Find a Standard

Our standards cover vital areas of the emerging digital economy

Standards Topics

Click on any topic below to see all standards that have been published or are in development in that area. View our work program

In Public Review

Public review is an essential part of the standards process. The following drafts of standards are in development and  are currently available for public review. Leave your comments in the online draft and they will be considered by technical committee responsible.

CAN/DGSI 109-2, Canadian information Privacy Protection Framework

Minimum requirements for organizations that handle personal information in Canada.
Read more

Exploratory Work

Below are standards project proposals that are currently under consideration by our Standards Policy Committee. If the committee approves them, they will move into our development process.

Develop a standard for data governance for the delivery of community and social services
Design, Use and Evaluation of a Regulatory Sandbox

We welcome your opinions on these proposals. Please send your comments to:

Periodic Maintenance

Every published standard undergoes periodic maintenance to ensure it stays aligned with the fast ever-growing digital needs. Below are the standards currently undergoing maintenance.

CAN/CIOSC 100-7:2022 | Digital Governance – Part 7: Operating Model for Responsible Data Stewardship

This standard applies to the stewardship, accountability and management of data whenever a legal entity collects, uses or shares it with another entity or individual.

Read Draft 

CAN/CIOSC 100-1: 2020 (Revised) | Digital Governance – Part 1

Data breaches are a serious risk for all organizations. Whether the result of inadvertent mishandling, recklessness, or cyberattack, the exposure of confidential information can have damaging and long-lasting impacts on organizations and the people whose data is leaked.

This standard sets out the fundamental characteristics and attributes required of data protection systems. It includes measures to protect data while it is being held on a server and while it is being transferred between IT systems and/or organizations.

Read Draft 

Scroll to Top

This website uses cookies to improve your experience. By using our website you agree to our Cookie Policy

This website uses cookies to improve your experience. By using our website you agree to our Cookie Policy