Treasury Board Secretariat Policy Context

On this page

Introduction

Treasury Board of Canada Secretariat (TBS), in its role as the administrative branch of the Treasury Board of Canada, sets policies for Government of Canada (GC) departments as defined in the Financial Administration Act (FAA); this includes policies for information management (IM). Additionally, sections 7 and 8 of the Library and Archives of Canada Act (LAC Act) identify Library and Archives Canada’s (LAC’s) role in facilitating GC IM and providing IM advice and services in support of LAC’s mandate. Together, TBS and LAC offer policies, tools, and guidance to ensure that GC information is well managed.

From a legislative perspective, the LAC Act applies to institutions subject to the Access to Information Act (ATIA) and the Privacy Act (PA) or others identified by the Governor in Council. While about 180 GC institutions are included under the ATIA and the PA, TBS policies only apply to about 80 institutions defined as “departments” in the FAA. This means that certain institutions are subject to both LAC and TBS policies, whereas others may only be subject to LAC policies. Though not all GC institutions are subject to TBS policies, LAC considers that the guidance in these tools provides useful direction and helpful advice for all institutions on the development of effective IM and metadata best practices. The relationships that LAC maps in this document are reflective of this general applicability.

Additionally, LAC’s Operational Standard for Digital Archival Records’ Metadata has recently been endorsed as a Government of Canada Enterprise Data Reference Standard and will be released alongside the existing TBS data reference standards following final approvals. Once published, it will not add any new requirements to those provided in the LAC Operational Standard, but would be mandatory for departments and agencies subject to section 6 of the TBS Policy on Service and Digital on a day-forward basis. As a result of the above considerations, it is useful to reflect on how TBS policies for information and data management relate to the Operational Standard as specified in the table below.

How TBS policies for information and data management relate to the Operational Standard

How TBS policies for information and data management relate to the Operational Standard
TB Policy Instrument Alignment with the LAC Operational Standard
Policy on Service and Digital

Subsection 4.3.2 of the Policy on Service and Digital explains deputy heads’ responsibilities for open and strategic information management. Although metadata is not directly mentioned in the policy, some requirements would depend at least partially on metadata.

  • For example, metadata would be a tool that would support information and data life cycle management (4.3.2.2), such as documenting retention and disposition activities on records.
Directive on Service and Digital

The LAC Operational Standard directly supports subsection 4.3.1 of the Directive on Service and Digital and related policy instruments that describe how departments must strategically manage their information and data.

Section 4.3 explains the departmental Chief Information Officer's (CIO) responsibilities for open and strategic management of information and data. Although metadata is not mentioned in the directive, some requirements would depend, at least partially, on metadata.

  • For example, managing information and data in a way that enables interoperability, reuse and sharing among GC institutions (4.3.1.3) relies, in part, on metadata. Using a common metadata scheme (structure) makes it easier to exchange metadata (or the information it describes) because it describes the environment in which it was created. It also saves time and resources removing the need to interpret or restructure the information when receiving it.
  • Another example is the use of metadata as taxonomies or classification structures for managing, storing, searching, and retrieving information and data (4.3.1.5).
Directive on Open Government

This directive supports information management requirements in the Policy and Directive on Service and Digital.

  • For example, Section 6.3 requires establishing and maintaining comprehensive inventories of data and information held by GC institutions to help with planning for their release (sharing on GC websites and services like the Open Government portal). This inventory would effectively be metadata about the data and information resources (e.g., title, creator, date).
  • Additionally, Section 6.5 requires GC institutions to maximize the removal of access restrictions on information before transferring it to LAC at disposition. Access restrictions could include security classification or provisions under the ATIA and PA. The LAC Operational Standard requires this kind of “rights management information” at transfer, supporting the federal government’s efforts to ensure transparency.
Standard on Systems that Manage Information and Data (SSTMID)

The SSTMID requirements are based on ISO 16175-1 Information and documentation—Processes and functional requirements for software for managing records—Part 1: Functional requirements and associated guidance for any applications that manage digital records (2nd edition).

The requirements do not directly map to Operational Standard concepts because they identify system functionality that is supported by metadata instead of identifying metadata concepts required for this functionality. For example, the SSTMID requirement to support interoperability may depend on metadata to search, retrieve, and share records, but the specific metadata concepts or elements required are not listed.

See Appendix A for further details.

Standard for Managing Metadata (Appendix L of the Directive on Service and Digital)

The requirements of this standard include:

  • L.2.2.1 Assess metadata needs to inform the planning, design, delivery and continuous improvement of operations and services.
  • L.2.2.2 Use GC enterprise-wide metadata reference standards to describe information and data to support information and data discovery, sharing, exchange and reuse. If such GC enterprise-wide metadata reference standards do not exist, use departmental metadata reference standards.
  • L.2.2.3 Apply a risk management approach to metadata quality control.
  • L.2.2.4 Manage metadata consistent with the information and data life cycle.

Part of LAC’s legislated mandate is to enable GC records disposition through disposition authorizations (DAs). GC institutions use DAs in accordance with LAC policy instruments, including the Operational Standard, for archival records’ protection and transfer. The Operational Standard thus serves as both a starting point for the assessment of metadata needs to inform operations and services (L.2.2.1) and a reference standard (L.2.2.2).

Moreover, the Operational Standard metadata requirements must be maintained with the archival records throughout their life cycle, including at time of transfer. This requirement aligns with L.2.2.4, to manage metadata consistent with the information and data life cycle.

Requirement L2.2.3 does not directly correspond to the Operational Standard; however, it supports sound metadata management.

Standard on Security Categorization (Appendix J of the Directive on Security Management)

Section J.2.4 defines information confidentiality categories: classified (top secret, secret, confidential) and protected (protected C, protected B, protected A). According to Appendix E, section 2.2.2.1, of the Directive on Security Management (this standard’s enabling directive), security markings must be assigned to government information. These markings align with the Operational Standard’s rights management information requirement.

Information Management Common Core, Part 2: Metadata

While the IMCC is no longer being maintained by TBS, the recommendations were taken into account in the development of the Operational Standard as the influence of the IMCC continues to be evident in system use and design across the federal government. Moreover, all LAC metadata requirements map to the IMCC with the exception of technical environment information.

An interpretation and full breakdown of this alignment are provided in Appendix B. This is considered an “interpretation” because there are many IMCC elements that align with a single LAC concept. Do all of them need to be provided for each item, file, or transfer, or would it be enough to give only some of them? The answer to this could be “it depends on what is available” and whether some metadata for each item, file, and transfer would still be provided. In preparing for the transfer, it is important for departments to work with the LAC assigned archivist to decide what options are available to meet the Operational Standard.

Note: future guidance will be developed to provide additional information on metadata assessment and selection (when applicable) to support the preparation of transfers from various environments, clarifying which metadata may be required or desirable beyond the Operational Standard’s minimum set. This is because the standard is designed to be flexible to account for the wide variety of systems and configurations in place for managing government records, including the various ways in which the IMCC has been or remains implemented today.

Appendix A: Alignment between LAC’s Operational Standard and TBS’s SSTMID (and ISO-16175-1:2020)

Operational standard concept SSTMID Comments
overall J.2.2.1 Permit users to discover, access, create, capture, collaborate and share information and data, as set out in R1.1.1, R1.1.2, R1.1.3 and R1.1.4 of ISO-16175-1:2020 Metadata is implied in SSTMID, but the details of which metadata is needed to enable discovery, access, creation, capture, collaboration, and sharing is not specified. Several LAC concepts assist in these activities, but it would depend on what users search (e.g., creator, title). The LAC concept of rights management information is dissimilar from access controls in an active record-keeping context (e.g., read-write, read-only), which are excluded from the LAC concept because they are not relevant to archival practice.
disposition authorization J.2.2.2 Have the capacity to manage the retention and disposition of information and data in a procedural and auditable way, as set out in R2.1.1, R2.1.2, R2.1.3, R2.1.4, R2.1.5, R2.1.6 and R2.1.7 of ISO-16175-1:2020 Transferring records under an identified disposition authorization is evidence of disposition having occurred.

classification code

record identifier

J.2.2.3 Support the use of metadata as an active, dynamic and integral part of the record-keeping process, as set out in R1.2.1, R1.2.2, R1.2.3, R1.2.4, R1.3.1, and R1.3.2 of ISO-16175-1:2020 not available
classification code J.2.2.4 Support the use of enterprise information and data taxonomies and classification structures to manage, store, search and retrieve information and data, as set out in R3.2.4 of ISO-16175-1:2020 not available
N/A J.2.2.5 Support interoperability, as set out in R4.1.1, R4.1.2 and R4.1.3 of ISO-16175-1:2020 These SSTMID/ISO requirements describe system functionality supported by metadata, not metadata concepts or values, which are what are expressed in the LAC standard.
N/A J.2.2.6 Have the capacity for bulk import and export using open formats, as set out in R2.2.1, R2.2.2, R2.2.3, R2.2.4, and R2.2.5 of ISO-16175-1:2020 These SSTMID/ISO requirements describe system functionality supported by metadata, not metadata concepts or values, which are what are expressed in the LAC standard.

date/time

integrity

J.2.2.7 Facilitate the secure management of information and data, and consideration of privacy and security categorization, as set out in R3.1.1, R3.1.2, R3.1.3, R3.1.4, R4.2.1, R4.2.2, R4.2.3 of ISO-16175-1:2020 The LAC concept of rights management information is dissimilar from access controls in an active record-keeping context (e.g., read-write, read-only), which are excluded from the LAC concept because they are not relevant to archival practice.

Appendix B: Alignment between LAC’s Operational Standard and the IMCC Part 2: Metadata

Legend

--
Not applicable
X
Mandatory
X(*)
Mandatory where present
Number IMCC Metadata Element Name LAC Metadata Concept Item Aggregation
(File, Series)
Transfer Comments
1 Access Restrictions -- -- -- -- The LAC concept of rights management information is dissimilar from access controls in an active record-keeping context (e.g., read-write, read-only), which are excluded from the LAC concept because they are not relevant to archival practice.
2 Addressee Creator  X(*) -- --

Creator concept includes idea of “accumulation” (person who accumulates the records).

The IMCC element only applies to items.

3 Agent Identifier Creator X(*) X(*) -- No information
4 Agent Name Creator X(*) X(*) -- No information
5 Agent Corporate Name Creator X(*) X(*) X The names of the creating and transferring institutions should be provided to LAC at transfer (they may be the same name or different names).
6 Agent Section Name Creator X(*) X(*) -- No information
7 Agent Position Title Creator X(*) X(*) -- No information
8 Agent Role Creator X(*) X(*) -- No information
9 Agent Security Clearance -- -- -- -- Agent Security Clearance may control access to records while they are being created and used. Similar to IMCC Access Restrictions, this element is not mandatory for archival practice and does not align with the LAC concept of rights management information.
10 Aggregation -- -- -- -- No information
11 Audience -- -- -- -- No information
12 Classification Code Classification Code X(*) X -- No information
13 Compound Resource Link -- -- -- -- No information
14 Container Type -- -- -- -- No information
15 Container From Date -- -- -- -- No information
16 Container To Date -- -- -- -- No information
17 Coverage -- -- -- -- No information
18 Description -- -- -- -- No information
19 Disposition Action -- -- -- -- No information
20 Disposition Authority Disposition Authorization -- X X(*) No information
21 Essential Status -- -- -- -- No information
22 Event Date/Time Date/Time X X(*) -- Event Description, Event Identifier, and Event Type explain what happened at a particular Event Date/Time. The LAC standard mentions several types of events for which date information is important (e.g., creation, last modification).
23 Event Description Date/Time X X(*) -- No information
24 Event Identifier Date/Time X X(*) -- No information
25 Event Type Date/Time X X(*) -- No information
26 Extent Extent -- -- X No information
27 External Resource Identifier Record Identifier X X(*) -- No information
28 External Resource Identifier Type Record Identifier X X(*) -- No information
29 Format Format X -- -- No information
30 Integrity Integrity X -- -- The LAC integrity concept is mandatory for items only at transfer.
31 Jurisdiction -- -- -- -- No information
32 Keywords -- -- -- -- No information
33 Language Language X(*) -- -- No information
34 Legal Hold -- -- -- -- No information
35 Location -- -- -- -- No information
36 Medium -- -- -- -- No information
37 Office of Primary Interest -- -- -- -- No information
38 Releasable To Rights Management Information X(*) X -- No information
39 Resource Date Date/Time X X(*) -- No information
40 Resource Identifier Record Identifier X X(*) -- No information
41 Resource Locked -- -- -- -- No information
42 Retention Period -- -- -- -- No information
43 Retention Trigger -- -- -- -- No information
44 Retention Trigger Date -- -- -- -- No information
45 Sensitivity Rights Management Information X(*) X -- No information
46 Subject -- -- -- -- No information
47 Supplemental Markings Rights Management Information X(*) X -- No information
48 Title Title X X(*) -- No information
49 Type -- -- -- -- No information
50 Usage Conditions Rights Management Information X(*) X -- No information

Page details

Date modified: