Information Management Manual
Information Management Manual
Information Management Manual
2010
Table of Contents
1 INTRODUCTION ............................................................................................................................... 2
1.1 PURPOSE ...................................................................................................................................... 2
1.2 ORGANIZATION OF THE MANUAL .................................................................................................. 2
1.3 DEFINITION OF TERMS USED ........................................................................................................ 2
2 GOVERNANCE AND ACCOUNTABILITY ................................................................................... 2
2.1 LEGISLATION AND POLICY ............................................................................................................ 2
2.2 IM ACCOUNTABILITY STRUCTURE ................................................................................................ 4
3 IM ROLES AND RESPONSIBILITIES ........................................................................................... 6
4 INFORMATION MANAGEMENT TOOLS.................................................................................. 10
4.1 RDIMS........................................................................................................................................ 10
4.2 OIC CLASSIFICATION STRUCTURE ............................................................................................. 10
4.3 BUSINESS APPLICATIONS ........................................................................................................... 10
4.4 SHARED ELECTRONIC FOLDERS ................................................................................................ 10
4.5 E-MAIL FOLDERS ........................................................................................................................ 10
5 IM BUSINESS RULES ..................................................................................................................... 12
5.1 CREATE AND RECEIVE DOCUMENTS .......................................................................................... 12
5.2 ORGANIZE AND CLASSIFY DOCUMENTS ..................................................................................... 13
5.3 STORE AND PROTECT DOCUMENTS ........................................................................................... 13
5.4 RETAIN AND DISPOSE OF DOCUMENTS ...................................................................................... 13
6 USE AND MANAGEMENT OF INFORMATION........................................................................ 15
6.1 ELECTRONIC DOCUMENTS ......................................................................................................... 15
6.2 E-MAIL MESSAGES ...................................................................................................................... 15
6.3 PAPER-BASED, NON-ELECTRONIC RECORDS ............................................................................ 15
6.4 WEB CONTENT............................................................................................................................ 15
7 INFORMATION SECURITY .......................................................................................................... 17
8 IM SUPPORT .................................................................................................................................... 18
8.1 SUPPORT PROCESS.................................................................................................................... 18
8.2 IM SUPPORT ACTIVITIES AND ROLES ......................................................................................... 19
9 REVIEW AND UPDATE.................................................................................................................. 22
10 MANAGING INFORMATION BY OIC FUNCTION .............................................................. 22
ANNEX - A - DEFINITION OF TERMS................................................................................................. 23
ANNEX - B - MANAGING SENSITIVE RECORDS ............................................................................. 25
ANNEX - C - MANAGING RECORDS WHEN AN EMPLOYEE LEAVES ...................................... 31
ANNEX - D - POLICY ON THE USE OF THE OIC ELECTRONIC NETWORK............................ 33
ANNEX E – RDIMS METADATA........................................................................................................... 43
ANNEX – F - REQUESTING FILES FROM THE RECORDS CENTRE........................................... 45
ANNEX - G - SUBMITTING / RETURNING FILES TO THE RECORDS CENTRE ...................... 46
-1-
Information Management Manual Office of the Information Commissioner
1 Introduction
1.1 Purpose
The purpose of this manual is to provide direction to OIC staff on the management
of corporate information.
The first section of the manual outlines its purpose. Sections two to seven of the
manual comprise the governance, business rules and support for information
management covering all OIC functions.
Section eight of the manual provides specific accountabilities for IM within OIC
functions, along with detailed descriptions of:
• Corporate records within the function
• The file classification structure
• Approved retention and disposition schedules.
Library and Archives of Canada Act - Specifies that the records of Federal
Government institutions and ministerial records (regardless of recording media)
shall not be destroyed or disposed of without the consent of the National Librarian
and Archivist. To comply, institutions must:
• obtain consent of the National Librarian and Archivist before disposing of
any record that is under institutional control; and
• arrange for the transfer of historical information to Library and Archives
Canada in accordance with schedules or other agreements.
-2-
Information Management Manual Office of the Information Commissioner
Government Security Policy - The purpose of this policy and its related standards
is to ensure all sensitive information and other assets of the Federal government
are appropriately safeguarded. The policy calls upon institutions to:
-3-
Information Management Manual Office of the Information Commissioner
• Information Commissioner
• Chief Information Officer
• Information Management Division
• Heads of the various functions
• Employees
• Information and Records Management specialists
• Information Technology specialists
• Information Management practitioners
-4-
Information Management Manual Office of the Information Commissioner
-5-
Information Management Manual Office of the Information Commissioner
c. Ensure that IM is designed into the planning, budgeting and business processes
of the OIC and into the design of new or updated information systems.
e. Ensure the protection of enduring and essential information over time and
through technology changes.
-6-
Information Management Manual Office of the Information Commissioner
Program Heads
b. Ensure that every person doing work for the OIC (employee, contractor,
consultant, student and volunteer) is aware of their IM responsibilities in
compliance with OIC policies and with Government of Canada statutes and
policy.
c. Ensure that IM requirements are designed into the planning, budgeting and
business processes of the business unit.
Employees
a. Comply with OIC IM policy and business rules and with Government of Canada
IM policies and statutes.
e. Only dispose of transitory records in accordance with the Authority for the
Destruction of Transitory Records (Library and Archives Canada).
b. Provide information and records management advice and guidance to OIC staff.
c. Maintain the OIC Classification Structure used to organize, retrieve and manage
records in all recording media across the OIC.
-7-
Information Management Manual Office of the Information Commissioner
d. Classify paper and electronic documents according to the UCS and perform
quality assurance monitoring on the organization of records.
e. Manage the retrieval, charge-out/in, routing and security of paper files from the
Records Office.
k. Ensure the legal disposal of records according to the Library and Archives of
Canada Act and associated disposition authorities.
d. Perform backup and recovery functions for all electronic files and documents
within IM systems.
-8-
Information Management Manual Office of the Information Commissioner
-9-
Information Management Manual Office of the Information Commissioner
4.1 RDIMS
RDIMS has been adopted by the OIC as the official repository for electronic
documents that are created and received in fulfilling its mandate.
One of the main benefits of RDIMS is the ability to capture ‘metadata’ (descriptive
information) on each electronic document or information object saved into the
RDIMS repository. The metadata facilitates searching for and managing OIC
information. A description of OIC metadata is provided in Annex E.
The OIC has adopted a structure to organize and manage all records created and
received, regardless of medium. Based on the BASCS (Business Activity
Structure Classification System) model developed by Library and Archives
Canada, records are organized into three successive tiers: function, sub-function
and activity. This classification structure is derived from the mandate and
accountability structure of the OIC. This causes the classification structure to be
more stable and reliable.
Electronic folders, that are accessible to staff in specific OIC functions, are also
used to store, organize and access electronic documents. These shared
electronic folders are available on various drives on the OIC network and are used
where RDIMS has not been implemented. The use of shared electronic folders
will be phased-out with the full implementation of RDIMS.
-10-
Information Management Manual Office of the Information Commissioner
Folders within the OIC electronic mail system are also used to organize and
access e-mail messages that are sent and received. These folders are created
and maintained within the e-mail accounts of individual OIC staff. E-mail
messages having long-term corporate value are stored in RDIMS or in shared
electronic folders.
-11-
Information Management Manual Office of the Information Commissioner
5 IM Business Rules
Business rules translate IM policies, standards and best practices into practical
requirements. They reflect the essential and mandatory conventions for the
management of information.
The OIC, in accordance with GoC standards, manages corporate information in the
RDIMS document and records management system. Below are the business rules
for managing information in the OIC using RDIMS.
The preferred medium for managing OIC records throughout their lifecycle is
electronic. The different record types saved and managed in RDIMS are listed
below.
-12-
Information Management Manual Office of the Information Commissioner
g. Transfer document custodian rights – When an OIC staff member leaves the
organization, the custodian rights to documents under their control will be
transferred to another OIC employee. Transferring custodian rights will be
approved by business unit manager. For more information, see Annex - C -
Managing Records When an Employee Leaves.
-13-
Information Management Manual Office of the Information Commissioner
f. Manager approval - Written approval for the disposition of all electronic and
non-electronic records must be obtained from the workgroup manager prior to
undertaking the disposition action.
-14-
Information Management Manual Office of the Information Commissioner
RDIMS, when fully implemented across the OIC, will be the official repository for
storing, retrieving and managing all electronic documents that are created and
received while fulfilling the OIC business mandate. Users will be prompted to
store electronic documents in RDIMS when saving documents in applications such
as Word or Excel.
Users will have the option to invoke a number of other RDIMS functions such as
creating versions of documents, setting access controls and retrieving documents
through browsing or searching the RDIMS repository.
Like electronic documents, e-mail messages that have long-term value to OIC
business functions will be stored in RDIMS (when the application is fully
implemented). When an e-mail message is profiled to RDIMS it is declared read-
only, meaning the e-mail cannot be deleted or altered.
E-mail messages that remain in a staff member’s inbox or personal folders, and a
decision has been made not to file them in RDIMS, will be considered to have
short-term value to the OIC. These e-mail messages are considered transitory
and can be deleted from the e-mail system when necessary.
-15-
Information Management Manual Office of the Information Commissioner
-16-
Information Management Manual Office of the Information Commissioner
7 Information Security
The OIC manages sensitive records as part of fulfilling its mandate. Records that
are “sensitive” contain information that can cause different degrees of injury to an
individual, a company or the country if the information were disclosed in an
unauthorized manner.
When managing sensitive records specific action is taken to ensure the records are
identified according to their degree of sensitivity and are used, stored, transmitted
and destroyed in an appropriate manner.
-17-
Information Management Manual Office of the Information Commissioner
8 IM Support
Information Management in the OIC will be supported by IM and IT specialist staff
and by IM practitioners within each OIC function. IM Practitioners are designated
by the Program Head.
The Help Desk is equipped to receive and dispatch telephone and e-mail requests
from users. As a minimum, the support service is available within core business
hours (9:00 to 17:00 Monday to Friday). To support exceptional business
requirements the Help Desk service is sometimes available for extended hours
(17:00 to 22:00 Monday to Friday and 10:00 to 16:00 Saturday and Sunday).
-18-
Information Management Manual Office of the Information Commissioner
Request
No Resolved? Yes
fulfilled
Support ticket is
created and dispatched
IM IT
The general support activities and the roles that fulfill them are described in the
section below, IM Support Activities and Roles.
-19-
Information Management Manual Office of the Information Commissioner
Below are the general support activities and the roles that will provide the support.
IM Support Activities
Below are the IM support activities and the roles that will provide the support.
-20-
Information Management Manual Office of the Information Commissioner
IT Support Activities
Below are the IT support activities and the roles that will provide the support.
-21-
Information Management Manual Office of the Information Commissioner
(Approvals by business areas – will not be covered at Ex Com on January 28, 2010)
-22-
Information Management Manual Office of the Information Commissioner
Transitory records: Records that are required only for a limited time to ensure
the completion of a routine action or the preparation of a subsequent record.
Transitory records do not include records required by government institutions or
Ministers to control, support or document the delivery of programs, to carry out
operations, to make decisions or to account for activities of the Government.
Information Life Cycle: A series of stages through which information passes during its
lifetime. The information life cycle encompasses the following: planning; collection,
creation, receipt, and capture of information; its organization, use and dissemination; its
maintenance, protection and preservation; its disposition; and evaluation.
-23-
Information Management Manual Office of the Information Commissioner
Metadata: Descriptions of stored data. That is, information that describes the content,
context and structure of recorded information objects. Examples of metadata include
information on the author, subject, creation date and security designation of the
information.
Records Retention Schedule: Identifies the period of time that specific records should
be retained to meet legal, business and accountability requirements of the Office. The
schedule can also identify the disposition action to be applied to the records, and the
owner or custodian of the records.
-24-
Information Management Manual Office of the Information Commissioner
Records that are “sensitive” contain information that can cause different degrees of
injury to an individual, a company or the country if the information were disclosed in an
unauthorized manner. The Government of Canada groups sensitive records into six
main categories corresponding to the severity of possible injury. The first three
categories are referred to as designated and the last three are referred to as classified.
Categories of Description
Sensitivity
Designated Records
Protected A This information is not sensitive to the national interest but could
cause embarrassment to an individual or a company if it were
disclosed in an unauthorized manner. For example, loss of
privacy through the disclosure of a salary figure.
Protected B This information is not sensitive to the national interest but serious
injury to an individual or a company could result if the information
were disclosed in an unauthorized manner. Examples include:
medical records; personal evaluations; indications of political
beliefs, associations or lifestyles; sensitive contracts; police
reports; financial records; and, information received in confidence.
Protected C This information is not sensitive to the national interest but very
serious injury to an individual or a company could result if the
information were disclosed in an unauthorized manner. Examples
include: life threatening information; serious criminal intelligence
and grave socio-economic information applicable to a geographic
area, time frame or interest.
Classified Records
Examples of classified information include: records of federal-provincial relations,
international affairs and economic interests of Canada; information under the cabinet
papers system; information involving security, intelligence or security assessments.
-25-
Information Management Manual Office of the Information Commissioner
The act of ‘managing’ sensitive records is essentially taking specific action to ensure the
records are identified according to their degree of sensitivity and are used, stored,
transmitted and destroyed appropriately.
Records that are sensitive are often the most important within an organization. As a
result, they need to be protected from unauthorized disclosure which could result in
injury to an individual, a company or the country. Measures also need to be taken to
ensure that sensitive records are not accidentally or illegally destroyed.
Once sensitive records have been identified, the next step to protecting them is to
indicate on the record the:
• designated or classified level
• date the record was created or received, and
• whenever possible, the date or event at which declassification or downgrading is to
occur (see below for more information on declassifying or downgrading records).
Indicating the sensitivity level on the record alerts those who use it that appropriate
safeguards must be taken to protect the records.
Markings that identify records as being sensitive are indicated in different ways
depending on the media.
• For paper and electronic documents, whether they are a draft, copy or final, mark
each page.
• For electronic storage devices place a label on the outside of the device that
corresponds to the highest level of sensitivity of information it contains.
Keep in mind that records are to be designated or classified only for the period of time
required for safeguarding. Records are also to be declassified or downgraded when the
protection is no longer necessary or no longer needed at the same level (see below for
more information).
Sensitive paper records must be stored in an approved secure room, safe or cabinet that
meets Government of Canada standards1. Sensitive electronic records, up to Protected
1
Plans for the construction of secure rooms must be approved by the Departmental Security
Officer before construction commences.
-26-
Information Management Manual Office of the Information Commissioner
B can be stored on the OIC network. Sensitive electronic records designated Protected
C or Classified (Confidential, Secret or Top Secret) must be stored on a computer that is
not connected to the OIC LAN or, on removable storage media such as a removable
hard drive or USB drive (‘memory stick’). Computers used to store sensitive records
must be located in a secure room. If sensitive information is stored on a portable
computer or on removable storage media, these must also be stored in a secure room, a
cabinet or safe when not in use.
Sensitive paper records that are circulated must be placed in a marked file folder and
kept in a secure container when not in use. Sensitive paper records must be circulated,
organized and maintained within file folders as follows.
If a file folder contains a combination of unclassified and sensitive records, the entire file
folder assumes the highest sensitivity level of the records in that file.
Only use the OIC e-mail messages system to send or distribute sensitive records up to
Protected B. Sensitive messages that are designated Protected C or Classified
(Confidential, Secret or Top Secret) must be circulated by hand.
When using sensitive records it is important to prevent unauthorized people from seeing,
hearing, recording or copying the information. This is accomplished by using the records
within adequate security zones. Usually, an adequate security zone is an enclosed
office or room with a door that can be locked. It can also be an open area where access
is controlled and monitored.
If leaving a room where secure records are in the open, even for a brief period, always
lock the door. When finished using sensitive records always put them, or the device
they are stored on, away within a secure room, cabinet or safe.
When sensitive records are sent by mail or courier they must be properly packaged.
The manner they are packaged depends on the sensitivity level or the records.
-27-
Information Management Manual Office of the Information Commissioner
If the envelope is sent outside the OIC within Canada, the U.S.
or the U.K use one of the following options.
• A reliable postal or courier service that provides proof of
mailing and a record while in transit and of delivery.
• Carried by an authorized individual with an appropriate
security clearance, using a locked case tagged with a
forwarding or return office address.
• Classified diplomatic courier bag service.
Top Secret Same measures as Secret but Top Secret records are never
sent by a postal or courier service. A record of the records
being sent is created, the intended recipient is notified in
advance and the records are sent in an approved locked case
carried by an individual with Top Secret clearance.
All sensitive records, either Designated or Classified are to be hand delivered unopened
to the addressee or to the person responsible for the program.
Keep a record of receiving Secret or Top Secret records such as the date received, the
general subject and the name of the person or group the records were received from.
When exchanging sensitive information with organizations outside the OIC always
establish a written agreement that stipulates the necessary safeguards.
-28-
Information Management Manual Office of the Information Commissioner
Information in your custody and use that was received from outside the OIC can only be
declassified or downgraded in accordance with established agreements and only after
consulting the originating organization.
Designated Records
2
Degauss - A process by which a computer hard drive is unformatted by randomly scrambling
the bits on the drive therefore rendering the data unreadable.
-29-
Information Management Manual Office of the Information Commissioner
Classified Records
-30-
Information Management Manual Office of the Information Commissioner
Whether you have worked within the OIC for ten months or ten years, during that time
you created and received many records that are important.
When you leave your organization, these records stay within the OIC and are your
legacy. They represent and document the unique contributions you made to the
Canadian Federal Government and to Canadian citizens.
These records will continue to be valuable after you leave the organization so it’s
important that your legacy of information is well managed.
In the period just prior to your departure there are specific responsibilities that you and
your manager should do.
Responsibilities of Employees
As an employee, there are four main tasks you need to complete to ensure that your
legacy of information is in the best condition possible after you are gone.
1. “Clean up” the records stored in your filing cabinets and stored on network drives, on
your personal computer and on removable disks.
2. Organize the records according to the classification structure of the organization and
store them within an established system such as:
• RDIMS
• shared electronic folders on the OIC network
• paper file folders.
-31-
Information Management Manual Office of the Information Commissioner
The system or location where you store your records should ensure that other staff in
the organization can access your records after you leave.
For guidance and/or advice, consult with staff in the Records Management Office.
3. Prepare a concise list, with descriptions, of all your records, both paper and
electronic.
The list only needs to identify and describe the general groups of records that you
have and where they are located (e.g., drawer one of filing cabinet, network drive Z,
folder X, sub-folder Y). You want to make it easy for the staff replacing you or those
requiring access to understand and gain access to the records.
4. Before you leave meet with your manager and staff of the Records Management
Office.
The purpose of this meeting is to ensure that your manager and staff of the Records
Management Office have a clear understanding of the records under your control,
where they are located and how they are organized.
Don’t have this meeting on the last day before you leave. There may be things you
need to do as a result of the meeting and you want to leave yourself and others
enough time.
Responsibilities of Managers
There are three records management tasks a manager should do when informed that an
employee is leaving.
1. Have two meetings with the employee before they leave the organization.
a. The first meeting, immediately after they have provided notice of their
departure, is to discuss their responsibilities for cleaning and organizing any
records under their control.
b. The second meeting, a few days before the employee is scheduled to leave,
is to ensure you are provided with a clear description of the records under
their control, where they are located and how they are organized.
2. Assign responsibility over the records to a person who will replace the departing
employee or to an employee who will assume interim responsibility. Ensure that full
rights to electronic records are provided to the person assuming responsibility.
Obtain passwords, keys or combinations to filing cabinets.
3. Contact the Records Management Office to inform them of the employee’s departure
date.
-32-
Information Management Manual Office of the Information Commissioner
EFFECTIVE DATE
This policy takes effect Dec 17, 2008 and supersedes all previous directive of the same
subject.
BACKGROUND
Treasury Board (TB) approved a government-wide Policy on the Use of Electronic Networks in
February 1998. The introduction of this policy reflected a growing concern that inappropriate
use of publicly funded electronic networks could reduce productivity, increase costs,
compromise information assets and security, and risk embarrassment or legal liability for
individuals and government institutions.
PURPOSE
This policy encourages the acceptable use of government Information Technology (IT) and
electronic networks, effectively discourages inappropriate use, and ensures that the Office of
the Information Commissioner of Canada (OIC) deals quickly, fairly and decisively with
violations of this policy.
APPLICATION
This policy applies to all OIC authorized network users, whether employees or contract
resources. It governs the use of OIC computing equipment connected to any internal or
external network. This includes, but is not limited to workstations, servers, printers and smart
wireless devices (i.e. Blackberry).
AUTHORITY
Authorized users, whether employees or contractors are to use OIC electronic networks for
approved purposes only, in an informed and responsible manner, to protect and conserve
these limited resources. The OIC will monitor compliance with this policy. Violations may lead to
corrective measures, ranging from disciplinary to legal action.
INQUIRIES
-33-
Information Management Manual Office of the Information Commissioner
POLICY REQUIREMENTS
The focus of this policy is the acceptable use of electronic networks, which by definition
includes the Internet. However, the same management philosophy applies to the use of all OIC
Information Management and Information Technology (IM/IT) resources. The following
guidelines are provided to advise managers and users on the application of the policy.
Authorized Uses
Access to the Organization's electronic networks, including access to the Internet through OIC
networks, whether from a computer at work or at any other location, will be authorized by a
user's manager or supervisor based on the user's job requirements and circumstances. For
employees, authorized uses of electronic networks, such as the Internet, include the conduct of
government business, professional activities, career development and limited personal use.
These uses are subject to the following limitations.
General Limitations
All authorized use of electronic networks, including personal use, is subject to the provisions
of this policy and any other policies of the government and the OIC.
The Internet offers a useful tool for professional and career development. While the OIC
supports such use, it expects employees to act responsibly so as to ensure that this activity
does not interfere with normal business operations.
Personal Use
Extensive personal use of the Internet can degrade the operation of network resources and
lead to security breaches. For that reason, the following high demand, personal use
activities are prohibited, unless specifically authorized by the employee's manager for
business or employee career development purposes. This is a non-exhaustive list of
prohibited activities and employees are advised to refrain from other demand-intensive
activities undertaken for personal reasons:
• downloading specific file types for personal use, such as, MP3 files, executable program
files (including computer files such as video games downloaded to run on a computer)
and shareware (free software)
• listening to web radio, watching streaming video (e.g., music videos or web casts),
playing interactive games and instant messaging (e.g., ICQ)
-34-
Information Management Manual Office of the Information Commissioner
NOTE: Personal use must take place on personal time and be undertaken in a manner which
will not add to organizational costs or interfere with its operations. Personal time consists of
breaks, lunchtime and time before and after the employee's hours of work.
Management retains the right to place restrictions and conditions on the use of technology to
ensure efficient and secure operation, information integrity and compliance with policy.
Inappropriate Uses
OIC electronic networks must not be used for the following purposes which are unlawful or
deemed unacceptable by the government or the OIC:
Authorized individuals are prohibited from conducting any of the unlawful or unacceptable
activities listed above. Doing so exposes them to disciplinary measures and possible revoking of
electronic network access. Furthermore, authorized individuals cannot use government electronic
-35-
Information Management Manual Office of the Information Commissioner
networks to access or download Web sites or files, or send or receive electronic mail messages
or other types of communication, that fall into the following categories:
The OIC expects authorized users to refrain from practices which would not bear public scrutiny
or might otherwise bring disrepute on the OIC. Should users be uncertain as to whether a
proposed use is acceptable or not, they should consult with their manager. IT Officers and
Human Resources (HR) personnel can provide guidance.
For more information, consult the TB Policy on Use of Electronic Networks, Appendix A.
Monitoring
In addition to direct supervision, the OIC routinely monitors electronic networks to ensure their
efficient operation, to isolate and resolve problems, and to assess compliance with policies and
standards. Periodic and random checks may be conducted for specific operational purposes.
This routine operational monitoring does not normally involve reading files or targeting
authorized users. However, if, in the course of operational monitoring or by other means, there
appears to be grounds to suspect illegal or unacceptable activity - such as access to
unacceptable Internet sites - a security incident review may be undertaken by the OIC. This
could involve specialized monitoring and/or the reading of the contents of user's electronic mail
and files without notice.
Users should be aware that external networks may also monitor their activities, and may not
subscribe to the same high standards concerning disclosure of personal information. Users
should also be aware that the OIC routinely monitors electronic networks for intrusion detection
purposes.
To ensure that unusually high personal usage does not degrade network resources, designated
representatives may request on a daily, monthly or quarterly basis, a listing of individual
accounts demonstrating an unusually high volume use of the Internet. These designated
representatives will then solicit an explanation through the appropriate management channels
for the high volume use. In cases where usage is business-related, a list for those high volume
users will be compiled for future reference. If not business-related, the user's manager will
undertake the necessary corrective action in consultation with HR, if required.
-36-
Information Management Manual Office of the Information Commissioner
part of the logon process to the network. Authorized users must specifically acknowledge using
the "Enter" key to complete the logon process.
Expectation of Privacy
Authorized users are reminded that, while the OIC makes efforts to protect personal and private
information that it officially gathers, IT equipment and systems are assigned to individuals for
authorized use only, and that any personal or private information will be stored there at the
employee's own risk. Users are reminded that OIC networks are monitored for operation and
high volume Internet use and that organizational monitoring activities apply to any files stored
on OIC facilities or media. For example, if an individual is under investigation for unauthorized
or prohibited use of electronic networks, certain emails and their attachments may be read by
management, HR and designated OIC security personnel.
Users should be aware that activities they conduct on Internet sites, chat groups, etc.,
accessed from organizational networks, may be read and reported on by the public or the
press. The OIC expects authorized users to adhere to government and organizational policy
and to exercise mature judgment in using such facilities.
Disciplinary Measures
The OIC recognizes that many cases of inappropriate use result from unintended errors rather
than deliberate acts of misconduct. However, employees should be aware that disciplinary
action may be taken where there is evidence of misuse or failure to exercise due diligence.
Disciplinary action is progressive in application, and can range from an oral or written
reprimand to suspension or termination of employment, depending on the severity of the
infraction.
All authorized users, whether OIC employees or contractors, must act in a timely manner to
prevent, report and respond to suspected violations and breaches of IT security. With the
advice of OIC HR and Security, suspected illegal activity will be reported to law enforcement
agencies.
Authorized users have an obligation to use IT and electronic networks in an informed and
responsible manner conforming to network customs and courtesies. Users are responsible for
complying with the policies, guidelines and standards, as set out by Treasury board and OIC.
Each user should:
-37-
Information Management Manual Office of the Information Commissioner
• be informed
Maintain a level of competency consistent with his/her duties and the technologies
employed, and an awareness of governing policies and practices. Take advantage of
learning opportunities such as employee orientation and awareness sessions, formal in-
house and external training courses, the OIC lntranet and learning centre facilities.
• be security conscious
Take all necessary measures to ensure the integrity and security of OIC information,
technology and networks. These measures include protecting user identifications and
passwords, and controlling access to and use of facilities to prevent unauthorized use.
Report security incidents to your manager or IT Security Officer.
• Personal Accounts
User accounts should not be shared as a method of sharing data. If shared data is required
(such as a calendar, email etc) then the helpdesk should be contacted to arrange such
access. If this it not technologically practical then an exception will be granted.
Managers' Responsibilities
As part of their normal managerial responsibilities, OIC managers and supervisors are
responsible and accountable for the safeguarding and effective use of OIC assets. This
includes IM/IT resources and the use of electronic networks. They are also responsible for
informing employees and contractors of this OIC policy. Each manager should:
-38-
Information Management Manual Office of the Information Commissioner
user is aware of limitations on personal use, monitoring, and expectation of privacy. Cancel
authorizations when employees or contractors leave the employ of the OIC, or no longer
require network access.
• be security conscious
Take reasonable measures to ensure that use of OIC networks falls within the constraints
of OIC security policies. Be aware that the OIC network is operated to secure information at
the Protected "A", Protected "B” and Protected "C” mode and that information at a higher
security level cannot be transmitted, stored or processed without additional safeguards.
All of OIC’s officials are responsible and accountable for ensuring that IT resources and
electronic networks are used effectively in support of business objectives in an environment
that discourages uninformed and unacceptable practices.
To support these goals, the Assistant Information Commissioner, Policy, Communications and
Operations has delegated OIC authority primarily to:
o The Director, Information Management is responsible, through consultation and the IM/IT
governance process, for promoting the effective use of OIC information technology and
electronic networks, and for IM/IT services in support of a reliable and secure environment.
• The Manager, IM/IT, is responsible for supporting training programs which ensure that staff
is knowledgeable in the use of technology. As part of regular supervisory activities, will also
monitor the use of information and technology to ensure that these resources are used
productively, effectively and acceptably for business purposes. Upon discovery of policy
infractions, will notify the employee’s manager.
Specific functional authorities to implement this policy are delegated across the organization as
noted in the following subsections.
Network Administration
• workstation
Each workstation is uniquely identified, and configured with hardware and software to meet
the user's requirements. Workstation integrity is monitored through logon verification and
virus checks, logon banner, user census requests, automated scans of installed hardware
and software, and physical examinations for service and inventory purposes.
• network
OIC networks include a large number of Local Area Networks (LANs), which are primarily
monitored for overall operational performance, capacity management, and exception
reporting purposes. Logs can be used to identify workstations associated with specific
activities such as unusually heavy traffic volumes or security violations.
-39-
Information Management Manual Office of the Information Commissioner
• firewall
Firewalls provide a secure gateway or interface to external electronic networks such as the
Internet. Monitoring usually includes logging all transactions by originating workstation and
destination. Automated software can be used to provide detailed and aggregate information
including sites visited, the number and duration of visits, files transferred, and e-mails sent
and received. Automated filtering tools can be used to block or filter access to some sites,
and adjust service levels and priorities.
IT Security
The Manager, IM/IT provides functional direction and training to users, and supports managers
and authorized users of IT and electronic networks by providing advice and assistance
concerning acceptable use, and through security awareness programs.
The Manager, IM/IT is authorized to review security incidents related to inappropriate use under
procedures established by the Director, Information Management and the Manager, IM/IT.
Human Resources
The Director of Human Resources supports managers and employees by providing advice
and assistance concerning acceptable use and staff relations practices. The Director of
Human Resources may participate in security incident reviews related to inappropriate use.
This may include consultation with the Director, Information Management, Security officials
and Legal Counsel.
Privacy Coordinator
The Director, Information Management advises OIC officials on policies and procedures to
ensure that personal information about users is properly protected, appropriately collected,
retained and disposed.
Audit
The Director Information Management is responsible for conducting periodic audits of the OIC's
compliance with this policy and the effectiveness of its implementation.
REFERENCES
Relevant legislation:
-40-
Information Management Manual Office of the Information Commissioner
Criminal Code;
Crown Liability and Proceedings Act;
Export and Import Permits Act;
Financial Administration Act;
National Archives of Canada Act;
Security of Information Act;
Patent Act;
Privacy Act;
Trademarks Act.
Other Publication:
DEFINITIONS
Access means gaining entry to an electronic network that the OIC has provided to authorize
users. Access to such networks may be from inside or outside OIC premises. Access may
support telework and remote access situations or where authorized individuals are using
electronic networks provided by the OIC on their own time for personal use.
Authorized users include employees of the OIC as well as contractors and other persons who
have been authorized by the Commissioner to access electronic networks.
Electronic networks are groups of computers and computer systems that can communicate
with each other. Without restricting the generality of the foregoing, these networks include the
Internet, networks internal to OIC and public and private networks external to OIC.
Monitoring of electronic networks means any action that involves the recording and
subsequent analysis of activity on, or use of, a system or electronic network. Examples include
recording user accounts, user activities, sites visited, information downloaded and computer
resources used to perform a routine analysis of traffic flow on networks, use patterns and sites
that certain work groups or individuals have visited. The information recorded and subjected to
-41-
Information Management Manual Office of the Information Commissioner
analysis does not normally involve the contents of user's electronic mail, files and
transmissions.
Security incidents include breaches and violations of security. Breaches occur when sensitive
information has been compromised, or when the availability or integrity of information or
information technology services has been degraded. Violations are acts or omissions that
contravene any provision of the OIC security policies and standards.
Unacceptable or inappropriate activity is any activity that violates OIC or Treasury Board
policy, or that violates the limitations on personal use set out in this policy.
-42-
Information Management Manual Office of the Information Commissioner
Metadata Description
Access Control (check The access controls assigned to the electronic document. Different
box) types of access can be provided to individual RDIMS users or to
groups of users. The pre-established types of access that can be
Edit (button) selected are:
• View Profile: Users may view the profile information, but not the
document.
• Edit Profile: Users may edit the document profile but not the
document.
• View Document: Users may view the document in a viewer; they
may also view the profile. No edit rights are given.
• Retrieve Document: Users may retrieve the document in its native
application (i.e., the application the document was created in).
They may also view the profile. Any edits made must be saved as
a new document.
• Edit Content: Users may edit the document, save as a new
version, or save as a new document.
• Copy: Users may retrieve a copy of the document and save it as a
new document. Editing the original document or the profile is not
allowed.
• Control Access: Users with this right may control access to the
document (i.e., change the rights of any user/group except their
own account).
Annual Report Interest A check box to indicate if the electronic document is of interest for the
OIC Annual Report: on to indicate yes; off to indicate no.
Annual Report A free-form text field to provide a reason the document is of interest
Rationale for the Annual Report.
Author The RDIMS user that profiled and saved the electronic document
within the RDIMS repository. This is usually the author of the
document but can also be the person profiling a document received
from outside the OIC. The values in this field are selected from a pre-
established list. This is a mandatory field.
Creation Date The date the electronic document was profiled and saved in RDIMS.
This is a mandatory field.
-43-
Information Management Manual Office of the Information Commissioner
Metadata Description
Date Made Record The date the electronic document was set as a final and official
record.
Document Name The name of the electronic document. This is free-form text field.
This field is mandatory.
Document Process The stage of the document within its life-cycle. For example, work in
progress, final, ?? The values in this field are selected from a pre-
established list.
Document Type The general type of document based on the OIC organization or
function. The values in this field are selected from a pre-established
list.
File Number The number within the file classification structure that the electronic
document is filed to. The values in this field are selected from a pre-
established list.
File State Indicator that the file is open or closed. The values in this field are
selected from a pre-established list.
Last Edited By The RDIMS user that last edited the electronic documents.
Last Edited Date The date the electronic document was last edited.
Security level The security level of the electronic document based on the
Government of Canada standard for designated and classified levels.
• Protected A
• Protected B
• Protected C
• Confidential
• Secret
• Top Secret
-44-
Information Management Manual Office of the Information Commissioner
2. Provide subject, date, or other details that will assist in locating files for non-investigation
files that pre-date the File Plans (2010).
3. You may come in person to the Records Centre and request a file. If possible, Records
staff will retrieve and check the file(s) out to you while you wait.
Note: If you are requesting files for another person, please indicate the name of the person to
whom the files are to be checked out.
Records Centre staff will contact you when the file(s) have been retrieved and, depending on your
instructions, will deliver the file to your office or have it ready for you to pick up. They will also
advise you if the file you are requesting is checked out to someone else.
Information Security
Records Office staff will verify the security level of requesters asking for files that are classified
above Protected B. Files are placed in a secured pouch or closed container for delivery. See:
Annex B in the Information Management Manual, RDIMS#177901.
As a rule, Records Centre staff will contact you or deliver the file to you within 3 hours of reading
your email or receiving your telephone call. Urgent requests for files will be dealt without delay.
-45-
Information Management Manual Office of the Information Commissioner
• Administrative assistants will affix the IIA “File Label - Investigation” on the upper left
corner of each volume of the investigation file when it is closed. Investigators will fill out
the label indicating the number of volumes for each type of file: investigation files, red
files and wallets.
• Security classification of files and documents must be clearly marked on the file jacket
and/or documents.
• Designated individuals should bring the complete file, including Red Files, to the Records
Centre AND change the File Location to “Transition to Records” in IIA/InTrac.
• Transport files in a blue pouch or other container appropriate to the file’s security
classification.
2. Non-Investigation Files
• Files must be properly labeled using the approved File Plans from the IM Manual and in
RDIMS.
• Files must be sorted and labeled before submitting them to the Records Centre. Boxes
filled with unlabeled files will not be accepted.
Departing Employees
• Departing employees are responsible for returning their files to the Records Centre.
• If a file is being transferred to another employee, managers must ensure that the File
Location field is updated in the Case Management System.
• Managers are responsible for ensuring that any files that are submitted to the Records
Centre are complete and labeled correctly.
• OIC Library material must be returned to the Library.
See: “Managing Records When an Employee Leaves”, Information Management Manual, Annex
C (RDIMS #177901)
Information Security
Files and documents must be properly classified and the classification level must be clearly
marked on the front of File Folder and on the documents contained therein.
Files must be placed in a secured pouch or closed container for delivery to the Records Centre as
appropriate to its security classification.
See: “Managing Sensitive Records”, Information Management Manual, Annex B
(RDIMS#177901)
We Can Help
We are here to help, so feel free to send an email to “Access IM Central (Records)” or come and
see us in the Records Centre on the 4th Floor.
-46-