Accreditation In Progress
Standards Council of Canada (SCC)
ISO/IEC 17021-1 Management System Certification
ISO/IEC 17020 Inspection
MSAP & IBAP Programs
Conformity Assessment Body · SCC Accreditation In Progress

The certification body that understands technology

Independent assessment, inspection, and certification for information security, AI governance, and cybersecurity.

Scope Finder
Find which programs apply to your organization
What describes your organization?
Select one or more to see applicable programs
AccreditationSCC · In Progress
ProgramsMSAP + IBAP Applied
HeadquartersVancouver, BC
ScopeTechnology Exclusively
The Landscape

How laws, standards, and certification connect

Laws create obligations. Standards provide the management system. Certification provides independent evidence. This is the map.

Regulation / Law
PIPEDA
Federal private sector privacy
Provincial Privacy
BC PIPA, AB PIPA, QC Law 25
AIDA (proposed)
AI regulation under Bill C-27
Defence Procurement
Federal cybersecurity mandates
Gov't Procurement
Supplier security expectations
Mapping
PIPEDAISO 27701 + 27001Maps to
AIDAISO/IEC 42001Maps to
DefenceCPCSCRequired
Gov't SupplyCyberSecure or 27001Expected
Cloud DataISO 27017 + 27018Expected
AI Systems42001 + NIST AI RMFRecommended
Certification / Inspection
ISO/IEC 27001
Information Security -- Certification
ISO/IEC 42001
AI Management -- Certification
CyberSecure Canada
Baseline Cybersecurity -- Certification
CPCSC
Defence Supply Chain -- Inspection
Required Mandated by regulation, contract, or sector rules
Maps to Standard directly supports regulatory requirement
Expected Commonly required in procurement or industry
Recommended Best practice alignment for emerging regulation
Accredited Scope

Programs and standards

Our accredited scope covers the certifications and inspections most critical to technology organizations. For standards beyond those listed, contact us.

Information Security Management Systems
ISO/IEC 27001:2022
Certification

Third-party certification of your ISMS. Risk-based approach to protecting information assets through governance, controls, and continuous improvement. Annex A controls span organizational, people, physical, and technological domains.

Applicability
Technology companies, SaaS, managed service providers, enterprises handling sensitive data
Audit Model
Stage 1 readiness + Stage 2 assessment. Annual surveillance. Three-year cycle.
Related Standards
27002, 27005, 27017, 27018, 27701, 27035
Deliverables
ISO/IEC 27001:2022 Certificate
Audit report with findings and evidence summary
Statement of Applicability sign-off
Annual surveillance coverage
Public register listing
International IAF/ILAC recognition
Evidence Checklist
  • Information security policy
  • Risk assessment methodology and results
  • Statement of Applicability
  • Asset inventory
  • Access control procedures
  • Incident management records
  • Internal audit report and management review
Timeline
Inquiry
1–2 wks
Application
1–2 wks
Stage 1 Audit
2–4 wks
Stage 2 Audit
4–8 wks
Decision
1–2 wks
Certificate
3+ months
Common Failure Points
  • !
    Risk treatment not linked to Annex A controls
  • !
    Statement of Applicability incomplete or undated
  • !
    Internal audit not completed before Stage 2
  • !
    Scope definition too vague or too broad
AI Management Systems
ISO/IEC 42001:2023
Certification

Certification for organizations developing, providing, or using AI. Governance, risk management, lifecycle controls, responsible AI, and monitoring. First certifiable international AI standard.

Applicability
AI developers, deployers, companies preparing for AIDA / AIMS and international AI regulation
Audit Focus
AI governance, risk, lifecycle, monitoring, incidents, responsible AI
Regulatory Context
Aligns with AIDA / AIMS (Canada), EU AI Act, OECD AI Principles, NIST AI RMF
Deliverables
ISO/IEC 42001:2023 Certificate
AI governance audit report
Lifecycle and risk assessment review
AIDA/AIMS readiness positioning
Public register listing
Evidence Checklist
  • AI governance policy and objectives
  • AI system register with risk classification
  • AI risk assessment and treatment plan
  • Lifecycle documentation
  • Human oversight mechanisms
  • Monitoring and incident records
Timeline
Inquiry
1–2 wks
Stage 1
3–5 wks
Stage 2
4–8 wks
Certificate
3–5 months
Common Failure Points
  • !
    AI register incomplete or missing system descriptions
  • !
    Risk assessment does not address AI-specific harms
  • !
    No documented human oversight mechanism
CyberSecure Canada
Government of Canada Program
Certification

Government of Canada baseline cybersecurity for SMEs. Thirteen control areas including incident response, access control, patching, malware protection, security awareness.

Applicability
Canadian SMEs, government suppliers, organizations building cybersecurity baseline
Audit Model
Program-defined certification. 13 control domains. Annual cycle.
Progression
Starting point for SMEs, maturing toward ISO 27001
Deliverables
CyberSecure Canada Certificate
13 control domain assessment report
Government of Canada recognition
Clear pathway to ISO 27001
Evidence Checklist
  • Incident response plan
  • Patch management records
  • Strong user authentication (MFA)
  • Security software enabled
  • Employee awareness training
  • Backup and encryption records
Timeline
Application
1 wk
Assessment
3–6 wks
Certificate
4–8 wks
Common Failure Points
  • !
    MFA not enforced on all admin accounts
  • !
    Patch management undocumented
  • !
    Incident response plan untested or absent
Canadian Program for Cyber Security Certification
CPCSC / Defence Supply Chain
Inspection

Inspection-based assessment for Canada's defence supply chain. Cybersecurity practice verification. SCC IBAP accredited per ISO/IEC 17020.

Applicability
Defence contractors, supply chain, federal cybersecurity procurement
Assessment Model
ISO 17020 inspection. Scope, verification, findings, remediation, determination.
Regulatory Basis
Federal program. Mandatory for defence procurement. Aligns to NIST CSF, CIS Controls.
Deliverables
CPCSC Inspection Report
ISO/IEC 17020 conformant inspection
Defence procurement eligibility documentation
Findings, determinations, remediation path
Evidence Checklist
  • Cybersecurity policy and documented practices
  • Access control and identity management
  • Incident response capability
  • Configuration management records
  • Supply chain security controls
Timeline
Scoping
1–2 wks
Inspection
4–8 wks
Determination
2 wks
Common Failure Points
  • !
    Scope boundary undefined between supplier and prime
  • !
    Cybersecurity practices undocumented
  • !
    Supply chain controls absent or unevidenced
Reference Library

Standards, laws, and frameworks

Searchable reference across the Canadian technology regulatory landscape. Our chatbot can answer detailed questions on any item listed.

Accredited Scope
Canadian Regulation
Federal Law

PIPEDA

Governs private-sector commercial activities. Consent, safeguards, breach notification, accountability. Applies where no substantially similar provincial law exists.

Provincial

Provincial Privacy Laws

BC PIPA, Alberta PIPA, and Quebec Law 25. Each substantially similar to PIPEDA for intra-provincial activities. Law 25 adds enhanced breach rules and mandatory PIAs.

Proposed

AIDA / AIMS

Artificial Intelligence and Data Act (AIDA) and the AI and Data Companion Regulation (AIMS) under Bill C-27. Would regulate high-impact AI systems. Not yet enacted. Maps to ISO 42001.

Related ISO Standards
ISO Standard

ISO/IEC 27701

Privacy information management extension to 27001. Maps controls to PIPEDA and GDPR requirements.

ISO Standard

ISO/IEC 27017 & 27018

Cloud security controls (27017) and cloud PII protection (27018). Both extend 27002 for cloud environments.

ISO Standard

ISO/IEC 27002 & 27005

Control implementation guidance (27002) and risk management processes (27005). Supporting standards for 27001 certification.

ISO Standard

ISO 22301 & ISO/IEC 20000-1

Business continuity management (22301) and IT service management (20000-1). Additional management system standards for technology organizations.

Federal Law

Privacy Act

Federal public-sector privacy. Collection, use, disclosure constraints for government institutions. Access and correction rights.

Frameworks & Reference
Framework

NIST CSF

Identify, Protect, Detect, Respond, Recover. Voluntary framework. Maps to ISO 27001 controls.

Framework

NIST AI RMF & OECD AI Principles

AI risk management (Govern, Map, Measure, Manage) and international AI governance principles. Voluntary reference frameworks.

Framework

SOC 2

Attestation report based on Trust Services Criteria. Issued by CPA firms. Not a certification. Primarily North American.

Framework

EU AI Act

Risk-based AI regulation. Prohibited, high-risk, limited, minimal categories. International reference point for AI governance.

Framework

CIS Controls & COBIT

Prioritized security controls by maturity (CIS) and IT governance framework (COBIT). Complementary to management system standards.

No matching items. Try a different search or category.
How It Works

Certification and inspection lifecycle

Structured, transparent, independent. Select a program and click each stage.

01
Inquiry
02
Application
03
Stage 1
04
Stage 2
05
Decision
06
Surveillance
Inquiry and Eligibility
Initial discussion to understand your organization, scope, and objectives. We screen eligibility against program rules and help you understand what to expect.
Typical duration: 1-2 weeks. No commitment required at this stage.
Governance
Certification and inspection decisions require structural independence
AICT maintains complete separation between assessment activities and certification or inspection decisions. This is a requirement of our SCC accreditation, embedded in our quality management system and enforced on every engagement.
01

Impartiality

Structural separation between assessment and decision functions. Two-year cooling-off period for prior consulting relationships. Conflict-of-interest screening on every engagement.

02

Decision Independence

Certification decisions are made by qualified personnel who did not conduct the audit. This separation is a non-negotiable accreditation requirement.

03

Assessment Only

AICT does not provide consulting, implementation, or advisory services. This separation is a structural requirement of our accreditation, not a policy choice.

04

Complaints & Appeals

Formal processes with defined timelines, independent review, and escalation paths. Open to any person or organization. Submit complaints to complaints@aictglobalservices.com or appeals to appeals@aictglobalservices.com.

Standard: ISO/IEC 17021-1 Clause 5 — Impartiality
Audit-to-decision: Structurally separated, enforced in all cases
Consulting: Not permitted — 2-year cooling-off applies
Appeals: SCC escalation available
Certificate Register

Verify a certification

Search the AICT certificate register by organization name, certificate number, or standard. This register is updated on issuance, suspension, or withdrawal of any certificate. Inspection results under ISO/IEC 17020 are reported directly to clients and are not listed in this register.

Certificate status reflects information at time of last register update. For official confirmation of current validity, contact info@aictglobalservices.com.
Public Documents

Policies & Procedures

Access AICT's public disclosure documents. These policies are maintained as part of our quality management system.

Download PDF
Start a conversation

Whether exploring certification for the first time or looking for a technology-focused alternative, we will help you understand scope, timeline, and requirements.

info@aictglobalservices.com
Vancouver, British Columbia, Canada
aictglobalservices.com
What are you looking for?
Submitting an inquiry does not constitute an application, certification, or conformity assessment decision.

Certification Advisor

AICT
Static advisor. No APIs. No data sent. Email us
What initiative is driving this?