archive-ca.com » CA » I » INFOCONSOMMATION.CA

Total: 1253

Choose link from "Titles, links and description words view":

Or switch to "Titles and links view".
  • Mobile Protection Toolbox - Canada's Anti-Spam Legislation
    have weaker security systems than others A weak security system can make your device and the information stored in the cloud vulnerable to phishers spammers hackers and other cyber criminals Tips Choose a cloud service that is well known and trusted or has been recommended by friends or family members who have used the service Look for a cloud storage service which encrypts your data so that third parties and the storage service you are dealing with cannot see your file names or open and read the content This information should be detailed on the company s website If the company does not do so for you consider encrypting your data yourself before using a cloud storage service in order to protect your information Know the limitations of your cloud storage service before you start uploading Read about the features offered and make sure you understand what they mean Find out what backups are in place in the event of data loss Search for a cloud storage service which gives you control to set file and folder settings to manage who can access and make changes to your files Contact a representative of the company you are considering using if

    Original URL path: http://www.infoconsommation.ca/eic/site/030.nsf/eng/00244.html (2016-02-13)
    Open archived version from archive


  • Mobile Protection Toolbox - Canada's Anti-Spam Legislation
    data loss theft malware spyware hackers and viruses A mobile virus can drain your device s battery erase and steal important personal and or business related information and even render certain features of your device nonfunctional Mobile malware can send infected files to your contacts send mass messages without your permission and make expensive calls from your device resulting in unwanted billing Tips When searching for mobile security software choose something that is easy to understand and simple and straightforward to install and operate Look for security software or a device with built in functionality that allows you to remotely lock your screen and or wipe the information stored on your device Some software will sound an alarm if someone tries to get into your phone with a wrong password Scheduled and on demand scans online management options remote backups an activity log parental control monitoring and accepted and blocked number lists are great features to look for when choosing mobile security software Look for software that clearly lists a help and support line for contacting a representative who can answer any questions you might have about the software Take caution when choosing a security software provider Look for companies

    Original URL path: http://www.infoconsommation.ca/eic/site/030.nsf/eng/00243.html (2016-02-13)
    Open archived version from archive

  • Mobile Protection Toolbox - Canada's Anti-Spam Legislation
    and it is important not to forget this Free and regular offers via social networking games and applications text messages SMS fake log in pages and posing as contacts in your trusted network are all common techniques hackers and other online criminals use to get your personal information money and more Tips Be careful what material you post online it could be used to gain access to your personal information Some criminals need very little information to conduct criminal activities such as identity theft Never give out your social networking account password or other log in credentials and regularly update your mobile device s security settings Always log out of your social network account after each use Simply closing the application may leave you logged into your account Do not take free offers at face value Avoid in game credits that require you to purchase or sign up for another service Familiarize yourself with the privacy settings offered by your social networking site You should have the option to control who has access to view certain information on your profile Beware of friend requests or any other request from someone you do not know Some social networking sites will send

    Original URL path: http://www.infoconsommation.ca/eic/site/030.nsf/eng/00246.html (2016-02-13)
    Open archived version from archive



  • Mobile Protection Toolbox - Canada's Anti-Spam Legislation
    to get to you and your device Learn to recognize warning signs Check out Worried it s Spam 5 Things to Look For for tips on how to recognize spam messages If you think a message is fraudulent delete it immediately Fraudulent messages can also be reported to the Spam Reporting Centre Pause before you click always take a few minutes to make sure you know what you are opening

    Original URL path: http://www.infoconsommation.ca/eic/site/030.nsf/eng/00248.html (2016-02-13)
    Open archived version from archive

  • Mobile Protection Toolbox - Canada's Anti-Spam Legislation
    of Canada If you suspect that you may be a target of fraud or if you have fallen victim to fraud and want to report it you should contact the CAFC Fraudulent messages can be reported to the Spam Reporting Centre Complaints If you are unable to resolve a cellphone related dispute directly with a particular provider you can use the services of the Commissioner for Complaints for Telecommunications Services

    Original URL path: http://www.infoconsommation.ca/eic/site/030.nsf/eng/00237.html (2016-02-13)
    Open archived version from archive

  • Privacy Impact Assessment (PIA) - Canada's Anti-Spam Legislation
    time of drafting has also been considered The CASL PIA does not include a review of specialized or institutional specific investigative or enforcement activities being undertaken by Enforcement Agencies These activities to the extent that they involve the collection use or disclosure of personal information have or are to be covered in program PIAs initiated by individual agencies Summary of Privacy Issues Identified In general based on the findings of the present PIA administrative and enforcement activities to be undertaken in conjunction with CASL are likely to present a moderate risk to the privacy of individuals While the supply of personal information in submissions is entirely voluntary information of a sensitive nature may from time to time be collected as it relates to an alleged contravention of the law That information while not intended for purposes of making an administrative decision about a submitter may be used in judicial proceedings and or for purposes of law enforcement In all cases the use of personal information by Enforcement Agencies is to be limited to the purposes for which the information was first collected i e the investigation of CASL contraventions and any authorized enforcement activities Security and safeguards planned for the SRC are to be commensurate with the sensitivity of information compiled Based on a review of the development of the SRC and planned enforcement activities the program is unlikely to attract negative public interest or criticism Notwithstanding the program s general characteristics some of which suggest an elevated project risk recommendations from the CASL PIA where fully adopted are expected reduce the overall level of risk associated with CASL s implementation to a low or acceptable level The table which follows summarizes the privacy risks identified through the PIA process and assigns responsibility for each recommendation to appropriate entities A detailed action plan for outstanding items shall be developed for implementation prior to July 1 2014 Privacy risks identified through the PIA process Issue and recommendation IC Footnote 8 CRTC CB OPC 1 There is presently no policy or agreement in place to establish access and privacy rights or requirements with respect to the Spam Reporting Centre The CRTC in consultation with IC CB and OPC should consider drafting and executing an agreement or policy respecting the use of the SRC the spam intelligence database and other supporting tools and applications if any The agreement should establish privacy and security requirements for the handling or personal information C R C C 2 Privacy protocols for institutions involved in the administration and enforcement of CASL may be inadequate or insufficient in ensuring the proper handling of personal information from the SRC TBS PIA Directive encourages federal institutions collecting using or disclosing personal information to create and implement privacy protocols to help mitigate the privacy impacts emanating from operating programs or activities While a full evaluation of the privacy protocols of the CRTC CB and OPC were beyond the scope of the present PIA each institution will need to evaluate its own

    Original URL path: http://www.infoconsommation.ca/eic/site/030.nsf/eng/00322.html (2016-02-13)
    Open archived version from archive

  • Ready to use articles - Canada's Anti-Spam Legislation
    or business visit www fightspam gc ca to find out what the new law will mean for you This website has been set up by the federal government and includes answers to frequently asked questions about the law You will also find a section on tips on how to protect your personal information and your business from electronic threats Top of page Businesses need to know about Canada s new anti spam law The Parliament of Canada passed a new anti spam law in December 2010 Once this legislation is in force it will Help reduce unwanted emails from appearing in consumers inboxes by requiring companies to gain their consent to receive commercial electronic messages and Protect businesses and consumers alike by helping deter the most damaging and deceptive forms of spam or other electronic threats from occurring in Canada When the new law is in force it will prohibit Sending commercial electronic messages including messages to email addresses and text messages to a cell phone without the recipient s express or implied consent Installation of computer programs on another person s computer system without the express consent of the owner of the computer system or its agent such as an authorized employee Use of false or misleading electronic representations in the promotion of products services or business interests Collection of personal information through accessing a computer system in violation of federal law e g the Criminal Code of Canada and Collection of electronic addresses by the use of computer programs or the use of such addresses without permission a practice known as address harvesting The federal government has set up a website www fightspam gc ca This site posts information about spam and other electronic threats including definitions frequently asked questions about the law and tips for protecting your computer and email accounts Top of page Website delivers useful information about the new anti spam law The federal government is committed to safeguarding the online marketplace for the benefit and protection of both consumers and businesses As a result it has passed a new anti spam law The website www fightspam gc ca contains information about the law as well as advice on how to protect yourself and your electronic devices from being attacked and what you can do to fight spam under the new legislation While on the site Take the online spam quiz to test your knowledge of electronic threats Read the information sheets to learn how to protect yourself or your business from spam and other electronic threats Look at the Frequently Asked Questions For Individuals and Frequently Asked Questions For Businesses and Organizations sections to learn more about the new anti spam law The law targets various types of violations including The sending of commercial electronic messages without express or implied consent The installation of computer programs on another person s computer system without express consent False or misleading electronic representations used to promote products services or business interests and The unauthorized collection of electronic addresses and the collection of personal information by accessing a computer system in contravention of an Act of Parliament Top of page Anti spam law targets include social media and mobile devices The Parliament of Canada passed a new anti spam law in December 2010 Once in force Canada s new anti spam law will require companies to gain consumer consent to receive commercial electronic messages and target malicious attacks on electronic devices of businesses and consumers be they on a home or work computer a wireless tablet or cell phone The law targets various types of violations including The sending of commercial electronic messages without express or implied consent The installation of computer programs on another person s computer system without express consent False or misleading electronic representations used to promote a product service or business and The unauthorized collection of electronic addresses and the collection of personal information by accessing a computer system in contravention of an Act of Parliament These violations can include spam malware spyware address harvesting and false or misleading representations involving the use of any means of telecommunications Short Message Services SMS or text messaging social networking websites uniform resource locators URL and other locators applications blogs and Voice over Internet Protocol VoIP Canada s anti spam law takes a technology neutral approach so that all forms of commercial electronic messages sent by any means of telecommunications are captured under the new law More information and tips are available online at www fightspam gc ca Top of page Sign up for updates on Canada s anti spam law Protect yourself and your computer from malicious spam and other electronic threats by staying up to date on Canada s new anti spam law The federal government will be posting information about regulations timing and other major announcements about the new law on its website www fightspam gc ca You can sign up on the homepage to receive updates Top of page Sign up for the latest on Canada s new anti spam law What does Canada s new anti spam law mean for your organization s marketing plans Find out at www fightspam gc ca Compliance with the law will be mandatory and will apply to any organization that sends commercial messages using electronic channels to sell or promote products or services Therefore consider signing up on the site s homepage to receive related news and updates Spam and other electronic threats such as spyware phishing and malware are a real concern to individuals and businesses and compliance with the law will help your organization maintain the trust and respect of clients and customers Top of page Avoid Spam and Other Electronic Threats How to protect yourself from spam and electronic threats The federal government has passed a new anti spam law Once in force the new legislation will prohibit sending commercial electronic messages including messages to email addresses and social networking accounts and text messages to a cell phone without the recipient s express

    Original URL path: http://www.infoconsommation.ca/eic/site/030.nsf/eng/00258.html (2016-02-13)
    Open archived version from archive

  • Print Materials - Canada's Anti-Spam Legislation
    KB Did you know Canada has a new law about spam and other electronic threats Visit fightspam gc ca Worried It s Spam 5 Things to Look for Info card Sharing version JPEG 260 KB Print version PDF 358 KB

    Original URL path: http://www.infoconsommation.ca/eic/site/030.nsf/eng/00259.html (2016-02-13)
    Open archived version from archive



  •