Treasury Board Secretariat Policy Context
On this page
- Introduction
- How TBS policies for information and data management relate to the Operational Standard
- Appendix A: Alignment between LAC’s Operational Standard and TBS’s SSTMID (and ISO-16175-1:2020)
- Appendix B: Alignment between LAC’s Operational Standard and the IMCC Part 2: Metadata
Introduction
Treasury Board of Canada Secretariat (TBS), in its role as the administrative branch of the Treasury Board of Canada, sets policies for Government of Canada (GC) departments as defined in the Financial Administration Act (FAA); this includes policies for information management (IM). Additionally, sections 7 and 8 of the Library and Archives of Canada Act (LAC Act) identify Library and Archives Canada’s (LAC’s) role in facilitating GC IM and providing IM advice and services in support of LAC’s mandate. Together, TBS and LAC offer policies, tools, and guidance to ensure that GC information is well managed.
From a legislative perspective, the LAC Act applies to institutions subject to the Access to Information Act (ATIA) and the Privacy Act (PA) or others identified by the Governor in Council. While about 180 GC institutions are included under the ATIA and the PA, TBS policies only apply to about 80 institutions defined as “departments” in the FAA. This means that certain institutions are subject to both LAC and TBS policies, whereas others may only be subject to LAC policies. Though not all GC institutions are subject to TBS policies, LAC considers that the guidance in these tools provides useful direction and helpful advice for all institutions on the development of effective IM and metadata best practices. The relationships that LAC maps in this document are reflective of this general applicability.
Additionally, LAC’s Operational Standard for Digital Archival Records’ Metadata has recently been endorsed as a Government of Canada Enterprise Data Reference Standard and will be released alongside the existing TBS data reference standards following final approvals. Once published, it will not add any new requirements to those provided in the LAC Operational Standard, but would be mandatory for departments and agencies subject to section 6 of the TBS Policy on Service and Digital on a day-forward basis. As a result of the above considerations, it is useful to reflect on how TBS policies for information and data management relate to the Operational Standard as specified in the table below.
How TBS policies for information and data management relate to the Operational Standard
TB Policy Instrument | Alignment with the LAC Operational Standard |
---|---|
Policy on Service and Digital |
Subsection 4.3.2 of the Policy on Service and Digital explains deputy heads’ responsibilities for open and strategic information management. Although metadata is not directly mentioned in the policy, some requirements would depend at least partially on metadata.
|
Directive on Service and Digital |
The LAC Operational Standard directly supports subsection 4.3.1 of the Directive on Service and Digital and related policy instruments that describe how departments must strategically manage their information and data. Section 4.3 explains the departmental Chief Information Officer's (CIO) responsibilities for open and strategic management of information and data. Although metadata is not mentioned in the directive, some requirements would depend, at least partially, on metadata.
|
Directive on Open Government |
This directive supports information management requirements in the Policy and Directive on Service and Digital.
|
Standard on Systems that Manage Information and Data (SSTMID) |
The SSTMID requirements are based on ISO 16175-1 Information and documentation—Processes and functional requirements for software for managing records—Part 1: Functional requirements and associated guidance for any applications that manage digital records (2nd edition). The requirements do not directly map to Operational Standard concepts because they identify system functionality that is supported by metadata instead of identifying metadata concepts required for this functionality. For example, the SSTMID requirement to support interoperability may depend on metadata to search, retrieve, and share records, but the specific metadata concepts or elements required are not listed. See Appendix A for further details. |
Standard for Managing Metadata (Appendix L of the Directive on Service and Digital) |
The requirements of this standard include:
Part of LAC’s legislated mandate is to enable GC records disposition through disposition authorizations (DAs). GC institutions use DAs in accordance with LAC policy instruments, including the Operational Standard, for archival records’ protection and transfer. The Operational Standard thus serves as both a starting point for the assessment of metadata needs to inform operations and services (L.2.2.1) and a reference standard (L.2.2.2). Moreover, the Operational Standard metadata requirements must be maintained with the archival records throughout their life cycle, including at time of transfer. This requirement aligns with L.2.2.4, to manage metadata consistent with the information and data life cycle. Requirement L2.2.3 does not directly correspond to the Operational Standard; however, it supports sound metadata management. |
Standard on Security Categorization (Appendix J of the Directive on Security Management) |
Section J.2.4 defines information confidentiality categories: classified (top secret, secret, confidential) and protected (protected C, protected B, protected A). According to Appendix E, section 2.2.2.1, of the Directive on Security Management (this standard’s enabling directive), security markings must be assigned to government information. These markings align with the Operational Standard’s rights management information requirement. |
Information Management Common Core, Part 2: Metadata |
While the IMCC is no longer being maintained by TBS, the recommendations were taken into account in the development of the Operational Standard as the influence of the IMCC continues to be evident in system use and design across the federal government. Moreover, all LAC metadata requirements map to the IMCC with the exception of technical environment information. An interpretation and full breakdown of this alignment are provided in Appendix B. This is considered an “interpretation” because there are many IMCC elements that align with a single LAC concept. Do all of them need to be provided for each item, file, or transfer, or would it be enough to give only some of them? The answer to this could be “it depends on what is available” and whether some metadata for each item, file, and transfer would still be provided. In preparing for the transfer, it is important for departments to work with the LAC assigned archivist to decide what options are available to meet the Operational Standard. Note: future guidance will be developed to provide additional information on metadata assessment and selection (when applicable) to support the preparation of transfers from various environments, clarifying which metadata may be required or desirable beyond the Operational Standard’s minimum set. This is because the standard is designed to be flexible to account for the wide variety of systems and configurations in place for managing government records, including the various ways in which the IMCC has been or remains implemented today. |
Appendix A: Alignment between LAC’s Operational Standard and TBS’s SSTMID (and ISO-16175-1:2020)
Operational standard concept | SSTMID | Comments |
---|---|---|
overall | J.2.2.1 Permit users to discover, access, create, capture, collaborate and share information and data, as set out in R1.1.1, R1.1.2, R1.1.3 and R1.1.4 of ISO-16175-1:2020 | Metadata is implied in SSTMID, but the details of which metadata is needed to enable discovery, access, creation, capture, collaboration, and sharing is not specified. Several LAC concepts assist in these activities, but it would depend on what users search (e.g., creator, title). The LAC concept of rights management information is dissimilar from access controls in an active record-keeping context (e.g., read-write, read-only), which are excluded from the LAC concept because they are not relevant to archival practice. |
disposition authorization | J.2.2.2 Have the capacity to manage the retention and disposition of information and data in a procedural and auditable way, as set out in R2.1.1, R2.1.2, R2.1.3, R2.1.4, R2.1.5, R2.1.6 and R2.1.7 of ISO-16175-1:2020 | Transferring records under an identified disposition authorization is evidence of disposition having occurred. |
classification code record identifier |
J.2.2.3 Support the use of metadata as an active, dynamic and integral part of the record-keeping process, as set out in R1.2.1, R1.2.2, R1.2.3, R1.2.4, R1.3.1, and R1.3.2 of ISO-16175-1:2020 | not available |
classification code | J.2.2.4 Support the use of enterprise information and data taxonomies and classification structures to manage, store, search and retrieve information and data, as set out in R3.2.4 of ISO-16175-1:2020 | not available |
N/A | J.2.2.5 Support interoperability, as set out in R4.1.1, R4.1.2 and R4.1.3 of ISO-16175-1:2020 | These SSTMID/ISO requirements describe system functionality supported by metadata, not metadata concepts or values, which are what are expressed in the LAC standard. |
N/A | J.2.2.6 Have the capacity for bulk import and export using open formats, as set out in R2.2.1, R2.2.2, R2.2.3, R2.2.4, and R2.2.5 of ISO-16175-1:2020 | These SSTMID/ISO requirements describe system functionality supported by metadata, not metadata concepts or values, which are what are expressed in the LAC standard. |
date/time integrity |
J.2.2.7 Facilitate the secure management of information and data, and consideration of privacy and security categorization, as set out in R3.1.1, R3.1.2, R3.1.3, R3.1.4, R4.2.1, R4.2.2, R4.2.3 of ISO-16175-1:2020 | The LAC concept of rights management information is dissimilar from access controls in an active record-keeping context (e.g., read-write, read-only), which are excluded from the LAC concept because they are not relevant to archival practice. |
Appendix B: Alignment between LAC’s Operational Standard and the IMCC Part 2: Metadata
Legend
- --
- Not applicable
- X
- Mandatory
- X(*)
- Mandatory where present
Number | IMCC Metadata Element Name | LAC Metadata Concept | Item | Aggregation (File, Series) |
Transfer | Comments |
---|---|---|---|---|---|---|
1 | Access Restrictions | -- | -- | -- | -- | The LAC concept of rights management information is dissimilar from access controls in an active record-keeping context (e.g., read-write, read-only), which are excluded from the LAC concept because they are not relevant to archival practice. |
2 | Addressee | Creator | X(*) | -- | -- | Creator concept includes idea of “accumulation” (person who accumulates the records). The IMCC element only applies to items. |
3 | Agent Identifier | Creator | X(*) | X(*) | -- | No information |
4 | Agent Name | Creator | X(*) | X(*) | -- | No information |
5 | Agent Corporate Name | Creator | X(*) | X(*) | X | The names of the creating and transferring institutions should be provided to LAC at transfer (they may be the same name or different names). |
6 | Agent Section Name | Creator | X(*) | X(*) | -- | No information |
7 | Agent Position Title | Creator | X(*) | X(*) | -- | No information |
8 | Agent Role | Creator | X(*) | X(*) | -- | No information |
9 | Agent Security Clearance | -- | -- | -- | -- | Agent Security Clearance may control access to records while they are being created and used. Similar to IMCC Access Restrictions, this element is not mandatory for archival practice and does not align with the LAC concept of rights management information. |
10 | Aggregation | -- | -- | -- | -- | No information |
11 | Audience | -- | -- | -- | -- | No information |
12 | Classification Code | Classification Code | X(*) | X | -- | No information |
13 | Compound Resource Link | -- | -- | -- | -- | No information |
14 | Container Type | -- | -- | -- | -- | No information |
15 | Container From Date | -- | -- | -- | -- | No information |
16 | Container To Date | -- | -- | -- | -- | No information |
17 | Coverage | -- | -- | -- | -- | No information |
18 | Description | -- | -- | -- | -- | No information |
19 | Disposition Action | -- | -- | -- | -- | No information |
20 | Disposition Authority | Disposition Authorization | -- | X | X(*) | No information |
21 | Essential Status | -- | -- | -- | -- | No information |
22 | Event Date/Time | Date/Time | X | X(*) | -- | Event Description, Event Identifier, and Event Type explain what happened at a particular Event Date/Time. The LAC standard mentions several types of events for which date information is important (e.g., creation, last modification). |
23 | Event Description | Date/Time | X | X(*) | -- | No information |
24 | Event Identifier | Date/Time | X | X(*) | -- | No information |
25 | Event Type | Date/Time | X | X(*) | -- | No information |
26 | Extent | Extent | -- | -- | X | No information |
27 | External Resource Identifier | Record Identifier | X | X(*) | -- | No information |
28 | External Resource Identifier Type | Record Identifier | X | X(*) | -- | No information |
29 | Format | Format | X | -- | -- | No information |
30 | Integrity | Integrity | X | -- | -- | The LAC integrity concept is mandatory for items only at transfer. |
31 | Jurisdiction | -- | -- | -- | -- | No information |
32 | Keywords | -- | -- | -- | -- | No information |
33 | Language | Language | X(*) | -- | -- | No information |
34 | Legal Hold | -- | -- | -- | -- | No information |
35 | Location | -- | -- | -- | -- | No information |
36 | Medium | -- | -- | -- | -- | No information |
37 | Office of Primary Interest | -- | -- | -- | -- | No information |
38 | Releasable To | Rights Management Information | X(*) | X | -- | No information |
39 | Resource Date | Date/Time | X | X(*) | -- | No information |
40 | Resource Identifier | Record Identifier | X | X(*) | -- | No information |
41 | Resource Locked | -- | -- | -- | -- | No information |
42 | Retention Period | -- | -- | -- | -- | No information |
43 | Retention Trigger | -- | -- | -- | -- | No information |
44 | Retention Trigger Date | -- | -- | -- | -- | No information |
45 | Sensitivity | Rights Management Information | X(*) | X | -- | No information |
46 | Subject | -- | -- | -- | -- | No information |
47 | Supplemental Markings | Rights Management Information | X(*) | X | -- | No information |
48 | Title | Title | X | X(*) | -- | No information |
49 | Type | -- | -- | -- | -- | No information |
50 | Usage Conditions | Rights Management Information | X(*) | X | -- | No information |
Page details
- Date modified: