GlossaryA B C D E F G H I L M N O P Q R S T U V W Z
Technical Surveillance Countermeasures (TSCM)
The process of surveying facilities to detect the presence of technical surveillance devices and to identify technical security weaknesses that could aid in the conduct of a technical penetration of the surveyed facility.
A location separate to the employee’s home and remote from the agency’s normal business premises that provides access to an office environment and may provide remote access to agency ICT systems. These facilities may be provided on an agency-specific or shared basis.
Tele-work (telework, telecommuting)
Paid work conducted away from an agency’s offices in a fixed location that requires at least periodic connection to the employer’s ICT network. Tele-work is distinguished from mobile computing by having a controlled environment and little need for portability of equipment. Tele-work is subject to a formal agreement between the agency and the employee.
The investigation of compromising emanations from electronic equipment such as computers. The term is also used for such compromising emanations.
The act of a potential contractor offering to perform services or supply goods for a specified cost.
Thin client technology
A thin client is a lightweight computer that has been optimized for remoting into a server-based computing environment. The server does most of the work, which can include launching software programs, crunching numbers, and storing data.
Third party interest (in competitive tendering and contracting)
Any legal or equitable right, interest, power or remedy (no matter the degree) in favour of any person, other than the agency or the contractor, in connection with the contract, including any right of repossession, receivership, control or power of sale and any mortgage, charge, security or other interest.
A source of harm that is deliberate or has the potential or intent to do harm.
Evaluation and assessment of the intentions of people who could pose a hazard to a resource or function, how they might cause harm and their ability to carry out their intentions. Threats need to be assessed to determine what potential exists for them to actually cause harm.
A security classification that shows that compromise of the official information could cause exceptionally grave damage to the national interest.
A treaty is an agreement between states (countries) that is binding by international law. In some cases, international organisations can be parties to treaties. A treaty may also be called a convention, protocol, covenant or exchange of letters.