Annex D: Glossary
Special Report on the Lawful Access to Communications by Security and Intelligence Organizations

Backdoor
An undocumented, private, or less detectable-way of gaining remote access to a computer, bypassing authentication measures, and obtaining access to plaintext. Footnote 374
Basic subscriber information
Basic identifying information that corresponds to a customer’s telecommunications subscription. This can include name, home address, phone number, email address, and/or IP address. BSI does not include the contents of communications. Footnote 375
Carrier
An entity that operates a transmission facility used to provide telecommunications services to the public for compensation. Footnote 376
Computer network exploitation
Tools and techniques that exploit vulnerabilities in systems or software to surreptitiously obtain data that is stored on or transiting communications networks.*** Footnote 377
Communications service provider
An entity that offer telecommunications services or some combination of information and media services, content, entertainment, and application services over networks. Footnote 378
Encryption
The conversion of information from one form to another to hide its content and prevent unauthorized access. Footnote 379
Internet of Things
A variety of everyday web-enabled “smart” objects, such as personal fitness trackers, televisions and cars, with embedded sensors, electrical components and software collecting data and information from their surroundings. Footnote 380
IP address
A numerical identification and logical address that is assigned to devices participating in a computer network. Footnote 381
Lawful access
The judicially authorized interception of electronic communications, and the search and seizure of electronic information, in accordance with Canada’s legal framework. Footnote 382
Metadata
Data about data, or an informal term for transmission data. In the context of communications, metadata is the who, where, when, how and with whom of a communication, but not the contents of the communication. Footnote 383
On-Device Investigative Tool
A term the RCMP uses to refer to its computer network exploitation tools.
Virtual private network
A private communications network used to communicate over a wider network. VPN communications are typically encrypted or encoded to protect the traffic from other users on the public network carrying the VPN. Footnote 384
Vulnerability
A flaw or weakness in the design or implementation of an information system or its environment that could be exploited to adversely affect an organization’s assets or operations. Footnote 385