Open Government Portal
Found 10 records similar to Cross Domain Solutions (ITSE.80.030)
"Your mobile device provides a convenient and flexible way to work anywhere or at anytime. While mobile devices play a vital role in the day-to-day operations of organizations and agencies, their use can also pose a threat to information and networks. Mobile devices are attractive targets that provide unique opportunities for threat actors intent on gathering information, because they can contain vast amounts of sensitive and personal information. A compromised device has the potential to allow unauthorized access to your departmental network, placing not only your own information at risk, but also that of the organization.
The Privacy Act (PA) protects the privacy of Canadian citizens and permanent residents against the unauthorized use and disclosure of personal information about themselves held by a government institution. It also provides individuals with a right of access to that information and the right to correct inaccurate personal information. In addition, the PA legislates how the government collects, stores, disposes, uses and discloses personal information. Section 72 of the PA requires that the Head of every federal government institution submit an annual report to Parliament on the administration of this Act over the fiscal year.
Based on the VECPS and in accordance with Section 6 of the Public Servants Disclosure Protection Act, SSC developed its own Organizational Code in June 2013 to provide guidance on ethical behaviour and decision-making in the context of SSC's day-to-day operations. Adherence to both the VECPS and to SSC's Organizational Code is a condition of employment. The values and expected behaviours outlined in SSC's Organizational Code are intended to promote ethical decision-making and behaviour, and guide employees in the performance of their duties. The SSC Organizational Code also recognizes the unique role SSC plays in activities related to procurement, hospitality, gifts, and information security.
As an employee, you’re not only privy to important and sensitive information, but you’re also responsible for protecting this information. Inadequate information technology security (ITS) practices provide cyber threat actors with an easy way to bring down your organization’s network and give them access to sensitive information. To keep threat actors out, there are some common IT security challenges you can avoid.
The Department completed 241 privacy requests, totaling 24,483 pages processed, ensuring Canadians have the right of access to their personal information.
The Department completed 584 privacy requests, totaling 14,382 pages processed, ensuring Canadians have the right of access to their personal information.
The Privacy Act came into effect on July 1, 1983. The Act protects the privacy of individuals with respect to their personal information that is held by government institutions, and provides these individuals with a right of access to their information. In addition, the Privacy Act gives individuals substantial control over the collection, use and disclosure of their personal information. Section 72 of the Privacy Act requires that the head of every government institution submit an annual report to Parliament, detailing the administration of the Act within the institution for each fiscal year.
The information in this publication identifies and describes acceptable security protocols and their appropriate methods of use to ensure continued protection of UNCLASSIFIED, PROTECTED A, and PROTECTED B information.
The Privacy Act provides members of the public with the legislated right to access and request the correction of their personal information under the control of federal government institutions. The Act also imposes strict obligations related to the collection, accuracy, use, disclosure, retention and disposition of personal information.
Veterans Affairs Canada (VAC) and the Office of the Veterans Ombudsman (OVO) take very seriously the responsibility to protect the privacy and rights of all Veterans and their families.
These annual reports on the administration of the Privacy Act outline how VAC and the OVO fulfilled their responsibilities under the Privacy Act during each fiscal year beginning April 1 and ending March 31.
Organizations and their networks are frequently targeted by a wide variety of threat actors looking to steal information. Cyber intruders are technologically savvy, vulnerability conscious, and aggressively agile; a successful intrusion can quickly lead to the loss of data integrity and confidentiality. Employees are privy to important and sensitive information, and as a result, often receive malicious emails that are intended to provide cyber intruders access to this information. Everyone needs to be aware of the threats and take care to ensure that organizational information is protected and secure.