Authentication protects information by verifying the identity of the parties on both ends of the Internet connection, before confidential information is exchanged. Your Web access code and Business Number are positively identified at the time of log-in.

Throughout a session, extensive measures maintain security. In addition, server authentication ensures that you're communicating directly with the CRA and not with an unauthorized party.



In a Web browser–such as Microsoft Internet Explorer–a bookmark (or "Favourite") is a way to save the current link, so that you won't have to type in the complete address the next time you want to visit the same site.


This type of software lets users browse through the World Wide Web. Google Chrome, Safari, Mozilla Firefox, and Microsoft Internet Explorer are the most well-known browsers.



Your cache stores information where it can be accessed quickly. Your Web browser stores pages, sounds, URLs, and images in caches where they can be easily retrieved. As the user backs through the links, the pages are retrieved quickly, saving the time of a reload.


The acronym for the Canada Revenue Agency (CRA).

A cookie is a small information file that's transferred from a Web server to your Web browser to be stored and accessed on your computer. There are several types of cookies that are used for many different reasons, depending on the Web site you're visiting. One of the most common reasons for a Web site to send you cookies is to remember who you are and your preferences for certain kinds of information. Only the site that sends you cookies is able to read them.



You copy a file from a host system to your computer. There are several different methods, or protocols, for downloading files.Most of them periodically check the file as it's being copied to ensure that no information is inadvertently destroyed or damaged during the process.



Encryption is used to ensure that an unauthorized party won't access your personal information. Data you send from your computer is encrypted before leaving it. Encryption alters your data into a format that can be safely transmitted over the Internet. Once the data has been encrypted, it cannot be read until it reaches its destination and is decrypted, using a decryption key.



A firewall acts as a barrier between internal and external computers in a network, controlling the flow of information between the two. When a computer outside the firewall wishes to communicate with a computer inside, it must communicate with the firewall, which then passes the data to the internal computer. This two-step process protects the CRA's internal network from unauthorized access.



JavaScript is a scripting language which works primarily on Web pages and is used frequently to: add visual functions such as alert boxes and pop-up windows, create animations, as well as detect browser, browser version, and platform.

Java applets

Java applets are little applications which work primarily on Web pages and Web servers and are used frequently to perform specialized tasks.

Java application

A downloadable Java application allows clients, on their computer, to create, print, save, and submit an electronic information return.

Java Runtime Environment (JRE)

The Java Runtime Environment lets your computer run Java applications.



A combined form of modulator-demodulator, a modem is a device that allows computers to transmit data over telephone lines.



Whenever information is sent over the Internet, it is divided into smaller multiple parts or packets to make transmission easier. These packets of information are then reassembled when they reach their destination.


An acronym for Public Key Infrastructure, PKI involves certificates being held by each party transmitting over the Internet. PKI is not required for Internet filing.


TLS (Transport Layer Security)

TLS is a protocol that provides authentication, confidentially, and data integrity between communicating applications. TLS is a middle layer of the Open Systems Interconnection (OSI) communication model that permits security services to be defined in a layered or architecture approach. It is based upon and supersedes Secure Socket Layer version 3.0 (SSL v3.0). The CRA depends on its information technology (IT) systems to ensure the delivery of data in a secure and reliable manner.

Using the appropriate safeguards and configuration, TLS provides a method of transmitting data securely across networks. Effective implementation of TLS will assist in mitigating the most serious threats with web-based applications such as eavesdropping, data tampering, and message forgery.



This initialism for "universal resource locator" – refers to an address on the World Wide Web. For example, You need a browser like Internet Explorer or Safari to read the information.

Page details

Date modified: