Security assessments for personnel examining, possessing or transferring controlled goods

Once you or your organization is registered in the Controlled Goods Program, your designated official will conduct security assessments of officers, directors and other employees who need to examine, possess or transfer controlled goods or technology.

On this page

Why security assessments are required

Security assessments are required by law for anyone examining, possessing or transferring controlled goods. Through these assessments, the Controlled Goods Program or the designated official determines the extent to which the individual poses a risk of transferring a controlled good to a non-registered or exempt individual.

Who needs a security assessment

All of the following personnel of a business or organization registered in the program must undergo a security assessment before examining, possessing or transferring controlled goods:

Who conducts security assessments

The Controlled Goods Program conducts security assessments of:

Once your organization is registered, your designated official conducts security assessments of:

How to conduct a security assessment

Designated officials will learn how to conduct security assessments through training and guidelines provided by the Controlled Goods Program:

To conduct a security assessment, the designated official will perform the following steps.

1. Conduct, with the consent of the employee, a security assessment using the security assessment application form

Learn about conducting security assessments in section 3 of the guideline for designated officials.

2. Conduct a risk assessment to determine if the employee poses a risk of unauthorized transfer of controlled goods

Learn how to assess risk in the mandatory training for designated officials and in section 4 of the guideline for designated officials.

3. Authorize or deny access to controlled goods based on the outcome of the security assessment

Complete a summary of the security assessment using the following template:
Security assessment summary by designated official conducting a security assessment of an employee, director or officer (PDF, 180KB).

4. Keep records of the most recent security assessment

Forms for security assessments

Refer to the instructions on how to complete a security assessment application form for officers, directors and employees.

Use of Government of Canada security clearances

When conducting a security assessment of an officer, director or employee, you may accept either of the following:

How to use Government of Canada security clearances

Instructions for using Government of Canada security clearances in the guideline for designated officials

Download the Consent to use a Government of Canada security clearance or a Transport Canada transportation security clearance form (PDF, 192KB).

Complete the security assessment forms for temporary workers, international students and visitors

Download the Visitor exemption application for security assessment and exemption from registration (PDF, 291KB).

Download the Temporary worker or international student application for security assessment and exemption from registration (PDF, 891KB).

Decision of security assessments

Approval of access

By completing this form, the designated official formally advises individuals that they successfully meet the assessment criteria to access controlled goods.

Download the Notice of security assessment form (PDF, 191KB).

Denial of access

By completing this form, the designated official formally advises individuals that they do not meet the assessment criteria to access controlled goods.

Download the Notice of security assessment denial form (PDF, 184KB).

Security reassessments

The designated official must conduct a security reassessment upon receiving new or different information about an individual.

Individuals denied access to controlled goods may provide new information that will lead to a security reassessment.

Validity period for security assessments

All security assessments are valid for a period of up to 5 years and as long as the individual remains with the same organization.

Security assessments: A summary of considerations, requirements and timelines

Page details

Date modified: