Important notices on security and privacy at the Competition Tribunal's E-Filing
Print this page. Print

The Competition Tribunal (Tribunal) is committed to providing visitors with websites that are safe and secure. This Important Notices page summarizes the various policies and practices affecting the Tribunal’s E-Filing.

SECURITY

Security Statement

The Tribunal uses a layered suite of technologies to ensure your communications with us are safe and protected. In addition to this computer security system, the Tribunal has implemented procedures to prevent security breaches.

Encryption ensures that information in transit between your computer and our server cannot be read (privacy and confidentiality) or changed (integrity); consequently, all data is transported using encrypted channels in order to provide security.

While you use the E-Filing, the integrity of any information you communicate, as well as your registered profile, is guaranteed.

Even though we go to great lengths to secure your transactions with us, you too should take precautions to maximize your protection. For example, you should regularly apply commercially available patches and updates to your browser and operating system, and protect your computer with up-to-date anti-virus and firewall software, which are also available commercially.

We also collect and analyze information for site management. Our software programs create summary statistics, which are used to assess what services are of interest to our clients; determine technical design specifications; monitor system performance and identify problems. The information collected by our servers for site management purposes is protected, and access to this information is restricted.

For website security purposes, and to ensure that our services remain available to all users, we monitor network traffic. This monitoring is done to identify unauthorized attempts to upload or change information, or to otherwise cause damage.

In the course of monitoring, we will receive and record routing information from the data (the IP address of the computer) that reaches our website, the date and time of visits, and the web pages visited. We make no attempt to link these addresses with the identity of individuals visiting our site unless an attempt to damage the site has been detected. In such cases, data logs will only be used to identify individual users for authorized law enforcement investigations or national security purposes. These logs are used for no other purposes and are scheduled for regular destruction in accordance with the Library and Archives of Canada Act and the Privacy Act.

Top of Page