Commissioner's directive 564-2: Departmental physical security

Commissioner's Directive

Commissioner's Directive

  • Number: 564-2
  • In Effect: 2015-02-09

Related Links

AUTHORITIES

PURPOSE

  • The objective of this policy is to develop and define Correctional Service of Canada (CSC) standards in compliance with the Policy on Government Security (PGS) and related directives and standards

APPLICATION

Applies to all CSC employees and individuals who have access to government information, property and assets under CSC’s jurisdiction

CONTENTS

RESPONSIBILITIES

  1. The Assistant Commissioner, Correctional Operations and Programs, is responsible for the development and approval of guidelines to support all departmental security directives.
  2. The Director General, Security, will act as a liaison between the members of the Executive Committee and members of the Security Advisory Committee. He/she will also chair the Security Advisory Committee, which oversees departmental security directions within CSC.
  3. The Departmental Security Officer (DSO) will:
    1. ensure a standardized approach to departmental security within the organization
    2. serve as a subject matter expert on the Treasury Board physical security standards applicable to all CSC facilities.
  4. The Director General, Technical Services and Facilities, will:
    1. serve as the subject matter expert on the CSC technical security requirements in institutions, Community Correctional Centres (CCCs) and parole offices
    2. liaise closely with the Departmental Security Division on departmental security matters
    3. approve and oversee construction, renovations and refits in CSC facilities.
  5. The Regional Deputy Commissioners will ensure that this directive is implemented at all CSC facilities.
  6. The regional designated individuals having responsibilities for departmental security activities will:
    1. ensure that a Threat and Risk Assessment (TRA) is completed and security measures are in place for the safety and security of individuals, information and CSC assets
    2. ensure that identified deficiencies are addressed and corrective measures are applied
    3. investigate all security incidents and breaches
    4. collaborate with the Regional Manager, Information Technology Security (RMITS), to identify and validate information technology security risks pursuant to CD 225 – Information Technology Security
  7. Managers at all levels will comply with the Treasury Board Operational Security Standard on Physical Security and with the RCMP policy instruments, guidelines and tools in the following areas:
    1. physical security
    2. safeguarding of information and assets
    3. protection of facilities
    4. protection of individuals.
  8. Individuals will apply the physical security requirements and protection measures in accordance with the Treasury Board Operational Security Standard on Physical Security.

PHYSICAL SECURITY PROCEDURES

  1. Threats and residual risks identified in a TRA will be addressed by implementing appropriate safeguards to mitigate the risks to an acceptable level. These safeguards must be pursuant to the Treasury Board Operational Security Standard on Physical Security and the CSC Technical Criteria for Correctional Institutions.
  2. All security incidents/breaches and any security deficiencies will be reported in accordance with CD 568-1 – Recording and Reporting of Security Incidents.

Facilities Standards

  1. The standards for CSC office/administrative facilities (e.g. National and Regional Headquarters, including administrative facilities within the institutions), warehouses or other unspecified facilities are governed by CSC’s obligations under the Policy on Government Security and its related standards and the CSC Technical Criteria for Correctional Institutions.
  2. Where CSC is the tenant of a facility, CSC must inform the custodian department of its security requirements for the location and make arrangements to fulfil these requirements.
  3. Where CSC is the custodian of a facility and shares the facility with other organizations, CSC must apply the appropriate measures identified in a TRA in order to preserve the safety and security of the building and its occupants, based on the risks generated by all tenants.
  4. Where a CSC office is located in a multi-tenant facility, the demising walls will be built in accordance with the RCMP Guide G13-02 Secure Demising Wall.
  5. CSC must ensure that access to, and safeguards for, protected or classified information and assets are based on a clearly discernible hierarchy of zones. There are five zones that should be applied based on the TRA, as defined in the RCMP Guide G1-026 Guide to the Application of Physical Security Zones : (Note: The Inmate/Offender Access Zone was added to the Treasury Board Hierarchy of Zones to meet CSC’s operational requirements.)
    1. Public Zone
    2. Reception Zone
    3. Inmate/Offender Access Zone (protected and classified information must not be stored in this zone and should not be processed unless necessary and only when inmates/offenders are under direct supervision)
    4. Operations Zone (at a minimum, Protected A and B and confidential information must be processed and stored in this zone)
    5. Security Zone (at a minimum, Protected C, Secret and Top Secret information must be processed and stored in this zone)
    6. High Security Zone.

    The definition of each zone and examples of assets found in each one based on their sensitivity level are defined in Annex A, and the minimum measures are defined in Appendix B of the Treasury Board Operational Security Standard on Physical Security

Access Control

  1. For all CSC facilities other than a designated institution (e.g. National and Regional Headquarters, CORCAN, local training depots, etc.), access control is defined in the Treasury Board Operational Security Standard on Physical Security and in the RCMP Guide G1-024 Control of Access.
  2. All institutional access controls are defined in CD 566-1 – Control of Entry to and Exit from Institutions.

Storage Standards

  1. Appendix B of the Treasury Board Operational Security Standard on Physical Security defines the minimum standards and security equipment required for asset storage, based on the level of sensitivity, protection and classification of information and assets.
  2. According to the Treasury Board Operational Security Standard on Physical Security , all employees who work outside of the department must protect information in a manner consistent with the minimum standards set out in Appendix B. The Treasury Board Telework Policy also provides related clarification.
  3. Contractors must comply with the security requirements identified in the contract and in the Security Requirements Check List (SRCL).
  4. Open shelve storage of protected and/or classified information must be in accordance with the Treasury Board Operational Security Standard on Physical Security,section 7.6.7 Secure rooms and with the RCMP Guide G13-01 Secure Storage Rooms.

Standards for the Transport and Transmittal of Information

  1. Standards for the transport and transmittal of protected and classified assets have been established and are set out in Appendix C of the Treasury Board Operational Security Standard on Physical Security.
  2. RCMP Guide G1-009 Transport and Transmittal of Protected and Classified Information is applicable in these circumstances.

Standards for the Destruction of Material and Information

  1. Every unit must follow the CSC approved procedures for the destruction of valuable, protected and classified assets. Contact the National Headquarters Information Management Division, the Central Registry or Main Records Office for further direction and guidance.
  2. Various destruction standards and mechanisms must be in place for protected and classified assets:
    1. Protected A and B information on paper must be destroyed to the maximum shred sizes, in accordance with the RCMP Guide G1-001 Security Equipment Guide, Destruction Equipment Selection Guide
    2. Protected C and all levels of classified information on paper must be destroyed in a shredder approved for the classification level, in accordance with the RCMP Guide G1 001 Security Equipment Guide, Destruction Equipment Selection Guide.
  3. The person assigned to destroy protected or classified waste must hold a valid reliability status or security clearance consistent with the classification level of information and/or asset being destroyed.
  4. Suppliers of destruction services approved by the Canadian Industrial Security Directorate of Public Works and Government Services Canada through a contract or standing offer have the ability to destroy Protected A and B information only without the presence of a CSC employee, provided all other secure destruction requirements pursuant to section 4 of the RCMP Guide G1 001 Security Equipment Guide, Destruction Equipment Selection Guide are met. For classified and Protected C information, all aspects of the destruction process, from pick-up, to transport, to final destruction, must be under the continuous supervision of an appropriately security-screened departmental employee.
  5. The information contained on electronic media must be destroyed in accordance with the information technology security guides and reports contained in the Communications Security Establishment Canada Clearing and Declassifying Electronic Data Storage Devices – ITSG-06.

ENQUIRIES

  1. Strategic Policy Division
    National Headquarters
    Email: Gen-NHQPolicy-Politi@csc-scc.gc.ca

Commissioner,

Original Signed by:
Don Head

ANNEX A

CROSS-REFERENCES

(Access is restricted to Government of Canada departments and agencies)

Inmate/Offender Access Zone: areas where offenders have unescorted access inside and outside correctional facilities. Examples: the grounds inside the fence surrounding a federal correctional facility, areas inside federal correctional institutions, Community Correctional Centres and Parole Offices.

Material: any tangible object with the exclusion of those embodying information.

*Operations Zone: an area where access is limited to personnel who work there and to properly-escorted visitors; it must be indicated by a recognizable perimeter and monitored periodically. Examples: typical open office space, areas where Protected A and B information is processed and/or safeguarded, or typical electrical, telecom and LAN rooms.

Physical Security: the use of physical safeguards to prevent or delay unauthorized access to assets, to detect attempted and actual unauthorized access and to activate appropriate responses.

Protected asset or information: an asset or information that may qualify for an exemption or exclusion under the Access to Information Actor the Privacy Act because its disclosure would reasonably be expected to compromise the non-national interest.t.

Protection: for physical security, protection means the use of physical, procedural and psychological barriers to delay or deter unauthorized access, including visual and acoustic barriers.

Public Zone: where the public has unimpeded access and generally surrounds or forms part of a government facility. Examples: the grounds surrounding a building, or public corridors and elevator lobbies in multiple occupancy buildings. At CSC medium and maximum security facilities, the Public Zone is outside the fence surrounding the facility.

Reception Zone: where the transition from a Public Zone to a restricted-access area is demarcated and controlled. It is typically located at the entry to the facility where initial contact between visitors and the department occurs; this can include such spaces as places where services are provided and information is exchanged. Access by visitors may be limited to specific times of the day or for specific reasons.

Restricted-access area: work areas where unescorted access is limited to authorized and security screened individuals only, includes Operations, Security and High Security Zones.

Risk: the chance of a vulnerability being exploited.

*Security Zone: an area to which access is limited to authorized personnel and to authorized and properly-escorted visitors; it must be indicated by a recognizable perimeter and monitored continuously (e.g. 24 hours a day and 7 days a week). Example: an area where Protected C and Secret information is processed and/or stored.

Threat: any potential event or act, deliberate or accidental, that could cause injury to employees or assets.

Zones: a series of clearly discernible spaces to progressively control access.

*The following three zones are restricted-access areas to authorized and security screened individuals only and to properly escorted visitors: Operations Zone, Security Zone and High Security Zone.

For more information

To learn about upcoming or ongoing consultations on proposed federal regulations, visit the Canada Gazette and Consulting with Canadians websites.

Page details

Date modified: