Contract Security Manual effective August 13, 2020

The Contract Security Manual (CSM) details the requirements that private sector organizations must follow for safeguarding government information and assets provided to, or produced by, organizations awarded a government contract with security requirements. It applies to organizations registered in Public Services and Procurement Canada (PSPC)’s Contract Security Program (CSP) and to all contracts, Canadian or foreign, for which PSPC is responsible.

Current manual effective August 13, 2020

In response to feedback from industry and participating federal institutions, the manual was re-written to clearly explain the current security requirements of the CSP that private sector organizations must comply with when bidding and working on sensitive Government of Canada contracts.

For contracts dated before August 12, 2020. The superseded manual still applies. Consult the Industrial Security Manual (for contracts dated before August 12, 2020).

On this page

Chapter 1: General introduction

1.1 Overview

This manual is a reference for organizations to understand the Government of Canada's security standards, procedures and international commitments for working on government contracts, projects and programs with security requirements.

It details the requirements that organizations must follow for safeguarding government information and assets provided to, or produced by, organizations registered in the CSP and to all contracts, Canadian or foreign, for which PSPC is responsible. Procedures are also provided for the same activities related to allied foreign governments contracting through PSPC, such as multinational ventures where Canada is a partner.

Organizations awarded a government contract with security requirements or with a legitimate need to access protected or classified information must be registered and security screened at the appropriate level through the CSP. Once registered, organizations must comply with the security requirements set out in this manual and with all other applicable security policies, standards and directives including, but not limited to the following:

1.2 Contract security administration

PSPC is authorized to administer contract security services by the Department of Public Works and Government Services Act and the Treasury Board Policy on Government Security (PGS), which includes the Standard on Security Screening, as well as the Policy on the CSP. These contract security services help safeguard protected, classified, as well as other sensitive Government of Canada and foreign information and assets. Included in the PGS is a Directive on Security Management, which provides detailed information on mandatory security controls, as well as the Directive on Identity Management, which provides details on managing identity in a manner that mitigates risks to personnel, organizational and national security. In accordance with the North Atlantic Treaty organization (NATO) policy and bilateral security instruments, the CSP is also responsible to oversee the safeguarding of foreign classified information in contracting.

1.3 Other security elements

Granting a reliability status or security clearance (hereafter referred to as security status and/or security clearance) to an organization or individual is confirmation that they are eligible to access, and requires them to safeguard, a certain level of information or assets when they have a need to know (recipient needs access to perform his or her official duties). This means organizations must comply with the requirements in the Security of Information Act, and the Personal Information Protection and Electronic Documents Act.

1.4 Publicity of security information

The following security criteria apply to organizations registered in the CSP and to all government contracts, projects or programs, Canadian or foreign, for which PSPC is responsible.

Having a security status or clearance is not a secret in and of itself, but there is an expectation of good judgment regarding sharing that information. Security status or clearance information must be adequately safeguarded to mitigate the risk that cleared organizations might become targets for security infiltration or terrorism activity.

  • Organizations must not make public any specific information about their security status or clearance in any advertising or promotional activities such as on the organization's website, in videos, social media or photos
  • Employees of organizations must not make public their level of security status or clearance on business cards, curriculum vitae, or the Internet, including social media, as this could draw attention to the security status of the organization for which they work
  • Any enquiries received by organizations concerning their security status should be directed to contact the Contract Security Program's client service centre

General information about a contract can be released as this is already public knowledge, however organizations must:

  • get clarification and/or written approval from the contracting authority before releasing information related to a contract
  • not make public any specific information about the security requirements of a government contract

Protected or classified information cannot be made public or advertised in any manner.

1.5. Cost

PSPC does not charge applicants a fee to process organizational screenings and personnel security screening applications. As such, organizations registered in PSPC's CSP are prohibited from charging fees to their sub-contractors and employees to obtain security clearances.

1.6 Additional information

Organizations can learn how to meet the requirements in this manual by visiting the PSPC's Security requirements for contracting with the Government of Canada website.

Chapter 2: Contracts with security requirements

2.1 Overview

A contract contains security requirements when access to any of the following is required:

  • Canadian protected or classified information, assets or sites
  • Canadian, NATO or foreign classified information, assets or sites

The requirements may also include contract promotion, pre-contract enquiries and negotiations. Clauses containing the security requirements are written into federal government contracts. Any amendments or extensions to a PSPC contract with security requirements must be provided to the CSP by email at tpsgc.ssicontrats-isscontracts.pwgsc@tpsgc-pwgsc.gc.ca.

The CSP must also receive the following items by email at tpsgc.dgsssiprojetintl-dobissintlproject.pwgsc@tpsgc-pwgsc.gc.ca:

  • any awards of contracts or subcontracts with security requirements from NATO or foreign entities
  • any amendments or extensions to contracts with security requirements involving NATO or foreign entities

2.2 Security requirements check list

At the beginning of the procurement process, the project authority completes a Security requirements check list form (TBS/SCT 350-103) outlining the security requirements in a contract. This is part of the bid solicitation documents. The contracting authority ensures that all requirements, approved security clauses and supplementary remarks are included in the contract documentation. These are legally binding.

Organizations should not sign a contract until they understand the implications and potential cost of the security requirements. Once the contract is signed, the organization must give a copy of the security requirements of the contract and the security requirements check list (SRCL) form to its company security officer (CSO). Please see Section 3.2 Organization clearance. The CSO must make sure that all security requirements are met throughout the lifecycle of the contract and before accessing protected and/or classified information.

2.3 Pre-contract award

The CSP will begin the organization security screening process upon receipt of a complete and valid request from the contracting authority. Before the contract is awarded, parts of the screening process must be completed, such as the designated organization screening and facility security clearance. Other requirements, such as Information Technology Security, production capability and communication security (COMSEC) are typically met after awarding the contract but before starting work.

If the contract has a document safeguarding capability (DSC) requirement, work on the contract at the supplier's location cannot start until the full inspection process is completed. Please see Section 3.4 Site inspections.

2.4 Subcontracting

The prime contractor is the organization that wins the bid to work on a contract for the Government of Canada, a foreign government or an international organization. This prime contractor hires the subcontractor to work on a specific part of the contract. The subcontractor is not an employee of the prime contractor's organization and must be security screened with the CSP. The prime contractor must contact the Contract Security Program for approval before awarding a subcontract with security requirements to a subcontractor and the CSP's approval is required for each successive level of subcontracting.

To request approval, the prime contractor must submit a completed SRCL to obtain security clauses for the subcontract. If the subcontractor is not already security-cleared, the prime contractor must also submit a Request for private sector organization screening form to the CSP to sponsor the organization. The CSP and the prime contractor will ensure the subcontractor meets the security aspects of the intended subcontract and/or obtains the appropriate security screening. The subcontract can be awarded after the CSP provides the prime contractor with:

  • the approval letter
  • a signed copy of the SRCL
  • security clauses that must be inserted into the subcontract

The prime contractor must provide a copy of the subcontract to the CSP once awarded. The subcontractor cannot start until the subcontract is awarded and their organization has been granted the required security status or clearance.

Learn more about the subcontracting security requirements.

2.4.1 Subcontracting simplification options

Contractors can leverage the following options to request a security screening for their respective subcontractors.

Option 1

The prime contractor requests and holds personnel security screenings for employees of their subcontractors. This option can be used by organizations:

  • that subcontract work to sole proprietors or small organizations
  • where a small number of individual resources, residing in Canada, are required

Protected or classified information and assets cannot be received or stored at the subcontractor's location. Work on the subcontract can only be performed at the government work site or at the prime contractor's business location if it is authorized for DSC.

Option 2

The prime contractor collects the organization security screening forms from their subcontractors, reviews them for quality assurance and submits them to the CSP for processing. This option can be used for subcontractors that:

  • do not already hold an organization security clearance with the CSP
  • provide written consent to the prime contractor for the collection and sharing of their forms with the CSP

This consent can be emailed to the prime contractor's CSO. Under this option, the prime contractor must still obtain approval and security clauses from the CSP prior to awarding a subcontract.

Learn more about the subcontracting simplification options.

2.4.2 Subcontracting to organizations outside Canada

Contractors must get prior written approval from the CSP by email at tpsgc.dgsssiprojetintl-dobissintlproject.pwgsc@tpsgc-pwgsc.gc.ca and the contracting authority before awarding a subcontract to organizations outside of Canada. The CSP must:

  • verify the security status of a foreign organization and its personnel
  • ensure its compliance with the bilateral security instrument between Canada and that country
  • authorize the release and transfer of Canadian classified and sensitive information to and from the foreign organization

Contractors must contact the CSP by email at tpsgc.dgsssiprojetintl-dobissintlproject.pwgsc@tpsgc-pwgsc.gc.ca when transferring sensitive information or assets to or from Canada. They must also provide a copy of the subcontract to the CSP once it is awarded.

Learn more about international contract security requirements.

Chapter 3: Organization screening

3.1 Overview

To be screened by the CSP, a Canadian organization must either:

This source must be one of the following:

  • a federal government procurement, security or project officer
  • an eligible organization who is:
    • already screened with the CSP
    • working on an active contract
    • has a requirement to subcontract
  • a foreign national or designated security authority

By obtaining a security clearance with the CSP, the organization agrees with the Government of Canada to:

  • meet the security requirements of this manual and any other security requirements in a federal government contract awarded to the organization
  • allow PSPC, or other government authority at the request of PSPC, to conduct security inspections at any time
  • cover all security related costs

Pre-contract negotiations, involving protected or classified information and assets, cannot start before an organization has been security screened through the CSP, unless specified by the contracting authority. This also applies when a security-cleared organization wishes to award a subcontract with security requirements to another organization.

3.2 Organization clearance

There are 3 types of organization clearances:

  • a provisional security clearance
  • a designated organization screening (DOS)
  • a facility security clearance (FSC)

A provisional security clearance is a temporary clearance approved for a specific solicitation process for organizations requiring access to sensitive information prior to responding to a solicitation with security requirements. It allows an organization to obtain personnel security screening for individuals who are part of their bid preparation team.

As for a DOS or an FSC, it is not awarded in perpetuity; it is granted to organizations for a specific contract or subcontract, and to organizations that bid on federal government solicitations with security requirements with a complete Application for registration (AFR) form. A DOS or an FSC allows an organization to obtain personnel security screening for their employees at the required level as indicated in the awarded contract or subcontract.

If an organization needs to possess or store protected or classified information and assets, an additional safeguard capability authorization is required. Please see Subsection 3.2.2 Safeguards.

During the organization screening process, certain individuals in the organization must be security screened. Please see Chapter 4: Personnel screening. These individuals include:

  • key senior officials (KSO)
    • an individual owner as well as any officer, director (of the board), executive and/or partner
    • in a position of control or influence over an organization
  • company security officer (CSO)
    • appointed by the chief executive officer or the designated KSO
    • reports to KSOs on security matters
  • alternate company security officer (ACSO)
    • appointed by the CSO to be the CSO's back up
    • assumes any specific duties the CSO requires
  • corporate company security officer (CCSO)
    • appointed by the chief executive officer or the designated KSO when an organization has one or more security assessed subsidiaries in Canada
    • has a requirement to oversee government contract security matters for the entire corporation
    • does not replace the requirement to have a CSO at each security assessed subsidiary

The security officers must be employed by the organization or a KSO, be physically located in Canada and be a Canadian citizen Footnote 1.

The CSO and CCSO must be security screened at least at the security level of the organization. The ACSO can be security screened at the level of the organization or lower, depending on its location and specific roles and responsibilities in regards to the other security officers.

The CCSO, CSO and ACSO must sign the security appointment, acknowledgement and undertaking form that describes their responsibilities. Information about these responsibilities can also be found in Annex A: Guidelines on company security officer and alternate company security officer responsibilities.

3.2.1 Types of organization clearances

The request for organization screening will indicate the type of organization clearance needed for the pre-solicitation, contract or subcontract.

A provisional security clearance is temporary. It is required to access protected or classified information or assets during the pre-solicitation and/or bid preparation phases of a solicitation process. At a minimum, the CSO and the identified employees that need access to the information require a personnel security screening at the level of the provisional clearance.

A DOS is required to access Protected A or B information or assets. A DOS is also necessary to obtain a site access status. Please see Section 4.3 Site access screening. At a minimum, the CSO will require a reliability status. In some cases selected KSOs may also require a reliability status.

An FSC is required to access classified information or assets: Confidential, Secret or Top Secret, NATO Confidential, NATO Secret, or Control of Secret Material in an International Command (COSMIC) Top SecretFootnote 2 or other foreign equivalent classified information. An FSC must also obtain a site access clearance. Before an FSC is granted, the CSO and KSOs identified by the CSP must be security screened, as a minimum.

A subsidiary is considered a separate legal entity requiring a separate DOS or FSC. A more detailed evaluation of the organization's ownership may also be required. Please see Section 3.3 Foreign ownership, control or influence.

The CSP may require security screenings of all owners, directors, partners, and officers in positions of influence of organizations screened with the CSP, regardless of the security level required.

A provisional security clearance is valid for the duration of the bid solicitation stage only. During the bid evaluation stage, confirmed bidders are invited to complete the screening process to obtain either a DOS or FSC.

Once the clearance is granted, a DOS may be valid for up to 2 years and an FSC may be valid for up to 1 year as long as the organization complies with the requirements of the CSP. At the end of this period, the DOS or FSC will either be administratively terminated, if it is no longer required, or if it will be maintained and renewed by the CSP. A DOS or an FSC is valid if the organization is:

  • executing an active contract or subcontract with security requirements
  • participating in an international program with security requirements
  • holding a PSPC-issued standing offer or supply arrangement with security requirements
  • bidding on federal or foreign government or international organization solicitations with security requirements with a complete AFR form

It is the organization's responsibility to keep the CSP informed of any changes following the screening process. PSPC also reserves the right to request an update or a renewal at any time following the screening process.

Note

Access to Protected C information and assets requires enhanced screening. Please contact the Contract Security Program for information if you require access to Protected C information and assets.

PSPC's CSP will suspend or, as applicable, revoke a DOS or an FSC if the organization fails to maintain the required security standards of the CSP, consistent with the requirements of the security agreement and this manual. Suspension or revocation of a DOS or an FSC by the CSP could lead to a decision by the contract authority to cancel existing contracts.

3.2.2 Safeguards

There are different types of safeguards granted under a DOS or FSC.

DSC allows an organization to view, possess and store protected and/or classified information and assets at their facilities for a specific contract or subcontract. In exceptional cases only, they can be kept for a specific solicitation process.

The CSP inspects and assesses the physical security of the organization's facilities. All sites with a document safeguarding requirement must be screened.

The additional safeguards listed below may be required depending on the requirements of the contract or subcontract. These safeguards are granted only after an organization has received a DSC. These include:

  • production capability allows an organization to build, manufacture, repair, modify or work on sensitive products at a work site in conjunction with a DSC
  • shredding capability allows an organization to destroy sensitive information and assets
  • bulk storage capability allows an organization to store bulk information or assets at their work site, to the level for which they are authorized
  • information technology (IT) authorization allows an organization to store, process or transmit sensitive information electronically
  • COMSEC is the discipline of preventing unauthorized access to telecommunications information in readable form, while still delivering the information to the intended recipients
    • COMSEC is comprised of multiple disciplines such as cryptographic security, emission security (EMSEC), transmission security (TRANSEC), and physical security

A DSC will be granted for successful bidders only after their organization's facility has met the physical and administrative security requirements identified in the contract and has been inspected and approved by the CSP.

In the case of DSC for classified information and assets, a parent organization must also possess an FSC at the same level or it must be excluded from having access to classified information or assets held by the subsidiary organization. Parental exclusions may be recommended in certain cases in consultation with the CSP.

3.2.3 Reciprocal facility security clearances

Under a number of international bilateral security instruments (such as between Canada and the United States), the CSP can ask a foreign government to grant a reciprocal FSC to a foreign organization located in another country for access to Canadian, NATO and/or foreign classified information. This is useful if the organization becomes a subcontractor in a Canadian classified contract. Please email the CSP at tpsgc.dgsssiprojetintl-dobissintlproject.pwgsc@tpsgc-pwgsc.gc.ca for information related to subcontracting to foreign organizations.

3.3 Foreign ownership, control or influence

A foreign ownership control or influence (FOCI) evaluation assesses the degree of authority, ownership, control or influence that foreign interests may have over a Canadian organization. This helps determine and mitigate the risk that unauthorized third parties may exert undue influence over a Canadian organization to access government classified information and assets.

FSCs do not exempt an organization from further evaluation. In addition, having a Confidential, Secret or Top Secret clearance does not exempt an organization from a FOCI evaluation, if it is required. The FOCI evaluation is generally triggered by the type of information being accessed. A FOCI evaluation must be done for contracts involving access to NATO, foreign or COMSEC classified information or assets, or as directed by the CSP.

The existence of foreign ownership, control or influence does not, in itself, prohibit an organization from holding an FSC. Each case is assessed individually based on the particular risk profile associated with the goods or services being procured to the government or foreign government client. In cases of an adverse assessment, the CSP will discuss with the organization and the client department whether certain measures can reduce the risk to an acceptable level by the CSP and the client department.

A FOCI evaluation must generally be completed before access to sensitive information, assets or sites is granted. The determination of FOCI risks is contract specific and remains valid during the contract as long as the degree of potential foreign control or influence of the organization does not change. Re-evaluations are conducted when a new FOCI requirement is identified or when the factors at the time of the evaluation change (for example, a new ownership or corporate restructuring).

3.4 Site inspections

Site inspections are a key component of the security screening process. An organization must allow the CSP field industrial security officer (FISO) to inspect all relevant facilities or sites to ensure that existing security measures protect information and assets.

Scheduled and unscheduled access by the CSP security inspectors is a normal condition of a contract with security requirements.

During the inspection, the FISO will also assess:

  • potential targets or risks for physical attacks
  • intrusion detection systems
  • physical security zones
  • how information and assets are handled

The organization cannot hold or store protected or classified information associated with the contract until the inspection process is completed and the CSP has notified it in writing that the DSC has been granted.

Inspections may be conducted at any time while the organization is security-cleared with the CSP. Inspection timeframes vary based on:

  • the contracts
  • the security levels
  • the length of time an organization needs to comply with the CSP security requirements
  • the organization's history of compliance with the CSP

Learn more about site inspections.

3.5 Government of Canada security agreement

Before an organization receives a provisional security clearance, a DOS or an FSC, a KSO must complete and sign a security agreement with the Government of Canada. The security agreement outlines the terms and conditions of the organization's security clearance as well as grounds for the suspension or revocation of the organization's security clearance. After signing the agreement, the organization agrees to abide by all security requirements of the CSP. This agreement is signed as part of the security screening process.

3.6 Compliance and enforcement for private sector organizations with an organization clearance

Private sector organizations have an obligation to maintain compliance with the requirements of the CSP at all times throughout the performance of procurement instrumentsFootnote 3 that contain security requirements.

3.6.1 Compliance with the requirements of the Contract Security Program

Organizations must comply with the policies and directives outlined in the CSM, the Security Agreement (SA), and any other Government of Canada policies related to the CSP. The CSP will address unethical business practicesFootnote 4 as well as non-compliance with contract security requirements for Government of Canada contracts.

The CSP will adopt a systematic approach to deal with non-compliance issues in procurement instruments, in addition to unethical business practices, to ensure that all situations receive a fair and consistent application.

Outcomes from the compliance assessment may include a suspension and a revocation of an organization's security clearance. Contracting authorities (CAs) and client departments will be informed of any changes to an organization's security clearance status. This may ultimately result in the termination or amendment of an existing procurement instrument by the CAs or the client departments. Furthermore, as individual personnel security screenings are dependent upon the status of the organization to which they belong. Should an organization's clearance be revoked, all personnel security screenings tied to that organization will be terminated.

3.6.2 Contract Security Program process for non-compliant organizations

The CSP will apply a two-step approach when it determines that an organization:

  • has engaged in unethical business practices, or
  • has not complied with the policies and directives outlined in the CSM, the SA, and any other Government of Canada policies related to the CSP, or
  • has failed to implement corrective measures recommended by the CSP
  • The KSO, the CSO of the organization, and any other persons, who could have information pertaining to the non compliance, can be interviewed by representatives of the CSP
Step 1: Suspension letter—Issued by Director, Industrial Organization Security Services

Upon confirmation of non-compliance or a violation, the CSP will send the organization's CSO a suspension letter, by email, detailing the reasons for the organization's security clearance suspension. Unless otherwise notified by the CSP, the organization will have 30 days to submit its reply, by email, to the suspension letter to outline the corrective measures it is taking in order to meet the requirements, or address the concerns which led to the suspension, in order to maintain a valid organization clearance. If the CSP determines that the organization has clearly demonstrated it still meets the requirements and that there are no security concerns, their organization clearance will be reinstated.

If the organization's response does not address or mitigate the reasons for the suspension, or if no mitigation measures are provided to address the situation, including a non response to the suspension letter, the CSP will proceed to issuing a revocation letter.

It should be noted that when an organization's security clearance is suspended by the CSP, the organization may be able to retain the ability to continue working on existing procurement instruments that had been awarded to the organization, prior to the suspension. This decision will be at the discretion of the CAs and the client department, and not of the CSP. The clearance of the organizations' employees will remain active pending the outcome of the assessment, unless notified otherwise by the CSP. However, the organization's suspension could impact their ability to continue working on existing procurement instruments, being awarded new procurement instruments, or be considered for any new procurement opportunities. Organizations must validate their status and their ability to work on a sensitive contract when suspended by the CSP.

Step 2: Revocation letter—Issued by Director General, Industrial Security Services

If the organization does not address or mitigate the reasons for the suspension, or if no mitigation measures are provided to address the situation, the CSP will proceed with sending the organization a letter of revocation in situations where the CSP:

  • did not receive a response from the organization in 30 days, or
  • determines that the organization has not implemented the required corrective measures, or
  • determines that the organization failed to adequately provide evidence that would justify the reinstatement of the organization's security clearance

The CSP will inform the organization in writing of the final decision, along with the rationale and the option for recourseFootnote 5.

The organization may decide to pursue a formal route to review the Director General, Industrial Security Services' decision to revoke the organization's security clearance. They must submit a request in writing to the CSP compliance inboxFootnote 6, to have the decision reviewed by the Assistant Deputy Minister, Departmental Oversight Branch of PSPC. This request must be made within 30 days from the date of the revocation letter. Upon request for reapplication into the CSP, there will be a review and examination of the organization's file. The CSP reserves the right to validate, through assessment processes, that the minimum requirements and any additional conditions have been met by an organization.

When an organization's security clearance is revoked, the CSP will recommend, to the CAs and the client departments, that all procurement instruments previously awarded to the organization should be terminated. All personnel security screenings held by this organization will also be terminated.

Notification to other parties

Any changes in the organization's status will be shared immediately via e-mail with all applicable CAs, the client departments, and other stakeholders. If the non-compliant organization is a subcontractor, the aforementioned parties and the prime contractor will be notified.

3.6.3 Suspension or revocation of an organization security clearance

The following non-exhaustive circumstances are grounds which may lead the CSP to suspend or revoke an organization's security clearance:

  1. The organization's inability to obtain and confirm the personnel reliability status/security clearance for CSOs, ACSOs, and KSOs
  2. The CSP's inability to reach the organization via email, telephone, or website due to the organization's failure to advise the CSP of contact information updates
  3. Personnel from the organization accessing protected or classified information, assets or sites without the proper level of reliability status or security clearance and need-to-know
  4. KSOs of the organization, who have signed a KSO exclusion attestation, accessing protected or classified information, assets, or sites
  5. Information uncovered by the CSP that calls into question the integrity and honesty of the organization
  6. The CSP's inability to adequately mitigate risks associated with foreign ownership, control, and influence on the Canadian organization
  7. The inability or refusal of the organization to provide complete and accurate foreign ownership, control, and influence information to the CSP for purposes of an evaluation, where the security requirements of the contract necessitate such information
  8. The inability or refusal of the organization to provide a valid proof of a permanent physical location and a principal place of business in Canada where the work is executed and where the business operates
  9. The organization refusing to grant access to an authorized representative of the CSP to either enter into its physical location, or to interview an identified key person of the organization
  10. The organization refusing to disclose procurement instruments awarded by foreign governments or international organizations involving foreign or Canadian classified information
  11. The organization refusing to provide security requirements identified in procurement instruments awarded by foreign governments or international organizations
  12. The organization providing inadequate physical security requirements or making unauthorized changes to the CSP-approved security zones
  13. Any criminal acts committed by CSOs, ACSOs or KSOs as a representation of the organization, while committing the act to benefit the organization or their standing in the organization
  14. Any acts of aggression or harassment against the Crown, by CSOs, ACSOs or KSOs, which may be considered a breach of the anti-harassment provisions found in the Code of Conduct for Procurement
  15. Any acts against the Crown, criminal convictions committed by the organization, or any acts which bring the trustworthiness or reliability of the organization or its procurement instruments into dispute
  16. Significant changes to the organization which bring the trustworthiness or reliability of the organization or its procurement instruments into dispute, including but not limited to changes in jurisdiction of registration, ownership, partners, bankruptcy, dissolution, or criminal convictions of the organization or of its KSOs
  17. Any suspension, termination, or revocation of a CSO, ACSO or KSO's reliability status/security clearance, that may impact the security status of the organization
  18. Any attempt at providing false or misleading information, including by way of omission, to the CSP, to any government of Canada department or one of its authorized agents; or
  19. The inability of the CSP to interview a CSO, ACSO or KSO of the organization within the allotted deadline

For more information on compliance and enforcement visit Annexe A: VIII. Contract Security Program Compliance and Enforcement Guide.

Chapter 4: Personnel screening

4.1 Overview

To obtain a security clearance with the CSP, an organization must have its personnel security screened. This begins with its:

  • key senior officials (if required)
  • corporate company security officers (if required)
  • company security officers (CSO)
  • alternate company security officers (ACSO)

Once the organization's screening is complete, the provisional security clearance, designated organization screening or facility security clearance is granted. Please see Subsection 3.2.1 Types of organization clearances. The CSOs and ACSOs can submit screening requests for personnel in their organization who have a legitimate requirement to access protected or classified information, assets and work sites as part of an active solicitation process, contract, subcontract or lease.

Learn more about who is eligible for a personnel security screening.

An employee is a person employed by the company for wages or salary as part of the payroll. However, under specific conditions, it can include subcontractor resources; these resources would fall within the first subcontracting option. Please see Subsection 2.4.1 Subcontracting simplification options. This security screening must be completed before granting access to protected or classified information, assets or work sites.

4.2 Personnel security screening

There are different levels of personnel security screening. These are determined by the identified security requirements of a contract or subcontract. Organizations must get the required security screening for personnel who require access to protected or classified information, assets or work sites. Individuals cannot access protected or classified information or assets until they have the required reliability status, Secret security clearance, or Top Secret security clearance.

Reliability status

A reliability status screening assesses an individual's honesty and reliability. It grants access to Protected A and B information and assets. It requires the applicant to provide 5 years of verifiable background history. It is typically valid for 10 years from the date of issue, unless revoked for cause or terminated.

Enhanced reliability status

An enhanced reliability status allows access to Protected C information and assets. It requires the applicant to provide 5 years of verifiable background history. It is typically valid for 10 years from the date of issue, unless revoked or terminated.

Personnel security clearance

A personnel security clearance assesses an individual's loyalty to Canada and their reliability as it relates to that loyalty. It allows access to classified information, assets, or sites. The applicant must provide 10 years of verifiable background history. Depending on the type, it is valid for either 5 or 10 years from the date of issue, unless revoked or terminated. Secret and NATO Secret clearances are valid for 10 years. Top Secret and COSMIC Top Secretfootnote 7 are valid for 5 years.

Security concerns

If security concerns arise during the screening process, the CSP may conduct a security screening interview with the applicant for additional information. This interview helps the CSP determine the circumstances or activity that caused the concerns. It also lets the applicant respond to these concerns. Any information the applicant provides is protected and not shared with the CSO, unless required by the CSP and in accordance with security, contractual and privacy requirements.

The CSO or ACSO must ensure that the applicant is employed and eligible for a personnel security screening. If the applicant is a subcontractor resource, the CSO or ACSO must ensure the applicant meets the conditions for the first subcontracting option. Submitting a personnel security screening request without a valid requirement compromises the CSO and/or ACSO personnel security status or clearance. It also compromises the organization's compliance with the CSP. For further details, see Annex A: Guidelines on company security officer and alternate company security officer responsibilities.

Learn more on how to obtain security screening for your organization and personnel:

4.3 Site access screening

Site access screening is another type of screening. It may be conducted for individuals external to government who do not access sensitive information, but who access restricted or controlled government facilities or areas within those facilities.

There are 2 types of site access screening:

  • screening for site access status assesses an individual's honesty and reliability, it requires a verification of
    • an individual's identity
    • a law enforcement enquiry
  • screening for site access clearance assesses an individual's loyalty to Canada and their reliability as it relates to that loyalty, it requires a verification of
    • an individual's identity
    • a law enforcement enquiry
    • a security assessment

Individuals cannot access sensitive sites or facilities without the site access status or site access clearance.

Chapter 5: Facility protection

5.1 Overview

Properly protecting a facility means having a system of physical security that detects and responds to actual or attempted unauthorized access using physical, procedural and psychological barriers.

Given enough time, almost any physical security measure can be compromised. Therefore, protective measures must be based on the time required for a response unit or person to arrive at the scene. The CSP can help develop a facility protection plan, which will form part of an overall effective security program.

An organization that has a DOS or FSC, with an additional capability authorization, such as DSC (Subsection 3.2.2 Safeguards) must protect its facility from compromise and unauthorized access.

Organizations must effectively use restricted zones by implementing appropriate security procedures such as:

  • storing and treating information and assets in the appropriate security zones
  • controlling access to classified information in a document registry
  • ensuring that all individuals working in security zones are security assessed to the appropriate level
  • segregating information sufficiently so that only those individuals with a need to know will be able to access the information
  • escorting visitors
  • securing protected and classified information and assets when leaving the work area
  • using precautions when discussing protected or classified information
  • placing equipment, such as containers and shredders, where they can be used without leaving protected and classified information and assets unattended
  • preparing and handling Protected C information and assets in a security zone or, if required, in a high-security zone
  • physical security zones in accordance with the federal Directive on Security Management

5.2 Physical security

Organizations should consult the CSP at an early stage when building, buying, leasing or renovating facilities for which a site clearance will be required. Physical security systems must comply with provincial and municipal regulations and codes, such as fire, construction and electrical.

Secure zones

Organizations holding a DSC must have a proper number of progressively restrictive zones to control access to protected and classified information and assets. These include a:

  • public zone
  • reception zone
  • operations zone
  • security zone
  • high-security zone

Annex B: II. Types of secure zones provides further information about the types of secure zones.

Zones must have a recognizable perimeter that defines the boundaries, which will be established in consultation with FISO.

Physical security measures are more effective if they are adapted to normal operations as much as possible. Properly locating and defining secure zones helps with functional use as well as access control.

5.3 External areas and perimeters

PSPC's CSP will also assist with the specific requirements for external areas and perimeters such as:

  • fences and free-standing walls
  • landscaping and parking lots
  • external security lighting
  • access doors; windows; other perimeter openings
  • emergency exits

An organization with DSC may need a security control centre at each site to monitor and control the security equipment and systems. It can be operated by the facility, by a commercial agency under contract, or a combination to provide full-time coverage. The security monitoring system must have the capability to operate independently of other facility monitoring systems.

5.4 Access control of secure zones

Organizations must use established entry points to channel employees and visitors, verify identities and stop a visitor from entering until properly recorded and accompanied by an employee. A number of measures must be taken to control access to secure zones such as:

  • personnel identification
  • guards
  • electronic access control
  • electronic intrusion detection
  • closed-circuit television
  • interior access controls
  • service spaces

The organization cannot access, possess, handle or store protected and classified information at the site until the CSP has notified it in writing that the required security level has been granted.

Further details about these requirements and what the field industrial security officer will be reviewing during the site inspection are in Annex B: Guidelines for facility protection.

Chapter 6: Handling and safeguarding information and assets

6.1 Overview

When an organization is authorized under the CSP to possess and store protected or classified information and assets (Subsection 3.2.2 Safeguards), it must have an asset security system that:

  • identifies management and employee responsibilities
  • defines assets requiring safeguards
  • establishes a document registry, which includes maintaining an inventory, reporting and handling security incidents, and maintaining a threat and risk assessment
  • details proper personnel and physical security measures

Access to protected and classified information and assets must be limited to persons who have the appropriate security level and who have a need to know.

These requirements also apply to any foreign classified and NATO classified information, in addition to other NATO requirements (Chapter 10.2: North Atlantic Treaty Organization). The safeguarding principles outlined in this chapter for classified information apply to foreign or domestic government information, as well as to NATO, European Union and European Space Agency classified information.

Improper handling and safeguarding of protected and classified information and assets could result in the suspension or revocation of an organization's DOS or FSC, or an employee's reliability status or security clearance, depending on the situation. Revocation or suspension of a DOS or FSC may result in the loss of any government contract requiring the organization to hold a security screening status.

The following sections provide an overview of each requirement for safeguarding protected and classified information and assets. Annex C: Guidelines for safeguarding information and assets provides further details on these requirements and should be read in conjunction with this chapter. These measures apply to any information that is copied or translated, which retains the security categorization level of the original information. Specific instructions on whether information can be copied or translated may be provided in the contract or in bilateral security instruments.

6.2 Secure environment

In an office environment, organizations must use restricted zones to safeguard information and assets. Appropriate security procedures ensure that information and assets are accessed only by persons authorized at the appropriate security level and with a need to know; that it is not left unattended; and that it is recorded, stored and disposed of properly. (Annex C: I. Secure environment)

6.2.1 Security level requirements

The security level determines the requirements for handling, storing, marking and disposing of protected and classified information and assets. Information on the types of security zones is available in Annex B: Guidelines for facility protection.

  1. Secret and Top Secret information and assets must be processed, stored and destroyed in a security zone unless a threat and risk analysis recommends a higher level of security zone
  2. Protected C information and assets must be processed, stored and destroyed in a security zone unless a threat and risk analysis recommends a higher security zone
  3. Confidential information and assets must be processed, stored and destroyed in an operations zone or higher
  4. Protected A and Protected B information and assets should be processed, stored and destroyed in an operations zone or higher

6.3 Records management

Organizations must have a suitable location, called a registry, to receive, distribute and store protected and classified information and assets.

Organizations must keep records of the dates, names and transactions of all classified information and assets indicating the receipt, distribution, creation, reproduction and destruction within the facility.

All records of protected/classified information and assets and all protected/classified information and assets must be available for inspection by the CSP FISO.

The use of secure registries and implementing proper procedures protects all information and assets. These procedures include treating the registry as a security zone, implementing measures that prevent unauthorized access, and opening, releasing and marking records with the appropriate level of security. (Annex C: II. Records management)

Organizations must keep records of foreign information and assets unless otherwise stipulated in the contract clauses.

6.3.1 Retaining records

When a bid is not accepted, or when the contract is completed or terminated, protected and classified material and assets must be returned to the client department, destroyed using an approved third party destruction company or be destroyed onsite if the organization has an approved shredder as specified by the CSP (Chapter 6.10: Destruction of records) or as directed by the CSP. Organizations may be authorized to retain such material when approved by the originator through the CSP.

Requests for retention authority must identify the material, the period of time and the justification.

If the organization has been authorized to retain related protected and classified information for a specific period after contract completion, details of this authorization must be included with the retention request.

Unless the retention authority is received in writing, protected and classified information must be disposed of according to Chapter 6.10: Destruction of records and instructions from the CSP.

6.4 Security markings

Protected and classified information must be appropriately marked using specific procedures and markings according to the level of sensitivity and the type of media, including microforms and electronic storage material.

Markings on international documentation is guided by international security memoranda of understanding, agreements or other international standards and guidelines (Annex C: III. Security markings). Contact the CSP by email: tpsgc.dgsssiprojetintl-dobissintlproject.pwgsc@tpsgc-pwgsc.gc.ca for advice and assistance.

6.5 Storage

As a minimum, when located in an approved operations zone, protected and restricted information and assets must be stored in locked containers, such as cabinets, safes, vaults and secure rooms, unless otherwise stipulated in contract clauses. Protected C, Secret and Top Secret information and assets must be stored in an approved security container in a security zone (Chapter 5.2: Physical security), in accordance with the RCMP Security Equipment Guide. Classified information at the Confidential level must be kept in an RCMP container, when located in an approved operations zone. When constructed to the specifications identified in the RCMP's Secure Storage Rooms Guide and located in the appropriate zones, protected or classified information and assets may be stored on open shelving in a secure room. The FISO will provide advice and must inspect and approve the rooms before use.

Foreign classified information must be stored separate from all other forms of foreign or domestic classified and protected information. Protected and classified information and assets must not be stored in the same container as negotiable or attractive assets.

Organizations are permitted to purchase approved security equipment through the CSP. The CSO or ACSO should consult with the FISO by email: tpsgc.ssidie-issiid.pwgsc@tpsgc-pwgsc.gc.ca to determine the required equipment. After the FISO approves the order, the CSP will process the request, although the invoicing and delivery for the equipment is between the purchaser (the CSO) and the supplier. Examples of equipment available through this procedure are listed in Annex C: IV. Storage.

6.6 Use of computers

A computer, including portable computers, used for protected or classified information must not be removed from the organization without written permission from the CSO or ACSO. Computers used for protected or classified information must follow the security procedures for storage established by the organization, as well as transport and transmittal standards if it is removed from the organization. Further information about the informational technology security is available in Chapter 7: Information technology security.

6.7 Packaging and transmitting

When transmitting classified and protected information and assets, organizations must protect its security with proper packaging, maintain a record during transit and of delivery. Contact the CSP by email: tpsgc.ssidie-issiid.pwgsc@tpsgc-pwgsc.gc.ca for information.

Records of distribution, circulation and return within the facility must include receipt by signature of the persons involved. Persons who have access to classified information and assets must be briefed on their responsibilities for protecting it and any special restrictions concerning its use or further distribution.

Protected and classified information and assets must be packaged and transmitted in accordance with the RCMP's standards on transport and transmittal of protected and classified information and approved by the CSP for international transmittal. Hand carrying and/or bulk shipping specific protected and classified information and assets must follow specific procedures; the FISO will provide advice and assistance.

Organizations can submit their screening forms to the CSP by email since it is the organization's protected information, but if the information is protected in relation to contracts, then the protected information should be encrypted before emailing.

Organizations must have the prior approval of the Canadian Designated Security Authority before internationally transmitting protected or classified information or assets. For more information, contact the CSP by email: tpsgc.dgsssiprojetintl-dobissintlproject.pwgsc@tpsgc-pwgsc.gc.ca.

6.8 Transfer of information and assets

If an organization plans to transfer Protected and/or Classified information/assets from one site to another the organization must ensure the sites are cleared with DSC and information technology (if applicable) for that specific contract prior to transfer. Note this transfer can only be within Canada and does not include Top Secret, Protected C, COMSEC material or NATO and foreign classified information/assets. The organizations CSO and ACSOs must follow a CSP approved method of transportation for the exchange as well as account for and record the change in the document registry.

The CSP must approve removing and transporting of information and assets at Protected C and COMSEC material, as well as all NATO, foreign and Canadian classified information at Confidential or above. For more information, contact the CSP by email: tpsgc.dgsssiprojetintl-dobissintlproject.pwgsc@tpsgc-pwgsc.gc.ca.

6.9 Verbal and message communication

Unprotected telephones or facsimiles cannot be used to communicate information classified above restricted or designated above Protected A. The Communications Security Establishment will provide assistance to coordinate secure telephones or facsimiles.

6.10 Destruction of records

As identified in the contract clauses, protected and classified information and assets can either be returned to the client department, destroyed using an approved third party destruction company or the organization can shred onsite if they have an approved shredder. An organization's shredder will be inspected by the FISO during the DSC inspection if a company indicates that they will be shredding on site. A certificate of destruction is required for classified information.

The CSP does not normally retrieve protected or classified information unless stipulated in the contract, requested to do so or in certain cases where the DSC is being revoked.

All foreign classified Information must be destroyed in accordance with the contract clauses. Always validate with the CSP before destruction of foreign classified information. Foreign Restricted information and assets must also be destroyed in accordance with the requirements established in the contract clauses.

Protected and classified information and assets that have been authorized for destruction must be disposed of with the following requirements:

  • by approved destruction equipment, or at a facility with DSC clearance authorized by the CSP
  • be safeguarded according to the highest level of asset involved while awaiting, or in transit to, destruction
  • kept separate from other information and assets awaiting destruction
  • be monitored by an employee with a proper reliability status or security clearance, as applicable
  • surplus copies and waste that could reveal protected and classified information must be protected to the appropriate level and should be promptly destroyed

Note

Destruction of classified information and assets must be recorded on a certificate of destruction form, a copy of which must be forwarded to the CSP by email: tpsgc.dgsssiprojetintl-dobissintlproject.pwgsc@tpsgc-pwgsc.gc.ca.

Chapter 7: Information technology security

7.1 Overview

When organizations are awarded Government of Canada contracts (both prime and sub-contracts) that require them to use their own information technology (IT) system(s) to store/process/create protected or classified information as indicated in the contract's security requirements check list (SRCL) (section C.11.D and/or section C.11.E), they must first get authorization from Public Services and the CSP.

The organization cannot use its IT system to store/process/create protected or classified information until the IT security inspection process, conducted by a CSP IT security inspector, is completed and formalized in an IT written approval letter from PSPC's CSP.

Organizations must not use an IT system in support of a contract to store/process/create protected or classified information before receiving authorization from the CSP; this will constitute a breach of one or more of the terms of the contract.

7.2 Planning

An IT security plan is an important step in safeguarding and controlling an organization's information system.

7.2.1 Physical security

Protected and classified information in electronic format, as well as protected and classified technology assets, must be physically safeguarded in an equivalent manner to hard-copy information as indicated in Chapter 5: Facility Protection, and Chapter 6: Handling and Safeguarding Information and Assets.

7.2.2 Electronic information security

Organizations must conduct IT security planning for the complete life-cycle of both the protected or classified information that is stored/processed/created and the IT equipment used in support of a contract.

Organizations must maintain an IT security posture that respects and maintains the confidentiality, integrity, and availability of protected or classified electronic information for the duration of the time held.

The CSP IT security inspections are based on the policies and guidelines found in the Policy on Government Security, the Policy on Service and Digital, the Directive on Service and Digital, the North Atlantic Treaty Organization Security Policy (PDF) as appropriate, and other guidelines published by the Government of Canada, and on business best practices concepts.

7.3 Inspections

The CSP IT security inspections occur after a contract has been awarded with an IT requirement. The organization must first meet the physical security requirements (Chapter 5: Facility protection) and received a DSC at the level of the contract or higher.

Organizations must not store, process or create protected or classified information on their IT system(s) until the CSP has issued an IT written approval letter.

The CSP IT security inspections are performed to ensure that the residual risk to Government of Canada protected or classified information is low. Government departments and agencies have authorized the CSP, through memoranda of understanding and other means, to approve IT systems for storing/processing/creating protected or classified information where the residual risk, as evaluated by the IT security inspector, is low.

IT security inspections are specific to a particular contract, and only for the levels identified in the contract's SRCL. The IT written approval letter is only valid for the contract(s) inspected against, and is only valid for the duration of this/these contract(s).

As part of the inspection process, organizations may receive recommendations and/or suggestions for improving their overall IT security posture which, when implemented, will provide IT security inspectors with a level of confidence that the residual risk is low.

For information on how an IT security inspection is performed, see Annex D: Information technology security inspection process.

More information on IT security is available on the Information technology security requirements webpage.

Chapter 8: Visits to secure sites

8.1 Overview

For bid solicitation purposes, or during the course of a contract, security-cleared individuals may be required to visit a government or private sector organization in Canada or abroad, or an organization may be required to host visitors to their facilities. In these cases, a request for visit (RFV) must be submitted to and approved by the CSP.

In Canada, the CSP verifies that the organization requesting the visit has the required level of FSC; each of the proposed visitors has the required level of security clearance; and foreign disclosure limitations (Chapter 9.3: Foreign Disclosure), if any, are identified and strictly observed according to international security instruments.

An approved RFV authorizes access to classified information on an oral and visual basis only; it does not authorize removing classified material from the site. Organizations and individuals must strictly observe any access or disclosure limitations prescribed in the visit authorization.

The visitor's personnel security clearance level and need to know must be verified through official visit protocol before the host organization allows access to classified information or access to a controlled site.

PSPC representatives holding the appropriate level of personnel security clearance may visit organizations in an official capacity without notifying the organization in advance of their visit. The organization must verify PSPC personnel's valid Government of Canada credentials and level of clearance by contacting the Contract Security Program's client service centre before granting access to classified information. Personnel of the Communications Security Establishment (CSE) will also be afforded the same access for the purpose of conducting an inspection of information technology systems.

Procedures for processing RFVs are available on the Approval for visits to secure sites webpage.

8.2 Types of visit requests

There are different types of visit requests:

  • a one-time visit is for a specified, continuous period of time up to one year, and it is not renewable. If the need for access is ongoing, a new request must be submitted at the end of the year for approval
  • a recurring visit is for a series of visits over an extended period of time, normally up to one year. It is renewable on an annual basis, unless otherwise authorized by the CSP, that is, for a multi-year contract or major crown project
  • an emergency request is used for an event of an urgent nature
  • a project/program security instruction-specific visit. These are determined on a case-by-case basis

8.3 Mandatory prerequisites

All organizations submitting an RFV for access to classified information, must hold a valid FSC at or above the categorization level of the requested visit. In addition, each person involved must hold a personnel security clearance at or above the categorization level of the requested visit.

Foreign nationals, residing in Canada and employed by a cleared Canadian organization, must hold a Canadian personnel security clearance before the CSP will approve a visit to other countries or to other Canadian organizations as a representative/consultant of a Canadian organization.

Foreign nationals visiting a Canadian organization on an approved international visit request cannot be included in a Canadian visit request to another Canadian organization.

Guidelines for processing visits and the responsibilities for the visiting and host organizations are available in Annex E: Guidelines for requests for visits.

8.4 International visits

All international visits must be authorized through the Canadian Designated Security Authority (DSA) (Chapter 9.1.1: Canadian Designated Security Authority) using the Multinational Industrial Security Working Group request for visits form. Similarly, the Canadian DSA will process visit requests for Canadian organizations to NATO commands and agencies using the NATO international visit control procedures.

The requirements for processing international visits vary according to the specific bilateral security instrument. The CSP will notify Canadian organizations of applicable procedures if and when required.

8.5 Records of visits

Organizations must keep a record of all visitors to their facility who access classified information. A separate visitor log must be maintained for NATO visits listing the visitor's full name and organization, person visited, and the date of arrival and departure. The CSP representatives are not considered visitors and are not required to enter their names in visit logs.

Records of authorized visits that have taken place must be maintained by the host organization for a minimum period of two years and can be randomly inspected by the CSP during that period.

8.6 Urgent requests

Special procedures exist for processing urgent visit requests through official PSPC channels as a result of an invitation from a host organization. The requesting organization's CSO or ACSO must adequately justify the urgent requirement and provide all details (for example, urgent need to repair equipment whose non-serviceability is preventing the continuation of test trials, and thereby affecting the overall progress of a program or contract).

Contact the CSP by email at ssi-iss@tpsgc-pwgsc.gc.ca for information on submitting an urgent request.

8.7 Amendments

When submitting additions or deletions of visitors to approved visit requests, the organization must include the original approved the CSP visit identification number.

Generally, the purpose or period of a visit cannot be changed by an amendment submission, and a new request may be required. The CSO or ACSO should contact the CSP before submitting these types of amendments.

8.8 Unclassified Visits

For unclassified visits to United States (U.S.) Department of Defense (DOD) facilities, a visit approval using the Canada/U.S. Joint Certification Program (JCP) directly arranged visit (DAV) process may be required by Canadian organizations for access to certain establishments (Chapter 11: Joint Certification Program).

More information about visit requests is available on the Approval for visits to secure sites webpage.

8.9 Visits requiring access to foreign Restricted information

Requests for visits involving access to foreign Restricted information or assets must be done in accordance with procedures established in the contract clauses. Contact the Canadian DSA by email at dgsssiprojetintl-dobissintlproject@tpsgc-pwgsc.gc.ca for more information about these types of visits.

Chapter 9: International security

9.1 Overview

The Government of Canada must occasionally use foreign contractors and increasingly complex supply chains to access specialized skills and technologies. Similarly, Canadian contractors may be a supplier of an allied foreign government or international organization. The Government of Canada, allied governments and international organizations must ensure their respective sensitive information is adequately handled and safeguarded using common international standards when shared among themselves.

9.1.1 Canadian designated security authority

As per Canada's international commitments, a DSA must be identified to provide direction and assistance to government and industry on industrial security matters related to the exchange of classified information with foreign entities. In Canada, the DSA is part of the CSP. In some countries the National Security Authority (NSA) may be acting as the DSA.

9.2 Bilateral security instruments

The Canadian DSA negotiates a number of bilateral security instruments (arrangements, memoranda of understanding, agreements) to facilitate the exchanging and safeguarding of protected and classified information and assets that have been provided to contractors. Consequently, the Canadian DSA identifies the security requirements to safeguard protected and classified information that a Canadian or foreign organization must abide by when it becomes involved in any stage of a contract covered by a bilateral security instrument.

In Canada, the DSA is responsible to negotiate bilateral security instruments that:

  • enable Canadian industry to access classified contracts with foreign governments and international organizations
  • allow Canadian industry to compete internationally and encourages foreign investment
  • administer safeguarding measures for all pre-contracting phases, as well as projects, programs, contracts/subcontracts with foreign countries and international organizations related to the exchange of protected or classified information
  • include provisions to define the scope; designate the security authority(ies) to administer and implement the instrument; define security classification level equivalencies of classified and protected information; define protection and handling of classified and protected information; define process to exchange security assurances; define how contract security requirements are transmitted; define process for visits of personnel and transportation of documents and freight; define loss or compromise of classified and protected information; and additional mitigation strategies

9.3 Foreign disclosure

Organizations must get approval from the Canadian DSA to exchange or transfer protected and classified information and assets with a foreign entity or to receive foreign government or international organization classified information. A foreign security assurance confirms that a foreign organization and its personnel meet the security requirements of a solicitation request, contract or subcontract. To obtain a foreign security assurance, organizations must contact the Canadian DSA by email at dgsssiprojetintl-dobissintlproject@tpsgc-pwgsc.gc.ca, who will determine if the information can be released to, and safeguarded by, the foreign organization or government. Please note that foreign disclosure reviews may take several months depending on the information to be disclosed.

Canadian industry transferring national or international information and assets to a foreign entity (government or private sector) must go through the Canadian DSA unless otherwise approved. Most government-to-government exchanges of information and assets use approved courier services. Therefore, organizations who have shipments must contact the Canadian DSA by email at dgsssiprojetintl-dobissintlproject@tpsgc-pwgsc.gc.ca for approval of the shipment. When these methods of transport would result in unacceptable delays to a contract/program/project, the CSO or ACSO can request an alternate method of transmission, such as hand carriage by an organization's employee from the Canadian DSA.

Information belonging to a third nation cannot be released to individuals holding foreign clearances without the prior written approval of the originating nation through the Canadian DSA. Therefore, disclosing national or international information to a foreign person employed by a Canadian organization must be first approved by the Canadian DSA and strictly controlled by the CSO or ACSO.

Disclosing information to foreign visitors is prohibited unless disclosure authority has been obtained from the CSP through an approved visit clearance (Chapter 8: Visits to secure sites) or other authorizing document.

The release of protected and classified information or assets to foreign countries and international organizations must comply with Canada's international bilateral security instruments and foreign legislation, and must be approved by the Canadian DSA.

To request approval for any of the above exchanges of information, or for more information, please contact the Canadian DSA by email at dgsssiprojetintl-dobissintlproject@tpsgc-pwgsc.gc.ca.

9.4 Protected information

Organizations must have written authorization from the Canadian DSA before releasing Canadian protected information and assets to other countries. The Canadian DSA will provide the level of safeguarding required for protected information and assets through contract security clauses or written instructions.

9.5 International alternative solutions

In some cases, when there is no bilateral security instrument covering protected information, customized international alternative solutions may be used to help safeguard Canadian protected information handled abroad during Government of Canada contracting.

With international alternative solutions, the Government of Canada may award contracts and subcontracts at Protected A or Protected B levels to suppliers located in a limited set of countries with appropriate security and privacy legislation and framework; similarly, Canadian organizations may consider certain foreign suppliers in their bids and subcontracts. The suitability of an alternative solutions approach is always considered on a case-by-case basis and is at the exclusive discretion of PSPC's CSP.

More information on whether international alternative solutions are possible is available on the International alternative solutions webpage.

9.6 Foreign classified information and assets

Foreign government and international organization classified information or assets that are Confidential, Secret or Top Secret must be safeguarded in the same manner as Canadian classified information and assets of an equivalent level as defined in the respective bilateral security instrument, unless advised otherwise by the Canadian DSA (Chapter 6: Handling and safeguarding information and assets). Security measures to handle and safeguard foreign classified information are stipulated in the contract clauses.

9.7 Foreign information at the Restricted level

The Restricted classification no longer exists in Canada, however many allied governments and international organizations still use this classification and Canada is obligated to safeguard it consistent with bilateral security instruments. Industries awarded a foreign government contract at the Restricted classification must contact the Canadian DSA by email at dgsssiprojetintl-dobissintlproject@tpsgc-pwgsc.gc.ca for further guidance as the security measures will normally be included in their contract clauses from the foreign DSA. Organizations must also comply with the following additional safeguarding procedures:

  • the Canadian DSA must approve the release of foreign Restricted information to any government, person or institution of another country
  • access to Restricted information must only be given to individuals who require access in connection with a government or multinational program/project/contract
  • the CSO or ACSO must inform all recipients of foreign Restricted information and assets of their responsibility for safeguarding the information and assets
  • to avoid confusion, organizations must indicate the country of origin of foreign Restricted information and assets, along with the classification, for example, Restricted (Italy)

9.8 Security requirements for contracts awarded to foreign organizations

In addition to the requirements specified in (Chapter 2: Contracts with security requirements), when awarding contracts, including subcontracts, to organizations outside of Canada holding a valid facility security clearance (FSC) in their nation (foreign contractor), organizations are required to:

  • get the Canadian DSA approval for the contract and/or sub-contract; and
  • include security requirements clauses in the contract and security classification guidance for the Canadian information, provided by the CSP

9.9 Program/project security instructions

To enable the exchange of information and assets required by governments and industry for multinational cooperative programs, nations participating the program or project may agree to use practices and procedures that differ from the requirements in this manual and from bilateral security instruments. In such cases, these requirements, practices and procedures will be detailed in a Program/Project Security Instruction approved by all participants. For Canada, the Canadian DSA will approve it.

Chapter 10: International organizations

10.1 Overview

Canadian organizations working on contracts requiring access to classified information and assets belonging to international organizations must safeguard that information at the equivalent Canadian security level specified in the respective bilateral security instrument, including the additional requirements written into the contract.

The Canadian DSA will assist a Canadian organization under contract with a foreign government or international organization by identifying the detailed requirements that must be met.

10.2 North Atlantic Treaty Organization

Canada is a member of the NATO, an alliance of 31 member countries.

As a member of NATO, Canada follows security regulations related to classified NATO information, which is circulated within and by NATO. This includes information released by member nations into the NATO alliance, as well as information originated in the organization itself.

Note

Classified information contributed by a member nation remains the property of that nation even though it is circulated in a document belonging to NATO.

10.2.1 North Atlantic Treaty Organization cooperative program with non-North Atlantic Treaty Organization allies

Contractors participating in a multinational cooperative program involving NATO member nations and non-NATO member nations, or who are required to share NATO classified information with a non-NATO member during a contract must contact the Canadian DSA by email at dgsssiprojetintl-dobissintlproject@tpsgc-pwgsc.gc.ca for further information. Organizations must also contact the Canadian DSA if they have security-related concerns in multinational cooperative programs.

10.2.2 North Atlantic Treaty Organization personnel security clearances

An employee granted a Canadian security clearance is not automatically cleared to access NATO classified information. A security briefing and a need to know are required for a NATO security clearance at the level of COSMIC Top SecretFootnote 8, NATO Secret, or NATO Confidential. Access to NATO Restricted information will also require a formal security briefing and need to know, but will otherwise be governed by contract security clauses. Access to NATO unclassified information will be governed by the contract security clauses.

In Canada, an individual with a NATO security clearance who needs access to other types of classified information must have their right of access confirmed. The CSO must contact the Canadian DSA by email at dgsssiprojetintl-dobissintlproject@tpsgc-pwgsc.gc.cafor further guidance.

For a non-permanent resident of Canada, the NATO security clearance can only be granted by the parent nation, unless otherwise approved by both DSAs.

Organizations must maintain a separate record of all employees at the facility who are authorized to access NATO classified information. Only individuals having a need to know, who hold a security clearance at the appropriate level, and who have been security briefed on their responsibilities for the safeguarding of NATO classified information, and have acknowledged these responsibilities in writing may be permitted access to NATO classified information. The CSO must be briefed by the Canadian DSA and acknowledge in writing that they understand the terms and conditions for handling NATO classified information. Once CSOs accept their responsibilities, they can brief the employee using the DSA-approved form provided by the Canadian DSA on NATO requirements including:

  • the meaning of the term NATO information
  • the security markings on a document identifying it as the property of NATO. This marking will be on all copies of documents classified Restricted, Confidential or Secret that are circulated within NATO. The marking COSMIC Top Secret also signifies that the document is the property of NATO and is used exclusively on all copies of Top Secret documents circulated within NATO
  • the safeguarding of NATO classified documents according to the requirements (Chapter 6: Handling and safeguarding information and assets) for handling Confidential, Secret and Top Secret material, and keeping it separate from other types of protected/classified/unclassified information. NATO Restricted and NATO unclassified documents must be handled and safeguarded according to the contract security clauses included in the contract.

The CSO and all employee signed acknowledgements must be returned to the Canadian DSA.

Access to NATO Confidential information and above can only be granted to nationals of the 31 member countries, unless specific authorization is obtained by NATO through the Canadian DSA by email at by email at dgsssiprojetintl-dobissintlproject@tpsgc-pwgsc.gc.ca. In Canada, the term “nationals” includes both citizens and permanent residents of Canada.

10.2.3 Facility security clearances

If an organization is required to safeguard NATO classified information, it must obtain a FSC at the level of NATO Confidential, NATO Secret or COSMIC Top Secret. See Section 3.2 Organization clearance for the requirements to obtain an FSC.

10.2.4 Handling classified North Atlantic Treaty Organization information

All classified NATO information received must be handled according to Chapter 6: Handling and safeguarding information and assets and with the following additional requirements:

  • NATO Secret information and above must be recorded in a NATO register located at the organization's facility
  • when NATO classified material is received by the organization, the CSO or ACSO must inform the Canadian DSA of its receipt
  • NATO classified information must always be marked with appropriate NATO classification markings
  • NATO classified information must always be returned to the Canadian DSA for destruction unless otherwise approved by the Canadian DSA
  • when transmitting NATO classified information to another nation or international organization, organizations must contact the Canadian DSA by email at dgsssiprojetintl-dobissintlproject@tpsgc-pwgsc.gc.ca for guidance and approval, unless otherwise authorized by the Canadian DSA

10.2.5 Contracts

The security requirements for NATO classified contracts are documented in a NATO security aspects letter included with the contract.

Organizations must have authorization from both the contracting authority and the Canadian DSA before awarding a NATO classified subcontract to a Canadian or foreign contractor.

When contractors negotiate directly with foreign governments and/or organizations, any classified material to be transmitted outside of Canada must be forwarded through the Canadian DSA (Chapter 6.7: Packaging and transmitting).

In addition, all the requirements of personnel security clearances (Chapter 4.2: Personnel security screening), visit security clearances (Chapter 8: Visits to secure sites) and release of information to foreign entities (Chapter 9.3: Foreign disclosure) apply equally to NATO contracts.

10.2.6 Release of North Atlantic Treaty Organization classified information to contractors from non-North Atlantic Treaty Organization nations

In certain cases, NATO classified information may be shared with foreign contractors from a non-NATO member nation, either through a sub-contract or through the hiring of a non-NATO national. However, this cannot be done without the written consent of the originator of the NATO classified information and the Canadian DSA. Therefore, prior to sharing NATO classified with a foreign contractor, Canadian contractors must receive written authorization from the Canadian DSA.

10.3 European Union

In accordance with the bilateral security instrument between Canada and the European Union (EU), Canadian contractors may have access to EU classified information, through contracts awarded by EU member states or the EU Commission. Canadian contractors must advise the Canadian DSA if they receive a contract for EU classified information and assets. The Canadian DSA is responsible to oversee the organization's compliance with the security requirements for all EU classified information identified in the contract. For guidance on safeguarding EU classified information, contractors must contact the Canadian DSA by email at dgsssiprojetintl-dobissintlproject@tpsgc-pwgsc.gc.ca.

10.4 European Space Agency

In accordance with the bilateral security instrument between Canada and the European Space Agency (ESA), Canadian contractors may have access to ESA classified information, through contracts awarded by ESA member states or the ESA. Canadian contractors must advise the Canadian DSA if they receive a contract for ESA classified information and assets. The Canadian DSA is responsible to oversee the organization's compliance with the security requirements for all ESA classified information identified in the contract. Contracts including ESA Restricted information will contain detailed clauses for appropriately safeguarding this information. For guidance on safeguarding ESA classified information, contractors must contact the Canadian DSA by email at dgsssiprojetintl-dobissintlproject@tpsgc-pwgsc.gc.ca.

Chapter 11: Joint Certification Program

11.1 Overview

The U.S./Canada JCP was established in 1985 to allow contractors of each country to apply for access to DOD/Department of National Defence (DND) unclassified militarily critical technical data (MCTD), on an equally favorable basis, in accordance with the U.S. DOD Directive 5320.25 “Withholding of Unclassified Technical Data and Technology from Public Disclosure”, and Canadian Technical Data Control Regulations (TDCR) pursuant to the Defence Production Act.

Contractors must be certified under the JCP to be eligible to bid on or receive a contract involving access to unclassified MCTD under the control of DOD or DND. Participation in the JCP is limited to contractors who are located in Canada or the U.S.

The JCP is managed by the U.S./Canada Joint Certification Program Office (JCPO) located at Battle Creek, Michigan under the administration of Defense Logistics Agency. The JCP certification establishes the eligibility of Canadian or U.S. contractors to:

  • receive unclassified MCTD, under the control of DOD or DND
  • bid on defence-related contract opportunities whose specifications involve unclassified militarily critical technical data that are releasable only to certified organizations
  • attend gatherings restricted to certified JCP contractors, such as:
    • symposia
    • program briefings
    • meetings designed to publicize advance requirements of contracting agencies
    • pre-solicitation, pre-bid, pre-proposal and pre-award conferences and workshops
  • arrange unclassified visits directly with:
    • other JCP certified Canadian and U.S. contractors
    • DOD and DND military facilities

11.2 Joint certification process

To become a certified contractor, an organization must agree to abide by the terms and conditions listed on the militarily critical technical data agreement—DD form 2345 (PDF), complete and submit the DD form 2345 along with all supporting documentation to the U.S./Canada JCPO for verification.

Once accepted by the JCPO, the DD form 2345 constitutes an agreement with the organization and the JCP that unclassified MCTD will not be further distributed to unauthorized individuals. If a contractor violates the provisions of the agreement, its certification for access to unclassified militarily critical technical data may be revoked.

11.3 Unclassified visits

Once certified through the JCP, Canadian contractors can request unclassified directly arranged visits with other certified defence contractors or military facilities in Canada and the U.S. They must make arrangements directly with the point of contact at the industry facility or the military installation under valid certification. The security official at the facility or the commander of the installation retains final approval authority for any visit and may deny it for security or operational reasons.

More information about how to request a directly arranged visit is available on the JCP website.

Find out more information on the Government of Canada's Joint Certification Program webpage or contact the U.S./Canada Joint Certification Program.

Annex A: Guidelines on company security officer and alternate company security officer responsibilities

I. General responsibilities for company security officers and alternate company security officers

When the organization holds a DOS or a FSC, the CSO and alternate company security officer (ACSO) sign an acknowledgement and undertaking form that provides a list of their obligations. Except where indicated, the CSO and ACSO are responsible for:

  1. appointing, briefing and training all ACSOs (CSO responsibility)
  2. designating one appointed ACSO to be the CSO in their absence (CSO responsibility)
  3. reviewing the security requirements in the contract SRCL or contract security clauses and ensuring that all requirements are followed
  4. obtaining approval from the CSP before awarding a subcontract with security requirements
  5. submitting personnel security screening requests for all ACSOs KSOs to the highest level of access required
  6. submitting personnel security screening requests for employees of their organization who require access to protected and classified information, assets, or worksites
  7. verifying the identities of employees through evidence of identity and validating details related to date of birth, address, education, professional qualifications, employment history, travel and personal character references
  8. coordinating subject interviews with employees, when required
  9. submitting requests for personnel security screening updates and upgrades, when required
  10. conducting security briefings for employees after they receive a security clearance or reliability status and completing the Security screening certificate and briefing form
  11. briefing employees on their responsibility to protect NATO classified information and having them sign the acknowledgement form provided by the CSP and return the signed forms by email
  12. retaining signed briefing forms in the employee's file
  13. limiting access to protected and classified information, assets or worksites to only personnel who have the proper security screening and who have a need-to-know
  14. maintaining an up-to-date list of security screened CSOs, ACSOs, KSOs and employees
  15. safeguarding personnel security screening files
  16. submitting the Security screening certificate and briefing form to terminate the reliability status or security clearance of employees who no longer require access to protected and classified information, assets or worksites
  17. coordinating with client's security representative to brief employees working at client sites on any relevant security requirements
  18. completing requests for visits
  19. informing the CSP of any changes in the organization's legal status, corporate structure, ownership and changes to the list of KSOs
  20. promptly informing the CSP before any physical move or new construction
  21. documenting and reporting to the CSP any changes of circumstance or behaviour of security screened personnel and ACSOs (Chapter 4: Security screening of this manual)
  22. documenting and reporting to the CSP any persistent or unusual contact or attempts from another individual to gain access to sensitive information, assets or a facility without proper authorization
  23. ensuring that approved visits are properly logged
  24. promptly informing the CSP of any classified contracts and sub-contracts from and to foreign entities
  25. promptly informing the CSP following any damage to classified information and assets
  26. completing essential training offered by the CSP, which includes training in a virtual classroom setting, online videos and pre-recorded webinars

II. Document safeguarding capability responsibilities

In addition to the above responsibilities, if the organization also has DSC, the CSO and ACSO are also responsible for:

  1. preparing security orders and briefing all personnel who have access to protected and classified information and assets on their security responsibilities by implementing an effective security awareness program
  2. appointing, when required, an information technology corporate security coordinator
  3. coordinating with the CSE to appoint, when required, COMSEC and alternate COMSEC custodians
  4. ensuring that all protected and classified information and assets are safeguarded and handled according to the provisions of the CSM (Chapter 6: Handling and safeguarding information and assets of this manual) and contract-specific clauses
  5. annually updating the inventory of protected and classified information and assets
  6. notifying the CSP of all security violations for direction before investigating
  7. notifying the CSP immediately of any significant incident or compromise, and submitting a written report. Investigations of breaches or compromises will be coordinated by the CSP
  8. establishing a registry to log and control access to classified information
  9. briefing hand-carriage couriers as per the courier certificates provided by the CSP

III. Official contact with Public Services and Procurement Canada

The CSO is the official contact with the CSP to address and coordinate security issues. Communication with the CSP, whether written or oral, should be limited to the CSO, ACSO(s), or the chief executive officer of the organization.

IV. Security briefings

To ensure proper security in the organization, the CSO works closely with management, from the top down, to conduct a security education and aftercare program. Inadequate security may result in the loss of an organization's DOS or FSC and the cancellation of contracts involving protected or classified information and assets.

The CSO and security staff are not solely responsible for an organization's security. Managers and supervisors, at all levels, and KSOs are responsible for their own personal security measures in addition to ensuring that proper security procedures are followed by all employees in the organization. The CSP recommends that performance assessments include a measure of the individual's security effectiveness, just as they include other organizational assessments.

An initial security briefing, reinforced by an ongoing security education and awareness program, is essential to maintaining an effective security program. Ultimately, the success of a security program depends on the employees of the organization. Procedures, regulations and physical safeguards are more effective if employees are fully aware of their individual responsibilities and the importance of the security requirements, along with the necessity for these security requirements.

The Security screening certificate and briefing form, which each person reads and signs when receiving their reliability status or security clearance, is an acknowledgement of their responsibilities. The signing of the form must be accompanied by a briefing from the CSO, detailing the individual's specific responsibilities and duties regarding security in the facility holding a DOS or FSC. The completed and signed form must be kept in the employee's personnel file.

New employees, even though not yet security-screened and therefore prohibited from knowledge of or access to protected and classified information, assets, and secure sites, should be given a security briefing appropriate to their duties. Security in the private sector includes requirements for corporate security, as well as safeguarding government protected and classified information and assets.

Ongoing security education

Ongoing security education and awareness may contain many forms of instruction including, but not limited to:

  • general briefings to all employees
  • smaller, group briefings
  • movies and videos
  • articles in an organization's newsletter(s)
  • security bulletins
  • posters
  • specific training for employee supervisors regarding aftercare of all security assessed employees

Assistance with training sessions is available by emailing the CSP at tpsgc.ssidsicsensibilisation-isscisdoutreach.pwgsc@tpsgc-pwgsc.gc.ca.

V. Security awareness content

Each organization's security education and awareness program must be tailored to the situation and needs of the specific facility holding a DOS or FSC with a DSC. The organization is required to develop a document that guides and directs employees on the security measures to be implemented in the organization. It should be based on the CSM; however, the organization should not reproduce the CSM in its entirety. The security orders should be developed for the specific facility holding the DOS or FSC.

Suggested topics for including in the security orders

  • The CSP and its requirements
  • Security references
  • Security organization
  • Level of DOS or FSC
  • Handling and safeguarding information and assets
  • Personnel security screening
  • Procedure for persons terminating employment
  • Security education and awareness
  • Physical security
  • Access controls
  • Intrusion alarms
  • Emergencies
  • Special international requirements, including NATO requirements
  • Security incidents
  • Procedures for unclassified and classified visits
  • Contract security requirements
  • Foreign contract security requirements
  • Information technology security
  • U.S./Canada JCP
  • Where to obtain security information
  • List of abbreviations and acronyms
  • List of definitions

VI. Security violations, breaches and compromises

Organizations must establish a procedure to identify and investigate suspected or confirmed security incidents, breaches or compromises. Any incidents must be recorded on a completed Security incident report form for security officers, ensuring no classified information is included, and emailed to the CSP: ssidsicdieenquetes-isscisdiidinvestigations@tpsgc-pwgsc.gc.ca.

CSOs are also responsible for recording any changes in behaviour or circumstances related to individual employees, or a suspicious contact from another person. These instances must be properly recorded and reported to the CSP. Any changes in behavior of your screened personnel must be promptly reported by email: spac.dgsssidessn-dobissnssid.pspc@tpsgc-pwgsc.gc.ca. Consult reporting security incidents and changes in circumstances and behavior for more information.

The CSO can prevent security incidents by creating awareness in the organization by:

  • reminding employees of their security responsibilities, and of any security concerns, threats and risks
  • conducting regular checks to make sure employees are respecting security procedures and practices
  • increasing employee awareness through security awareness orientation and training
  • sharing information on the organization's security procedures and best practices

Security incidents

A security incident is an alert that a breach of security may be taking place or may have taken place. It is an act, event or omission that could result in the compromise of information, assets or services. This may include:

  • leaving a protected file out on a desk unattended
  • misplacing a laptop computer that contains secure information
  • suspicious contact from someone who may be trying to gain sensitive information from you

Security breaches

A security incident that leads to a confirmed compromise of the confidentiality, integrity, or availability of information and assets is considered a security breach.

A breach is an act, event or omission that results in the compromise of sensitive information or assets. This means that there has been unauthorized access, disclosure, destruction, removal, modification, use or interruption of protected and classified information and assets.

Changes in behaviour

Unusual behaviour in security screened individuals that may be cause for security concern must be reported to the CSO or ACSO. They may include but are not limited to:

  • drug or alcohol misuse
  • expressions of support for extremist views, actions or incidents, particularly when violence is advocated
  • unexplained hostile behaviour or communication
  • unexplained frequent absences
  • indications of fraudulent activity
  • disregard for safeguarding sensitive information or assets (such as repeated security violations or breaches)
  • unexplained financial affluence or extreme financial distress
  • persistent or unusual interest in or attempts to gain access to sensitive information, assets or facilities to which an individual has no work-related need to access

A CSO who becomes aware or has reasonable and probable grounds to suspect that an employee has a change of circumstances or behaviour that may be cause for security concern must forward a complete report of the change of circumstances to the CSP. The CSO may also deny that individual access to protected and/or classified information and assets until the situation is resolved.

Changes in circumstances

All individuals are required to report information related to a change of personal circumstances that may affect their reliability status or security clearance. At a minimum, individuals are required to report any:

  • change in criminal record status (criminal conviction, suspension of a criminal record or other judicial prohibitions)
  • involvement with law enforcement (such as being the subject of a criminal investigation, being charged or arrested)
  • association with criminals
  • legal name changes based on marriage or divorce
  • significant change in financial situation (such as bankruptcy or unexpected wealth)

Suspicious contacts and security incidents

Persistent or unusual contact from another individual to obtain access to protected or classified information, assets or a facility without proper authorization must be documented, investigated and reported. As CSO, you must ensure that access to information and assets is limited to employees who:

  • are security screened and have been briefed on their security responsibilities and have acknowledged these responsibilities in writing
  • need to access and know information in order to perform their duties, referred to as a need-to-know (the intended recipient must have access to perform his or her official duties)

If an organization has sensitive government information or assets at any of its worksites, the CSO or ACSO must remain even more aware of suspicious behaviours and be ready to report these to the CSP.

Organizational changes

A CSO or ACSO who becomes aware of any changes in the organization's legal status, corporate structure, ownership or changes to the list of KSOs must promptly inform the CSP of these changes to start a review of the registration and organizational screening.

Classified contracts from foreign entities

A CSO or ACSO who becomes aware of any classified contracts or sub-contracts awarded to the organization from a foreign government, foreign industry or international organization must promptly inform the CSP to ensure these contracts do not create additional risk to contracts awarded by the Government of Canada, and to ensure the protection of the foreign classified information is in accordance with bilateral security instruments administered by the CSP.

VII. Reporting

All clearance holders must report known or suspected security incidents to the CSO. If the CSO believes a security breach has taken place, they are responsible for:

  • reporting it to the program
  • completing a written report of the security concern, ensuring no classified information is included
  • suspending access to sensitive information and assets until the program has completed the investigation

Upon receiving an incident report, the CSO must immediately conduct a preliminary inquiry to determine all of the circumstances and report the incident to the CSP within 24 hours. If the results of the preliminary inquiry indicate a suspected or actual breach of information and assets, the CSO must immediately notify the CSP. The CSP will conduct an investigation of the incident to determine the cause and recommend corrective measures and controls for the CSO to implement to prevent or minimize the possibility of future similar incidents.

Records should be kept by the organization for a period of 2 years following the incident and are subject to inspection by the CSP FISO.

Learn more about Reporting security incidents and changes in circumstances and behaviours.

Note

Most attempts to collect sensitive information or intelligence are subtle and often appear harmless. These can occur during social events, over the internet or during official meetings held domestically or abroad.

At a minimum, the CSO or ACSO must report the following situations to the CSP:

  • unusual or persistent contact or any attempt by an unfamiliar individual to access information, assets or facilities
  • planned or unplanned contact with embassy or foreign government officials, foreign officials or foreign nationals in Canada or outside Canada, when such contact is outside of regular duties
  • actual or potential security breaches or concerns

VIII. Contract Security Program compliance and enforcement guide

The CSP will conduct assessments of organizations in cases of non-compliance and for security breaches and/or violations as indicated above.

Procedures

  1. When a security incident or breach occurs, the CSO must notify the CSP officials and, when required, notify the organization's client department immediately before conducting an internal inquiry. The CSO must then submit a security incident report to the CSP identifying the type of occurrence and details of the incident or the security breach, ensuring no classified information is included.
  2. After completing the assessment, the CSP may suspend the organization immediately. The CSP will notify the CSO of any corrective action and mitigation measures to be taken. In case of an immediate suspension, the CSP will provide the organization an opportunity to demonstrate that they still meet the minimum requirements to maintain a valid organization security clearance.
  3. Failure to implement corrective actions if required could result in a suspension. If the company is suspended, failure to demonstrate that the organization still meets the requirements of the CSP, could result in a revocation of an organization's security clearance status. When the company's organization security clearance is revoked, the CSP will also administratively close all of their active personnel security screenings. Any personnel security screening requests that were pending, would have been closed by the CSP at the suspension stage.

For more information visit:

The following list is to help determine the reasons for suspensions and the length of revocations in cases where organizations security clearances are revoked.

Table 1: Reasons for suspensions within different length of revocations
Length of revocations Reason for suspension Description Disciplinary action Remarks
30 day suspension and revocation if unresolved Key people in the organization do not hold the required personnel security screenings The CSP's inability to obtain and confirm the personnel security screening for CSOs, ACSOs, and KSOs. 30 day suspension. Revocation if unresolved. Organization will be suspended and given 30 days to submit the required information, otherwise, the organization will be revoked. The organization can be reinstated only after all personnel security screenings are confirmed for CSOs, ACSOs, and KSOs.
No physical location in Canada The inability of the organization to provide a valid proof of a permanent physical location and a principal place of business in Canada where the work is executed and where the business operates. 30 days suspension. Revocation if unresolved. The company can be reinstated if they provide proof of a physical location, deemed satisfactory by the CSP. A post office box will not be recognized as an organization's address.
Refusal to grant access to a CSP representative The organization refusing to grant access to an authorized representative of the program to either, enter into its physical location, or to interview an identified key person of the organization. 30 day suspension. Revocation if unresolved. The company can either be reinstated or revoked depending on whether or not the company is deemed to be compliant with the CSP requirements.
Termination, suspension or revocation of key official's personnel security screening Any termination, suspension or revocation of key personnel's security screening, (for example, a KSO or CSO), that may impact the security status of the organization. 30 day suspension. Revocation if unresolved. Organization will be suspended and given 30 days to submit the required information. The organization can be reinstated when personnel security screenings are confirmed for CSOs and KSOs.
30 day suspension and revocation (<2 years) Security breach Personnel from the organization accessing protected or classified information or assets without the proper level of security screening or "need-to-know". 30 day suspension. Revocation up to 2 years if unresolved. The type of information that was accessed and the resulting damage caused to the Government of Canada will determine the length of the revocation.
Unauthorized KSO accessing information KSOs of the organization, who have signed a KSO exclusion, accessing protected or classified information, assets, or sites. 30 day suspension. Revocation up to 2 years if unresolved. The type of information that was accessed and the resulting damage caused to the Government of Canada will determine the length of the revocation.
30 day suspension + revocation (<3 years) Providing false or misleading information The organization failing to provide accurate information to the program or any Government of Canada department, by way of either willful actions, or omissions as a result of neglect on the part of the organization which brings the trustworthiness or reliability of the organization into dispute. 30 day suspension. Revocation up to 3 years. The length of the revocation period will depend on the extenuating circumstances and may be higher for organizations who have previously committed offences documented by the CSP.
Criminal acts or convictions by key individuals Any criminal acts committed by CSOs, ACSOs or KSOs as a representative of the organization, while committing the act to benefit the organization or their standing in the organization. 30 day suspension. Revocation up to 3 years. The length of the revocation period will depend on the type of offence committed and the criminal conviction.
Acts of aggression Any aggressive behaviour such as shouting and using harsh language or harassment against the Crown, by KSOs, CSOs or ACSOs, which may be considered a breach of the anti-harassment provisions found in the Code of Conduct for Procurement.table 1 note 1 30 day suspension. Revocation up to 3 years. The length of the revocation period will depend on the extenuating circumstances and may be higher for organizations who have previously committed such offences documented by the CSP.
Failure to report changes to organization Failure to disclose changes to the organization which brings into question the trustworthiness or reliability of the organization or its contracts into dispute, including but not limited to changes in jurisdiction of registration, ownership, partners, bankruptcy, criminal convictions of the organization or of one of its owners, partners, officers or dissolution. 30 day suspension. Revocation up to 3 years. The length of the revocation period will depend on the extenuating circumstances and may be higher for repeat offenders.
30 day suspension + revocation (< 10 years) Criminal acts, charges or convictions committed by the organization Charges or convictions of offences such as, but not limited to, conspiracies, agreements or arrangements between competitors, bid rigging, bribery, extortion, forgery and other offences resembling forgery, fraudulent manipulation of stock exchange transactions, insider trading, falsification of books and documents, criminal breach of contract, secret commissions, overbilling, laundering proceeds of crime, participation in activities of criminal organization, foreign directives, false or misleading information, deceptive notice of winning a prize, false or deceptive statements regarding the Excise Tax and other offences to the Criminal Code including the Competition Act, Income Tax Act, Corruption of Foreign Public Officials Act, the Controlled Drugs and Substance Act and the Lobbying Act. 30 day suspension. Revocation up to 10 years. The length of the revocation period will depend on the extenuating circumstances and may be higher for repeat offenders.
Revocation Unmitigated high degree of foreign ownership or control influence (FOCI). The CSP's inability to adequately mitigate risks associated with FOCI, on the Canadian organization. FOCI refers to a situation where a company operating within a country's jurisdiction is subject to significant influence, control, or ownership by foreign entities. A high degree of FOCI can pose risks to national security interests, as it may lead to unauthorized access to sensitive information or influence over critical decisions. Revocation. The revocation will be permanent unless the CSP can adequately mitigate the risks associated to FOCI.

In the event that the CSP determines that the organization is not in compliance with the CSP (including but not limited to the above-listed circumstances), it may suspend the organization's security clearance and submit a letter to the organization advising it of the outcome of the assessment. Should the organization not make satisfactoryFootnote 9 amends in order to be in compliance with the CSP within 30 calendar days of being suspended, the organization's security clearance may be revoked.

Annex B: Guidelines for facility protection

I. Physical security

Organizations holding a DSC must establish an appropriate number of progressively restrictive zones to control access to protected and classified information and assets.

II. Types of secure zones

The first 2 types of zones listed below (public zone and reception zone) are not considered secure for safeguarding protected and classified information and assets. Their main purpose is to set up an initial base from which other secure zones can be developed.

A. Public zone

A public zone generally surrounds or forms part of an organization's facility. Examples include the grounds surrounding a building and public corridors and elevator lobbies in multiple-occupancy buildings. Boundary designators such as signs and direct or remote surveillance may also be used to discourage unauthorized activity.

B. Reception zone

A reception zone is located at the entry to the facility where:

  • the initial contact between the public and the organization occurs
  • services are provided
  • information is exchanged
  • access to restricted zones is controlled

To varying degrees, activity in a reception zone is monitored by the personnel who work there, other personnel or security staff. Public access may be limited to specific times of the day or for specific reasons. Entry beyond the reception zone is indicated by a recognizable perimeter such as a doorway or, in an open office environment, an arrangement of furniture and dividers.

C. Operations zone

An operation zone limits access to employees who are security screened at the appropriate level, and to properly escorted visitors. Operations zones should be monitored at least periodically, based on a threat and risk assessment, and should preferably be accessible from a reception zone.

D. Security zone

A security zone limits access to authorized employees who are security screened at the appropriate level. Security zones must be accessed from an operations zone and through an entry point and should be separated from an operations zone with a secure perimeter. A security zone must be continuously monitored by security-cleared personnel or electronic means.

E. High-security zone

A high-security zone controls access through an entry point and limits access to authorized, appropriately screened personnel and authorized and properly escorted visitors. High-security zones should be accessible only from security zones and are separated from security zones and operations zones by a perimeter built to the specifications recommended in a threat and risk analysis. High-security zones are monitored 24 hours a day, 7 days a week by security staff, other personnel or electronic means.

III. Elements of secure zones

  • Signs can be used to define secure zones and must include the term operations zone, security zone or high-security zone. Care must be taken in certain cases that the signage does not draw unwanted attention to a specific area or zone
  • The physical elements of a secure zone may vary. A security zone could also be an enclosed office to prevent unauthorized seeing or hearing of information
  • The definition of secure zones may vary according to the period of use during the day or week. For example, a reception zone during public access hours may be defined as an operations zone during restricted access hours, such as on weekends and at night
  • Physical security is more effective if measures, such as barriers, are adapted to normal operations as much as possible. Properly locating and segregating secure zones helps ensure functional use as well as control access
  • Access to secure zones must be limited to employees who are security screened at the appropriate level and to properly escorted visitors

IV. External areas and perimeters

A. External perimeter

Fences and free-standing walls define and control external perimeters. They are typically used where a facility contains valuable assets. Some types of fences and walls may also prevent unauthorized observation. They can compensate for security deficiencies in the building design, such as ground-level windows exposing information or areas.

B. Landscaping

Landscaping around a secure facility should:

  • Protect—by defining and securing the perimeters and by channelling personnel and the public
  • Detect—by allowing for easily identifiable controlled areas by reducing the opportunity for concealment, and by developing circulation routes that allow employee surveillance of the facility
  • Respond—by allowing unimpeded access to the facility for emergency response personnel and equipment

C. Parking lots

Parking lots should be designed to reduce the threat to the facility, its employees and visitors by:

  • channelling pedestrian traffic
  • easing surveillance of high-risk areas
  • discouraging the casual use of exit doors and shipping or receiving areas
  • prohibiting parking close to buildings

D. Security lighting

External security lighting is normally required to assist with surveillance and could include increased intensity, a specialized colour spectrum, or both, for identification purposes or closed-circuit television applications. Due to the technical complexity and the necessity to meet safety and other codes, qualified personnel should plan security lighting. The CSP will advise on the specific requirements.

E. Doors, windows and other openings

Access doors should be restricted to the smallest number possible. Windows should preferably be non-opening. All windows must be of sturdy construction and securely installed. Other perimeter openings, such as drains or utilities tunnels, must be secured. The CSP will advise on specific requirements and standards.

F. Emergency exits

Information and assets controlled by an organization are most vulnerable during an emergency. Measures must be implemented to ensure that emergency exit routes are adequately protected during an emergency and do not allow uncontrolled access to secure zones.

V. Security control centres

An organization granted a DOS or FSC with DSC may require a security control centre at each cleared site to monitor and control the status of security equipment and systems such as:

  • electronic access controls
  • intrusion detection systems
  • duress alarms
  • closed-circuit television systems
  • emergency communications systems
  • fire alarms
  • elevators

A security control centre may be operated by the facility, by a commercial agency under contract, or a combination of the 2, to provide full-time coverage. The security monitoring system must have the capability to operate independently of other facility monitoring systems.

VI. Control of access to secure zones

A. Reception

Entry points should be established to channel employees and visitors, verify employee identity and prohibit visitor entry until properly recorded and accompanied by an employee.

B. Personnel identification

Where organizations are large enough that personnel identification between employees becomes uncertain, employees should be required to wear cards that identify the bearer and/or access badges that allow entry to specified zones or facilities.

An identification card should contain the individual's photograph, name and signature, name of the issuing organization and a card number with an expiry date. It does not allow access, but merely identifies the bearer. Access requires an additional control such as an access list, knowledge of a combination, electronic access card or an access badge. An access list or access badge shows authorization only. Therefore, additional control procedures may be necessary to verify identity and regulate entry or exit.

Identification cards and access badges should be colour coded or marked in a way that quickly indicates clearance level and/or access authorization.

C. Organizations must:

  • establish procedures to verify cards or badges held by personnel and to withdraw cards or badges for cause
  • provide for the replacement of any or all cards or badges whenever a threat and risk assessment shows that this is necessary
  • set up a procedure for reporting the damage to, or the loss or theft of, personnel identification cards or access badges
  • maintain inventories of all cards or badges
  • replace personnel identification cards or access badges whenever personal appearance changes significantly from the photograph on the card or badge

D. Guards

Guards may be required to control access to secure zones where there is a need for personal interaction and judgment, or for quiet-hours patrolling and to provide a timely response to actual or attempted unauthorized entry or other emergency. Guards' response to alarms or emergency signals must be tested and be within a time limit evaluated as capable of preventing an intruder's access to the classified information being protected. Guards must be appropriately screened to the level of possible access to protected and classified information and assets. This does not include access resulting from the discovery of a security breach.

The CSP may recommend exceptions, on a case-by-case basis, based on an on-site inspection and a threat and risk assessment.

E. Electronic access control

Electronic access control devices can be used to record authorized entry and to deter unauthorized entry. An essential prerequisite for installing electronic access control devices is establishing a secure perimeter. Alternative measures must also be available when controls are out of service. Installed systems must comply with applicable building and fire codes and regulations.

F. Electronic intrusion detection

Electronic intrusion detection (EID) devices signal an alert on attempted unauthorized access. They can be used, in some circumstances, as an alternative to guards or to increase the efficiency of guards. They should be supported by a response capability related to the threat and risk assessment. EID devices are to be checked regularly to ensure reliable operations and alternate measures are to be available. To be effective, an EID should have a response force that will react within a reasonable timescale in the event of an alarm being given. The CSP can provide guidance to organizations on obtaining and installing EID devices.

G. Closed-circuit television

Closed-circuit television systems (CCTV)s broadcast only to selected receivers for surveillance and assessment purposes. CCTVs can also serve as a psychological deterrent and, when linked to a video recorder, serve as an aid in investigating incidents of unauthorized access. CCTVs can be used to improve guard effectiveness by extending their range of view and to assess the need for an immediate response to an alarm. Alternate measures must be available if the CCTV is out of service.

H. Interior access controls

In some circumstances, organizations may need to establish access controls and procedures within a facility to control and record entry to certain security or high-security zones.

I. Service spaces

Common service facilities such as general-use photocopiers should not be located in security or high-security zones. Circulation routes should be located to prevent the unauthorized viewing or hearing of protected or classified information. Public access service spaces, such as washrooms and cloakrooms, must be located outside of secure spaces.

Annex C: Guidelines for safeguarding information and assets

I. Secure environment

Organizations must effectively use restricted zones in an office environment to safeguard information and assets. Information about the types of secure zones is in Annex B: Guidelines for facility protection. Appropriate security procedures include:

  • respecting the need-to-know principle, having mechanisms to ensure that the proper personnel security clearances are in place, and respecting zone perimeters
  • escorting visitors
  • securing information and assets when leaving the work area
  • discussing information only when in the appropriate zone and with individuals who have a need-to-know and appropriate security screening
  • locating equipment, such as shredders, that can be used without leaving information and assets unattended
  • performing regular security audits
  • preparing and handling Protected C information and assets in a security zone or, if recommended in a threat and risk analysis, in a higher security zone
  • storing personnel security screening documentation containing personal information in a separate security file as protected information, not in the organization's general personnel files
  • safeguarding Protected B completed personnel security clearance questionnaires pending transmittal to the CSP and any adverse information regarding an individual

Contracts for statistical studies or surveys involving confidentiality, or other contracts for the collection of personnel information, will contain additional protection provisions.

II. Records management

Organizations must have a suitable location, such as a registry, to receive, distribute record and store protected and classified information and assets.

Organizations must keep records of the dates, names and transactions associated with all classified information and assets indicating the receipt, distribution, creation, reproduction and destruction within the facility. Organizations may keep records of all foreign Restricted information and assets if the requirement is included in the contract clauses.

All records of classified information and assets and all classified information and assets must be available for inspection by the CSP FISO.

A. Records office security

For protected and classified information and assets, registries, or parts of it, must follow these procedures:

  • be managed according to the highest security category of information being stored
  • ensure records employees hold the appropriate security status or clearance
  • file and circulate information in file jackets that indicate the contents and are marked according to the highest security category of information kept in it
  • manage areas where mail is opened as a security zone or high-security zone
  • limit the release of files to employees with the appropriate level of security status or clearance and a need-to-know
  • identify personnel with authorized access on an access list approved by the responsible manager (such as the project manager)
  • deliver mail marked "to be opened only by the addressee" to the intended recipient directly
  • ensure classified mail is opened only by the appointed authority within the facility responsible for its registration
  • protect foreign classified information in the same way as Canadian information of equivalent classification and store in a separate container. Contact the CSP for further advice and assistance by email at tpsgc.dgsssiprojetintl-dobissintlproject.pwgsc@tpsgc-pwgsc.gc.ca
  • implement special precautions to prevent unauthorized disclosure or access to non-Canadian nationals. Foreign classified information and information with restrictive markings such as “for Canadian eyes only” cannot be released to such persons without approval of the CSP
  • Contact the CSP by email at tpsgc.dgsssiprojetintl-dobissintlproject.pwgsc@tpsgc-pwgsc.gc.ca for assistance on any further restrictions regarding international and multinational contracts, programs or projects

III. Security markings

Protected and classified information must be appropriately marked using the following guidelines:

  • the size of the letters must be larger than those used in the text of the document
  • all materials (background information) used in preparing the documents must indicate the category
  • covering or transmittal letters, forms, or circulation slips must indicate the highest level of category or designation of the attachments
  • in addition to marking individual pages, documents must be appropriately marked on the outside of both the front and back covers
  • every sheet of loose pages must be marked
  • images such as charts, maps and drawings must be marked near the margin or title block with the marking clearly visible when the document is folded
  • security markings should include the applicable designation and the date at which declassification or downgrading is to occur, if it is determined at the time the information is created or collected

A. Protected and classified information

The following markings must be used for original documents and copies:

  • Protected A, B, or C must be written in the upper right corner of the face of the document
  • Confidential must be written in the upper right corner of the face of the document. Number each copy, show the copy number on the face of each copy, and maintain a distribution list
  • Secret must be written in the upper right corner of each document page. Number each copy, show the copy number on the face of each copy and maintain a distribution list
  • Top Secret must be written in the upper right corner of each page and show the total number of pages on all pages (for example, page 2 of 10). Assign a unique whole number to each copy, mark the copy number on each page and maintain a distribution list
  • Foreign government, European Union (EU), European Space Agency (ESA), NATO Classified information must be marked with both the foreign classification marking and the annotation to be treated as its Canadian equivalent. More information can be found in Chapter 9: International security of this manual and by contacting PSPC's CSP by email at dgsssiprojetintl-dobissintlproject@tpsgc-pwgsc.gc.ca.

B. Microforms

Microform is a generic term for any storage medium that contains micro-images. Organizations must implement the following procedures:

  • Assign the highest designation or categorization of the information contained on the microform
  • Mark protected or classified on microforms containing protected or classified information in eye-readable form, with the microform number and the total number of microforms

C. Electronic storage material

Electronic storage material includes items such as CDs, USB drives, removable hard drives, SD cards, microSD cards, phones, tablets, laptops.

Organizations must implement the following procedures:

  • Assign the highest designation or categorization of the information contained on the electronic storage material
  • Where possible, the security marking should be in both eye-readable and machine-readable form. If this is not possible, the security marking should be machine-readable
  • Removable storage material should bear standard labels. Where bypass label processing is allowed, procedures are needed to ensure that the proper item is loaded into the computer
  • Store material in the same manner as paper documents, when not in use

Refer to Chapter 7: Information technology security of this manual for further information.

The CSP can provide specific advice on how to mark various forms of electronic storage material by email at ssi-iss@tpsgc-pwgsc.gc.ca.

IV. Storage

As a minimum, protected A and B information and assets must be stored in a locked container such as cabinets, safes, vaults and/or secure rooms when located in an approved operations zone. Protected C information and assets and all classified information must be stored in an approved security container consistent with the RCMP Security Equipment Guide, when located in an appropriate approved zone (secret, top secret, Protected C minimum security zone). Protected or classified information and assets may be stored on open shelving in a secure room, only after inspection and approval by the CSP.

Foreign classified information must be stored separate from other forms of foreign or domestic classified and protected information. Protected and classified information and assets must not be stored in the same container as negotiable or attractive assets.

A. Keys for containers

Keys (devices such as cards, combinations and code numbers used to open and close containers) must be safeguarded at the highest security category of the information or assets to which they provide access. This also applies to recorded information that would allow a key to be produced. The CSO must control access to keys, combinations and code numbers, and keep distribution records.

Assigned keys should be changed at least every 12 months and when those with access to the container are transferred, released or no longer require access. The organization's security office must maintain a record of the dates of, and reasons for, all key changes.

Note

The key must be changed immediately when a container has been or is suspected of having been compromised.

B. Precautions

When protected and classified information and assets are removed from approved storage containers, organizations must ensure that they are not left unattended and that they cannot be viewed, or a discussion of it overheard, by persons not possessing the appropriate level of personnel security clearance or without a need-to-know.

For further advice and assistance, contact the CSP by email at tpsgc.ssidie-issiid.pwgsc@tpsgc-pwgsc.gc.ca.

C. Equipment

Organizations required to store protected and classified information and assets are permitted to purchase approved security equipment through PSPC. In consultation with the CSP, the CSO ACSO should determine the required equipment and submit the equipment purchase form. After the CSP endorses the request, it will be processed, however, the invoicing and delivery for the equipment is between the purchaser (the CSO) and the supplier. Examples of the most requested equipment available through this procedure are:

1. Filing cabinet with integral combination lock—Lateral (2-drawer)

Security steel, cap, filing cabinet with integral combination lock—lateral (2-drawer)

Model
global model FG36-2FCL
Dimensions
36 inches wide, 18 inches deep, 26.625 inches high
NATO stock number
7110-20-002-8735
2. Filing cabinet with integral combination lock—Lateral (4 drawer)

Security steel, cap, filing cabinet with integral combination lock—lateral (4 drawer)

Model
global model FG36-4FCL
Dimensions
36 inches wide, 18 inches deep, 26.625 inches high
NATO stock number
7110-20-002-8736
3. Filing cabinet—Security cabinet (2-drawer safe)
Dimensions
19 inches wide, 28 inches deep, 27.375 inches high
Weight
250 pounds
NATO stock number
7110-21-852-6693
4. Filing cabinet—Security cabinet (4-drawer safe)
Dimensions
19 inches wide, 28 inches deep, 51.375 inches high
Weight
450 pounds
NATO stock number
7110-21-852-6695
5. Locker safe
Dimensions
23.125 inches wide, 32.5 inches deep, 51.625 inches high
Weight
400 pounds (without cabinet)
NATO stock number
7110-21-108-0743
Note

Four drawer filing cabinet insert for locker safe is also available.

V. Packaging and transmitting

When transmitting protected and classified information and assets, organizations must safeguard its security during transmission with proper packaging, maintain a record while it's in transit and of its delivery. Contact the CSP by email at tpsgc.ssidie-issiid.pwgsc@tpsgc-pwgsc.gc.ca for information.

Records of distribution, circulation and return within the facility must include a signed receipt by the persons involved. Persons who have access to classified information and assets must be briefed on their responsibilities for protecting it and any special restrictions concerning its use or further distribution.

Protected and classified information and assets must be packaged and transmitted in a manner consistent with the RCMP's Transport and Transmittal Standards of protected and classified information. This includes hand carrying and/or bulk shipping specific protected and classified information and assets. The CSP FISOs can provide specific instructions.

For any international document transfer, including hand carriage, you must contact the CSP by email at dgsssiprojetintl-dobissintlproject@tpsgc-pwgsc.gc.ca for guidance and approval.

Annex D: Information technology security inspection process

I. Initiation

During the initiation phase of an IT security inspection, the CSP IT security inspector will contact the organization's CSO to discuss the upcoming inspection.

As part of the initiation phase, the organization will be expected to complete an IT security inspection checklist describing the IT system(s) it intends to use to store/process/create the protected and/or classified information associated with the contract. This checklist is not a pass/fail exercise, but serves as the key discussion tool for the on-site portion of the inspection. The scope of this document should only include a description of the IT system(s) to be used for storing/processing/creating protected or classified information associated with the contract. The CSO is expected to provide the completed IT security checklist and any supporting documentation to the IT security inspector within 30 days of receiving it.

Additionally, during the initiation phase of the inspection, if there is requirement for an on-site inspection, the IT security inspector will schedule a date and time for the inspection with the CSO.

II. The on-site inspection

During the on-site portion of the inspection, the IT security inspector will meet with the organization and evaluate its IT security posture for storing/processing/creating protected or classified information in support of the contract(s) for which inspections have been assigned.

The CSO or alternate company security officer (ACSO) must attend the on-site IT security inspection. If the CSO or ACSO is not an IT administrator for the IT systems being inspected, the CSP highly recommends that the organization has an IT administrator familiar with the system(s) attend the inspection. Additionally, it may be beneficial for the organization and the inspector to have a business expert, knowledgeable of the duties performed in support of the contract, available to answer questions.

During the on-site inspection, the IT security inspector will:

  • review the questions and responses provided on the IT security checklist and any supporting material
  • validate that any requirements of the contract as described in an IT technical requirements document (if existing within the contract) have been met
  • perform a walk-around of the IT system(s) in place for storing/processing/creating protected or classified information
  • ask to speak with personnel associated with contractual activities if required

During this inspection, the IT security inspector notes any findings where the organization may not be in compliance with the requirements of the contract, of the CSP, or of best business practices. For each finding, the inspector will make one or more recommendations to improve the IT security posture. These recommendations are made to the CSO during the inspection, as well as in a letter of recommendations following the inspection (Section IV. A: Letter of recommendations).

III. Off-site inspections

Where the inspection history and contractual requirements allow, the CSP IT security inspectors may perform off-site inspections. These inspections are performed in two ways:

  • As a telephone inspection with the requirement for an on-site follow-up, or
  • Through an attestation process

A. Telephone inspections

Telephone inspections operate in the same way as an on-site inspection, except that the IT security inspector will not perform a walk-around of the IT system(s) but rely on evidence.

B. Attestation process

If an organization has been inspected at the security level of the current contract within the previous two years and intends to use the same IT system(s), or system(s) configured identically to previously inspected system(s), the CSO will be asked to attest to the following:

  • the organization will use IT system(s) that were previously inspected and approved by the CSP
  • the organization has not made major changes to the IT system(s) since the previous inspection
  • there have been no breaches in security related to using the IT system(s) for storing/processing/creating protected or classified information
  • if the contract contains an IT security technical document, the organization is aware of this document and compliant with its requirements

The organization must also provide a completed IT security checklist for the current inspection to the IT security inspector.

IV. Post inspection

Two conclusions can result from an IT security inspection:

  • The organization is fully compliant with the requirements of the contract and the CSP, resulting in an approval letter (Section V. Approval), or
  • The organization is not fully compliant and recommendations have been made. Recommendations are made verbally to the CSO during the inspection and followed up with a letter of recommendations

A. Letter of recommendations

The letter of recommendations outlines the recommendations and/or suggestions made by the IT security inspector to the CSO. Upon receipt of the letter of recommendations, the CSO has 30 days to respond to them.

The CSO's response must describe the actions taken (or to be taken) by the organization to address each of the recommendations/suggestions in the letter. This document must be signed by the CSO and provided to the IT security inspector.

V. Approval

When an inspection has no findings and therefore no recommendations, or when an organization has provided a response to the letter of recommendations indicating its IT security posture has been upgraded to align with the specific contract security requirements, the CSP provides an IT approval letter to the organization and to the client department/client organization. The IT approval letter is only valid for the contract(s) inspected against, and is only valid for the duration of this/these contract(s).

The IT approval letter does not authorize the organization to use its IT system(s) for storing/processing/creating protected or classified information for any other contract.

An organization must not use an IT system to store/process/create protected or classified information before receiving authorization from the CSP or it will be in breach of one or more of the terms of the contract.

VI. Changes to information technology systems after an information technology security inspection

As noted in the IT approval letter, if an organization makes significant modifications to the inspected IT system(s), the CSP may suspend approval of these systems until re-inspected.

Organizations must notify the CSP if they intend to significantly modify the inspected IT system(s) over the course of a contract. The CSP will evaluate the modifications and determine whether to perform an inspection of the modified system(s).

Annex E: Guidelines for requests for visits

I. Requirements for requests for visits

There are different requirements for obtaining approval for RFVs, depending on the category.

A. Domestic visits

1. Canadian private sector organization to private sector organization visits
  • a)CSOs of registered Canadian private sector organizations can submit RFVs directly to other Canadian private sector organizations for employees who have a Canadian personnel security clearance at the required level. However, the CSP must process requests for visits involving:
    • foreign nationals, even though they may hold Canadian personnel security clearances
    • access to, or disclosure of, classified information requiring special access authorization, for example:
      • COMSEC
      • foreign classified information
      • NATO
      • other special-access or limited-access programs
  • b) Procedures for processing these RFVs:
    • organizations must complete the Request for visit form, plus confirm with the requesting CSO that their organization holds a valid FSC. CSOs should ensure that each visit has a unique identification or serial number
    • the host organization must receive the RFV at least 15 days before the intended visit:
      • in exceptional or emergency cases, visit arrangements can be made by telephone, provided all details are confirmed in writing
      • visitors cannot, under any circumstances, hand carry their own visit requests to the place being visited
    • if either the originating or host CSO is uncertain about the nature of the visit or the FSC of the other organization, they must contact the Contract Security Program's client service centre to verify this information
    • any loss or lowering of FSC by either organization must immediately be disclosed to the CSO of the other organization
    • the CSO initiating the request must immediately notify the host organization of any change in a visitor's status, which requires terminating the visit authorization
    • the CSO of the host organization can approve the request if all necessary conditions are met and notify the requesting CSO, either orally or in writing. If the visit is not approved, the CSO must also promptly notify the requesting CSO
2. Canadian private sector organizations to Canadian government visits

The Request for visit form must be completed and submitted to the CSP. Information on Submitting the request for visit form is available on PSPC's CSP website.

3. Canadian government to Canadian private sector organization visits
  • a) CSOs of registered Canadian organizations can process requests from departmental chief security officers of government departments and agencies for visits by their employees who hold Canadian personnel security clearances at the required level and have a legitimate need to discuss their classified contracts
  • b) Procedures for processing these requests for visits:
    • requests must be submitted using the Request for visit form CSOs should ask chief security officers to use the request form and ensure that each visit has a unique identification or serial number
    • the RFV form may be submitted by email, mail, fax or courier. Information on submitting the request for visit form is available on PSPC's website
    • the host private sector organization must receive the RFV at least 15 days before the intended visit:
      visitors cannot, under any circumstances, hand carry their own visit requests to the place being visited
    • if the host private sector organization's CSO is uncertain about the nature of the visit or the personnel security clearances of the proposed visitors, they must verify this information by contacting the Contract Security Program's Client service centre
    • the Chief Security Officer must immediately notify the host organization CSO of any change in a visitor's status, which requires terminating the visit authorization
    • the CSO of the host organization can approve the request if all necessary conditions are met and notify the requesting Chief Security Officer, either orally or in writing. If the request is not approved, the CSO must also promptly notify the requesting Chief Security Officer and inform the CSP

B. International visits

These visits include Canada to foreign locations and the foreign locations to Canada. The visiting organizations must get approval from their own country's designated security authority by completing and submitting the Request for visit form.

Information on Submitting the request for visit form for international visits is available on PSPC's CSP website.

II. Types of visits

One time, recurring and emergency visits

A one-time visit is for a specified, continuous period of time up to one year. A recurring visit is for a series of visits over an extended period of time, normally up to one year. An emergency request is for events of an urgent nature.

Project/program security instruction specific visits

Requirements for this category of visits are determined on a case-by-case basis. The CSP will notify Canadian private sector organizations of applicable procedures, if and when required.

III. Responsibilities

A. Host organization responsibilities

Organizations hosting classified visits are responsible for ensuring that no unauthorized disclosure occurs during the visit. Organizations cannot grant access to information classified higher than the level in the visit authorization, regardless of the level of the visitor's personnel security clearance. CSOs must ensure that the procedures are observed.

Identification and control of visitors

Organizations being visited must have an approved RFV, either from the CSP or the host CSO for Canadian organization to organization visits. The host CSO must verify that the organization requesting the visit has an FSC at the required level. This verification may be based on an existing contractual relationship involving classified information of the same or higher level or the CSP confirmation. Once the requesting organization's FSC status has been determined, the organization's CSO certification of each proposed visitor's personnel security clearance may be accepted.

The visitor's identity must be positively verified with photo identification before classified information is disclosed. If there is any question as to the validity of a visit request or identity of the visitor, organizations must contact the contract Security Program's client service centre for confirmation.

Host organizations must ensure that visitors only have access to classified information consistent with the authorized purpose of the visit. Foreign national visitors, whether from abroad or from Canadian organizations, must not have access except as provided for by the terms of the visit authorization. Foreign nationals must be escorted when given access to classified information consistent with the terms of the visit authorization and when in areas where classified information may be accessible. The escort should be a responsible, appropriately cleared employee who has been briefed regarding the visitor's access limitations or restrictions.

Classified material cannot be released to the visitor for removal from the host organization, except as provided for in Chapter 6.8: Transfer of information and assets of this manual.

Visitor records

Organizations must maintain a record of all individuals who visit the facility to access classified information. This record should be separate from the records of unclassified visits.

Records of authorized visits that have taken place must be kept by the host organization for a minimum of 2 years and can be randomly inspected by the CSP during that period.

A separate set of visitor records must be kept for NATO visits (Chapter 10: International organizations of this manual).

B. Visiting organization responsibilities

Visiting organizations must ensure that the:

  • host organization is given proper notification of and has approved the visit
  • recommendation of a minimum of 30 days' notice for visits to foreign countries is respected
  • host organization is aware of the purpose and classification level of the visit
  • two organizations agree on the administrative arrangements for the visit
  • visitors are fully briefed on the specific classified information and level authorized for disclosure during the visit, particularly during foreign visits
  • visitors only disclose classified information to host organizations that have the applicable level of clearance and a need-to-know
  • visitors transporting classified materiel must have the pre-approval of the CSP, observe the proper procedures, and ensure classified material is not left at the host organization except as specifically authorized (Chapter 6: Handling and safeguarding information and assets of this manual
  • visit arrangements are confirmed before departure

From: Public Services and Procurement Canada

Page details

Date modified: