Maverick GardnerMaverick Gardner

CGP IT Support

As a business or organization that deals with “controlled goods”, your Managed Service Provider or IT support company needs to be registered under the Controlled Goods Program. In order to provide any controlled goods IT support, which would or might give them access to anything considered a controlled good.  

Why does an MSP needto be registered under the controlled goods program? The simple answer here is that you are dealing with sensitive data that if delivered into the wrong hands could do serious harm to the company and or Canada in general. This is why all of Maverick Gardner’s employees are registered under the controlled goods program and have passed rigorous background checks. Maverick Gardner as a company is also registered under the CGP and abides to all of its rules and regulations.  

So just what are controlled goods?

  • goods, including components and technology (for example, blueprints and technical specifications in paper or electronic format), with strategic significance or national security implications, regardless of where they are manufactured 

  • defense articles originating from the United States that are controlled by the United States Munitions List—part 121 of the United States International Traffic in Arms Regulations, as amended from time to time 

  • goods, regardless of where they are manufactured, that are manufactured from technical data originating from the United States and are controlled by the International Traffic in Arms Regulations, as amended from time to time 

In Conclusion

 Your managed service provider should be registered with the CGP prior to dealing with any controlled goods. If you are unsure ask to see the controlled goods certificate which should be registered in the company’s name. Alternatively you may also use the Government Of Canada’s website to search for individuals or organizations in the controlled goods program.  

Let us know ...

We want to know your experience.  Share and get feedback from our experts.  Your story may help others.

What Is An Internal IT Department?

What Is An Internal IT Department?The Downsides Of An Internal IT DepartmentFinding suitable IT professionals can be time consuming, expensive and occasionally unfulfilling. That is, an SMB may spend a lot of resources on the hiring and recruitment process alone, and...

What Is A Cloud Service?

What Is A Cloud Service?A cloud service is a term used to describe services such as software, platforms and infrastructure hosted for users on the internet. Moving to the cloud is used to provide, easy and affordable access to these various applications without having...

9 Common Types Of Malware

9 Common Types Of MalwareIn this post we will discuss the 9 common types of malware and real world examples for each. The ongoing threat that malware represents significantly impacts both people and businesses on a day-to-day basis. With AV-TEST registering over...

What Is Cyber Resilience?

What Is Cyber Resilience?Cyber resilience is your ability to anticipate, recover from, and adapt to adverse conditions, stresses, attacks, or compromises on systems that use or are enabled by cyber recourses. In other words, it prepares you for cyber attacks....

Managed Services Vs Traditional IT Support

Managed Services Vs Traditional IT Support   The question of whether to use Traditional IT services outsource to Managed Service Providers (MSP) can be a difficult decision. While Traditional IT offers greater control, it can also be costly and time-consuming. MSPs,...

Improve Cybersecurity With 6 Simple Steps

Six Simple Strategies To Improve Cybersecurity As the new year sets in, have you considered how your business's cybersecurity policies might need an update? Many businesses fail to keep up with their security protocols and can be left vulnerable. Investing in...

Cyberattacks Spike During The Holiday Season: Here’s Why

Cyberattacks Spike During The Holiday Season : Here’s Why  The holidays are a time for family, friends, and—unfortunately—cyberattacks. Research shows that cybercrime spikes during the months of November and December, with hackers taking advantage of the busy shopping...

What Is A Zero Trust Security Model?

What Is A Zero Trust Security Model?   The Zero Trust Security Model is a framework for security that emphasizes the need to verify user identities and establish secure communications before granting access to data or systems. The Zero Trust model rejects the...