[Audio] "Good day everyone, and welcome to the Controlled Goods Program training for Point Hope Maritime at Eskymalt Graving Dock and Harbour Road. This training is important because the work we perform may involve sensitive goods, technical information, and defence-related projects regulated by the Government of Canada. Today's session will cover: What controlled goods are Your responsibilities when handling them How to protect controlled information And what to do if a security issue occurs The goal is to keep this practical, straightforward, and relevant to your day-to-day work.".
[Audio] Controlled Goods are items and technologies that have military, defence, or national security significance and are regulated under Canada's Controlled Goods Program, or CGP. Examples include: • Military equipment and weapons systems • Satellite and navigation systems • Missile and UAV technology The controls apply not only to physical items, but also to technical information and data, including: • Engineering drawings and blueprints • Technical manuals and specifications • CAD models and electronic files • Training material and technical knowledge At Point Hope Maritime, controlled goods may be encountered during vessel repair work, engineering activities, and while handling technical documentation. Controlled goods and related information must only be accessed by authorized individuals with a valid need to know..
[Audio] The Controlled Goods Program exists to protect Canada's national security and prevent sensitive information from ending up in the wrong hands. For our organization, compliance is critical. Failure to follow Controlled Goods requirements can result in: • Security breaches • Loss of contracts • Financial penalties • Suspension from the program • And potentially criminal charges Every employee plays an important role in protecting controlled goods and maintaining compliance..
[Audio] Controlled goods can include physical items, technical data, and sensitive information related to defence or military systems. At our facilities, examples may include: • Marine system components • Technical drawings and repair documentation • Controlled electronic files • Engineering specifications Not every item will be clearly marked. If you are ever unsure whether something is controlled: • Stop • Treat it as controlled • And ask your supervisor or Designated Official for guidance When dealing with controlled goods, it is always safer to verify first rather than assume..
[Audio] There are three important terms used throughout the Controlled Goods Program: Examine, Possess, and Transfer. Examine means viewing or accessing controlled goods or information. Even looking at a drawing on a screen counts. Possess means having custody or control of controlled goods, physically or electronically. If controlled files are saved on your computer, you are considered to possess them. Transfer means sharing or providing access to controlled goods or information. This can include: • Emailing files • Handing over documents • Uploading data • Or allowing someone to view information Most security incidents occur during transfers, especially electronic transfers, so always verify authorization before sharing anything..
[Audio] Here are some examples of how controlled goods activities may occur during normal work: • Reviewing a repair drawing is examining • Handling a controlled component is possession • Emailing a drawing or sharing information is a transfer These are routine work activities, but when controlled goods are involved, they become regulated activities. The key is ensuring that all handling, storage, and sharing is done properly and only with authorized individuals..
[Audio] Controlled goods are not limited to one secure room or office. They may exist: • On workstations and laptops • In offices and meeting rooms • On shared drives • In repair and production areas • In printed documents or technical binders Because controlled goods can exist in many forms and locations, employees must remain aware of how information and materials are handled at all times. If unsure, treat the material as controlled until confirmed otherwise..
[Audio] Physical security is one of the first layers of protection. This includes: • Following restricted area requirements • Using badge access properly • Securing materials in locked storage • Preventing unauthorized access Employees should never allow tailgating through secure doors or assume someone belongs in a restricted area simply because they look familiar. If you see someone without proper identification in a restricted area, challenge politely and report it..
[Audio] Information security is equally important, especially when handling electronic files and technical data. Key requirements include: • Never sharing passwords • Never using personal USB devices • Using only approved systems and networks • Protecting printed documents • Verifying recipients before sending emails or files Electronic transfers are one of the most common sources of security breaches. Always slow down before sending controlled information and confirm the recipient is authorized and has a legitimate need to know..
[Audio] Security awareness is part of everyday workplace behaviour. Employees are expected to: • Lock their screens when away from their workstation • Keep desks clear of sensitive documents • Secure controlled information when not in use • Avoid discussing sensitive information in public areas A good habit is to ask yourself: 'Could someone unauthorized see or hear this information right now?' If the answer is yes or maybe, corrective action should be taken immediately..
[Audio] Visitors and contractors must be managed carefully when controlled goods are present. Unless specifically authorized: • Visitors cannot access controlled goods • Visitors must remain escorted in restricted areas • Controlled information should not be visible or discussed around unauthorized individuals Access to controlled goods is based on authorization and need-to-know — not convenience or familiarity..
[Audio] A security breach is any situation where controlled goods or information are accessed, viewed, transferred, or handled improperly. Examples include: • Sending information to the wrong person • Leaving documents unattended • Discussing controlled information in public areas • Unauthorized access to files or workspaces Many breaches are accidental, but all incidents must be taken seriously and reported promptly..
[Audio] If you believe a breach or security incident has occurred: 1. Stop work immediately 2. Secure the item or information 3. Report the incident to your supervisor or Designated Official 4. Do not attempt to hide or independently resolve the issue Timely reporting is critical. Early reporting allows the organization to contain the issue and take corrective action quickly. Employees will not be penalized for reporting concerns in good faith..
[Audio] Every employee has responsibilities under the Controlled Goods Program. This includes: • Following company procedures • Protecting controlled goods and information • Reporting concerns or suspicious activity • Asking questions when unsure If you are uncertain about any situation involving controlled goods, stop and contact your supervisor or Designated Official for guidance. At Point Hope Maritime, the Designated Officials are: • Rob Morris • A.J. Singh.
[Audio] Before we conclude, there is an important acknowledgement required as part of this training. By completing this course, you are confirming that you understand your responsibilities under the Controlled Goods Program, that you agree to follow all applicable security procedures, and that you know how to report any concerns, incidents, or potential breaches. Signing the Acknowledgement Form is required to meet our compliance and audit obligations under the Controlled Goods Program, and access to Controlled Goods cannot be granted without it. If you are ever unsure about a requirement or need to report a concern, contact the Designated Official immediately..
[Audio] Thank you for completing this Controlled Goods Program training. Safeguarding controlled goods is a shared responsibility, and every employee plays an important role in protecting sensitive information, supporting national security, and maintaining compliance with federal regulations. Your awareness, attention to detail, and willingness to report concerns help protect both our organization and Canada's defence interests. Thank you for your participation and for doing your part to maintain a secure workplace..
[Audio] Before we wrap up, there's just a short quiz to complete. Don't worry, there are no trick questions here. You've already gone through the most important part of the training, and this quiz is simply a quick check to confirm your understanding of the key points. Take your time and do your best..