Discussion Paper DIS-21-03, Cyber Security and the Protection of Digital Information

Consultation has concluded

Consultation on discussion paper DIS-21-03, Cyber Security and the Protection of Digital Information, is now closed. Thank you to everyone who submitted comments.



Consultation on discussion paper DIS-21-03, Cyber Security and the Protection of Digital Information, is now closed. Thank you to everyone who submitted comments.



CLOSED: This discussion has concluded.
Discussions: All (31) Open (31)
  • Question 1

    about 1 year ago

    You need to be signed in to add your comment.

    Do you agree with the proposed model for managing prescribed information electronically?

  • Question 2

    about 1 year ago

    You need to be signed in to add your comment.

    Could this model be used to manage all sensitive information generated by your organization?

  • Question 3

    by andrewneuheimer, about 1 year ago

    You need to be signed in to add your comment.

    Do you agree with the proposed manner for the identification, classification and marking of sensitive information (including prescribed information) that you manage? Why? Why not?

  • Question 4

    by andrewneuheimer, about 1 year ago

    You need to be signed in to add your comment.

    Please identify any impacts that would arise if the CNSC would make the suggested practices mandatory.

  • Question 5

    by andrewneuheimer, about 1 year ago

    You need to be signed in to add your comment.

    What specific standards or guidance have you implemented to protect the prescribed information and other sensitive information on your information systems?

  • Question 6

    by andrewneuheimer, about 1 year ago

    You need to be signed in to add your comment.

    Are there additional sources of guidance for protecting your information systems that would be suitable to you?

  • Question 7

    by andrewneuheimer, about 1 year ago

    You need to be signed in to add your comment.

    Would your organization be able to implement the example measures listed above?

  • Question 8

    by andrewneuheimer, about 1 year ago

    You need to be signed in to add your comment.

    What specific measures have you implemented to protect the prescribed information you are managing while not in use?

  • Question 9

    by andrewneuheimer, about 1 year ago

    You need to be signed in to add your comment.

    What are your thoughts concerning the examples of guidance provided?

  • Question 10

    by andrewneuheimer, about 1 year ago

    You need to be signed in to add your comment.

    Are there additional sources of guidance for disposal that would be suitable to reference?