1
We diligently protect personal information and are transparent with our
customers
CTC maintains enterprise-wide policies, procedures, standards and guidelines to help protect the personal information of our stakeholders.
Corporately, we publish and honour an Employee Privacy Policy, which also covers employees of CT
REIT, and a customer-focused Privacy Policy. These policies
explain how we collect, use, and disclose, and protect personal information. We maintain clear and easily
accessible policies and practices so stakeholders can find answers about how we manage their information.
We ensure that training on our risk management and cybersecurity programs are part of our employee
onboarding process. Because our processes are always evolving, all employees are required to review the
policies and take part in a training module annually.
CTC has also established a set of policies and standards that specifically govern our cybersecurity
practices. This is based on the National Institute of Standards and Technology’s Cybersecurity Framework,
regulatory requirements and other industry-standard control frameworks. Read our Cybersecurity section below
for more details.
Using data and analytics to drive value
CTC’s Data In Action program supports scalable, secure and centralized data
technology platforms that enable data-driven insights to maximize business efficiency and provide
greater value to our customers. For example, we analyze the localized demand of our customers to inform
our purchasing decisions, our allocation and replenishment to stores, the offers we present, and the
placement of our product on our website. Customer needs, reinforced by data, are at the forefront of all
of our decisions.
Within the Data In Action program, we also advance our Responsible Artificial Intelligence initiatives,
which serve to manage the risks and opportunities associated with artificial intelligence. Our
artificial intelligence capabilities are built on a foundation of trusted and governed data that
prioritizes customer
privacy above all else.
2
We consider cybersecurity a critical business imperative
CTC acknowledges that cybersecurity is more than just a technology challenge, but a business imperative with ultimate accountability residing with the CEO. Each senior executive plays a role in ensuring the Company maintains constant vigilance. Accountability for the cybersecurity program, operations and governance, is held by our Chief Information Security Officer who reports to and is supported by our Chief Information & Technology Officer and our Enterprise Risk Committee. Together, we are staying ahead of threats to our organization through integrated policies, an embedded multi-layered set of controls and round-the-clock monitoring.
We work to ensure trust is built into every customer interaction. How we
operate is critically dependent on our technology and data, and so we ensure that our systems remain
resilient against cyberattacks. In addition to cybersecurity policies that guide and govern
our practices, our Information Governance team has established standards and controls related to data
classification and records retention and our cybersecurity program is subject to internal, external and
regulatory audits to validate control design adequacy and operating effectiveness.
We are committed to continuous improvement by conducting regular reviews of cybersecurity policies and
standards, assessing our capabilities and controls, and testing our ability to respond to potential cyber
threats. The National Institute of Standards and Technology Cybersecurity Framework provides CTC with a
structured and consistent approach to managing cyber risk, a common language, and consistent measurement of
our progress.
Through our threat management and intelligence program, we identify threats and mitigate risks (e.g.,
vulnerabilities) to help prevent attacks. To enhance our awareness of threats, we collaborate with
government, information-sharing organizations and regulatory agencies, and take part in external events to
stay on top of industry trends and tools. Our Security Information and Event Management team monitors our
environment 24/7 using modern security tools and techniques to detect, respond and recover from potential
cybersecurity issues. CTC’s “defence in depth” strategy provides many layers of cybersecurity controls,
integrating people, technology and operational capabilities to establish variable barriers across multiple
layers of defence.
The need to support the evolution of our business model and adapt to the changing operating environment has driven extensive cybersecurity transformation. To mitigate legacy cyber risks while continuing to progress on long-term and sustainable cyber risk practices for the future, we continue to execute on our multi-year cyber transformation strategy. These enhancements strengthen our resilience and shift the organization to a more deeply integrated and sustainable enterprise approach to cyber risk management. The initiatives and programs that drive this strategy are designed to address key cyber risk scenarios related to our business.
Cybersecurity Program Highlights:
-
Our cybersecurity training and awareness programs continually evolve to update users and keep them
informed of cybersecurity risk, current threats, and expected cyber secure behaviors. To maintain
resiliency against phishing attacks, we keep up to date on current research and update our simulation
phishing program accordingly. Through the program, our employees are made aware of phishing risk and
actions to take when faced with real phishing attempts.
-
We engage in extensive research on emerging and prevalent cybersecurity threats to continually increase
the effectiveness of our threat intelligence program.
-
Our cybersecurity risk assessment process, which we continue to evolve, is embedded in our
business, enabling the identification and communication of cybersecurity risks, and allowing the
organization to make risk-based decisions.
-
We have a third-party cybersecurity risk management framework to identify, mitigate and increase
visibility on third-party cybersecurity risks associated with digital crown jewels.
-
Our remote access model, which allows employees to work virtually, leverages secure solutions to ensure
safe external access into our digital business environment.
-
We have data protection capabilities in place to identify sensitive information, ensure protection and
reduce risk of data loss.
- We conduct regular and extensive testing both internally and with multiple 3rd party external
organizations with the purposes of continuously improving our overall posture.