Income Verification Services

Privacy Impact Assessment (PIA) summary - Information and Relationship Management Directorate, Strategy and Integration Branch

Overview and privacy impact assessment initiation

Government institution

Canada Revenue Agency

Government official responsible for the privacy impact assessment (PIA)

Yves Giroux
Assistant Commissioner, Strategy and Integration Branch

Head of the government institution or delegate for section 10 of the Privacy Act

Marie-Claude Juneau
ATIP Coordinator

Name of program or activity of the government institution

Income verification services

Description of the class of record and personal information bank

Standard or institution specific class of record:

Standard or institution specific personal information bank:

Legal authority for program or activity

Section 241 of the Income Tax Act allows the CRA to provide certain taxpayer information to any person, including a federal, provincial or territorial official, with the consent of the taxpayer. The legal authority that allows the provincial, territorial or federal government department to collect personal information and enter into an agreement with the CRA is specified in each written agreement.

Summary of the project / initiative / change

Individuals who apply for various provincial or territorial and federal income assistance programs have to provide proof of income. Examples of income assistance programs are drug cost assistance, housing, and student loans and grants. With the applicant’s consent, the Canada Revenue Agency (CRA) sends the proof of income electronically and securely to the partner government.

Risk identification and categorization

A) Type of program or activity

Administration of programs or activity and services 

Level of risk to privacy: 2

Details: The CRA gives personal information to partners with whom we have a written agreement to establish eligibility for benefits or assistance.

B) Type of personal information involved and context

Social insurance number, medical, financial or other sensitive personal information or the context surrounding the personal information is sensitive. Personal information of minors or incompetent individuals or involving a representative acting on behalf of the individual.

Level of risk to privacy: 3

Details: Most of the information used in the context of income verification fits into category 3 since it is personal data such as social insurance number, date of birth, address, marital status and financial information.

C) Program or activity partners and private sector involvement

One or several federal, provincial or municipal governments

Level of risk to privacy: 3

Details: Taxpayer information is exchanged between the CRA and other provincial, territorial or federal government departments. Details are outlined in a written collaborative agreement.

D) Duration of the program or activity

Long-term program

Level of risk to privacy: 3

Details: Income verification is a long-term program with no clear end. Individual agreements, however, end when partners’ programs change or stop. There is also a 10-year mandatory review of each agreement.

E) Program population

The program affects certain individuals for external administrative purposes.

Level of risk to privacy: 3

Details: The program affects the applicants of related provincial or territorial and federal income assistance programs.

F) Technology and privacy

Does the new or modified program or activity involve implementing a new electronic system, software or application program, including collaborative software or groupware, to support the program or activity for creating, collecting or handling personal information?

Risk to privacy: No

Does the new or modified program or activity require any modifications to IT legacy systems or services?

Risk to privacy: No

The new or modified program or activity involves implementing one or more of the following technologies:

Enhanced identification methods - this includes biometric technology (facial recognition, iris scan, gait analysis, fingerprint analysis, voice print, radio frequency identification, etc.) as well as easy-pass technology, new identification cards including magnetic stripe cards, smart cards (identification cards embedded with either an antenna or a contact pad that is connected to a microprocessor and a memory chip or only a memory chip with non-programmable logic).

Risk to privacy: No

Surveillance—this includes surveillance technologies such as audio and video recording devices, thermal imaging, recognition devices, radio frequency identification, surreptitious surveillance and interception, computer-aided monitoring including audit trails, satellite surveillance, etc.

Risk to privacy: No

Automated personal information analysis, personal information matching and knowledge discovery techniques - for the purposes of the Directive on privacy impact assessments, government institutions have to identify activities that use automated technology to analyze, create, compare, identify or extract personal information. These activities include personal information matching, record linkages, personal information mining, personal information comparison, knowledge discovery, information filtering or analysis. Activities involve some form of artificial intelligence or machine learning to uncover intelligence, trends or patterns or to predict behavior.

Risk to privacy: Yes

Details: Using file transfer protocol with Entrust encryption software, the federal, provincial or territorial partner gives the CRA information, such as the given name, surname, social insurance number and date of birth, to validate an individual’s identity. To get a high accuracy rating, the social insurance number and two of the three other elements must match. Once a match is made, the CRA sends the partner the type and number of data fields they agreed upon, using the same file transfer protocol.

G) Personal information transmission

The personal information is used in a system that has connections to at least one other system.

Level of risk to privacy: 2

Details: The CRA pulls personal information from its mainframe system and sends it to the partner organization using file transfer protocol with Entrust encryption software.

H) Risk impact to the individual or employee

Details: If personal data is compromised, it could cause financial harm and embarrassment to the individual.

I) Risk impact to the institution

Details: If information is accidently or deliberately discharged or compromised, it could cause embarrassment and loss of credibility and public trust to the CRA and its federal, provincial or territorial Partner.

Page details

Date modified: