secure.bdc.ca
Open in
urlscan Pro
162.253.202.36
Public Scan
Submitted URL: https://secure.bdc.ca/
Effective URL: https://secure.bdc.ca/dana-na/auth/url_default/welcome.cgi
Submission: On January 10 via automatic, source certstream-suspicious — Scanned from CA
Effective URL: https://secure.bdc.ca/dana-na/auth/url_default/welcome.cgi
Submission: On January 10 via automatic, source certstream-suspicious — Scanned from CA
Form analysis
1 forms found in the DOMName: frmLogin — POST login.cgi
<form id="frmLogin_4" name="frmLogin" action="login.cgi" method="POST" autocomplete="off" onsubmit="return Login(1)">
<input id="tz_offset_5" type="hidden" name="tz_offset">
<input id="client_mac" type="hidden" name="clientMAC" value="">
<table id="table_LoginPage_3" border="0" cellpadding="2" cellspacing="0">
<tbody>
<tr>
<td nowrap="" colspan="3"><b>Welcome to</b></td>
</tr>
<tr>
<td nowrap="" colspan="3"><span class="cssLarge"><b>BDC VPN</b></span></td>
</tr>
<tr>
<td colspan="3"> </td>
</tr>
<tr>
<td valign="top">
<table id="table_LoginPage_6" border="0" cellspacing="0" cellpadding="2">
<tbody>
<tr>
<td>BDC Username</td>
<td> </td>
<td><input id="username" type="text" name="username" size="20"></td>
</tr>
<tr>
<td>PIN and Token</td>
<td> </td>
<td><input id="password" type="password" name="password" size="20"></td>
</tr>
<tr> <input id="realm_16" type="hidden" name="realm" value="Users"> </tr>
<tr>
<td colspan="3"> </td>
</tr>
<tr>
<td> </td>
<td> </td>
<td><input id="btnSubmit_6" type="submit" value="Sign In" name="btnSubmit"> </td>
</tr>
</tbody>
</table>
</td>
<td valign="top"> </td>
<td valign="top">
<table id="TABLE_LoginPage_1" border="0" cellspacing="0" cellpadding="2">
<tbody>
<tr>
<td>*********************************************************<br> USER GUIDES are available on your BDC computer from:<br> <i>Start Menu | Programs | Juniper Networks | User Guide</i><br> <br> <b>SECURITY / PRIVACY AGREEMENT</b>: This
system is for the exclusive use of authorized users employed or contracted by BDC. Individuals using this computer system with or without proper authority, or in excess of their authority, are subject to having all of their
activities on this system monitored and recorded by system/security personnel. Your use of this system implies consent to such monitoring. You are advised that if such monitoring reveals possible evidence of inappropriate or
criminal activity as defined by BDC Information Security Policies, system/security personnel may provide this evidence to your immediate supervisor, Human Resources, and/or law enforcement officials for appropriate disciplinary or
legal action. All use of this system including use for personal reasons, must be consistent with BDC Code of Conduct, in compliance department productivity standards, and not in violation of the BDC Information Security policies.
You are reminded that although BDC attempts to maintain appropriate levels of security, you are not guaranteed privacy on this system. Be aware that all electronic information exchanges can be compromised and should never be
considered private. As a user of BDC network, you will respect and protect the confidentiality of associate and customer information at all times. All individuals must be prepared to prove their "need to know" to access any
information about specific customers or associates, and other privileged information.</td>
</tr>
</tbody>
</table>
</td>
</tr>
</tbody>
</table>
</form>
Text Content
Your browser is executing scripts on this page. If this message persists, please make sure that you are visiting a correct site and JavaSript support is enabled in your browser, and then try again. > Welcome to BDC VPN > > BDC Username PIN and Token > > > > ********************************************************* > USER GUIDES are available on your BDC computer from: > Start Menu | Programs | Juniper Networks | User Guide > > SECURITY / PRIVACY AGREEMENT: This system is for the exclusive use of > authorized users employed or contracted by BDC. Individuals using this > computer system with or without proper authority, or in excess of their > authority, are subject to having all of their activities on this system > monitored and recorded by system/security personnel. Your use of this system > implies consent to such monitoring. You are advised that if such monitoring > reveals possible evidence of inappropriate or criminal activity as defined by > BDC Information Security Policies, system/security personnel may provide this > evidence to your immediate supervisor, Human Resources, and/or law enforcement > officials for appropriate disciplinary or legal action. All use of this system > including use for personal reasons, must be consistent with BDC Code of > Conduct, in compliance department productivity standards, and not in violation > of the BDC Information Security policies. You are reminded that although BDC > attempts to maintain appropriate levels of security, you are not guaranteed > privacy on this system. Be aware that all electronic information exchanges can > be compromised and should never be considered private. As a user of BDC > network, you will respect and protect the confidentiality of associate and > customer information at all times. All individuals must be prepared to prove > their "need to know" to access any information about specific customers or > associates, and other privileged information.