Ontario CAS Data Breach: Why Won't the Crown set a Trial Date?
WHAT HAPPENS WHEN THE CHARGES DON'T FIT THE "FACS"
DELAY, DELAY AND MORE DELAYS BY THE CROWN.
Why is it it's the crown wanting a special judge at this late stage in the game and not Miss Denham - and why didn't the crown make the request for special judge 3 months ago considering he's been saying it would be a ten day trial right from the start?
What if the allegations made by FCSLLG are false and Kelley Denham didn't hack FCSLLG's computer because she didn't have to and the document allegedly posted on Facebook wasn't. What will that mean for FCSLLG after trial?
Did FCSLLG board members really need a password to access confidencial information on FCSLLG's computer system and did FCSLLG actually have any cyber security? Mainstream media seems to assume they did calling it a cyberattack and a hack.
Lemay admits the report was on the FCSLLG's website but says it was hidden behind several layers of security including a password given only to the organization's board of directors.
"You have to go through the back door. You have to be looking for this," he says. Did FCSLLG hide a loaded gun in their digital lobby and assume no one would see it or be extremely shocked to find it without hacking or knowing how to hack? As the statement of claim points out she has no obvious hacking skills and why would that be, because she has none.
This was the second time in about three months that the organization has had to take down its website because of security concerns. An outside expert was brought in after a February scare to better secure the website. No sensitive information was revealed or even in danger in the first breach, Lemay says. He says they made the changes and were told the website was secure - though and insider has stated not one of the recommendations made by the expert were implemented.
WHAT DID FCSLLG KNOW AND WHEN DID THEY KNOW IT?
Watch the video DENHAM VS FCSLLG to find out.
So what is corporate internet security and is this what Lemay meant when he says FCSLLG had security?
Corporate Internet Security - Is it all just programs, passwords and multiple layers of file folders to protect your business computer and client information or is there real hardware involved?
Yes there is real hardware and specially designed software and I bet you won't find anything like it in FCSLLG's budget reports.
Here's an older model of one the many devices on the market to protect corporate networks and confidential client information and a little about what it does.
JNISG is a purpose-built, security solution that are ideally suited for securing enterprise, carrier, and data center environments where consistent, scalable performance is required.
Network segmentation: Security zones, virtual systems, virtual LANS and virtual routers allow administrators to deploy security policies to isolate guests and regional servers or databases.
Does anyone think this is what Lemay meant when he said FCSLLG had layers of security?
Optional Integrated IDP:
The ISG Series firewall/VPN with IDP uses the same award-winning software found on Juniper Networks IDP Series appliances.
The IDP security module combines eight detection mechanisms, including stateful signatures and protocol anomaly detection.
The ISG with IDP defends against security threats such as worms, trojans, malware, spyware, unauthorized users and hackers and can provide information on rogue servers and data on applications and operating systems that were inadvertently added to the network. Application signatures enable administrators to maintain compliance and enforce corporate business policies with accurate detection of application traffic.
SEE: Hyperlinks not considered ‘publications,’ rules Supreme Court. Written by Gail J. Cohen Wednesday, 19 October 2011
Justice Rosalie Abella writing for the majority of the nine-judge panel, states: “Hyperlinks are, in essence, references, which are fundamentally different from other acts of ‘publication.’
"A hyperlink, by itself, should never be seen as ‘publication’ of the content to which it refers." When a person follows a hyperlink to a secondary source that contains the confidential information, the actual creator or poster of the confidential information in the secondary material is the person who is publishing.
WHAT'S MAINSTREAM MEDIA NOT TELLING YOU ABOUT ONTARIO CAS DATA BREACH TRIAL AND WHY WON'T THE CROWN SET A TRIAL DATE?