E-Filing - Security Statement
Print this page.

Security is important to us. The Competition Tribunal uses a layered suite of technologies to ensure your communications with us are safe and protected. Technological and procedural systems are also in place to ensure security is not breached.

Our E-Filing web site ensures your business and personal information is handled with care and protected while in transit between your computer and our server through the use of industry standard security techniques which include Secure Socket Layer (SSL) encryption.

Encryption ensures that information in transit between your computer and our server cannot be read (private and confidential) or changed (integrity) and therefore all data is transported using encrypted channels in order to achieve security.
While using E-Filing, the integrity of any communicated information, as well as your registered profile, is guaranteed.

Even though we go to great lengths to secure your transactions with us, there are other precautions you should take to maximize your protection. For example, you should regularly apply commercially available patches and updates to your browser and operating system and protect your computer with up-to-date anti-virus and firewall software, which is also commercially available.

We do not recommend the transmission of business or personal information using standard e-mail, as we can only ensure the protection of information that is entered on our E-Filing web site.

We also collect and analyze information for site management. Our software programs create summary statistics, which are used for such purposes as assessing what services are of most and least interest to our clients, determining technical design specifications, and identifying system performance or problem areas. The information collected by our servers for site management is protected and access to this information is restricted.
For web site security purposes and to ensure that our services remain available to all users, we monitor network traffic. This monitoring is done to identify unauthorized attempts to upload or change information, or to otherwise cause damage.

In the course of monitoring, we will receive and record routing information from the data (the Internet Protocol (IP) address of the computer) that reaches our web site, the date and time of visits, and the web pages visited. We make no attempt to link these addresses with the identity of individuals visiting our site, unless an attempt to damage the site has been detected. In such cases, data logs will only be used to identify individual users for authorized law enforcement investigations or national security purposes.

These logs are used for no other purposes and are scheduled for regular destruction in accordance with the Library and Archives of Canada Act and the Privacy Act.


Top of Page


© 2012  |  Date Modified : 2012-10-31