Saturday 30 September 2017

Canada's Cyber Security Strategy

Introduction


Cyberspace is the electronic world created by interconnected networks of information technology and the information on those networks. It is a global commons where more than 1.7 billion people are linked together to exchange ideas, services and friendship.

Canadians are embracing cyberspace:


74% of Canadian households had paid Internet service in 2008;Footnote 2
59% of personal tax filings were electronic in 2008;Footnote 3
67% of Canadians banked online in 2009.Footnote 4

The Canadian economy relies heavily on the Internet:Footnote 1

Canadian online sales in 2007 were estimated at $62.7 billion; and
In 2007, 87% of Canadian businesses used the Internet.
Canadian businesses are moving quickly to adopt the most modern digital applications, including next generation and mobile technologies.

Canada's governments have also become increasingly dependent on the Internet. The federal Government alone now offers more than 130 commonly used services online, including tax returns, employment insurance forms and student loan applications.

Our success in cyberspace is one of our greatest national assets. Protecting this success means protecting our cyber systems against malicious misuse and other destructive attacks. This is a daunting challenge. There is no simple way to detect, identify and recover from attackers who cannot be seen or heard, who leave no physical evidence behind them, and who hide their tracks through a complex web of compromised computers.

Cyber security affects us all, in part because even attackers with only basic skills have the potential to cause real harm. Sophisticated attackers can disrupt the electronic controls of our power grids, water treatment plants and telecommunications networks. They interfere with the production and delivery of basic goods and services provided by our governments and the private sector. They undermine our privacy by stealing our personal information. Dealing with cyber threats in isolation is not enough. Through the implementation of this Strategy, the Government will continue to work with the provinces, territories and the private sector in a concerted effort to address the threats facing Canada and Canadians.

Every year, we detect more attackers than the year before. And every year, those seeking to infiltrate, exploit or attack our cyber systems are more sophisticated and better resourced than the year before. They are investing in their capabilities. We must respond by investing more in ours.

Cyber attacks include the unintentional or unauthorized access, use, manipulation, interruption or destruction (via electronic means) of electronic information and/or the electronic and physical infrastructure used to process, communicate and/or store that information. The severity of the cyber attack determines the appropriate level of response and/or mitigation measures: i.e., cyber security.

The Government is continuing its efforts to help secure Canada's cyber systems and protect Canadians online. Indeed this Strategy is but one element in a series of initiatives designed to protect Canadians. The Government has established the Canadian Cyber Incident Response Centre to monitor and provide mitigation advice on cyber threats, and coordinate the national response to any cyber security incident. The Government will soon introduce legislation to modernize law enforcement's investigative powers, and ensure that technological innovations are not used to evade lawful interceptions of communications supporting criminal activity.

These are important initiatives, but they are no longer sufficient. The threat is becoming more serious. We cannot allow our cyber security efforts to remain fixed on the threat as we understood it in the past. To ensure that our advanced use of cyberspace remains a strategic asset, Canada must anticipate and confront emerging cyber threats. Canada's Cyber Security Strategy is our plan for making cyberspace more secure for all Canadians.

Understanding Cyber Threats


There are various ways to gain access to information in cyberspace. Attackers can exploit vulnerabilities in software and hardware. They can exploit security vulnerabilities by tricking people into opening infected emails or visiting corrupted websites that infect their computers with malicious software. They can take advantage of people who fail to follow basic cyber security practices, such as changing their passwords frequently, updating their antivirus protection on a regular basis, and using only protected wireless networks.

Once they have access to a computer, attackers can steal or distort the information stored on it, corrupt its operations and program it to attack other computers and the systems to which they are connected. In many cases, victims suffer a theft of their identity and/or their personal assets. According to a study by McMaster University,Footnote 5 1.7 million Canadians were victims of identity theft in 2008. The annual cost of identity theft in Canada has been estimated at nearly $1.9 billion. For this reason the Government has amended the Criminal Code to better protect Canadians from identity theft.

Canadian companies can lose the race to bring a product to market, or experience other harm without ever realizing that their losses were caused by a cyber attack. It has been estimated that in a recent one year period, 86% of large Canadian organizations had suffered a cyber attack. The loss of intellectual property as a result of these attacks doubled between 2006 and 2008.Footnote 6

Though certain attack tools and techniques are more costly and sophisticated than others, most cyber attacks share four characteristics that, in part, account for their growing popularity. Cyber attacks are often:

Inexpensive – Many attack tools can be purchased for a modest price or downloaded for free from the Internet;

Easy – Attackers with only basic skills can cause significant damage;

Effective – Even minor attacks can cause extensive damage; and

Low risk – Attackers can evade detection and prosecution by hiding their tracks through a complex web of computers and exploiting gaps in domestic and international legal regimes.

While there is some similarity in the targets and methods of cyber attackers, the nature of the threat posed by each is made distinct by their differing motivations and intentions. Three types of threats are discussed below.

State Sponsored Cyber Espionage and Military Activities

The most sophisticated cyber threats come from the intelligence and military services of foreign states. In most cases, these attackers are well resourced, patient and persistent. Their purpose is to gain political, economic, commercial or military advantage.

All technologically advanced governments and private businesses are vulnerable to state sponsored cyber espionage. Reports from Canada and across the world confirm that these attacks have succeeded in stealing industrial and state secrets, private data and other valuable information.

Some foreign states have declared publicly that cyber attacks are a central element of their military strategy. Some states have been widely accused of using cyber attacks to coincide with – and magnify the effects of – traditional military operations. These cyber attack programs are typically designed to sabotage an adversary's infrastructure and communications. They may also support electronic attacks on an adversary's military equipment and operations. Cyber attacks that disrupt emergency response and public health systems would put lives in danger.

Canada and our allies understand that addressing these risks requires modernizing our military doctrines. It is for this reason that the North Atlantic Treaty Organization (NATO) has adopted several policy documents regarding cyber defence, and like the militaries of our closest allies, the Department of National Defence and the Canadian Forces are examining how Canada can best respond to future cyber attacks.

Terrorist Use of the Internet


Terrorist networks also are moving to incorporate cyber operations into their strategic doctrines. Among many activities, they are using the Internet to support their recruitment, fundraising and propaganda activities.

Terrorists are aware of the potential for using the Western world's dependence on cyber systems as a vulnerability to be exploited. For example, there are now online resources providing advice to terrorists on how to defend their own websites while launching cyber attacks on their enemies. In addition, a number of terrorist groups, including Al-Qaeda, have expressed their intention to launch cyber attacks against Western states. Though experts doubt that terrorists currently have the ability to cause serious damage via cyber attacks, they recognize that this capacity will likely develop over time.

Cybercrime

In much the same way as states have expanded their operations into cyberspace, so too have organized criminals. The more sophisticated among them are turning to skilled cyber attackers to pursue many of their traditional activities, such as identity theft, money laundering and extortion.

Criminals now sell information stolen online, such as credit and debit card numbers, login passwords for computer servers, and malicious software designed to infiltrate and damage targeted systems. Even those of us who are diligent in protecting our personal information online are at risk of having our personal data stolen from the third parties we share it with.

Some criminal organizations are now developing customized attack software. They are using advanced encryption technologies to protect their own assets and trade secrets. Some in the law enforcement and security communities argue that the capabilities of some cyber criminals now rival those of developed states.

The Threat is Evolving


Much like bacteria developing drug resistance to antibiotics, cyber viruses and malicious code are continually evolvingto evade our defences and antivirus software. The evolution of cyber attack tools and techniques has accelerated dangerously in the recent past. Statistics compiled by two well known Internet security companies, Akamai and Symantec, together show that malicious computer programs now originate in more than 190 countries.Footnote 7 More than 60% of all the malicious code ever detected was introduced into cyberspace in 2008Footnote 8 alone.

There is no doubt that the frequency and severity of the cyber threat is accelerating. Protecting Canadians in cyberspace will be a constantly evolving challenge. To effectively address this challenge will require a range of actions and responses, accompanied by continuing investment and vigilance over the long term.

Canada's Cyber Security Strategy is our plan for meeting the cyber threat. The Strategy is built on three pillars:

Canada's Cyber Security Strategy


Canadian researchers have been at the forefront of making cyberspace a reality. This same ingenuity must continue to be applied to predicting, detecting and defeating the cyber threats of tomorrow, and exploiting cyberspace to further Canada's national interests.

1. Securing Government systems – Canadians trust Government with their personal and corporate information, and also trust Government to deliver services to them. They also trust that the Government will act to defend Canada's cyber sovereignty and protect and advance our national security and economic interests. The Government will put in place the necessary structures, tools and personnel to meet its obligations for cyber security.

2. Partnering to secure vital cyber systems outside the federal Government – Canada's economic prosperity and Canadians' security depend on the smooth functioning of systems outside the Government. In cooperation with provincial and territorial governments and the private sector, the Government will support initiatives and take steps to strengthen Canada's cyber resiliency, including that of its critical infrastructure sectors.

3. Helping Canadians to be secure online – The Government will assist Canadians in getting the information they need to protect themselves and their families online, and strengthen the ability of law enforcement agencies to combat cybercrime.

The Strategy:

Reflects Canadian values such as the rule of law, accountability and privacy;
Allows continual improvements to be made to meet emerging threats;
Integrates activity across the Government of Canada;
Emphasizes partnerships with Canadians, provinces, territories, business and academe; and
Builds upon our close working relationships with our allies.
Canada's Cyber Security Strategy will strengthen our cyber systems and critical infrastructure sectors, support economic growth and protect Canadians as they connect to each other and to the world. We all have a role to play as we take full advantage of cyberspace to build a safe, resilient and innovative Canada.

The Government has sought input from stakeholders on a wide range of cyber threats and security practices. Collaboration, especially internationally, is essential if cyberspace is to be secured. Canada will benefit from being seen internationally and domestically as a trusted partner in making cyberspace safer.

Three of our closest security and intelligence partners, the United States, the United Kingdom and Australia, recently released their own plans to secure cyberspace. Many of the guiding principles and operational priorities set out in those reports resemble our own. This complementarity reflects our shared experiences in dealing with cyber security, and demonstrates our determination to enhance our collective security by leveraging each ally's domestic cyber regimes. Like Canada, our allies intend to review and update their plans regularly in response to evolution in cyber security technologies and practices, and the cyber threat environment.

Canada will also build on its existing engagement in cyber security discussions at key international fora, such as the United Nations, NATO and the Group of Eight. We are one of the non-European states that have signed the Council of Europe's Convention on Cybercrime, and the Government is preparing legislation to permit ratification of this treaty.

Canada supports international efforts to develop and implement a global cyber governance regime that will enhance our security. To the extent possible, Canada will support efforts to build the cyber security capacity of less developed states and foreign partners. This will help forestall adversaries from exploiting weak links in global cyber defences.

Working Cooperatively


The Strategy will be implemented by the departments and agencies most directly responsible for securing the Government's cyber systems. We will work with our provincial and territorial partners, as they are jointly responsible for protecting much of the critical infrastructure in Canada.

Canada's academic community, non-governmental organizations and private sector must join the Government in securing Canada's cyber systems. Each of these communities has unique technological and analytical capabilities to offer, and a strong incentive to secure their own systems. Their collaboration is essential to our shared success to secure Canada and increase our productivity and prosperity.

Cyber security matters to everyone, everyday. It matters for a safer and more prosperous Canada.

Individual Canadians must also play a primary role in securing Canada's cyber future. The Government can introduce and support important cyber security initiatives, but it cannot protect each of us from every threat we encounter when we go online. Canadians must become aware of these threats, and of the tools available to recognize and avoid them. Most importantly, they must use these tools to protect themselves and their families.

Specific Initiatives
Canada's Cyber Security Strategy is built on three pillars:

Securing Government systems;
Partnering to secure vital cyber systems outside the federal Government; and
Helping Canadians to be secure online.
Securing Government systems

The cyber world in which Canadians live, work and play lacks the regimes of law and order that govern our physical world. The Government is entrusted with safeguarding some of our most personal and sensitive information in its electronic databases. It provides services to Canadians and the private sector through its websites and electronic processing systems. And the Government transmits highly classified information essential to our military and national security operations via its classified communications systems.

There have been many cyber attacks directed at Government systems. Cyber attackers regularly probe these systems, looking for vulnerabilities. Securing these links is not simply a matter of operational efficiency. It is a matter of national security and sovereignty, protecting the lives of our foreign service, military and law enforcement personnel, the integrity of our economy, and safeguarding the personal information of Canadians.

We must and will strengthen the Government's capability to detect, deter and defend against cyber attacks while deploying cyber technology to advance Canada's economic and national security interests. Achieving the cyber integrity of Government requires that roles and responsibilities are clear, systems are strengthened and Government employees are aware of proper procedure.

Establishing Clear Federal Roles and Responsibilities


With a subject as critical as cyber security, there is no room for ambiguity in terms of who does what. This Strategy sets out the required clarity.

Public Safety Canada will coordinate implementation of the Strategy. It will design a whole-of-Government approach to reporting on the implementation of the Strategy. It will provide central coordination for assessing emerging complex threats and developing and promoting comprehensive, coordinated approaches to address risks within the Government and across Canada. Within Public Safety Canada, the Canadian Cyber Incident Response Centre will continue to be the focal point for monitoring and providing advice on mitigating cyber threats, and directing the national response to any cyber security incident. Public Safety Canada will also lead public awareness and outreach activities to inform Canadians of the potential risks they face and the actions they can take to protect themselves and their families in cyberspace.

The Communications Security Establishment Canada has internationally recognized expertise in dealing with cyber threats and attacks. With its unique mandate and knowledge, the Communications Security Establishment Canada will enhance its capacity to detect and discover threats, provide foreign intelligence and cyber security services, and respond to cyber threats and attacks against Government networks and information technology systems.

The Canadian Security Intelligence Service will analyze and investigate domestic and international threats to the security of Canada. The Royal Canadian Mounted Police will investigate, as per the Royal Canadian Mounted Police Act, suspected domestic and international criminal acts against Canadian networks and critical information infrastructure.

The Treasury Board Secretariat will support and strengthen cyber incident management capabilities across Government, through the development of policies, standards and assessment tools. The Treasury Board Secretariat is also responsible for information technology security in the Government of Canada.

Foreign Affairs and International Trade Canada will advise on the international dimension of cyber security and work to develop a cyber security foreign policy that will help strengthen coherence in the Government's engagement abroad on cyber security.

The Department of National Defence and the Canadian Forces will strengthen their capacity to defend their own networks, will work with other Government departments to identify threats and possible responses, and will continue to exchange information about cyber best practices with allied militaries. The Department of National Defence and the Canadian Forces will also work with allies to develop the policy and legal framework for military aspects of cyber security, complementing international outreach efforts of Foreign Affairs and International Trade Canada.

Given the speed and complexity of many cyber attacks, barriers to cooperation and information sharing between federal partners must be eliminated. The Strategy includes measures to address this need, and provides the additional financial and personnel resources required to allow the Government to fulfill its cyber security obligations.

Strengthening the Security of Federal Cyber Systems


For each new technology or practice adopted to enhance our cyber security, another is developed to circumvent it. We will continually invest in the expertise, systems and governing frameworks required to keep pace with these evolving threats. We will also review our options for increasing the risks and consequences applied to those who attack our cyber systems.

The Government will enhance the security of its cyber architecture. It will continue to reduce the number of Internet gateways into its computer systems, and take other measures to secure systems.

In 2009 the Government made a number of important amendments to its Policy on Government Security. Administered by the Treasury Board Secretariat, the Policy sets out safeguards to assure the delivery of Government services to Canadians. Since the Government relies extensively on information technology to provide these services, the Policy emphasizes the need for departments and agencies to monitor and secure their electronic operations.

The globalization of the technology industry makes it difficult to assess suppliers' trustworthiness. Cyber attackers are well aware of the opportunities created for them by security gaps in the global supply chain. Some organized crime syndicates and foreign intelligence services have already exploited these vulnerabilities in an effort to disseminate exploitable technologies. The Government will strengthen processes to reduce the risk related to compromised technologies.

Enhancing Cyber Security Awareness throughout Government


While clear roles and responsibilities, and strengthened systems are important to achieving cyber security, the Government's success in securing its systems is largely dependent on its employees. As countless incidents in all segments of society have shown, even the most sophisticated security systems can be undermined by simple human error. In Government, as elsewhere, people can fail to follow basic cyber security practices by:

Not changing their passwords on a regular basis;
Assuming that an office email system is more secure than it is; and
Importing malicious viruses into workplace computers by visiting corrupted websites.
Partnering to secure vital cyber systems outside the federal Government

The economic success of Canada's private sector depends in large measure on its ability to secure cutting edge research and intellectual property, business transactions and financial data. Failing to secure these assets inevitably leads to lost market share, fewer customers and corporate breakdown.

In much the same way, our personal wellbeing depends on access to secure and reliable services from our transportation systems, communication networks and financial institutions. It is increasingly important to protect two of the primary contributors to our quality of life – private companies that drive our economic prosperity and the infrastructure systems that support our daily activities – against cyber threats. Failure to do so will have adverse economic impacts and undermine consumer confidence.

A 2008 study by McMaster UniversityFootnote 9 on identity theft in Canada found that 20% of consumers have eliminated or reduced the amount of shopping they do online, and that 9% have eliminated or reduced online banking activities due to the risks they perceive in doing business online. By building a secure and trusted business environment, we will help foster the productivity and innovation that drive our economic prosperity.

The public needs to be more aware of the vulnerabilities inherent in the cyber systems that these industries use to deliver their services. Increased awareness will equip Canadians to avoid identity theft and potential financial loss. The Government will partner with the provinces, territories and private sector to improve the cyber security posture of Canada and Canadians.

The Government will build on existing programs and expertise, such as Defence Research and Development Canada's Public Security Technical Program to better support cyber security research and development activities. We will also collaborate with our private sector and academic partners to enhance information sharing activities.

Partnering with the Provinces and Territories


Strengthened partnerships among all levels of government are an essential component in delivering a comprehensive cyber security strategy for Canada and Canadians. Our provincial and territorial counterparts provide a range of essential services whose delivery is dependent on the safe and secure operation of their cyber systems. For example, they hold sensitive personal information in their electronic databases, including health records, marriage and driver licenses, and provincial tax return information. The provinces and territories have a key role to play in promoting awareness among Canadians, especially young Canadians in the education system where first exposure to the Internet often occurs. Only when all levels of government are working together can Canadians be assured that their private information is secure and the services that they depend on will be delivered.

Partnering with the Private Sector and Critical Infrastructure Sectors

Many of the risks and impacts of cyber attacks are shared between the Government and private sector. For example, untrustworthy technology is harmful to both government and industry. Identifying these risks must be done in partnership.

Fortunately, Canada's public and private sectors share a long history of working together to achieve shared economic and national security goals. This cooperation needs to be further strengthened. Each partner must share accurate and timely cyber security information regarding existing and emerging threats, defensive techniques and other best practices.

Strengthened public/private partnerships will be fostered through existing structures and organizations, such as critical infrastructure sector networks. Cross sector mechanisms will also be established, providing opportunities for governments and industry to collaborate on a broad range of critical infrastructure issues, including cyber security.

Another key area for collaboration is the security of process control systems. These systems control everything from our machines and factories to our critical infrastructures. They keep our dams from overflowing, our electrical grids from collapsing and our transportation networks from malfunctioning. Their security is critical to the safe delivery of the services and products upon which Canadians depend. Joint public/private sector initiatives will be struck to identify and share best practices for addressing threats to these systems.

Our collective cyber security efforts will be further refined through training and exercise programs. The result of these exercises, some of which are already underway, will be an improved understanding of the dynamic among partners in cyber security. Participation in these exercises will also support the improvement of procedures to prevent cyber security failures.

The disruption of critical infrastructure and cyber systems can have direct impacts on businesses and communities on both sides of the Canada–United States border. Attacks on interconnected cyber networks can have cascading effects across industrial sectors and national borders. For this reason, Canada will be active in international fora dealing with critical infrastructure protection and cyber security.

Helping Canadians to be secure online


Our success in harnessing cyberspace has helped us achieve unprecedented personal productivity and prosperity. But it has also allowed the world's criminals to commit traditional crimes with 21st century technologies. The Government is taking steps to protect cyberspace from becoming a criminal haven. We will deny cyber criminals the anonymity they are seeking while at the same time protecting the privacy of Canadians.

Combatting Cybercrime


Criminals are learning quickly that cybercrime can be inexpensive, low risk and profitable. In one well known incident uncovered in 2007,Footnote 10 over 45 million customer records were stolen from a well known North American retailer. The breach occurred over a three year period, during which criminals monitored wireless signals from point of sale credit card terminals. These attacks cost the retailer over $130 million and inflicted unknown financial harm on individual victims.

Also in 2008, 11 people operating in five different countries were chargedFootnote 11 with breaking into the databases of nine major North American retailers, stealing some 40 million credit and debit card numbers from their databases, and selling the numbers (via the Internet) to other criminals.

Canada's law enforcement agencies cannot combat trans-national cybercrimes with outdated investigative powers and tools. Equipping our police to protect us in cyberspace requires that we provide them with new legislative authorities and supporting financial resources.

Accordingly, the Royal Canadian Mounted Police will be given the resources required to establish a centralized Integrated Cyber Crime Fusion Centre. This team will increase the ability of the Royal Canadian Mounted Police to respond, using a risk-based analysis approach, to requests from the Canadian Cyber Incident Response Centre regarding cyber attacks against Government or Canada's critical infrastructure.

The Government has already passed legislation to combat identity theft. Other legislative reforms will be re-introduced by the Government to enhance the capacity of law enforcement to investigate and prosecute cybercrime by:

Making it a crime to use a computer system to sexually exploit a child;
Requiring Internet service providers to maintain intercept capable systems, so that law enforcement agencies can execute judicially authorized interceptions;

Requiring Internet service providers to provide police with basic customer identification data, as this information is essential to combatting online crimes that occur in real time, such as child sexual abuse; and

Increasing the assistance that Canada provides to its treaty partners in fighting serious crimes.

Protecting Canadians Online


Canadian families want their privacy, identities and physical wellbeing protected from cyber predators. And Canadians know that risks exist. According to a Decima Research study:Footnote 12

Only 35% of Canadians believe their computer is very safe against online threats; and

77% are concerned about the security of personal information. Yet 63% use the Internet for sensitive transactions and 57% keep sensitive information on their computers.

As long as they know how to do so, Canadians will strengthen their own individual cyber security and that of Canada as a whole. We all need to follow basic cyber security practices, such as changing our passwords frequently, updating antivirus protection and using only protected wireless networks.

The Government will increase Canadians' awareness of common online crimes and will promote safe cyber security practices through the use of web sites, creative materials and outreach efforts.

The Government's ultimate goal is to create a culture of cyber safety whereby Canadians are aware of both the threats and the measures they can take to ensure the safe use of cyberspace. Creating such awareness will require a sustained effort over a period of several years. The effort must start now.

Moving Forward


With each passing day, Canadians' dependence on cyberspace grows. There is no turning back to a world without an Internet. Just as previous generations took advantage of increasingly complex and helpful methods of communications, we have embraced the Internet.

But as we enjoy the benefits of cyberspace, we also recognize that it threatens us in a variety of ways. Those who choose to abuse the Internet are becoming more sophisticated and dangerous every day. We must invest now in cyber security to protect our economic prosperity, national security and quality of life.

Canada's Cyber Security Strategy is Canada's plan for securing our cyber systems. The Strategy will protect the integrity of Government systems and our nation's critical assets. It will combat cybercrime and protect Canadians as they use cyberspace in their daily lives. By promoting awareness of the need for cyber security, the Strategy will encourage individual Canadians, industry and all levels of government to adapt behaviour and adopt the technology required to confront evolving cyber threats.

The Government will begin implementing new initiatives under the Strategy in 2010. The initiatives outlined in this Strategy are important first steps. They will be adjusted and strengthened as required.

Everyone must do their part.

Cyber security is a shared responsibility, one in which Canadians, their governments, the private sector and our international partners all have a role to play. The Strategy reflects this shared responsibility. Implementation will be a collective effort. Its success will depend on our ability to work together.

Message from the Minister


Canadians' personal and professional lives have gone digital: we live, work, and play in cyberspace. Canadians use the Internet, computers, cell phones and mobile devices every day to talk, email, text and twitter with family, friends and colleagues. We do business online everyday, from banking to shopping to accessing government services – and we do it from wherever we happen to be. Digital infrastructure makes all this possible, and also keeps essential services up and running.

Canadians – individuals, industry and governments – are embracing the many advantages that cyberspace offers, and our economy and quality of life are the better for it. But our increasing reliance on cyber technologies makes us more vulnerable to those who attack our digital infrastructure to undermine our national security, economic prosperity, and way of life.

Our systems are an attractive target for foreign military and intelligence services, criminals and terrorist networks. These groups are breaking into our computer systems, searching through our files, and causing our systems to crash. They are stealing our industrial and national security secrets, and our personal identities.

We don't see them, we don't hear them, and we don't always catch them. At times they are mere nuisances. At other times, they present real threats to our families, companies and to our country.

Canada's Cyber Security Strategy is our plan for meeting the cyber threat. It delivers on the Government's 2010 Speech from the Throne commitment to work with provinces, territories and the private sector to implement a cyber security strategy to protect our digital infrastructure. It leverages the partnerships being established under the National Strategy and Action Plan for Critical Infrastructure, and supports the ongoing efforts by our law enforcement community to work with partners and international allies in cracking down on those who use the Internet for crime and illegal activities.

Canada's Cyber Security Strategy is a cornerstone of our Government's commitment to keep Canada – including our cyberspace – safe, secure and prosperous.

The original version was signed by

The Honourable Vic Toews, P.C., Q.C., M.P.
Minister of Public Safety

Footnotes


1 Statistics Canada, "The Daily," April 24, 2008
2 Canadian Radio-television and Telecommunications Commission, "Communications Monitoring Report," August 2009
3 Canada Revenue Agency, "National Processing Status Report," September 2009
4 Statistics Canada, "Canadian Internet Use Survey," 2009
5 McMaster University, Measuring Identity Theft in Canada: 2008 Consumer Survey
6 CA Technologies, "Canada 2008 Security and Privacy Survey"
7 Akamai, "State of the Internet Report," March 20098
8 Symantec, "Global Internet Security Threat Report," April 2009
9 McMaster University, Measuring Identity Theft in Canada: 2008 Consumer Survey
10 SC Magazine, "FTC Settles with TJX Over Breach," March 2008
11 Wired Magazine, "Feds Charge 11 in Breaches at TJ Maxx, OfficeMax, DSW, Others," August 2008
12 Decima Research, Cyber Security Practices in Canada, Final Report, February 2008

cyber security canada, cyber security courses, cyber security jobs
Source: http://docphy.com/business-industry/business/canadas-cyber-security-strategy.html

Dover, Delaware Personal Injury Lawyers

Physical and emotional trauma that is experienced by auto accident and medical malpractice victims deserves to be justified through financial compensation. It’s important for all Dover, DE area residents to know exactly which firm to turn to for advice and representation in their case. Lundy Law is proud to be among the top accident lawyers in Delaware with decades of solid legal experience.

Slip and fall accident victims are often too embarrassed or afraid to come forward after they get hurt. When you or someone that you care about is involved in any type of accident due to the neglect or recklessness of another, our personal injury lawyers are equipped with the knowledge to serve your need for justice.

Personal Injury Lawyers Serving Dover, Delaware


Personal Injury Lawyers Serving Dover, Delaware

Representing clients in their tough legal battles is a part of our job, but we do everything we can to make sure you feel confident and informed throughout the legal process. Without a settlement, you’ll be facing debt trying to keep up with bills and the cost of living during a time that you’re not able to collect a normal paycheck. If circumstances prove that you were innocent, our professionals will make sure that the responsible party has to take care of your expenses.

Auto Accident Lawyers Serving Dover, Delaware


Auto Accident Lawyers Serving Dover, Delaware

The moment you realize that you’ve been in a collision, you’ll be understandably overcome with anxiety and confusion over what to do next. A medical examination should be first on your list of priorities, followed by contacting our car accident lawyers for help. Once we are able to investigate the incident, we’ll be able to figure out how much your case is worth and pursue the right amount.

Slip and Fall Accident Lawyers Serving Dover, Delaware


Slip and Fall Accident Lawyers Serving Dover, Delaware

Ignoring your injuries in the event that you fall on the property of another person or business is denying yourself a basic right to treatment. You may feel fine at first, but realize that you’re seriously hurt once it’s too late to take action. Speak with our attorneys as soon as possible after you visit a physician so that we have a chance to get you the money you deserve.

Medical Malpractice Lawyers Serving Dover, Delaware


Medical Malpractice Lawyers Serving Dover, Delaware

Complicated cases that other legal firms usually shy away from pursuing involve healthcare professionals that have mistreated or neglected patients. When this happens to you or a member of your immediate family, it needs to be handled properly by our personal injury lawyers in Delaware.

Although slip and fall cases and auto accidents lead to many of the injuries suffered by victims in the city of Dover, there are many other actions and situations that lead to personal harm and Lundy Law represents victims in these additional areas of practice, including:

Motorcycle Accident
Workers’ Compensation
Medical Malpractice
Social Security Disability
Birth and Child Injury
Drug Injury
Boating Accident

Truck Accident
Dog Bites
Veterans Disability
Wrongful Death
Nursing Home Abuse
Other Injuries

Give us a call at 1-800-LundyLaw anytime you are involved in an accident at the fault of another person. We want to give you the professional guidance and help that you deserve to get through the tough time.

Center City
1635 Market Street
19th Floor
Philadelphia, PA 19103
215-567-3000
Center City
Bethlehem, PA
Blue Bell, PA
Wilmington, DE
Cherry Hill, NJ
Reading, PA

delaware county personal injury lawyers, delaware personal injury attorney, delaware personal injury law
Source: http://docphy.com/business-industry/personal-finance/insurance/dover-delaware-personal-injury-lawyers.html

OLap (online analytical processing)

OLAP (online analytical processing) is computer processing that enables a user to easily and selectively extract and view data from different points of view. For example, a user can request that data be analyzed to display a spreadsheet showing all of a company's beach ball products sold in Florida in the month of July, compare revenue figures with those for the same products in September, and then see a comparison of other product sales in Florida in the same time period. To facilitate this kind of analysis, OLAP data is stored in a multidimensional database.

Whereas a relational database can be thought of as two-dimensional, a multidimensional database considers each data attribute (such as product, geographic sales region, and time period) as a separate "dimension." OLAP software can locate the intersection of dimensions (all products sold in the Eastern region above a certain price during a certain time period) and display them. Attributes such as time periods can be broken down into subattributes.

OLAP can be used for data mining or the discovery of previously undiscerned relationships between data items. An OLAP database does not need to be as large as a data warehouse, since not all transactional data is needed for trend analysis. Using Open Database Connectivity (ODBC), data can be imported from existing relational databases to create a multidimensional database for OLAP.

Two leading OLAP products are Hyperion Solution's Essbase and Oracle's Express Server. OLAP products are typically designed for multiple-user environments, with the cost of the software based on the number of users.

Continue Reading About OLAP (online analytical processing)


MySQL: Choosing the most important features
SQL Server OLTP vs. data warehouse performance tuning
The top 10 trends affecting DB2
Data acquisition and integration techniques

olap sql functions, olap sql query example, olap sql server
Source: http://docphy.com/technology/computers/software/olap-online-analytical-processing.html

UHD Online

Earn Your Degree Online​​​


UHD has several online degree completion programs for students who have completed core coursework at another university or community college.

UHD currently offers upper-level coursework online for 15 bachelor's degree and 3 graduate degrees. Online courses offer students:​​
  • Flexible scheduling

  • An interactive learning experience

  • Fully transferrable course credits

  • Quality curricula, identical to that of on-campus clases

  • Access to on-campus and online student services.


The following degree programs are now available for online completion:

DAVIES COLLEGE OF BUSINESS​​


B.B.A. Finance
B.B.A. General Business
B.B.A. Insurance & Risk Management
B.B.A. International Business
B.B.A. Management
B.B.A. Marketing
B.B.A. Management​ Information Systems
B.B.A. Supply Chain Management
Master of Security Management, M.S.M.

COLLEGE OF HU​MANITIES & SOCIAL SCIENCES


B.A. Humanities
B.S. Professional Writing
B.S. Psychology
M.A. Non-Profit Management

COLLEGE OF PUBLIC SERVICE​​​


B.S. Criminal Justice
B.A.A.S. Criminal Justice
M.S. Criminal Justice

UNIVERSITY COLLEGE​


B.A.A.S. Applied Administration
B.S. Interdisciplinary Studies​

The University of Houston-Downtown, does not currently offer online courses to residents of the following states and territories: American Samoa, Florida, Guam, Massachusetts and Puerto Rico.

Contact Us


UHD Online
PHONE: (713) 221-8006
​TOLL FREE: (855) 864-3932

N 320

Online Only Students

Students can access the online orientation by following the steps below:

Go to myUHD.
Select "Online Orientation."
Log-in using your UHD ID and password.
Complete the Orientation in its entirety.
The online portion of the orientation will take approximately 45 minutes to complete.

university of houston downtown online classes, university of houston downtown online degrees, university of houston downtown online masters
Source: http://docphy.com/business-industry/higher-education/uhd-online.html

National Security

The first priority of the Government of Canada is to protect the safety and security of Canadians both at home and abroad.

Public Safety Canada spearheads this effort by coordinating the activities of federal departments and agencies tasked with protecting Canadians and their communities, businesses and interests. Public Safety is also responsible for developing policies and providing advice to the Minister of Public Safety and Emergency Preparedness.

The preservation of national security is a multi-faceted endeavor that requires cooperation across a diverse range of initiatives and programs. Public Safety Canada functions as a centralized hub for coordinating work in counter-terrorism, critical infrastructure, cyber security and transportation security.

Additionally, Public Safety Canada engages with Canadian citizens to ensure that our country's national security efforts reflect and benefit the interests of all communities.

Counter-Terrorism


Protecting our communities from the threat of terrorism is of the utmost importance to the Government of Canada. Guided by Canada's Counter-terrorism Strategy, Public Safety Canada coordinates efforts to align government activities according to the four elements that underpin the Strategy aimed at preventing, detecting, denying and responding to terrorism.

The success of our counter-terrorism efforts depends on collaboration with all levels of government, including provincial and territorial governments, law enforcement and civil society.

Connecting with Canadian Communities


Public Safety Canada created the Cross-Cultural Roundtable on Security in order to engage Canadian community leaders on matters related to national security. The group provides advice and perspectives to the Minister of Public Safety and Emergency Preparedness and the Minister of Justice, focusing on emerging developments in national security and their impact on Canada's diverse and pluralistic society.

Counter Proliferation


The Government of Canada is countering the spread – or proliferation – of chemical, biological, radiological and nuclear (CBRN) weapons by preventing the acquisition of related goods and technologies, advanced knowledge and expertise and financial support by illegal CBRN weapons proliferators.

Critical Infrastructure


Disruptions of critical infrastructure could result in catastrophic loss of life or adverse economic effects, and significantly undermine the safety and wellbeing of Canadian communities. Public Safety Canada works with partners to strengthen the resilience of Canada's vital assets and systems such as our electricity grids, transportation, communications and public safety systems.

Cyber Security


In order to embrace the full advantages of cyberspace, Canada must guard against those who would attack our digital infrastructure to undermine our national security, economic prosperity and quality of life. Public Safety Canada works closely with domestic and international partners as part of the global effort to protect critical assets and information and combat cyber crime.

Sharing National Security-Related Information


The Government has created a clear authority for federal Government institutions to share national security-relevant information with other designated federal Canadian Government institutions that have national security responsibilities. This allows for faster access to critical information when swift action is required, while respecting Canadians' security and privacy.

National Security News Releases


Statement from Minister Goodale on bringing openness, transparency, and clarity to new Ministerial Directions
September 25, 2017
Canada Centre for Community Engagement and Prevention of Violence funds project to combat hate
September 12, 2017
Statement of apology to Mr. Omar Khadr
July 7, 2017
More National Security News Releases

National Security Publications and Reports


Five Country Ministerial 2017: Joint Communiqué
National Security Consultations: What We Learned Report
Compendium of U.S. - Canada Emergency Management Assistance Mechanisms
2016 Public Report On The Terrorist Threat To Canada
Fundamentals of Cyber Security for Canada's CI Community
More National Security Publications and Reports

public safety security clearance, public safety security company, public safety security officer
Source: http://docphy.com/business-industry/business/national-security.html

Premier Idaho Lawyers

Chances are you came to this website because of two things. First, you have a problem and you need help to reach a solution. Second, you want to know if this is the firm best suited to help you solve the problem.

We Use a Team Approach


Let’s focus on your problem first. Perhaps the problem is one which requires a will or an estate plan. Maybe it is business formation or dissolution problem. It may be that you have been injured in some sort of accident whether on the highway or in the workplace. Whatever the problem, you need a solution. You need someone who will take the weight and the worry off your shoulders and help you solve the problem. The approach is simple at Racine Olson. It’s a team approach. We meet with you, and we introduce you to those who will be helping on your case. We have you meet with the staff who will always be available to answer your phone calls. It’s a total commitment to you. We even have an Idaho attorney and staff person who speaks Spanish should that be necessary. The goal is to do everything we can to solve your problem.

Serving Idaho for 70 Years


The second question is whether this is the right firm for you. Let us describe the firm that we have worked so hard to create and keep for our clients. The firm was founded in the 1940’s by Lou Racine. After graduating from law school, he served in the military as Navy Captain in World War II. After his honorable discharge, he began practicing law in Pocatello, Idaho. Soon, others joined the firm including a future justice of the Idaho Supreme Court.

It’s not just that we have an impressive array of lawyers to help you. Those attorneys practice law in 19 different areas. They include land use planning, insurance defense, family law and tax just to name a few in addition to those listed below.

Idaho Personal Injury Lawyers


At the same time the firm began to grow, victories began to mount. Mr. Racine won a historic victory for the Shoshone Bannock tribes concerning fishing rights. Other clients brought their problems to the firm and received results. They included Idaho personal injury claim successes, Idaho worker’s compensation success, sexual abuse recoveries, and Idaho products liability successes for injured people. Our Idaho personal injury lawyers know how to win.

Idaho Estate Planning Lawyers


However, these are not the only areas where our clients experienced success. Racine Olson developed a thriving Idaho estate planning group. We have two Idaho estate planning attorneys with advanced tax law degrees. These capable Idaho estate planning lawyers not only developed areas of expertise in drafting wills and trusts and completing probates, but also in determining the tax consequences of various options.

Idaho Water Law Lawyers


We have attorneys practicing in other areas as well. We have two of the best Idaho water law attorneys in the state.

Idaho Creditor Bankruptcy Lawyers


We also have attorneys who practice in the area of creditor bankruptcy. Their qualifications are impeccable and impressive. Indeed they are well recognized in the field. They are licensed in Wyoming, Oregon, Utah, and of course, Idaho.

You may be concerned that your problem is just small. Maybe it’s a divorce, an adoption, or a criminal case. Don’t worry. We are able to address all of these problems. There are attorneys that practice in each of these areas of law. There are staff members eager to help with whatever problem.

If you have a problem, we’d like to help. Bring the problem to us. Let’s discuss it and solve it together. Problem solved.

Please call us at 208-232-6101.

idaho falls injury lawyer, idaho falls personal injury lawyer, idaho personal injury lawyer
Source: http://docphy.com/business-industry/personal-finance/insurance/premier-idaho-lawyers.html

Crichton Rehabilitation Center and Outpatient Clinics

Crichton Rehabilitation Center and Outpatient Clinics provide comprehensive inpatient and outpatient therapy to help individuals return to independence after surgery, illness or an accident. Programs, services, highly trained staff and immediate access to the many resources of the Conemaugh Health System provide the depth and expertise to handle the region's most complicated and complex cases. As the only rehabilitation center in the region to receive accreditation from the Commission on Accreditation of Rehabilitation Facilities (CARF), patients receive care that has met rigorous national standards.

Crichton Rehabilitation Center provides specialized inpatient rehabilitation services for patients suffering from neurological disorders and injuries, trauma, orthopedic injuries, and many other illnesses and injuries. Crichton Rehabilitation Outpatient Clinics provide physical, occupational, and speech therapies in conjunction with other specialty programs. In addition, we provide innovative, hands-on services that are specially designed to help patients successfully re-enter the community after a traumatic injury.

Quick Links


Inpatient Rehabilitation Outpatient RehabilitationInpatient Rehabilitation Outpatient RehabilitationTreatment Team Patient and Family SupportComplaints and Grievances Commitment to the Patient

All team members will act in a manner consistent with the mission, philosophy, and operating policies of Crichton Rehabilitation Center and Outpatient Clinics. In accordance with these principles and policies, team members will:

Treat others, including patients, families, visitors, fellow staff members, and any other person, with respect and dignity, which includes respecting rights to privacy.

Provide the highest quality clinical and customer related services.
Demonstrate fairness and honesty in all interactions with the public, including accurate portrayal of the programs and services offered, and the outcomes of such programs and services.
Adhere to professional codes and practice guidelines.
Be ethical in all marketing and public relation activities.

Crichton Rehabilitation Center and Outpatient Clinics promote an ethical environment and maintains a policy of equal opportunity in the admission, treatment, participation in our programs, services and activities, or employment of all people regardless of race, color, national origin, religious creed, disability, ancestry, sex, age or sexual orientation.

Mission


To be the premier provider of innovative rehabilitation services in West Central Pennsylvania that promotes an optimal level of function and ensures the highest quality of life through individualized programs encompassing the family and comprehensive team of compassionate specialists.

The mission is accomplished by following the overall program goals:

Offer a wide variety of unique and practical programs and services designed to help individuals return to an active lifestyle.
Seek input from those we serve so that the program may reflect their needs.
Construct and follow a system review of current programs as a means for continual improvement.
Employ treatment staff who are competent and seek continuing education.
Offer various programs and services to patients with different needs.

Patient Satisfaction


More than 95% of our patients are highly satisfied with the care they receive at Crichton Rehabilitation Center and Outpatient Clinics. To address any problem as soon as it may arise, we have established an “Open Door” policy, and encourage patients and their families to contact us at any time with questions, issues or comments.

Phone Directory


Crichton Rehabilitation Center - Inpatient Unit

Main Number

(814) 534-7900 or (888) 488-9988

Administration

(814) 534-7922

Admissions Department

(814) 534-7915

Conemaugh Rehabilitation – Outpatient Clinics

Conemaugh Rehabilitation, East Hills

(814) 534-6236

Conemaugh Rehabilitation, Ebensburg

(814) 472-4468

Conemaugh Rehabilitation, Conemaugh Meyersdale Medical Center

(814) 972-6917

Conemaugh Rehabilitation, Conemaugh Miners Medical Center

(814) 247-3100

crichton rehabilitation center ebensburg pa, crichton rehabilitation center jobs, crichton rehabilitation center johnstown pa
Source: http://docphy.com/business-industry/health-care/crichton-rehabilitation-center-outpatient-clinics.html

How safe is cloud computing?

(CNN) -- Stormy weather could be on the horizon for cloud computing as security experts warn not enough is being done to make sure one of the hottest IT trends is safe.

"There are many motivations for why an individual or a company would want to engage in cloud computing," said Thomas Parenty, managing director of Parenty Consulting, a Hong Kong-based information security consulting firm. "None of them have to do with enhanced security."

The reasons why more businesses and individuals are tapping into cloud power boil down to economics and convenience.

Broadly speaking cloud computing refers to outsourcing data once stored on privately owned computers. If you have an email account or are on a social networking site, like Facebook, you are using a cloud platform. The data is stored on servers operated by someone else, which means that data is subsequently available to use anywhere there is an Internet connection.

On an enterprise level, this allows companies to cut IT costs by reducing the amount of hardware and software they need to purchase and maintain or store information.

For individuals, photos or documents uploaded to the cloud (using services like Flickr or Google Docs) are accessible from home, from cyber cafes, or via mobile devices.

Yet the problem according to Parenty is that "you have no idea who is managing the computers with your information. You have no idea where they are. You have no idea what protections may or may not be in place to make sure your information is not stolen or disclosed or that it does not accidentally disappear."

A recent study from CIO Magazine found that despite the increasing popularity of outsourced computing, 50 percent of CEOs surveyed said safety was one of their biggest worries.

Potential security threats to virtualized computing environments are complex.

One concern stems from the issue of security itself. Companies have in place their own firewalls and anti-virus software to protect data stored on the premises. When computing is outsourced, control of security measures is also relinquished.

"There is no Good Housekeeping Seal of Approval that says this vendor does good, secure cloud computing," Parenty told CNN. "A company or an individual looking to move to the cloud is going to have to make a huge leap of faith that their data is being protected."

Then there is the worry that if remote servers crash or are compromised, data, ranging from family photos to financial records from a Fortune 500 company, could simply vanish into thin air, forever.

In January 2009, for example, Ma.gnolia, a bookmark storage service (similar to Yahoo's Delicious.com), went offline after its databases crashed. As a result, users permanently lost records of links to all of the Web pages they had stored. Now relaunched membership is now by invitation only.

"You have to have a plan B," said Craig Balding, founder of the blog cloudsecurity.org. "If I am going to trust any online photo provider with my family photos, I need to make sure I have a local back-up or pay for a second provider, which makes it less attractive because it is going to double the cost."

Within the data centers of cloud providers, the situation is murkier. Servers often use special virtualized software allowing data from multiple companies to be stored on one server or processor (an analogy would be instead of a cabinet containing files from a single customer, it holds files from numerous clients).

While the virtual machines cut costs and save energy, they also raise questions about data leakage as well as whether a customer would ever find out files have been breached, said Jim Reavis, executive director of Cloud Security Alliance, a non-profit advocated for cloud security standards.

Such high concentrations of information also create the perfect storm for hacking.

"We are very concerned about the bad guys using the cloud," said Reavis. "[Hackers] have the ability to move laterally and capture a lot of customer information. When you put more eggs in one basket, the prize is much bigger."

Bad guys also have the ability to infect clouds with spyware, botnets and other malicious programs, Reavis said.

In January, Google announced its web-based Gmail system had been compromised by a malware attack originating in China. As a result of the breach, Google announced it would stop censoring its Google.cn search engine and possibly end business operations in the country.

"We expect a whole new generation of malware to come out of things that are specifically designed for cloud providers," said Reavis. "We can imagine some very sophisticated next-generation hyper botnets that are very hard to defend against."

A final concern surrounds privacy.

In the United States, where many cloud companies are based, legal standards make it much easier for law enforcement to obtain data for criminal or other investigations, said Kevin Bankston, a senior staff attorney with the Electronic Frontier Foundation, a San Francisco-based digital rights group.

"Data stored in the cloud is substantially easier for the government to obtain than the data you store yourself because of lower legal standards," Bankston said. "And it is easier to do it secretly. We think this is a serious security concern, and the law needs to be updated."

Despite what seems to be a deluge of fears surrounding computing-in-the-sky, cloud providers say they are working hard to make sure their cloud services safe.

"This obviously is something we have been worrying about," said Huang Ying, IBM China Research Lab associate director who leads one of the company's cloud computing projects in China. "We need to remember this is just getting started and the requirements and challenges are just coming out."



is cloud computing more secure, what is cloud computing security issues, what is cloud computing security threats
Source: http://docphy.com/technology/computers/software/safe-cloud-computing.html

Get 24/7 Emergency Heating And Cooling Service

ABOUT SERVICE HEATING & AIR


We love our customers and are passionate about keeping people safe and comfortable in their homes. Service Heating & Air has been serving the Chattanooga area since 1977 and we are proud of what we have accomplished in the nearly 40 years years providing the community with quality HVAC services.

We perform the kind of work that requires consummate skill, training, and experience. Our N.A.T.E (North American Technician Excellence) certified technicians are the best in the business. This enables us to perform all the vital pre-installation services that make the difference between “just” a hvac unit and a home comfort system.

CONTACT SERVICE HEATING & AIR


1406 Boy Scout Road
Hixson, TN 37343

Call us: 423-267-2188
Fax us: 423-756-8903
Email us: Service@ServiceHeat-Air.com

Business Hours:
Monday to Friday 8:00 AM - 5:00 PM
Weekends: Closed

florida heat pump and ac service, heat and ac service
Source: http://docphy.com/business-industry/business/get-247-emergency-heating-cooling-service.html

Choosing a financial planner

In Canada, financial planners are known by many different titles. While some may call themselves a “financial planner”, others may be a “financial advisor”, “financial consultant” or “investment advisor”, to name just a few. This is because financial planning is not regulated in most Canadian provinces and territories.

Financial planners can also have varied training, qualifications and experience. Many financial planners have passed courses and exams in financial planning, and hold designations granted by an education provider or standards body. Others are also registered with their securities regulator to sell investments or provide investment advice. They may also be licensed
to sell insurance or hold designations in accounting or estate planning.

Ask about and understand the qualifications and experience of a planner before you work with them. Make sure the products and services they provide meet your needs.

Financial planning credentials


There are many financial planning designations, which offer a combination of training and experience. Most designations require training in money management, investing, tax, estate planning and insurance. Some also include ethics and a voluntary code of conduct. Your planner’s qualifications will help you make sure they can provide the services you’re looking for.

If your planner also sells investments or offers investment advice, they need to be registered with their securities regulator. There are different registration categories. For example, some planners are registered to provide advice only on mutual funds. Others can advise on a broader selection of investments. Make sure the services they are registered to provide meet your needs.

Examples of financial planning credentials

Certified Financial Planner (CFP)
Personal Financial Planner (PFP)
Chartered Financial Consultant (CH.F.C)
Registered Financial Planner (RFP)

Examples of additional qualifications that financial planners may hold

Chartered Accountant (CA)
Certified General Accountant (CGA)
Investment Dealer – Dealing Representative
Mutual Fund Dealer – Dealing Representative
Insurance broker

6 tips for choosing a financial planner


1. Understand your financial goals and needs


Choose someone who can meet your goals and needs. For example, if you want your planner to provide investment advice, choose someone who is registered with their securities regulator. If insurance is a priority, look for someone who has an insurance licence.

2. Check qualifications


Referrals from trusted sources are helpful, but not enough. Check each potential planner’s qualifications and background. Find out if they have any credentials. Call their professional associations to check on any complaints against them.

If they sell investments or provide investment advice in Ontario, you can also check out their qualifications and background through the Ontario Securities Commission.

3. Interview more than 1 planner


Make sure you feel comfortable discussing your finances with the people you interview. Find out if they provide the services you want. Ask each person about:their education, experience and specialties,how many clients they have,how long they’ve been a planner,how often they communicate with clients,what kinds of investment products or services they’re registered to sell, if any,which organizations they’re regulated by,how they’re paid, andif they’ve been subject to disciplinary action by any regulator or industry association.

4. Ask for references


Ask for references from clients with similar needs to yours. Find out if the planner works with any other experts, such as lawyers, accountants or insurance agents. Ask for references from these individuals.

5. Compare fees


Ask the planner to explain how they’ll be paid, and compare their rates with others. Make sure you get a written letter outlining the specific terms of your agreement. Also make sure you get notice in writing of any changes to compensation structure during your relationship.

6. Understand any conflicts


If your planner is also qualified to buy and sell investments, understand how they choose investments for you. Do they recommend a wide range of investments? Or do they only recommend certain products such as mutual funds from certain companies or only products that their firm sells? Will they make more money if they recommend one investment over another? Do they make money from sales fees every time you buy and sell?

If your planner also sells investments or provides investment advice, you can check their qualifications and background through the Ontario Securities Commission.

KEY POINTS

Check the background of your planner. Understand the qualifications they have and whether their qualifications meet your needs.

TAKE ACTION

Use this checklist as a guide to interviewing financial planners.

SIGN UP FOR INVESTOR NEWS

Stay informed about the latest investor initiatives, educational resources and investor warnings and alerts.

financial advisor jobs, financial advisor salary, financial advisor salary canada
Source: http://docphy.com/business-industry/personal-finance/investment/choosing-financial-planner.html

Friday 29 September 2017

How to Repair Water Damaged Carpet

Water damage to carpets from flooding or leaks in a home is not uncommon. If you’ve owned a home for several years, you’ve undoubtedly experienced it. You almost certainly will again in the future. When it happens, you’ll need to know when to clean and restore the damaged carpet, how to restore it, and when to replace it. When the time comes, you could benefit from the 5 repair steps you’ll find below.

Step 1 - Assess the Damage


Carpet that has been saturated in clean, sanitary water such as rainwater or tap water may be salvageable, depending on the type of carpet and how long it was wet. Water from toilets or other contaminated sourcesruin your carpet for good. Carpet saturated with water considered to be “black,” such as groundwater or sewage, is definitely not salvageable and should be replaced at once.

Step 2 - Determine the Water Source


For water that came from a single occasion, such as an overflowing bathtub or toilet, you will typically not need to be concerned about a continual flow of water onto your carpet. You do not need to take any action to stop the flow. If, however, the water that soaked your carpet continues to flow, you will need to stop it before deciding what to do with your carpet. If the flow of water is from a broken pipe, you might need to call a plumber. If the water comes from sewage or ground water, you may need the help of a contractor before you can begin cleaning or replacing your carpet.

Step 3 - Contact Your Insurance Agent


Armed with information about the extent of the damage to your carpet and the likely cause of the damage, contact your insurance company and determine with them what replacement help you can expect. Avoid investing in new carpets until you know what your insurance company is willing to do.

Step 4 - Treating a Small Carpet Area


If you have decided to proceed with repairing or replacing your damaged carpet and you have determined that the wet carpet needs to be disinfected, make a solution consisting of 1-gallon of clean water with 2-tablespoons of liquid bleach. If you have furniture sitting on the carpet, remove it so that your floor area is open. Use the solution to scrub the contaminated carpet. Use a box cutter or utility knife to cut through the carpet and padding around the contaminated area. Lift the carpet and remove the padding.

Step 5 - Dry the Soiled Carpet


Place large fans in the area of the soiled carpet, directed so that they blow air directly on the soiled carpet. Let the fans blow for 36 hours, or until the carpet is dry. If you have a dehumidifier, turn it on. Keep foot traffic off the wet carpet while it is drying. After 12 hours of drying, if you don’t see a noticeable difference in the wet condition of the carpet, you should consider replacing the it. Mold typically will begin to develop after this period of time.

Testing for Iron in Well Water


If you are testing well water, you may want to test for iron. The United States Department of Natural Resources does not list iron as a hazardous contaminant, but considers it an aesthetic contaminate in that it will give the water not only an odd taste, but also an odor and pigment that stains clothing, fixtures and dishes. Before you try to correct your water, it should be tested for hardness, pH, bacteria and iron concentration.

Step 1 - Testing Your Water


Do-it-yourself water test kits are available and can be used. Many experts believe that extensive testing must be done by professionals to get the best results. These experts also believe that professionals must be consulted to fix the problem. In many locales, you can have your water tested at a County Extension Office. If the local government cannot perform the test, they may still offer you information about water testing.

You can often tell if you have iron in your water just by observation. Soluble iron can be detected by filling a clear glass with water from your well. Let it sit a few minutes. If iron is present, you will notice tiny red particles floating to the bottom. Insoluble iron is the discolored water that you get when you turn on your faucet. It can be red, brown, or yellow. The color continues no matter how long you let the water run.

Step 2 - Removing the Iron


There are many ways to remove iron from your well. In most cases, you should consult with a professional before taking this step. It can be as simple as installing a water softener with an iron filtration system. More drastic solutions involve digging or expanding your existing well.

Well Water Problems: Why Does the Water Appear Cloudy When Initially Pumped?

Common well water problems can include the appearance of cloudy water. There are a variety of issues that could cause cloudy water. It is important to investigate the situation in order to address the problem correctly and to be certain that your well water is safe for household use. Perform these tasks to determine the source of your cloudy water.

Pump or Filter


Fill a drinking glass with well water. Allow the water to sit for a few moments. If the water comes from the tap cloudy then clears after it is allowed to settle, your pump or water filter may be experiencing problems.

Residue in the Well


The presence of dirt, silt, or rust residue in your system can cloud your well water. If these particles are in your system, they will eventually be pumped along with the water through your pipes and out of your faucet.

Excess Surface Water


Surface water that seeps into your well is usually benign; however, if there is any excess amount getting into your system, you could experience cloudy water. Large amounts of rainfall could cause excess surface water problems.

Testing and Maintenance


Ensure that your well water is safe through regular testing. Have your water privately tested for any bacterial contaminants such as E. Coli. Be sure your well water filtering system is operating properly. Replace your water filter on a regular basis.

carpet water damage cleanup, carpet water damage repair, carpet water damage sydney
Source: http://docphy.com/business-industry/business/repair-water-damaged-carpet.html

Marriott Business Services in Blount County transferred to Accenture

Marriott Business Services, one of Blount County’s largest employers, has been transferred to Accenture, a management consulting, technology services and outsourcing company based in Ireland.

Marriott International Inc. and Accenture announced the “strategic collaboration” in a joint statement released Wednesday.

Terms were not disclosed.

Marriott Business Services is in Louisville, Tenn. and has 561 employees, making it the eighth largest employer in Blount County, according to the Great Knoxville Business Journal Book of Lists.

Employees were told of the transfer in a meeting Wednesday.

Marriott spokesperson Jeff Flaherty said in a telephone interview that Accenture “plans to retain all employees who choose to stay on.” Accenture expects to grow the Louisville operation, but has no specific growth goal at this time, Flaherty said.

According to the statement, Marriott Business Services and its employees will be transferred to Accenture, which will create a entity called Accenture Hospitality Services.

The transfer will begin in August and is expected to be completed by early September, the companies said. Marriott Business Services currently occupies two buildings near the intersection of Topside Road and Pellissippi Parkway.

Blount Partnership President and CEO Bryan Daniels said Accenture’s Louisville operation will be a “viable entity for a long time” and the existing campus has room to expand.

The Louisville operation will “become an Accenture center of excellence for finance and accounting business process outsourcing and provide those services to Marriott as part of AHS,” the companies said.

AHS also will provide management consulting, technology and business process outsourcing services to other companies in the hospitality industry.

“By combining the world-class financial processes developed by MBS with Accenture’s scale and cross-industry expertise, Accenture will create a new business service to help lodging and hospitality companies better target strategic outcomes, achieve greater agility and drive new growth areas,” Paul Loftus, global managing director of Accenture’s Hospitality Industry Group said in a statement.

Accenture, which has clients in 120 countries, had revenue of $27.9 billion in its 2012 fiscal year.

marriott business services email, marriott business services louisville tn, marriott business services phone number
Source: http://docphy.com/business-industry/business/marriott-business-services-blount-county-transferred-accenture.html

Hagerstown Treatment Center

Hagerstown Treatment Center provides opioid addiction treatment and recovery in Hagerstown and surrounding areas including Frederick, Smithsburg, Maugansville, Martinsburg, Greencastle, and Boonsboro. Hagerstown TC has a dedicated team of treatment specialists including doctors, nurses and counselors to provide comprehensive care to each patient. All services listed below are included in the plan under one affordable low fee. Call today to set your appointment.

Our Services for Opioid Addiction Treatment:


Medication-Assisted Treatment (MAT) - such as methadone, buprenorphine or Suboxone to address withdrawal symptoms and cravings
Counseling: individual one-on-one, group and family
Medically supervised withdrawal
Medical exams to ensure safety
Convenient outpatient services
Referrals
Confidentiality
Take-home benefits after meeting key criteria

Business Hours:
Mon - Fri: 5:00am - 1:30pm
Sat, Sun & Holidays: 6:00am - 9:30am Pharmacy Hours:
Mon - Fri: 5:00am - 10:30am
Sat: 6:00am - 9:30am
Sun & Holidays: 6:00am - 9:00am

New Patients

Phone: 877-284-7074

Existing Patients

Phone: 301-714-0837
Fax: 301-714-2931
Email: hagerstown.md@cmglp.com

hagerstown treatment center hagerstown md, hagerstown treatment center hours, hagerstown treatment center phone number
Source: http://docphy.com/business-industry/health-care/hagerstown-treatment-center.html

Regional Accreditation for Online Schools

When selecting a distance learning college, your should choose an online school accredited by one of the five regional accreditors. These regional agencies are recognized by both the U.S. Department of Education (USDE) and the Council for Higher Education Accreditation (CHEA). They are the same regional associations that grant accreditation to most brick-and-mortar public and private universities

To determine whether an online school is regionally accredited, find out the state in which the online program is based.

Then look to see what regional agency grants accreditation to schools in that state. The following five regional accreditation agencies are recognized as legitimate accreditors:

NEW ENGLAND ASSOCIATION OF SCHOOLS AND COLLEGES (NEASC)


Accrediting schools in Connecticut, Maine, Massachusetts, New Hampshire, Rhode Island and Vermont, as well as Europe, Africa, Asia and the Middle East, the NEASC was founded in 1885 to establish and maintain high standards from prekindergarten to the doctoral level. The association has been in operation longer than any other U.S. accreditation agency. The NEASC is an independent, voluntary, nonprofit membership organization that connects and serves over 2,000 public and independent schools, technical/career institutions, colleges and universities in New England plus international schools in more than 65 nations worldwide.

ADVANCEED


AdvancED was created through a 2006 merger of the pre-K to 12 divisions of the North Central Association Commission on Accreditation and School Improvement (NCA CASI) and the Southern Association of Colleges and Schools Council on Accreditation and School Improvement (SACS CASI)—and expanded through the addition of the Northwest Accreditation Commission (NWAC) in 2012.

MIDDLE STATES COMMISSION ON HIGHER EDUCATION (MSCHE)


The Middle States Commission on Higher Education is a voluntary, nongovernmental, regional membership association that serves higher education institutions in Delaware, the District of Columbia, Maryland, New Jersey, New York, Pennsylvania, Puerto Rico, the Virgin Islands and other geographic areas in which the commission conducts accrediting activities.

The accreditation process ensures institutional accountability, self-appraisal, improvement, and innovation through peer review and rigorous standards.

WESTERN ASSOCIATION OF SCHOOLS AND COLLEGES (ACS WASC)


Accrediting schools in California, Hawaii, Guam, American Samoa, Palau, Micronesia, Northern Marianas, Marshall Islands and other Australasian locations, the ASC WASC encourages and supports institutional development and improvement through self-evaluation as well as mid-cycle, follow-up and special reports, and periodic peer evaluation of institutional quality.

NORTHWEST COMMISSION ON COLLEGES AND UNIVERSITIES (NWCCU)


The Northwest Commission on Colleges and Universities is an independent, nonprofit membership organization recognized by the U.S. Department of Education as the regional authority on educational quality and institutional effectiveness of higher education institutions in the region comprising Alaska, Idaho, Montana, Nevada, Oregon, Utah, and Washington. The NWCCU establishes accreditation criteria and evaluation procedures for reviewing its member institutions. At publication time, the commission oversees regional accreditation for 162 institutions. If you earn a degree from an online school that is accredited by one of these associations, that degree is as valid as a degree from any other accredited school.

Most employers and other universities will automatically accept your degree.

NATIONAL ACCREDITATION VS. REGIONAL ACCREDITATION


Alternatively, some online schools are accredited by the Distance Education Training Council. The DETC is also recognized by the U.S. Department of Education and the Council for Higher Education Accreditation. DETC accreditation is considered valid by many employers. However, many regionally accredited schools do not accept course credits from DETC-accredited schools, and some employers may be leery of these degrees.

FIND OUT IF YOUR ONLINE COLLEGE IS ACCREDITED


You can find out instantly if an online school is accredited by a regional accreditor, the DETC or another legitimate accreditor recognized by the U.S. Department of Education by searching the U.S. Department of Education database.

You may use the CHEA website to search for both CHEA- and USDE-recognized accreditors or to view a chart comparing CHEA and USDE recognition).

Note that "recognition" of an accrediting agency does not guarantee that schools and employers will accept a particular degree. Ultimately, regional accreditation remains the most widely accepted form of accreditation for degrees earned online and at brick-and-mortar universities.

online colleges accredited by sacs, online colleges accredited by sacscoc, online masters programs accredited by sacs
Source: http://docphy.com/business-industry/higher-education/regional-accreditation-online-schools.html

Emergency Management

BEING PREPARED IN AN EMERGENCY


The Montgomery County Office of Emergency Management is dedicated to ensuring the safety and readiness of all the citizens of Montgomery County. Take the time to read this information and prepare yourself and family in the event of an emergency.

The information presented here has been compiled from sources such as FEMA and the American Red Cross and can be very helpful in preparing for (and recovering from) an emergency or disaster.

Staying Informed


The first step to preparedness is making sure you've got all the correct information about the emergency or disaster, especially if it's local and affecting Montgomery County. The best way to do that is to sign up for our notification system, ReadyMontco.

GUIDELINES & FACT SHEETS


When it comes to emergencies and disasters, the three most important steps you need to take are to Be Informed, Make a Plan, and Build a Kit. The Federal Emergency Management Agency (FEMA) has compiled an extensive set of resources for each of these steps.

Be InformedBe InformedMake a PlanBuild A KitReadyMontco
Family Communications Basic Disaster SuppliesEmergency Alerts Plans for Infants & Children Where to Store Your Disaster Supply KitEvacuationPlans for Animals & PetsWaterShelter - Leaving Your HomePlans for SeniorsFoodShelter - Staying at HomePlans for Individuals with Access & Functional NeedsEmergency Food Pack (Sample Menu)

CITIZEN PREPAREDNESS GUIDES


Are You Ready: An In-Depth Guide to Citizen Preparedness
Emergency Preparedness Checklist
Family Communications Plan
Pennsylvania Emergency Preparedness Guide - also available en español
Preparing for Emergencies: A Checklist for People with Mobility Problems
United for a Stronger America: Citizens' Preparedness Guide

CONTACT US


P.O. Box 311
Norristown, PA 19404-0311
Phone: 610-278-3000
Hours 8:30 a.m.- 4:15 p.m.
Driving Directions

montgomery county emergency services district 8, montgomery county emergency services inc, montgomery county emergency services training center
Source: http://docphy.com/business-industry/business/emergency-management.html

Repost: How to Evaluate Sitecore as a Developer

This blog post provides some suggestions for developers evaluating the Sitecore ASP.NET CMS. You might find useful my series of posts about Sitecore Differentiating Factors and All About the Sitecore ASP.NET CMS.

This is a repost of http://sitecorejohn.spaces.live.com/Blog/cns!960125F1D4A59952!505.entry.

Like any Web Content Management System (WCM or CMS), the best way for a developer to evaluate Sitecore is to build a prototype using the product. The best way to learn Sitecore is to attend at least the Sitecore .NET Developer or Sitecore HTML Developer training (the latter focuses on XSL). If you choose HTML training, then you should know HTML, JavaScript, and CSS. If you choose .NET training, then you should also know XML, ASP.NET, C#, and Visual Studio. And it never hurts to know a little about Microsoft SQL Server. But first, schedule a live Web demo of the product with Sitecore.

Do some research before attending training, working with the technology, or involving any information and system architects, users, business analysts, or other parties in the prototyping process. Spend as much time as you can afford reading about Sitecore. Check out the Sitecore web site and the Sitecore Developer Network (SDN), especially the SDN forums. Manage your profile and sign up for newsletters on the Sitecore Portal. If you are a Sitecore partner, check out the Sitecore Partner Network (SPN).

Before architecting a solution, I think that developers should read through at least these in approximately the following order:

The Content Reference manual.
The Data Definition Reference manual.
The Presentation Component Reference manual.
Further reading before installing Sitecore:

On my old blog, I wrote a post about installing a local instance of SQL Server, which is the most convenient option.
The Sitecore Installation guide, including system requirements. I would read a little about the .zip installation to learn more about the system components, which include a file system, an IIS ASP.NET Web site, and supporting relational databases.
The Release Notes, which address known issues.

Sitecore requires specific Internet Explorer Configuration.

If you use Windows XP and have already configured an IIS Web site, then see this page on SDN.
For some reason, organizations often want to start by configuring the production servers. I would first focus on the development environments, then test environments, then production content management, and finally production content delivery.

You can get the latest Sitecore setup executable from this page on the Sitecore Developer Network. If you are a Sitecore partner, you can download the Nicam demo site from the Sitecore Partner Network (SPN). Customers can contact Sitecore for access to Nicam. Nicam is useful for demonstrations and (to some extent) education, but does not follow best practices, and neither should form any basis for production solutions. If you run into any trouble installing Sitecore, see the Installation Troubleshooting guide or contact your regional Sitecore office.

Use the cookbooks to implement what you’ve read:

The Content Author's Cookbook.
The Data Definition Cookbook.
The Presentation Component Cookbook (especially the section, “How to Create a Visual Studio Web Application Project”).
If you want to use XSL, see the Presentation Component XSL Reference.

For information about Sitecore Application Programmer Interfaces (APIs), see:

The Content API Cookbook.
The Data Definition API Cookbook.
The Presentation Component API Cookbook.
The Sitecore 6 API documentation. Most Sitecore developers also really appreciate .NET Reflector from RedGate.

If the above topics don’t cover what you need, check additional resources listed in my post that contains links to the Best Sitecore Documentation, common forum topics, and other resources. These should be particularly helpful:

The Client Configuration Cookbook.
The guide to Reusing and Sharing Data.
The Rules Engine Cookbook.
You might want to review various blogs about Sitecore. Lars Fløe Nielsen maintains this list of current blogs relevant to Sitecore.

You might also be interested in my series of blog posts about Sitecore best practices.

Sitecore partners and customers can file support cases at the Sitecore Support Portal.

download sitecore xpress edition, sitecore xpress download, sitecore xpress free download
Source: http://docphy.com/technology/computers/software/repost-evaluate-sitecore-developer.html

Department of Criminology

"We have to talk about liberating minds as well as liberating society.".Angela Davis."Injustice anywhere is a threat to justice everywhere.".Martin Luther King, Jr.

October 25, 2017
Canadian Youth and Justice Congress 2017: Advancing Ideas, Evidence and Innovation to shape a Canadian perspective of youth justice

September 14, 2017
Towards New Governance Strategies for Preventing Corruption: Law, Theory and Practice

April 7, 2017
Truth, Reconciliation, and Calls to Action in Education: A Discussion with Kimberly Murray

March 22, 2017
Gendering Justice and the Prison System

Criminology at Ryerson


The Criminology program at Ryerson examines the key players and institutions that affect, and are affected by, the justice system and other institutions of regulation. We seek to understand the balancing of the interests of victims, offenders, the public, and politicians along with concerns about human rights and social justice. This makes the field of criminology incredibly dynamic and ever-changing and is reflected in our curriculum. You will learn about the operation of the criminal justice system, the professionals that work within the system, and the various stakeholders that are involved. The ability to think critically about issues in criminology and the substantive knowledge you will acquire, will prepare you for work in criminal justice related fields as well as postgraduate education

LORIELLE GIFFIN

Lorielle Giffin, 2017 Criminology graduate and current Criminology and Social Justice MA student recognized by Undergraduate Awards (UA), Ireland

master's degree criminology cambridge, master's degree criminology jobs, master's degree criminology online
Source: http://docphy.com/hobbies-activities/politics-social-issues/law/department-of-criminology.html