (2019).<i> [https://cyber.gc.ca/en/glossary Glossary]</i>. Retrieved from ...<p class="inline"> carbon monoxide detector, smoke alarm, and lights. Home security IoT systems include alarms, smart locks, garage door openers, baby monitors
    36 KB (5,326 words) - 14:13, 16 July 2019
  • * Security and privacy standards and guardrails ...ne or many aspects of Business, Information/Data, Application, Technology, Security, and Privacy for reuse by departments with similar business processes or no
    28 KB (3,825 words) - 14:22, 15 September 2021
  • ...gcpedia.gc.ca/wiki/Consultation_Standard_on_Managing_Metadata Consultation Standard on Managing Metadata (GCpedia)]</h3> ...the GC. You can share your ideas, comments and feedback to ensure that the Standard on Managing Metadata is complete, correct, understandable, useful, and real
    21 KB (3,110 words) - 14:10, 6 March 2023
  • ...and rules for the management of the availability, usability, integrity and security of the data and information to enable coherent implementation and co-ordina === Data security ===
    20 KB (2,748 words) - 14:43, 18 April 2023
  • ...o so will result in more failure occurrences and a higher vulnerability to security threats. The two largest benefits to SDE are cost optimization and manpower ...ane. The controller will also run several policy, traffic-engineering, and security applications to control the network elements via APIs. In addition, these A
    36 KB (5,093 words) - 11:03, 17 February 2020
  • ...ources and efforts are occupied with implementation challenges, as well as security concerns related to the protection of the information of Canadians.</p> ...github.com/kubernetes/kubernetes ]</i></ref> An application container is a standard unit of software that packages code and all its dependencies so the applica
    35 KB (4,861 words) - 15:11, 14 February 2020
  • ...ources and efforts are occupied with implementation challenges, as well as security concerns related to the protection of the information of Canadians.</p> ...ngton. Retrieved 19-July-2019. <i>[https://docs.microsoft.com/en-us/dotnet/standard/microservices-architecture/implement-resilient-applications/monitor-app-hea
    22 KB (2,988 words) - 14:59, 20 February 2020
  • ...cloud-based via a third party provider. The network makes use of industry standard protocols or manufacturing protocols. Both the RTUs and PLCs will operate a ...ntrol systems such as SCADA and IT assets.<ref> Industrial Control Systems Security Events (2019, Novemeber 12) <i>[https://www.publicsafety.gc.ca/cnt/ntnl-scr
    26 KB (3,669 words) - 15:44, 14 February 2020
  • * Privacy and Security Regulatory Framework * Data Foundation – Implement (Leverage the standard definition)
    40 KB (5,780 words) - 16:59, 22 February 2023
  • ...partments and agencies should continue to actively engage in international standard-setting and harmonization initiatives aimed at improving international regu ...and plant life or health, prevention of deceptive practices, and national security. However, Canada is obligated to regulate in these areas in a way that does
    33 KB (4,573 words) - 12:26, 15 September 2021
  • ...5-202/ Red Tape Reduction Regulations]''. This methodology is based on the Standard Cost Model, an internationally accepted way to estimate the administrative ...lations Amending the Canadian Aviation Security Regulations, 2012 (Airport Security Programs)]''
    25 KB (3,519 words) - 17:55, 17 August 2021
  • ...esearch-facility Data Analytics Centre], the Multimedia Analytic Tools for Security program, and the [https://nrc.canada.ca/en/research-development/research-co ...Foundation]], he is leading the development of a Software Carbon Intensity standard towards the comparable and interoperable measurement of the environmental i
    9 KB (1,223 words) - 13:36, 24 August 2022
  • ...as being pertinent to DFO projects using AI. These themes are Privacy and Security, Transparency, Accountability, Methodology and Data Quality, Fairness, and * Privacy and Security
    21 KB (3,183 words) - 12:44, 23 December 2022
  • <p>A standard App Store is comprised of several components. On the server side a database ...scalable, and integrated platform to comply with Government of Canada (GC) security policies while being flexible enough to allow members to purchase recommend
    34 KB (4,742 words) - 09:20, 4 February 2020
  • ...ocess to all interested parties, intellectual property rights allowing the standard to be implemented using any type of software (open source as well as propri === Open standard features ===
    80 KB (11,997 words) - 15:03, 26 July 2018
  • Digital Security; <br> ...uirements in the context of cloud computing. || Business Facing || Digital Security
    35 KB (4,692 words) - 15:19, 1 August 2018
  • ...itability, Increased Efficiency in Software Development, Cost Savings, and Security.</p> ...efficient.</p><p class="highlighted mw-collapsible-content"> Additionally, standard infrastructure environments in other regions where the cloud provider opera
    43 KB (6,363 words) - 14:14, 18 February 2020
  • =[https://www.iso.org/standard/39883.html]'''CNSC laboratory achieves a milestone in ISO accreditation'''= [https://www.iso.org/standard/39883.html]Written by: Aslam Ibrahim
    45 KB (6,414 words) - 16:57, 12 November 2021
  • ...ents critical within many inspection programs (for example: assignment of "Standard Lines"). [[Cyclops|Project Cyclops]] also uses NLP to interpret and classif ...he Department for HR processes.  Our other available tools do not meet the security requirements; WebEx is available for unclassified conversations only, and w
    10 KB (1,445 words) - 09:52, 4 July 2022
  • ...came the base standard for further development in wireless standards. This standard was capable of supporting a data rate from 14.4kbps up to 64kbps (maximum), ...poses risks for security. D2D communication requires more complex network security than what is currently available. Communication is possible through the use
    37 KB (5,463 words) - 09:27, 17 February 2020
  • <li>Operation and Security Logs</li> <p><b><u>Data Security</u></b></p>
    29 KB (4,292 words) - 09:30, 17 February 2020
  • ...ne learning and the internet of things (IoT), as well as cloud management, security and developer tools.<ref>Rouse, M. (2016, January 29). Google Cloud Platfor ...ambient.com/how-to/how-to-watch-nest-security-camera-alexa-493 How to view security camera footage on your Amazon Echo devices]</i>. Retrieved from the-ambient
    40 KB (5,813 words) - 14:50, 14 February 2020
  • ...ossible, governments should make accessibility to information and data the standard, without people having to specifically request them. This principle is ofte ...a and information in open and standardized formats while ensuring National Security is not put in jeopardy. This includes access to everything from government
    32 KB (4,685 words) - 09:52, 17 July 2019
  • * protect health, safety, security and the environment ...hat Canada’s regulatory system continues to prioritize the health, safety, security, and social and economic well-being of Canadians, and a sustainable environ
    45 KB (6,005 words) - 14:47, 28 February 2022
  • The Standard Cost Model will be used to measure the administrative burden costs of regul ...tory system's contribution to the protection of Canadians' health, safety, security, the environment and the economy must not be compromised.
    64 KB (9,748 words) - 10:59, 19 August 2021
  • .... They subject that they want to offer their LIDAR technology in robotics, security, and agriculture. Their newest update, called Laser Bear Honeycomb, feature ...several concerns about the cyber security risks associated with them. The security systems as well as failure detection of these vehicles must be extensive i
    37 KB (5,322 words) - 12:49, 6 March 2020
  • ...e:medium;">'''Answer:'''</span> There is no current Canadian public sector standard for cloud capitalization. ...t Cloud Services expenses should always be expensed (OPEX), however the US Standard is suggesting to treat them in the same way as your internal use software.
    91 KB (13,904 words) - 14:31, 26 November 2019
  • ...ents and circumstances and characterizing their impact (on health, safety, security, the environment, or social and economic well-being).</ref> *Potential impacts of the regulation on health and safety, security, the environment, and the social and economic well-being of Canadians;
    60 KB (8,991 words) - 22:36, 3 October 2021
  • ...ormation communication technologies (ICTs) in the context of international security. Her report will be used to help mainstream gender into the Government of C '''Manager, Passenger Protect Program and Targeting Operations, Aviation Security''' <br>
    31 KB (4,582 words) - 15:58, 10 September 2021
  • *'''Protect and advance the public interest''' in health, safety, and security, the quality of the environment, and the social and economic well-being of ...government to enable economic activity and to protect the health, safety, security, and environment of Canadians.
    40 KB (5,493 words) - 11:44, 18 August 2021
  • ...cused:''' We create new but secure innovations by adhering to all relevant security standards. |To detect the misuse of HS Code (an international standard maintained by the World Customs Organization (WCO) that classifies traded p
    22 KB (3,208 words) - 10:52, 20 January 2023
  • ...regulatory options to minimize costs without compromising health, safety, security or the environment. Application of the lens in 2014–15 reduced the potent ...g risk-based alternative approaches that do not compromise health, safety, security or the environment.
    103 KB (14,222 words) - 12:58, 10 November 2021
  • ...regulations should be agile and adaptive enough to ensure health, safety, security and environmental considerations without imposing barriers to innovation an ...need for more risk-based regulatory approaches that ensure health, safety, security, and protection of the environment while also supporting economic competiti
    27 KB (3,661 words) - 15:16, 9 August 2022
  • ...thout compromising the environment, the economy, or the health, safety and security of Canadians. Regulators must summarize the results of the lens’s applica ...s with businesses each year. Regulators must set targets for achieving the standard and report publicly on performance against those standards. Finally, regula
    85 KB (12,487 words) - 11:30, 18 November 2021
  • ...thout compromising the environment, the economy, or the health, safety and security of Canadians. Regulators must summarize the results of the lens’s applica ...s with businesses each year. Regulators must set targets for achieving the standard and report publicly on performance against those standards. Finally, regula
    85 KB (12,481 words) - 02:21, 3 November 2022
  • ...the [https://www.canada.ca/en/government/system/digital-government/online-security-privacy/government-canada-guidance-using-electronic-signatures.html Governm The [https://www.canada.ca/en/government/system/digital-government/online-security-privacy/government-canada-guidance-using-electronic-signatures.html Governm
    43 KB (6,942 words) - 09:43, 8 July 2020
  • ...the [https://www.canada.ca/en/government/system/digital-government/online-security-privacy/government-canada-guidance-using-electronic-signatures.html Governm The [https://www.canada.ca/en/government/system/digital-government/online-security-privacy/government-canada-guidance-using-electronic-signatures.html Governm
    43 KB (6,919 words) - 12:21, 8 July 2020
  • ...justified by a clear rationale in terms of protecting the health, safety, security, social and economic well-being of Canadians, and the environment. ...n on Canadian business, while maintaining or improving the health, safety, security, social and economic well-being of Canadians, and the environment.
    52 KB (7,313 words) - 02:25, 3 November 2022
  • ...also holds professional certifications in Project Management (PMP) and IT Security (CISSP).  Darryl is also a graduate of the CSPS's Direxion Leadership Prog ...t & technology, access to information & privacy, human resources, finance, security, etc.
    62 KB (9,375 words) - 11:20, 2 February 2024
  • ...gital Service and Consumer Journey, Data Management and Data Risk, Privacy Security, Social Disconnect and Organizational Reputation Risk, and Employee Digital ...procedures involved in transactional events.<ref>Canadian Centre for Cyber Security. (2019).<i> [https://cyber.gc.ca/en/glossary Glossary]</i>. Retrieved from
    76 KB (10,608 words) - 14:09, 14 February 2020
  • ...ministers and over 36,000 public service employees who work to improve the standard of living and quality of life for all Canadians by supporting the developme ...hiring manager may direct you to additional resources on our corporate IT security policy.</p>
    22 KB (2,906 words) - 12:24, 20 October 2021
  • <li>Canadian Centre for Cyber Security. (15 mai 2019). [https://cyber.gc.ca/en/guidance/five-practical-ways-make-y ...=12328 Operational Security Standard: Management of Information Technology Security (MITS)]. Récupéré de Governement of Canada</li>
    45 KB (7,013 words) - 14:40, 17 February 2020
  • ...lp-ptsd-5076 ]</i></ref> Through the Innovation for Defense Excellence and Security program, a few projects involving AR and VR have received funding from the ...cate through computers. AR and VR can reduce the barriers presented by the standard computer interface and can offer new and adaptive ways for GC employees and
    43 KB (6,337 words) - 14:51, 24 February 2020
  • | 04-0123|| JUSTIFICATION FOR ENFORCEMENT ACTION – MARINE SECURITY | 09-0361 || SECURITY INCIDENT REPORT
    48 KB (7,048 words) - 15:40, 23 July 2020
  • ...ea Network) et NAS (Network Attached Storage), sur n’importe quel matériel standard du secteur.</li> ...rprise_Security_Architecture_(ESA)_Program Government of Canada Enterprise Security Architecture (ESA) Program]</i>. Récupéré de GCPedia.</ref></p>
    43 KB (6,931 words) - 12:57, 17 February 2020
  • * Increase security ...atus of your modernization strategies to the TBS Oversight Team. This is a standard template that is used to monitor projects with [https://intranet.canada.ca/
    65 KB (9,597 words) - 12:16, 26 May 2022
  • * address security and privacy risks <li>Security screening</li>
    115 KB (17,317 words) - 13:22, 21 July 2021
  • ...netes ]</i></ref> Par ailleurs, un conteneur d’applications est une unité standard de logiciel qui regroupe le code et toutes ses dépendances afin que l’ap ...e : <i>[https://thenewstack.io/ebooks/kubernetes/kubernetes-deployment-and-security-patterns/]</i></ref></p>
    42 KB (6,413 words) - 15:22, 17 February 2020
  • ...the economic development of Canada's natural resources, the North, safety, security, sovereignty, and environmental monitoring. * JAXA ALOS-2: Several Canadian standard coverages provided by Jaxa to the GC, for free.
    21 KB (3,094 words) - 17:14, 14 February 2024
  • ...atives covered a wide range of sectors—from health and the environment, to security and trade. The vast majority of the identified initiatives (75%) were not e ...icy instrument to enable economic activity and protect the health, safety, security, and environment of Canadians.
    75 KB (10,719 words) - 16:37, 12 July 2022
  • ...disaster to ensure the delivery of critical services affecting the safety, security, and economic viability of Canadian citizens continues to operate normally. ...er Recovery Management program in response to the TBS Policy on Government Security to provide IT service continuity in a timely and efficient manner.
    191 KB (27,163 words) - 10:49, 16 June 2023
  • ...nted by emerging technologies and advanced analytics while balancing cyber security risks, Lynette has a track record of successfully leading large-scale digit ...ishing digital service delivery standards, and enterprise architecture and security assessments for the Department. </p>
    99 KB (15,058 words) - 14:39, 20 February 2024
  • ...ffective regulations to protect our environment and the health, safety and security of Canadians. * security
    59 KB (8,197 words) - 10:39, 9 August 2022
  • *'''Protect and advance the public interest''' in health, safety and security, the quality of the environment, and the social and economic well-being of ...o emergencies that pose major risks to health, safety, the environment, or security;
    97 KB (14,669 words) - 11:42, 14 September 2021
  • ...ntives to encourage technological advances to reduce pollution, safety, or security beyond what is required by the regulations. Thus, market-oriented approache ...ertain pollutant, regulators should not automatically set a zero tolerance standard without first considering other levels and trying to maximize the net benef
    137 KB (21,323 words) - 12:48, 18 August 2021
  • |Regulations Amending the Canadian Aviation Security Regulations, 2012 (Enhanced Access Controls), SOR/2016-039 ...sted by April 1, 2014, also reported on performance in meeting the service standard
    38 KB (5,147 words) - 17:07, 12 July 2022
  • ...g opportunities which are individuals who are furthest away from the above standard. |Internal Integrity and Security Officer, Integrity Services Branch
    74 KB (10,349 words) - 13:24, 7 February 2024
  • ...ts and delivery, parliamentary reporting and provides facility management, security and procurement services to the whole Department. It also manages the depar ...ic Planning, Head of Development Evaluation, and Director General for Food Security and Environment. In her most recent position she has been overseeing the im
    87 KB (13,130 words) - 21:50, 9 November 2022
  • ...has a strong background in public administration, international relations, security, emergency management, and consular affairs. She has received several accol |Transport Canada, Safety and Security
    146 KB (21,578 words) - 09:42, 11 February 2021
  • ...of the largest public facing digital services against the Digital Service Standard, helping teams across government meet user needs and transform the way they ...us importants services numériques publics par rapport à la Digital Service Standard, aidant les équipes de l’ensemble du gouvernement à répondre aux besoi
    179 KB (27,529 words) - 19:40, 2 March 2020
  • ...ambient.com/how-to/how-to-watch-nest-security-camera-alexa-493 How to view security camera footage on your Amazon Echo devices]</i>. Récupéré de the-ambient ...nAttack<ref>Arntz, P. (28 juillet 2018). <i>[https://blog.malwarebytes.com/security-world/2018/07/whats-the-real-value-and-danger-of-smart-assistants/ What’s
    49 KB (7,278 words) - 10:39, 18 February 2020
  • ..., and hold manufacturers of these technologies accountable for the digital security and safety of their products. The technology industry has fielded vulnerabl ...t AI advancements reflect Canadian values". To establish an evidence-based standard of the current public perception of AI and its development, with the goal o
    84 KB (12,591 words) - 14:30, 21 February 2023