Access to and use of the Online Industrial Security Services (OLISS) is provided subject to the following terms and conditions. By selecting “I agree” at the bottom of the page, you are agreeing to have read and to abide by those terms and conditions. If you select “I do not agree”, access to OLISS will be refused.
You have been provided a User ID and Password to access the Online Industrial Security Services (OLISS). As an OLISS user, you acknowledge that:
- Your User ID and Password are for your use only and shall be kept secured at all times.
- You are not to provide or permit access to OLISS by unauthorized personnel.
- Access privileges are solely for authorized work and shall not be used to attempt any other type of access.
- You are only permitted to access and/or copy data that is specifically required and authorized for use by your organization.
- You will not attempt to modify any component of the OLISS functionality.
- All hardware, software and computer files should be examined for malicious code (viruses) prior to accessing OLISS.
- You shall not communicate any sensitive information to which you have been granted access to any unauthorized individuals.
- You shall not use any such information or data for other than authorized purposes.
- You shall not destroy or alter data in any manner.
- You shall not obstruct, interrupt or interfere with the lawful use of data.
Privacy Notice Statement
Public Works and Government Services Canada (PWGSC) and the Industrial Security Program are committed to respecting the personal privacy of individuals who visit our Web sites.
- The Industrial Security Program does not automatically gather any personal information from you, such as your name, phone number, e-mail or street address during your visit to its Web sites. This information is only obtained if you supply it voluntarily.
All personal information you do provide is protected and used in accordance with the provisions of the federal
Privacy Act and the Treasury Board on Privacy and Data Protection. This means that, at the point of collection, you will be informed that your personal information is being collected, the purpose for which it is being collected and that you have a right of access to the information.
- The Industrial Security Program employs software programs to monitor network traffic to identify unauthorized attempts to upload or change information, or otherwise cause damage. This software receives and records the Internet Protocol (IP) address of the computer that has contacted our Web site, the date and time of the visit and the pages visited. We make no attempt to link these addresses with the identity of individuals visiting our site unless an attempt to damage the site has been detected.
- The Industrial Security Program occasionally uses "cookies" to track how our visitors use this site or to determine sites previously visited. The cookies we use do not allow us to identify individuals. They are compiled into statistical information on traffic patterns and are used to assess site efficiency. If a departmental site is using cookies that collect personal information, a notice will appear on the site advising of such use. You will be provided with an opportunity to refuse them. Such refusal will not affect the site performance or restrict your ability to access information from this site. (A "cookie" is a file that may be placed on your hard drive without your knowledge by a Web site to allow it to monitor your use of the site.)
The Industrial Security Program is taking the necessary measures to protect the confidentiality of the personal information you provide and to ensure that your electronic transactions with us are secure.
There are two main ways that we ensure the security of your transactions:
- Encryption electronically scrambles the data stream between your computer and our server. This minimizes the risk that Internet hackers and other users will alter or view information being transmitted. You must be using a browser with 128-bit encryption in order to access this site.
- Firewalls are a combination of hardware and software designed to securely separate the outside world from our internal computer systems and database.
E-mail should never be used to send sensitive information. Our encryption system does not function on e-mail.
If you are using this service on a shared computer in a public area (i.e. public kiosk or library), please ensure that you do not leave the computer unattended while accessing this service. This will ensure that no one else can access any personal information you may have entered. Ensure that you log out once you have completed your session so that none of your personal data is accessible to other individuals who will subsequently use the same computer. You must also be cautious about saving any personal information on the hard drive, which would also become accessible to other individuals. Also ensure to delete any outstanding print jobs when you conclude your session so that none of your personal information can subsequently be printed and be made available to other persons.
Users assume the risk associated with any transfer of information to the Industrial Security Program and with any other use of this site. The Industrial Security Program has made all reasonable efforts to protect the confidentiality of the information you provide and to ensure that your electronic transactions with us are secure. However, the Industrial Security Program is not liable for any damages that may arise from interception, loss, theft or their action regarding your personal information while in transit.
The Industrial Security Program is not responsible for any losses or damages incurred by anyone because of any restriction, delay, malfunction, or unavailability of the Online Industrial Security Services (OLISS) Portal.
Users are solely responsible for the accuracy of the information provided to the Industrial Security Program via this service.
I do not agree