Language selection

  • Français fr

Guideline on Service and Digital

About this guideline.

This Guideline on Service and Digital supports the Government of Canada in implementing the Treasury Board Policy on Service and Digital and Directive on Service and Digital , with advice, considerations, and best practices.

This Guideline is primarily for Government of Canada organizations to which the Policy applies (see subsection 6 of the Policy on Service and Digital ), but all federal departments and agencies Footnote 1 are encouraged to follow the advice provided, as appropriate. This evergreen Guideline was prepared by the Office of the Chief Information Officer (OCIO) of the Treasury Board of Canada Secretariat (TBS),  was informed by feedback received from departments and other stakeholders, and will be updated regularly to incorporate updated and additional policy guidance and considerations.

The Guideline has five sections that mirror the structure of the Policy and Directive. In each section, the requirements of the Policy and Directive are grouped into themes. For each theme, the Guideline provides information about:

  • what the theme means
  • why the theme is important
  • considerations in implementing the associated requirements of the Policy and Directive

On this page

Introduction, 1. integrated governance, planning and reporting, 2. client-centric service design and delivery, 3. open and strategic management of information and data, 4. leveraging technology, 5. supporting workforce capacity and capability, appendix a: policy on service and digital logic model.

  • Appendix B: Government of Canada Digital Standards

Appendix C: Client-Centric Services

Appendix d: information and data, appendix e: identifying and recognizing information and data of business value.

  • Appendix F: Guidance on Information Technology Provisions and User and Workpoint Profiles

The Policy on Service and Digital (hereafter ‘the Policy’) and the Directive on Service and Digital (hereafter ‘the Directive’) were approved by Treasury Board in July 2019, and came into  effect on April 1, 2020.

The Policy and Directive integrate, streamline and strengthen requirements for managing the following functional areas:

  • information
  • information technology (IT)
  • cyber security

The expected outcome of the Policy is that government operates, designs and delivers client-centric services using digital methods and tools.

Over the long term, digital transformation is expected to continually improve the government’s operations, services and client experience.

Appendix A of this Guideline includes the outcomes that departments are expected to achieve by fulfilling the requirements of the Policy and the Directive.

The requirements set out in the Policy and the Directive are guided by the overarching principles and best practices set out in the Government of Canada Digital Standards . See how the Digital Standards have influenced different requirements of the Policy and Directive in Appendix B of this Guideline.

The Policy must be applied in conjunction with other policies and legislation, including in the areas of privacy, security, official languages and accessibility (see section 8 of the Policy on Service and Digital ).

1.1 Designation of officials

1.2 integrated governance, 1.3 integrated planning and reporting, 1.4 enterprise architecture governance, 1.5 innovation and experimentation.

Governance establishes how the government exercises authority, accountability, leadership, direction and control.

The integration of governance, planning and reporting is an expected outcome of the Policy.

By integrating decision-making on service, information, data, IT and cyber security (at both the government-wide and departmental levels), impacts for each function are considered throughout the development of new initiatives. This approach prevents issues that might otherwise arise if they hadn’t been considered and improving the resulting operations and services.

1.1.1 Description and associated requirements

The Policy requires that the deputy head of a department or agency designate:

  • an official responsible for leading the departmental service management function
  • a departmental CIO
  • an official responsible for leading the cyber security management function

The Policy requires that the official responsible for the service management function and the departmental CIO have direct access to the deputy head (Section 4.1.3.5).

As a vacancy or a new position arises, deputy heads are to consult with the CIO of Canada in the early planning of replacing or appointing a departmental CIO. The CIO of Canada and delegates will ensure support from the IM/IT community, provide an enterprise-wide approach for talent management and demonstrate commitment to creating a more diverse and representative leadership cadre. Consulting means that when considering a candidate for a departmental CIO role, the CIO of Canada or delegates should be aware of, and or, participate in the selection process. Staffing from pools of qualified departmental CIO candidates established by the CIO of Canada may also be recommended.

Furthermore, as part of the process of identifying “feeder groups”, departmental CIOs are recommended to consider individuals identified during talent management exercises and collective pools led by the OCIO. As per Policy requirement 4.5.2.3, Deputy Heads are required to involve the participation of the CIO of Canada or delegates during the selection process and/or other measures which demonstrate meaningful consultation.

Requirements for departments under the Policy

Deputy heads are responsible for:

1.1.2 Why is this important?

Designating these officials will ensure clarity in their roles and accountabilities to the functional community they serve.

Designating specific roles for service and a Chief Information Officer will ensure focus and support for meeting clients’ needs.

Establishing a specific role for cyber security is important in securing government’s increasingly digital services and operations.

Within departments, these officials:

  • collectively support the deputy head in advancing functional areas
  • ensure that their responsibilities are fulfilled in a timely way throughout the planning, decision-making and design processes of a digital organization
  • collaborate with other officials within their organization in fulfilling their responsibilities

The benefits of designating officials for functional areas include:

  • a coordinated and strategic approach to management at the departmental level that supports deputy heads, with better advice on how the functional areas can help support departmental priorities that align with the Government of Canada direction
  • enhanced clarity in roles and related accountabilities for each functional area
  • a centralized perspective that allows for efficiencies across departmental program areas
  • increased linkages with other supporting functions across the department (service, IT, information, data, cyber security, privacy) that can improve services and operations while meeting privacy, security and other obligations

1.1.3 Considerations in implementing the requirements

  • determine who to designate for the service management, cyber security and CIO functions
  • assign these responsibilities at the level they deem appropriate, including assigning responsibility for more than one functional area to a single official
  • establish other related senior roles, such as chief data officer, if appropriate for their organization
  • their own functional areas, and functional authority for the IM/IT employees within the department 
  • for ensuring that departments have a coordinated response to various policy requirements
  • collaborating effectively with other departmental officials and functional communities (such as privacy protection) across the department to improve the department’s services and operations (integrated governance is one way to support these linkages and collaboration between functional areas (see subsection 1.1 of this Guideline)
  • The Policy requires that the departmental CIO and the official responsible for service have direct access to the deputy head, but how access is implemented may vary based on considerations such as the department’s size and mandate.
  • reporting directly to the deputy head
  • having regular bilateral or multilateral meetings with the deputy head
  • being a member of the executive committee or other governance committee chaired by the deputy head
  • communicating directly with the deputy head as needed

Considerations for designating an official responsible for leading a department’s service management function

The role for the official responsible for leading a department’s service management function could include the following:

  • promoting a centralized perspective on service, allowing for improved efficiencies in the department’s policy and program areas
  • planning and performance measurement activities
  • service inventory
  • service standards
  • service review
  • client feedback
  • supporting the deputy head in fulfilling departmental priorities
  • administrative policy requirements and other TBS direction
  • activities that stem from the service functional community
  • other functions (IT, information, data, cyber security, privacy protection) are leveraged
  • linkages are made to ensure a holistic approach to improving how service design and delivery are managed throughout the department

A deputy head is advised to not designate someone as both the Chief Financial Officer and the official responsible for leading the department’s service management function, as Subsection 4.1.10 of the Policy on Financial Management stipulates that Chief Financial Officers cannot be assigned non-financial corporate responsibilities that could compromise their objectivity.

In designating an official responsible for a department’s service management function, deputy heads can consider the following competencies:

  • leadership competencies
  • knowledge of departmental and government-wide governance frameworks (knowing the key partners and knowing where to go and when to go)
  • knowledge of departmental and government-wide services
  • familiarity with the service direction of the Government of Canada (that is, its priorities and strategies)
  • familiarity with Treasury Board administrative policy requirements related to service (the Policy on Service and Digital and related policy instruments)
  • knowledge of government obligations regarding IT, information, data, security, cyber security and privacy and how these relate to service
  • knowledge of the department’s clients and their needs and expectations
  • the ability, to collaborate and communicate
  • knowledge of strategic planning and performance measurement

Considerations for designating a CIO responsible for leading a department’s IT, information and data management functions

Departmental CIOs are responsible for managing information and IT, and they are to be involved throughout the life cycle of how services are designed and delivered in order to continually improve how client’s needs are met. To fulfill the requirements set out in the Directive on Service and Digital, the CIO is responsible for:

  • managing departmental information, data and IT
  • being a strategic voice at the executive table who advises on digitally enabled approaches to meet departmental and government objectives and business needs
  • align with the direction set by the Office of the Chief Information Officer of TBS
  • follow legislative and policy requirements for protecting privacy
  • supporting the department and senior leaders in open and digital transformation
  • ensuring that IT, information and data activities align with government-wide and departmental service priorities and strategies

In addition to “consulting with the CIO of Canada before appointing, deploying, or otherwise replacing the departmental CIO” (subsection 4.5.2.3 of the Policy on Service and Digital), deputy heads may consider the following when designating a departmental CIO:

  • knowledge of enterprise information and IT solutions and transformation in a dynamic and complex environment
  • knowledge of service, IT, information and data technology functions
  • knowledge of domestic or international partnerships to achieve departmental and government-wide outcomes
  • understanding of IT, information, privacy protection and data governance
  • understanding of work, workplace and workforce issues, trends, solutions and practices
  • understanding of emerging government-wide direction on digital services and their impact on the department
  • understanding of how the management of technology, information and data can help support and enable departmental and government-wide services

In discussions related to the appointment, deployment or replacement of a departmental CIO, deputy heads must ensure that “for the purposes of the Treasury Board Executive Group (EX) Qualifications Standard, the departmental CIO possesses an acceptable combination of education, training and experience” (subsection 4.5.2.4 of the Policy on Service and Digital). This requirement is mirrored at the government-wide level where the CIO of Canada is responsible for “providing enterprise-wide leadership on knowledge standards for the information and IT community, including determining the acceptable combination of education, training and experience required for the Treasury Board Executive Group (EX) Qualification Standard” (subsection 4.5.1.2 of the Policy on Service and Digital).

It is expected that CIO responsibilities in respect of information and data management would be carried out in close collaboration with other departmental officials, as necessary.

Deputy heads may also designate a Chief Data Officer (CDO) to support data governance and departmental capacity. CDOs can help leverage data to support the department’s objectives, in alignment with enterprise-wide priorities and CIO direction. CDOs can fall within the departmental CIO reporting structures or be separate and distinct. Where they are distinct,  the CIO and CDO are expected to work collaboratively, to support and to realize data and information policy requirements.

Considerations for designating an official responsible for leading the departmental cyber security management function

The Designated Official for Cyber Security (DOCS) is responsible for providing department-wide strategic leadership, coordination and oversight on cyber security, in collaboration with the departmental CIO and Chief Security Officer (CSO), as appropriate. The DOCS is responsible for:

  • ensuring that cyber security requirements and appropriate measures are applied in a risk-based, life-cycle approach to protect IT services, in line with the Directive on Security Management, Appendix B: Mandatory Procedures for information Technology Security Control
  • identifying and establishing roles and responsibilities for reporting cyber security events and incidents in accordance with section 5 of the Government of Canada Cyber Security Event Management Plan and subsection 4.1.6 of the Directive on Security Management , and undertaking immediate action if there is a privacy breach and implementing associated mitigation measures

It is recommended that deputy heads consider the following when designating a DOCS:

  • knowledge and awareness of domestic and international cyber security related trends, risks and their impacts
  • knowledge of Government of Canada and departmental policy instruments relating to cyber security, the department’s business context and threat environment, and the department’s overall cyber security posture
  • ability to enable strategic discussions regarding cyber security–risks, and to support integrated and informed risk management decisions at a senior official level

Taken together, these considerations are important because they provide deputy heads with an integrated view of government cyber security practices, risks and concerns.

The responsibilities of the DOCS are the same, regardless of the size of the department or agency Capacity should be considered when designating the DOCS to ensure that the designated individual can effectively fulfill their responsibilities. For example, the deputy head could designate the CSO as the DOCS. However, in larger departments and agencies, it may be preferred to have another senior official designated as the DOCS. In that case, specific responsibilities of the DOCS and the CSO in relation to cyber security would be defined in the integrated departmental governance structure.

1.2.1 Description and associated requirements

Integrated governance means that all pertinent officials from the different functional areas in the Policy  – service design and delivery, information, data, technology and cyber security – are brought together at government-wide and departmental decision-making tables. This allows them to convey considerations related to their functional area and have them reflected at all stages of development and implementation.

At the government-wide level, a deputy-level committee has been established to provide advice and recommendations to the Secretary of the Treasury Board and the Chief Information Officer (CIO) of Canada on strategic decisions regarding:

  • managing external and internal enterprise services, information, data, IT and cyber security
  • prioritizing Government of Canada demand for IT shared services and assets

The CIO of Canada is responsible for providing advice to the Secretary and President of the Treasury Board of Canada on these matters, as outlined in the following requirements:

Requirements for the Treasury Board of Canada Secretariat (TBS) under the Policy

The Secretary of the Treasury Board of Canada is responsible for:

The Chief Information Officer (CIO) of Canada is responsible for:

At the departmental level, deputy heads are required to establish integrated departmental governance to ensure the efficient and effective integrated management of these functions within their organizations.

Requirement for departments under the Policy

1.2.2 Why is this important?

Integrated governance ensures that perspectives from all of the relevant functional areas are considered proactively in the development of government initiatives. This allows officials to draw connections between different functional areas and make decisions strategically in support of a more efficient, high-quality, and well thought-through suite of programs and services. It also ensures activities in each area of management are aligned with clear business outcomes (for example, service, operations). This approach allows decision-makers to identify issues at the outset or early in the process of any initiative to enable course correction.

Supporting the implementation of a government-wide approach to digital requires integrated discussions so that the focus is on:

  • business needs, including improving services to clients
  • ensuring the sustainability and security of technology (for example, replacing legacy systems)
  • ensuring data and information are complete, available and usable, when needed.

1.2.3 Considerations in implementing the requirements

  • All departments are different – whether in  size, mandate, sector or nature of work – so consider developing a governance structure that is appropriate for the specific department.
  • Consider leveraging existing bodies within the organization (either by integrating them or making clearer linkages between them), as long as their governance structure allows decision-making to be carried out in a way that is integrated with other areas of management.
  • The scope of integrated governance should address how the department manages service, information, data, IT and cyber security (as required by the Policy).
  • horizontal trends and issues that affect departmental service delivery and operations, to better support individuals’ and businesses’ access to services that are client-centric, trusted and secure;
  • horizontal strategic and operational uses of information and data within the organization, consistent with privacy requirements and following government-wide direction; and,
  • horizontal strategic and operational uses of IT (including cyber security considerations) within the organization, following government-wide standards and direction.
  • Although there is no formal reporting relationship between departmental governance and the enterprise governance committee, a consider having your deputy head bring forward issues discussed at the departmental integrated governance committee to the enterprise governance committee (when appropriate)  to promote government-wide efficiencies.
  • Consider linking decisions made on technology, information, data and cyber security to a clear business outcome and improved service.
  • The Policy and Directive are primarily focused on specific areas of management, but the benefits of integrated governance are not limited to these areas of management. Consider how to integrate other horizontal areas – such as openness, inclusion, accessibility, security, privacy, and choice of official language – to benefit the organization.

1.3.1 Description and associated requirements

The three policy requirements under this theme focus on the integration of planning and reporting for service, information, data, IT and cyber security.

Requirement for TBS under the Policy

The CIO of Canada is responsible for:

The Policy requires the CIO of Canada to produce an integrated government-wide plan that:

  • provides overarching enterprise-wide direction for managing service, information, data, IT and cyber security
  • is issued annually and covers the next three years
  • includes a progress report that provides a measured assessment of how the plan for the previous year was implemented

The Policy requires deputy heads of departments to produce an integrated departmental plan that:

  • provides overarching direction for the integrated management of service, information, data, IT and cyber security within their organization
  • is informed by subject-specific plans, such as a dedicated service, information management, data, IT, or cyber security plan as appropriate, where more specificity and detail may be required
  • is aligned with the CIO of Canada’s enterprise-wide integrated plan
  • includes a progress report that will provide a measured assessment of how the previous plan was implemented

Requirement for departments under the Directive

Departmental CIOs are responsible for:

This requirement mandates departmental CIOs to produce:

  • a departmental IT expenditure report
  • data to support the ongoing Application Portfolio Management program

1.3.2 Why is this important?

Integrating planning and reporting across service, information, data, IT and cyber security:

  • supports effective planning and better decision-making by articulating clear and tangible instructions for departments
  • enables assessment of government performance against various priorities such as service improvement, release of open information and legacy migration
  • provides for a more holistic approach to planning and reporting, which allows key interdependencies to be identified, including identifying systems that have limited business value and opportunities to reallocate investments in areas that support service delivery
  • ensures that client-centric services to Canadians are supported by establishing, measuring and assessing performance against targets

1.3.3 Considerations in implementing the requirements

Departments will be expected to provide integrated plans following instructions from TBS, once they become available. TBS, in collaboration with departments, will be developing additional and updated guidance and tools to set out expectations for integrated planning and reporting.

Integrated departmental plan

A departmental integrated plan is to:

  • outline how service, information, data, IT and cyber security will be managed together within the department
  • balance departmental priorities against the CIO of Canada’s government-wide plan that provides the strategic direction and priorities for the Government of Canada with respect to the same areas of management

Departments’ progress in achieving the strategic goals outlined in the CIO of Canada’s enterprise plan will be tracked, evaluated and reported on annually at the enterprise level. Departments, through their integrated plans, will detail how the enterprise approach will be implemented within their organization.

Departments’ integrated plans will be leveraged to support enterprise priorities, such as:

  • improving services provided to Canadians
  • providing sound information and data stewardship
  • ensuring secure and sustainable IT infrastructure and systems

 IT Expenditure Report

Departments will also be asked to produce an IT Expenditure Report, supplemental to the integrated departmental plan.

In 2011, the Comptroller General of Canada and the CIO of Canada jointly issued a request to some departments for information on departmental IT expenses. TBS asked those organizations to:

  • use a “high-level” expenditure model to create a baseline for Government of Canada IT expenses, starting with data from 2009–10
  • maintain this data for each fiscal year on an ongoing basis

Collection of such information has continued as the IT Expenditure Report, which collects departmental spending on IT by fiscal year and helps inform decision-making.

Context and guidance for departments on developing an IT Expenditure Report is available on the IT Expenditure GCwiki page (available only on the Government of Canada network).

Application Portfolio Management Program

Departments will also be asked to provide data to support the TBS Application Portfolio Management Program which will supplement the integrated departmental plan.

The TBS Application Portfolio Management Program aims to:

  • improve the maturity of application portfolio management practices across government to provide a holistic view of the Government of Canada applications landscape, related risks and investments
  • support government-wide strategies on the renewal and ever-greening of aging applications that are economical and that ensure continued services to Canadians
  • direct investments towards government priorities, by implementing as part of investment planning, multi-year planning for applications that are interlocked with corporate risk
  • populate Shared Service Canada inventories to help provide responsive and tailored client support

Context and guidance for departments on developing an Application Portfolio Management Report is available on the GCwiki Application Portfolio Management (APM) page (available only on the Government of Canada network).

Other considerations in implementation: broader alignment

In addition to ensuring integrated planning to manage service, information, data, IT and cyber security, other Treasury Board policies require deputy heads to ensure alignment with other areas of management, such as financial management and investment planning, including project management, procurement, materiel management and real property. For example, it is recommended that a department’s capacity for the following be considered in setting strategic direction, prioritization and impact:

  • financial management
  • investment planning
  • procurement and project management
  • capacity of service providers
  • change management

1.4.1 Description and associated requirements

Enterprise architecture (EA) is a conceptual blueprint that defines the structure and operation of an organization while considering and aligning business, information, data, application, technology, security, and privacy domains to support strategic outcomes. EA leads an organization toward an integrated and unified enterprise system that is better positioned to create business value and address organizational silos.

Governance for EA at the enterprise level is conducted through the Government of Canada Enterprise Architecture Review Board (GC EARB), which oversees the implementation of the EA direction for the Government of Canada. The objective of enterprise-level EA governance is to ensure that departmental vision and standards are aligned with Government of Canada EA requirements.  

Requirements for TBS under the Policy

The Directive on Service and Digital outlines when departments must appear before the GC EARB and how to establish their own departmental architecture review board (DARB).

Requirements for departments under the Directive

The departmental CIO is responsible for:

1.4.2 Why is this important?

EA supports a coordinated approach by providing an integrated view of IT spending and priorities that will help the government optimize its IT investments. Enterprise architecture ensures better coordination, within and between departments, that:

  • prevents duplicative spending
  • increases cost efficiencies through sharing lessons learned, procurement vehicles, and investments
  • increases interoperability
  • provides more cohesive government services
  • addresses security and privacy considerations

EA governance at the enterprise level ensures that all departmental digital initiatives that meet criteria of subsection 4.1.1.2 of the Directive on Service and Digital:

  • are reviewed at the GC EARB
  • align with Government of Canada EA standards (see the Directive’s Appendix A: Mandatory Procedures for Enterprise Architecture Assessment and Appendix B: Mandatory Procedures for Application Programming Interfaces )

1.4.3 Considerations in implementing the requirements

To ensure clear direction and guide departments on aligning with government-wide direction and strategies for EA, mandatory procedures are included in the Directive on Service and Digital in:

  • Appendix A: Mandatory Procedures for Enterprise Architecture Assessment : provides an assessment framework to review digital initiatives to be used by DARBs and the GC EARB.
  • allow communication between IT services
  • enable interoperability

Departmental Architecture Review Boards

The Directive requires that the departmental CIO is responsible for chairing a Departmental Architecture Review Board (DARB) and submitting architecture review board proposals to the GC EARB. The composition of DARBs should reflect integrated governance for the department that touches on IT, IM and data, service and cyber security. 

Making a Proposal to the GC EARB

  • Conduct a self-assessment against the criteria  in subsection 4.1.1.2 of the Directive on Service and Digital.
  • If one or more of the criteria apply, the proposal is to be submitted to the GC EARB.
  • Ensure that the proposal follows the review of concept cases for digital projects, before the development of a Treasury Board submission or a Departmental Business Case. Refer to the Mandatory Procedures for Concept Cases for Digital Projects and the graphical representation of the governance steps to be followed for digital projects.
  • Ensure that the proposal meets the requirements of Mandatory Procedures for Enterprise Architecture Assessment and Mandatory Procedures for Application Programming Interfaces .
  • Bring the proposal to your DARB for assessment, before submitting it to the GC EARB.
  • Once the DARB has assessed the proposal, the presenter can complete the GC EARB Presenter Template and submit the proposal by email to the Enterprise Architecture Team in the Office of the Chief Information Officer at the Treasury Board of Canada Secretariat.
  • Once received, the proposal is reviewed by the Enterprise Architecture Team against the requirements of the Mandatory Procedures for Enterprise Architecture Assessment .
  • provides feedback to the presenter on the proposal in advance of the presentation at the GC EARB
  • briefs the GC EARB co-chairs
  • The GC EARB co-chairs review the final proposal. If there are no issues, the GC EARB secretariat will invite the departmental contacts to present their proposal at a regularly scheduled meeting of the GC EARB.

For more information, visit the GCwiki Enterprise Architecture Review Board web page (available only on the Government of Canada network), which includes information such as the GC EARB’s agendas, past sessions, and other useful links and resources.

Additional resources include:

  • business architecture
  • information architecture
  • application architecture
  • technology architecture
  • security and privacy architecture

The group’s resources include:

  • target architectures developed by departments (requires an account to access this content)
  • a draft Government of Canada Service and Digital Target architecture (requires an account to access this content)
  • GC Enterprise Architecture wiki .This page provides details on the various layers of EA.

1.5.1 Description and associated requirements

 Implementing innovation and experimentation can be complex in a context where enterprise-wide standardization is prioritized to achieve increased interoperability and other government-wide outcomes, such as improved government services and operations.

In TBS’s Experimentation Direction for Deputy Heads: December 2016 , experimentation is defined as “testing new approaches to learn what works and what does not work using a rigorous method.” This direction identifies possible features that an experimentation project could have, as well as potential innovative approaches, including tools and methods. In this direction, innovation is regarded as finding new ways to address problems. Experimentation is vital to innovation because turning an idea or concept into a meaningful reality must be tested before release.

At the government-wide level, the CIO of Canada plays a role in facilitating this process by providing tools and guidance in support of innovation and experimentation, including establishing guidance on open-source and open-standard applications, and agile application development.

At the departmental level, the process of providing the appropriate level of support to take an idea, refine it, experiment with it and turn it into a real solution is what this requirement is about.

The deputy head is responsible for:

1.5.2 Why is this important?

Technologies are constantly changing and the operational necessities of managing an organization present little opportunity to research and implement new technologies. Therefore, deputy heads need to support specific activities to review, assess and potentially adopt new methods to better support departmental priorities and improvements to services and operations in the long run.

The benefits of exploring innovation and experimentation include:

  • finding new ways to address persistent problems that traditional approaches have failed to solve
  • generating evidence to learn what works and it inform decision-making
  • delivering services to the public using tools that are modern and effective to meet client expectations
  • empowering employees to bring forward new ideas
  • keeping pace with rapidly evolving technological changes and avoiding the use of outdated tools

1.5.3 Considerations in implementing the requirements

The government is committed to devoting a fixed percentage of program funds to experimenting with new approaches and measuring impact. However, additional methods that deputy heads can use (based on their department’s size, mandate and other factors) include:

  • internal activities (e.g., Dragons’ Den-style events, hackathons)
  • supporting structures (e.g., innovation hubs)
  • employee-focused activities (e.g., awareness, time allotments, training)

In providing support for innovation and experimentation, departments could consider:

  • developing proofs of concept and pilot projects as a way to learn quickly before launching on a full scale
  • creating an environment that supports cross-departmental collaborations
  • creating a research and development team with operational resources frequently rotating in and out
  • developing an environment that allows for the isolated execution of software or programs for independent evaluation, monitoring or testing, without affecting the application, system or platform on which they run (sandbox environments) to enable the safe incubation of disruptive projects
  • using fictional data (data created from scratch that do not include personal information and that do not represent or identify Canadian citizens) in innovation and experimentation solutions to eliminate risks of information exposure or privacy breaches
  • using modern and agile practices in software development to reduce implementation timelines
  • leveraging open-source and open-standard applications to avoid duplicating efforts and allow for community-based improvements
  • partnering with external stakeholders such as universities to establish events such as hackathons (using open data) to help innovate

Pilots and proof of concepts can be submitted to the GC EARB for review and assessment. GC EARB provides recommendations on new processes and technology when conducting assessments. Subsection 1.4 of this guideline has more information on GC EARB assessments.

In order to share and promote innovation and experimentation broadly within the Government of Canada, and to showcase successful practices and learn from challenges, departments should incorporate activities for their innovation and experimentation projects into their departmental planning processes.

Innovation and experimentation activities, as for any other activities undertaken in departments, must comply with all related laws and Treasury Board policies, including requirements for privacy protection, security and accessibility.

Departments should use fictional data instead of collecting, using or disclosing personal information in an experimental context. Contact your institution’s Access to Information and Privacy (ATIP) office to discuss the requirement for a Privacy Impact Assessment, as required by the Directive on Privacy Impact Assessment . Subsection 3.6 of this guideline has more information on specific considerations related to privacy and protection of personal information.

It is also important to prioritize security at the outset of innovation and experimentation activities. For more information on security considerations, see subsection 4.1 of this guideline. In the context of cloud, additional security controls may need to be considered in order to satisfy departmental requirements. For more information on security considerations related to cloud services, see subsection 4.3 of this guideline.

There is also an opportunity to experiment with new ways of enabling accessibility across the government, whether it is related to accessible information and communication technology or creating accessible documents from the outset. See subsection 3.5 of this guideline for more information on accessibility requirements.

In line with the requirement of the CIO of Canada to support innovative practices and technologies, including open-source and open-standard applications and agile application development, further guidance on Open Source Software and an Open First Whitepaper are available for departmental use. Departments that are interested in additional research and guidance for open source in government can join the TBS-led FLOSSING (requires an account to access this content) community of practice.

2.1 Client-centric services

2.2 client feedback and satisfaction, 2.3 online services, 2.4 real-time application status, 2.5 service inventory, 2.6 availability of service inventory on the open governmental portal, 2.7 service standards, 2.8 review of service standards, 2.9 real-time service performance information, 2.10 service review.

Every day, the Government of Canada delivers a broad range of services to Canadians. Excellence in designing and providing services promotes confidence in government and contributes to the efficient and effective achievement of public policy goals and better services for Canadians.

In an effort to continually improve its services, the Government of Canada has adopted a vision where:

  • client needs and feedback are at the centre of service design and delivery
  • services are simple, seamless, transparent, digitally enabled, and available anytime and anywhere

Among the expected outcomes of the Policy on Service and Digital is the development of departmental capacity to facilitate client-centric service design and delivery.

This section outlines the following key components:

  • implementing client-centric service design, delivery and improvement
  • maximizing the availability of end-to-end online services to complement all service delivery channels
  • establishing a departmental service inventory that is updated annually
  • developing service standards, related targets and performance information
  • undertaking service reviews

Appendix C   contains information on service definition, identification and types of services.

This section of the guideline replaces the guidance provided in the Guideline on Service Management, which was developed in support of the Policy on Service.

2.1.1 Description and associated requirements

Client-centric services focus on addressing client or user expectations, needs, challenges and feedback. Such services create a positive experience for the client or user and consider several factors, such as:

  • accessibility
  • choice of official language

A service-oriented government puts clients and their needs as its primary focus. A central component of this approach is understanding the needs of clients (whether external or internal to government) and building services around clients rather than concerns about organizations or silos.

2.1.2 Why is this important?

 Placing clients at the centre of the service design and delivery process allows government to better understand the public’s needs, and tailor services accordingly. A successful digital government continually improves how it designs and delivers services to improve the lives of its citizens, while maximizing the opportunities presented by information and technology to do so.

2.1.3 Considerations in implementing the requirement

When designing services, departments should consider several factors related to client-centric service, including the following:

Clients increasingly expect to access the services they need, when and where they want, whether it be online, by phone or in person. This requires an omni-channel approach for all services in order to:

  • offer Canadians an integrated client experience
  • enable the modernization of Government of Canada services
  • provide a barrier-free service experience for persons with disabilities

Departments can leverage technology and automation across all service delivery channels, including in-person services and call centres, to increase their efficiency and improve the client experience.

  • OneGC is the enterprise approach to enable seamless service delivery through interoperable systems, data-sharing and greater integration between services. OneGC is the umbrella under which common technology solutions and experimental service initiatives are pursued, in support of the digital government vision, where services are optimized for digital and are available anytime, anywhere and from any device.
  • The use of digital identity to identify and authenticate users and provide them with more seamless and secure enrolment and access to online services. See subsection 4.7 of this guideline for more information.

As the Government of Canada builds its capacity to offer more efficient client-centric services, there is an opportunity to bring about a culture shift to foster greater social inclusion. Such inclusion improves the participation of groups in society, particularly for people who are disadvantaged, by enhancing opportunities, access to resources, greater participation and respect for rights. Further information is available in see the Inclusive Design Guide prepared by the Inclusive Design Institute (IDI) .

Accessibility

When designing services, departments are to ensure that they are barrier-free for all clients by making them inclusive, accessible by default and usable by the broadest range of employees and the public without special adaptation. Footnote 2 See subsection 3.5 of this guideline for more information on specific considerations related to accessibility.

ESDC’s Accessible Client Service Centre of Expertise has been working with partners to develop tools to support ESDC become more accessible. These tools can be used more broadly to support the government-wide effort.

When designing services, departments are to:

  • a highly mobile workforce
  • shared service delivery
  • incorporate best practices in security management

Building cyber security into any government technology strategy is essential to ensuring continuity of service and safeguarding citizens’ private information. Consolidated programs, online end-to-end services and “tell us once” approaches increase the importance of cyber security, as information that is more consolidated or connected can intensify the potential impacts of security breaches, including privacy breaches (for example, a privacy breach for one program could put client information from many programs at risk). See subsection 4.6 of this guideline for more information on specific considerations related to cyber security.

The requirements of the Privacy Act , the Privacy Regulations and associated policies for the effective protection and management of personal information must be integrated throughout the design and delivery of services and systems. These requirements include:

  • limiting the collection of personal information to only what is directly related to delivering a service
  • ensuring that clients are notified in advance about why their personal information is being collected and how it will be used
  • ensuring that personal information is used only in ways that have been communicated to clients
  • sharing personal information only as permitted by law
  • keeping personal information only for as long as required

See subsection 3.6 of this guideline for more information on specific considerations related to privacy.

Whether services are provided in person, by telephone or online, it is important that they be simple so that they are easy to use for the client or user. Various factors contribute to this experience, including using:

  • clear language
  • appropriate formats
  • simplified interaction processes
  • user-friendly guidance (text boxes, YouTube videos, pamphlets) when necessary

Official languages

When designing and delivering services, departments must:

  • support activities that benefit members of both official language communities
  • respect the obligations of the Government of Canada as set out in the Official Languages Act , including ensuring that services are made available in both official languages
  • comply with the Policy on Official Languages .

2.2.1 Description and associated requirements

Client feedback is information directly from recipients of services about their satisfaction or dissatisfaction with a service or product. It is a key part of service design and improvement and can take several forms, including:

  • in-service client feedback
  • client satisfaction surveys
  • user experience design and testing
  • consultations

The designated official for service , in collaboration with other officials as necessary, is responsible for:

2.2.2 Why is this important?

Client feedback is a critical input into ensuring that services meet the needs of clients and to support continual improvement. It serves several key purposes, including:

  • identifying areas of service design and delivery that require improvement
  • providing an opportunity to establish trust relationships between clients and the organization by responding to client needs in addressing service-related challenges
  • increasing operational efficiency and effectiveness, and improving service outcomes, by identifying and addressing systemic service delivery issues
  • contributing to the overall evaluation of client satisfaction with the organization’s services

2.2.3 Considerations in implementing the requirement

  • Client feedback mechanisms can include various formal or informal methods or tools to collect feedback from clients and resolve service issues not related to decisions or appeals

Examples of feedback channels include:

  • an ombudsman
  • a generic departmental email or social media account
  • questionnaires during service delivery
  • the use of analytics tools

Client feedback mechanisms allow departments to receive and manage input from clients and involve recording, processing, responding to and reporting on the input received. These mechanisms are used after a service or product has already been launched to support improvements on the service or product. They are distinct from user experience design, which supports the development of services and products that provide meaningful and relevant experiences to users.

Client feedback mechanisms do not replace independent measures of service performance such as service standards or internal operational performance measures (for example, completion rates, time to completion of application, abandoned applications or calls, etc).

When services are delivered by a group of partners (such as Canadian or international organizations, or other levels of government such as provinces, territories and municipalities), departments are to work with them to develop and process client feedback.

Feedback mechanisms are used to manage a broad range of client experience information and usually employ several methods across all service delivery channels (in person, telephone and online), both prompted and unprompted. For example:

  • feedback mechanisms that involve prompting users for input include offers to participate in an exit survey
  • an unprompted method could include a “contact us” section that includes a web link, generic email and/or telephone number to contact the department

When departments seek client feedback, they should consider the Government of Canada’s public engagement principles .

Information received through the feedback mechanism can be classified into two broad categories:

  • General feedback used to improve services, including future service improvement work plans
  • More specific feedback or complaints on service delivery issues that are likely to require interaction or follow-up with a client, with varying degrees of urgency

Addressing service issues

A service issue refers to a challenge that a client is experiencing at any point in the process of receiving a service. It does not relate to recourse related to a decision or a formal appeal process.

Resolving service issues quickly, even when they are minor, is important to providing an overall positive service experience for the client. How quickly these issues are resolved will depend on their complexity and the operational circumstances of the organization. Examples of service issues include:

  • seeking clarification on what information is required to submit a complete application
  • overcoming difficulty with a web page, registering or authenticating a departmental account, or submitting an application
  • enquiring about the status of an application

Service issues are routinely raised with client service officers during normal client interactions and can usually be resolved quickly, to the clients’ satisfaction or understanding during the initial contact. To the extent possible, these interactions should be recorded to inform service management improvement in a manner consistent with section 3.6 (Privacy and protection of personal information) of this Guideline.

Determining whether an issue identified by a client is eligible for consideration under a particular client engagement mechanism can help avoid wasting resources on a misunderstanding or a wrongly directed concern. For example, clients should be directed to use general feedback channels to raise service delivery issues and to contact an ombudsman (or similar mechanism) to make a formal complaint or to dispute the outcome of a service request, such as ineligibility for a benefit.

A client’s perceptions of service delivery may be influenced by the outcome of the service. For example, even if the delivery of the service met or exceeded established service standards, a client may perceive the experience as negative if the outcome is negative, such as a denial of a benefit for not meeting eligibility criteria, or being informed of an unfavourable tax assessment. In these cases, the outcome of the transaction is influencing the client’s satisfaction with the service.

Depending on the service, a single method may be appropriate for collecting feedback and resolving service issues.

When there is a large volume of services and transactions, a specific office dedicated to client feedback and service resolution, such as an office of client satisfaction, could be considered.

Examples of client feedback methods include:

  • generic links for comments, compliments and complaints on the organization’s web presence
  • a web pop-up during or after service delivery interactions
  • a service agent recording verbal input during an in-person or telephone visit
  • an electronic kiosk at in-person centres where feedback can be submitted
  • a service exit survey
  • an external stakeholders reference group
  • public opinion research (for example, client satisfaction surveys)

Examples of methods to resolve client-service issues include the following:

  • an online live chat function
  • online co-browsing with a service agent
  • a telephone or in-person conversation with a service agent
  • a departmental response to the client via email
  • reference to a repository of frequently asked questions

Characteristics of effective client feedback mechanisms

  • Does the department proactively provide information to clients about how to provide feedback through all service delivery channels? How is this information disseminated?
  • Are there suitable arrangements to allow people with disabilities to provide feedback or raise issues?
  • Broad in scope: Feedback mechanisms designed to obtain a representative response from all client groups will provide more balanced feedback and allow for better overall service management. Such mechanisms may involve multiple feedback methods targeted at different clients to maximize the diversity of views and effectiveness of service improvement responses. Beware, however, of response biases, which can occur in situations of voluntary response, where those who care enough to respond may have either extremely negative or positive opinions, and may not necessarily be a statistically representative sample of the actual population. Implementing change to respond to client feedback also requires a strategic, whole-system approach, including considering the impact of improving results in one area of performance or another. For example, focusing on reducing transaction time to improve client satisfaction may, if not carefully considered, negatively impact service quality, in turn resulting in lower client satisfaction.
  • Is guidance on using the feedback mechanisms available for clients?
  • Is the format and language used to collect feedback easily understandable by the service’s target clients?
  • Are written procedures or guidance on feedback and mechanisms to resolve issues available to employees?
  • Does the department review guidance and feedback procedures regularly?
  • Has the department designated staff to help address client feedback issues?
  • Do the procedures set out clear responsibilities for designated staff?

All employees who deal with clients regularly should receive training in service excellence, including how to handle various issues. Such training could include instruction in negotiation, alternative dispute resolution, and dealing with difficult people. Consider the following:

  • Do procedures allow employees to provide immediate resolution, where appropriate?
  • If employees cannot deal appropriately with an issue immediately, do the procedures identify the key steps for conducting a full review and for providing a full final reply?
  • Are there standardized procedures for dealing with various types of issues and for each step in responding to clients, such as acknowledgment, interim reply and final reply?
  • Does the department’s client relations management system allow employees to access information about an issue quickly?
  • Privacy risks mitigated: Feedback processes and mechanisms must respect privacy requirements, in accordance with the Privacy Act , the Privacy Regulations and related policies. Staff involved in the feedback process must be aware of their privacy obligations when collecting and using feedback. Unauthorized collection, use, retention or disclosure (including sharing) of personal information constitutes a privacy breach. For example, collecting feedback through open text fields can inadvertently over-collect personal information. When reporting on feedback metrics, the data must be made anonymous or aggregated so that individuals cannot be re-identified. In addition, if third-party researchers are engaged, staff should ensure that contracts include privacy protections. For assistance, contact your institution’s ATIP office. See the Guidance Document: Taking Privacy into Account Before Making Contracting Decisions .
  • Responsiveness: Capturing and responding to client feedback in a comprehensive and timely manner is important in addressing negative experiences. For complex cases that require more time for follow-up, clients should be kept informed of the progress on addressing the issues they have raised throughout the feedback and issue-resolution process.

Providing clients with an opportunity to view a summary of survey results or actions undertaken in response to comments, complaints and suggestions will provide transparency, demonstrate that their feedback is valuable, and encourage their continued participation. Consider the following:

  • Has the department made service improvements after assessing issues raised by clients?
  • Has the department released open data and information on feedback received and improvements made?
  • A corporate-wide approach: The adoption of a corporate-wide approach allows for a more consistent client experience and provides greater insight into identifying and addressing service issues. Public opinion research can shed important insights into overall client satisfaction with services.
  • ease of access
  • ease of completing the transaction

2.3.1 Description and associated requirements

The Policy on Service and Digital defines online services (sometimes referred to as e-services) as services available on the Internet from beginning to end, without the client having to move offline to complete a step in the process. These services include the ability to receive a service online from the application stage, to the receipt of the final output and the provision of feedback. The final output may not be delivered online in all cases, as it may be a material document, such as a passport, a certificate or other item. However, departments are encouraged to consider the possibility of providing the final output online as well.

In instances of third-party delivery, departments have to incorporate online requirements into their contracts or agreements, as compliance with the Policy on Service and Digital remains necessary in those situations.

2.3.2 Why is this important?

Jurisdictions within Canada and around the world are increasingly focusing their efforts on delivering a better online service experience that clients want to use. Canadians and businesses have been clear that they expect online government services that:

  • are accessible, fast and personalized
  • respect privacy

Online services are convenient for many clients and are significantly more cost-effective than services delivered through in-person or telephone channels.

It is important to pursue holistic and integrated online delivery of services. Requiring clients to download and print an online PDF file, complete it, and send it to a Government of Canada office by fax or email is considered to be “out of band” and not an online service. Moreover, this is not what clients expect as an online service and is inefficient.

2.3.3 Considerations in implementing the requirement

Text version below:

The availability of an online service usually applies to all the interaction points between the service provider and the client. Typically, key interactions include (but may not be limited to) the following six points:

  • Account registration and enrolment: The client registers for a personalized account in order to request the service (example: a veteran registering for a MyVAC account).
  • Authentication: The client provides information and where their credentials are authenticated (example: GCKey).
  • Application: The client completes and submits their request, receives confirmation that the request has been registered, and provides payment if required (example: completing a passport application). 
  • Decision: The client is notified of the outcome of their request (example: confirmation on whether a client qualifies for Employment Insurance).
  • Issuance (final output): The client receives the service (example: payment, permit, licence or information).
  • Issue resolution and feedback: Any issues encountered during the delivery cycle are captured, reviewed, addressed and recorded, and where feedback on the service experience is provided (example: online chat with a service agent or client service feedback).

Considerations

  • starting with the department’s services that are in highest demand and broadening the scope over time based on key factors such as volume of service, cost or benefit, and risk
  • collaborating with key partners, such as the department’s CIO, its web senior departmental official, and other Government of Canada institutions that offer similar services
  • Ensuring that privacy- and security-related considerations are addressed at the design stage. For more information, refer to subsection 4.1 of this guideline.
  • whether the new system will collect and use personal information
  • whether a Privacy Impact Assessment needs to be completed (the assessment will address how the service will respect the requirements of the Privacy Act)
  • Leverage trusted digital identity to identify and authenticate users, and to provide more seamless and secure enrolment and access to online services. For more information on digital identity considerations, refer to subsection 4.7 of this guideline.
  • websites and web applications for mobile devices
  • layout and design specifications for websites, web applications and device-based mobile applications
  • An important step in establishing online services is user experience testing, a usability technique that can provide valuable insights from users of the service. It provides for the testing of different aspects of user experience to determine the best way for clients to interact with the key elements of an online service. It’s a good practice to employ user experience testing during the early stage of design and development of a service and to address any real or perceived issues.
  • a blueprint for how content on Canada.ca is to be organized
  • templates and guidelines for departments to rework, develop and harmonize content as they prepare to migrate their content to the Managed Web Services platform and decommission their URLs
  • information architecture requirements, which are key to effectively align the implementation of the Managed Web Services platform

When designing online services, consider the use of application program interfaces (APIs) as a means to facilitate this work. Refer to subsection 3.3 of this guideline for further details.

User engagement

User engagement promotes awareness among clients of the availability of online services and the benefits of accessing and using them, with the ultimate goal of increasing uptake. When engaging users on online services, consider:

  • Incorporating user engagement into departmental integrated plans. Departments can articulate their engagement approaches or priorities within service management plans or other corporate planning documents.
  • Engaging the departmental outreach and communications groups. They can provide valuable insight and advice on outreach activities and can coordinate these efforts with any other related communications initiatives for maximum impact.
  • Explaining the benefits of online services to clients. Making clients aware of the time-saving and potentially cost-saving benefits of online services provides incentive to use online channels over other channels that are less efficient.
  • Ensuring that the organization’s online services are secure and working properly. Doing so will increase the likelihood that those who use online services have a positive experience and return in the future. It can take only one negative experience for clients to choose not to use the organization’s online services, and possibly other government online services. Refer to subsection 4.6 of this guideline for other considerations related to cyber security.
  • Limiting service information exchanged to the minimum necessary. Refer to subsection 3.6 of this guideline for information about privacy considerations.
  • Addressing a diverse audience. Clients who are already tech savvy will likely migrate to online services as soon as they are aware they exist. However, other clients may need prompting since not all clients can be reached in the same way or through the same communications medium. Use a variety of platforms and methods (by telephone or in person) to raise awareness. Maintain alternate service delivery channels where appropriate so that clients have choices.

Key elements of a user-engagement approach

  • A client-centric approach to online services: Ease of use is essential to the success of online services. Good user design, based on actual testing with users, followed by clear and thorough explanations on how to access and use available online services, will help increase their use. Instructions and guidance should be tailored to a wide range of clients, taking into account literacy levels, language and other factors.
  • A client-centric multi-platform awareness campaign: In order to effectively migrate clients to online services, clients must be aware that this option is available and be aware of its benefits. Promoting awareness of the availability of online services should be done through all existing delivery channels, and can include using correspondence or reminders when providing services in person or through the telephone channels. Departments may wish to promote the benefits of using online services, such as the added convenience a service may offer, or the reduced time it would take to complete an application. These benefits may be communicated in real time, while the client is seeking a service through another channel (by telephone or in person).
  • A measurement plan to assess areas of success and weakness: It is important to know the extent to which clients are using online services. Engaging with users can increase online service uptake.
  • Limitations of online services: Beyond legal or security considerations, the online availability of services may not be practical from a cost or benefit perspective or because of other considerations such as technical feasibility. A particular intermediate activity of a service may not be available online under specific circumstances. In such cases, other channels may be required. The online availability of services requires taking a client-centric approach, and clients should be given the option to revert to the online channel once an activity that requires a different delivery channel has been completed.

2.4.1 Description and associated requirements

Real-time application status refers to information on the current standing of a client’s request for a service or product.

The designated official for service, in collaboration with other officials as necessary, is responsible for :

2.4.2 Why is this important?

Just as some clients expect to be able to complete the government’s authenticated external services online from end to end, they also expect to have access to real-time information on the state of their request or application. When accessing government services, clients need the most up-to-date information to make informed decisions. Providing such information facilitates openness and transparency of government processes in providing services and contributing to client satisfaction.

2.4.3 Considerations in implementing the requirement

This requirement applies only to a limited number of departmental services, which can be identified using the following cascading questions:

  • What are the departmental services?
  • Which of those services are external services?
  • Which of those external services require the client to authenticate themselves in order to apply for or receive the service?
  • Which services involve a request and a decision?
  • Which services should be prioritized for this functionality? Consider prioritizing high-volume, high-impact services.

When providing real-time application status, consider the following key elements:

  • a clear process for clients to receive an update or their application status on the department’s website
  • access to service and action history (date, actions)
  • access to any key messages or advisories related to the service

Following are examples of departments that provide application services in real time:

  • Veterans Affairs Canada
  • Immigration, Refugees and Citizenship Canada
  • Agriculture and Agri-Food Canada

2.5.1 Description and associated requirements

A service inventory is a catalogue of services that provides detailed information about a department’s services based on a specific set of elements (for example, type, channel, client and volume). It contains information, known as data elements, that enables organizations to better know, understand and more strategically manage their portfolio of services.

The designated official for service, in collaboration with other officials as necessary, is responsible for:

2.5.2 Why is this important?

When used effectively, a service inventory can be a useful tool to manage services. A service inventory also demonstrates an organization’s commitment to transparency and to service excellence. Using a service inventory has several benefits:

  • it provides a snapshot of departmental services and related data, which in turn can support strategic management and decision-making
  • it can help determine the resources required for service delivery (for example, staffing, facilities, IT and information management)
  • it facilitates performance reporting by linking services to internal performance indicators and external service standards
  • it supports the identification of opportunities to create efficiencies through consolidating and standardizing services or the constituent activities or processes within the department and across the Government of Canada

Individual departmental service inventories:

  • can be updated via the Government of Canada Service Inventory data collection tool
  • have been posted annually on the Government of Canada’s open government portal since July 2018

Publishing service inventories annually supports a departmental data-driven culture that is open and transparent.

2.5.3 Considerations in implementing the requirements

Identifying services.

As a first step, departments can review their annual Departmental Report, Program Inventory and website to identify a list of the department’s services. Services could include typical external services that most departments offer, such as public enquiries and access to information and privacy requests. Once a list of potential services is established, use the Service Identification Tool described in Appendix C of this guideline to confirm whether the activities undertaken are indeed services. You can also refer to the definition of services in Appendix C and to the instructions below on developing a service inventory.

After this assessment, if your department concludes that it doesn’t provide any services, it must submit a declaration from the deputy minister to TBS that indicates the following:

  • the department does not offer any services, as defined by TBS direction and guidance
  • the department understands that the public-facing GC Service Inventory will show that the department does not offer any services

This declaration can be revisited regularly, and the organization should notify TBS when the declaration is no longer accurate, or upon TBS’s request.

Best practices for developing a service inventory

  • identify a champion at the senior management table
  • identify a departmental lead or coordinator
  • identify key contributors in the department (branches/sectors)
  • develop a plan with key activities and timelines
  • convene an information session with contributors to kick off data collection within the organization
  • read the Policy on Service and Digital, the Directive on Service and Digitaland related policy instruments and guidelineson TBS’s website
  • review the Service Identification Tool (see Appendix C of this guideline)
  • verify for any updates on the Directive or guidance from TBS
  • review your Departmental Plan, Program Inventory and website to prepare a draft list of services
  • work with departmental partners to confirm services and related data elements
  • become familiar with TBS’s data collection website to ensure that data collected aligns with the data fields required
  • seek approval from your deputy head and information management senior official to allow publication on open.canada.ca
  • use the login credentials sent by TBS to access the data collection website
  • keep the department’s service inventory evergreen by updating it regularly

Key components of a service inventory

A service inventory includes a number of data elements, such as the following:

  • service name
  • service type
  • special designations
  • URL to access the service
  • link to program inventories
  • client type
  • volume of transactions
  • service standards and related performance information
  • use of a business number or a social insurance number
  • service fees
  • online availability

A service inventory template, which identifies the full set of required data elements and related definitions, can be found on the GC Service Community page (requires an account to access this content).

You will need to input your departmental data via a web-based tool (requires an account to access this content) launched by TBS.

Although departments and agencies are required to review data elements in all fields annually, some fields will remain static year over year.

Some key points to consider when developing and updating a service inventory:

  • The information in a service inventory should be verified and be consistent with data contained in a departmental Performance Information Profile (PIP) and other planning documents (for example, Departmental Plan and departmental data strategy).
  • It is important to keep your service inventory evergreen by updating it on a regular or annual basis. Such updates are essential in order for your service inventory to accurately indicate the services provided by your department.
  • the custodian(s) of the inventory
  • most recent revision date
  • other important information (e.g., where to find information relating to the Privacy Impact Assessment for the service) that can serve as a reference point for those using or managing this information in the future.

Service name considerations

When naming a new service or revising an existing service name, consider the following:

  • be concise and use plain language
  • use names that are easily identifiable and relevant to the clients it serves (for example, “Call Centre,” “Complaints”) 
  • avoid using acronyms as part of the service name
  • ensure that the service name is consistent with names used in the departmental or Canada.ca website and departmental reports, including the service inventory
  • avoid labelling the service with the name of a branch or sector, unless necessary
  • avoid including the words “process,” “program,” “service” or “activity” in the service name, unless required to align with a legislated or policy requirement

2.6.1 Description and associated requirement

The Directive on Service and Digital requires departments to make their service inventory available through the Government of Canada Service Inventory , a consolidated database of Government of Canada services and related performance information open to the public via the open government portal.

2.6.2 Why is this important?

The requirement to have departmental service inventories on the open governmental portal:

  • provides open and transparent access to Government of Canada service information to departments, central agencies, academia and the public
  • facilitates government-wide performance reporting
  • supports the Government of Canada strategic management and decision-making

2.6.3 Considerations in implementing the requirement

As specified in the Directive on Service and Digital, the designated official for service, in collaboration with other officials as necessary, is responsible for:

  • ensuring that service inventory data submitted to TBS is accurate
  • working with TBS to revise the departmental service inventory for government-wide consistency for the purposes of release on the open government portal

Departments remain responsible for the accuracy of their data, and TBS is the custodian of the service inventory data for publishing purposes.

Although departments can update their service inventories at any time, they will typically collect data for the previous fiscal year during the summer, in time for TBS’s review and publishing on the open government portal in the fall.

Link to other requirements and policies

Service inventories must link to other requirements and policies, including:

  • requirements 4.3.2.8 and 4.3.2.9 of the Policy on Service and Digital to release information and data on the open government portal (refer to subsection 3.4 of this guideline for more information)
  • subsection 6.2 of the Directive on Open Government , which requires that open data and open information is released in accessible and reusable formats via Government of Canada websites and services designated by TBS
  • the Policy on Results

2.7.1 Description and associated requirement

A service standard is a public commitment to a measurable level of performance that clients can expect under normal circumstances when requesting a service. The term “normal circumstances” refers to the expected level of supply and demand for regular day-to-day service operations. Such operations differ from special circumstances where regular service standards may not apply (for example, circumstances that are typically not within the organization’s control, including holidays, natural disasters or other emergency situations).

2.7.2 Why is this important?

Service standards reinforce government accountability by making performance transparent. They also increase the confidence of Canadians in government by demonstrating the government’s commitment to service excellence. They are integral to good client service and to effectively managing performance, and can clarify expectations for clients and employees, drive service improvement, and contribute to results-based management. Service standards also help clients make time-sensitive, important decisions about accessing services and other expectations relating to services.

2.7.3 Considerations in implementing the requirement

Key components of this policy requirement include:

  • scope : applies to all services where there is a clear and specific recipient
  • channels : service standards must be developed for all service delivery channels, as applicable (for example, in person, telephone and online)
  • comprehensiveness : includes access, timeliness, accuracy and real-time performance
  • consistency : proposes a common approach to articulating standards and measuring their fulfillment
  • transparency : focuses on what, how, where and when to publish information

Departments must also consider other service standard requirements in other policy instruments, Acts of Parliament and regulations to ensure alignment. Examples include:

  • Policy on Transfer Payments
  • Service Fees Act
  • Directive on Charging and Special Financial Authorities
  • Cabinet Directive on Regulation
  • Canada.ca Content and Information Architecture Specification

In order to develop comprehensive service standards, consider the three types of standards:

  • Access standard : a commitment outlining the ease and convenience the client should experience when attempting to access a service (for example, the likelihood that callers will be able to speak with an agent, hours in a day that the service can be accessed)
  • Timeliness standard : a commitment stating how long the client should expect to wait to receive a service once the service has been accessed (for example, how long callers will have to wait to speak with an agent once they are in the queue)
  • Accuracy standard : a commitment stipulating that the client will receive a service that is up-to-date, free of errors and complete (for example, will callers receive the correct answers to their questions)

Service standards typically have three key components:

  • Service standard : a clear and measurable statement on the level of service a client can expect (for example, answer calls within 20 seconds or process applications within five business days)
  • Service performance target : a clear and measurable statement on the extent (frequency) to which (in terms of percentage) the standard will be met (for example, “we will meet our service standard 95% of the time”)
  • Service performance result : the actual performance against the standard target (for example, “we met our target 96% of the time”), typically reported on an annual, quarterly or monthly average

Refer to the table in subsection 2.9 of this guideline for examples of service performance metrics.

Characteristics of a good service standard

When designing or reviewing service standards, consider the following key characteristics:

  • Relevance to the client: service standards are consistent with client expectations and address aspects of the service they value most within available resource allocations.
  • Simplicity: service standards are easy to understand and address only one dimension of performance.
  • Based on consultations: service standards are developed or reviewed in consultation with clients, managers, staff and other partners in service delivery to ensure that they are meaningful to clients and match the organization’s mandate and capacity. Note that the Service Fees Act requires that mandatory consultations be undertaken before modifying a service standard.
  • Measurable: service standards are quantifiable and linked to monitoring activities.
  • Consistent across government: service standards should be consistent throughout departments that provide similar services. This  helps both clients and government, as clients will find it easier to deal with different organizations, and the organizations themselves will find it easier to share best practices and adopt common approaches.
  • Ambitious but realistic: service standards are sufficiently challenging to service providers yet are realistic in terms of capacity.
  • Endorsed by management: Service standards are understood and endorsed by senior management.
  • Communicated: service standards are clearly communicated to clients, employees and other stakeholders to help manage expectations and performance.
  • Transparent: service standards are monitored and reported to senior management, and performance results are made available on their web presence to ensure transparency and promote client trust.
  • Continually updated: service standards are regularly reviewed and updated as appropriate.

In addition to the service characteristics described above, when establishing service standards, consider the following:

  • Secure the necessary approvals for proposed service standards and operational targets. From the outset, determine which level of approval is required before implementing a service standard and an operational target. Some service standards are established in policy or legislation and may require ministerial approval. Involving legal affairs from the outset can also identify and mitigate potential challenges early in the approval process.
  • Explore the implications of national (or global) service standards on regional services. Departments that deliver services across the country (and, in some instances, worldwide) may wish to consider the targeted client groups and the different resource levels at each service point. Determining the impact of national standards on regional operations before implementation can address potential variations and implementation challenges. National service standards are preferred because they help departments communicate a consistent message to all clients. Where possible, avoid sending different messages to each region or client group or encouraging unwanted comparisons between the levels of service offered in each region.
  • Verify that service standards do not create legal liabilities. Involve your department’s legal services unit early in the process and consult on the wording of service standards and the potential risks associated with non-performance. Fine print, footnotes and other forms of caveats may provide good risk management, but be careful not to overly diminish the intent of service standards or to create readability or interpretation challenges for clients.

Some best practices when developing service standards include:

  • avoiding identifying a performance target within the service standard
  • for the timeliness of service standards, using number of weeks, business days or hours, as appropriate
  • not using time ranges in service standards (for example, “between X and Y business days”)
  • in special circumstances, timelines may be negotiated on a case-by-case basis (for example, respond to media enquiries within timelines negotiated between the two parties)
  • ensuring that the service standards and related performance information reported on your department’s web presence is consistent with the information provided in your departmental service inventory

2.8.1 Description and associated requirement

Once service standards have been developed, they should be regularly reviewed and improved to ensure that they are comprehensive, meaningful and relevant.

2.8.2 Why is this important?

The process of reviewing service standards is important to ensure that they are comprehensive, consistent and meaningful to Canadians. Reviewing service standards helps identify any gaps or areas for improvement and courses of action to address key gaps in performance.

2.8.3 Considerations in implementing the requirement

The frequency of the review of service standards will depend on the service and performance against its associated service standard. Consider reviewing standards at least annually, after assessing annual performance.

The following Service Standards Development and Assessment Tool can help departments review their service standards. The table below provides a series of questions that organizations can answer. If the answer to a question is yes, indicate your data or evidence source in the adjacent column. If the answer to a question is no, this may indicate a gap that would need to be addressed.

Question Answer (Yes / No) Data Source or Evidence

Are the service standards comprehensive in perspective?

   

Is there an access standard?

   

Is there a timeliness standard?

   

Is there an accuracy standard?

   

Do the standards align with client needs and expectations?

   

Are the service standards based on consultations with various stakeholders?

   

Are the service standards measurable?

   

Do the standards align with specific requirements contained in applicable legislation and policies?

   

Are the service standards consistent with those of similar services?

   

Are the service standards realistic (for example, reasonable and practical)?

   

Are the service standards endorsed by management?

   

Are the service standards and related performance results available to staff, management, clients and stakeholders?

   

Have the appropriate web publishing and templates been used to communicate service standards, targets and related performance results online?

   

Have the service standards been reviewed and updated within the service review period (i.e. at least every five years)?

of this guideline for more information about service review.
   

Is real-time performance information related to service standards being published?

   

When reviewing service standards, consider the following:

Find the right balance between ambitious and safe standards.

Establishing ambitious but achievable standards helps an organization improve its performance and meet the expectations of clients. Reviewing service standards regularly and taking performance into account provides an opportunity for adjustment, including raising the standards if appropriate.

Organizations that strive to continually improve their performance are likely to meet client expectations more frequently and thereby increase client satisfaction. After service standards have been in place for a while and have matured (that is, they are meeting their performance over 95% of the time), departments may decide to review and improve them. Increases in expectations should be gradual to ensure that employees understand the changes and can contribute to their attainment.

Clients gain confidence in the government when standards are met consistently. Departments are encouraged to allocate resources to meet any new improved service levels.

Monitor performance to determine whether course corrections are required

A regular review of whether service standards and operational targets are being met can help senior managers determine whether resource adjustments are required. It is possible that the service standard may be set too high or too low.

Determine whether the variance between the service standard and actual performance is temporary or long-standing. It may be necessary to scan the environment, internally and externally, to determine possible influences that affect the attainment of service standards.

Performance results scenarios

Scenario 1: performance results exceed service standard target.

  • Was the methodology used to develop the standards adequate?
  • Has the organization’s capacity improved?
  • Are the standards too low?
  • Were projections about trends and client behaviours accurate?
  • Did circumstances change, such as lower-than-expected demand or new delivery approaches?
  • Raise standards where appropriate.
  • Redeploy resources to lower-performing areas.
  • Communicate results to clients, staff and service delivery partners.
  • Share knowledge, including best practices and lessons learned, with the service community.
  • Celebrate success.
  • Plan to address emerging or longer-term issues, such as resources, capacity, expected change in demand and new priorities.

Scenario 2: Performance results are consistent with service standard target

  • Confirm whether clients are satisfied with current levels of service through client feedback and results of client satisfaction measurement.
  • Determine whether higher standards are warranted or desirable.
  • Plan to address emerging or longer-term issues such as resources, capacity, expected change in demand and new priorities.

Scenario 3: Performance results fall short of service standard target

  • Are service standards too high?
  • Is the business process unclear or unnecessarily cumbersome?
  • Were there unexpected changes in resource capacity and level of demand for service?
  • Was sufficient attention paid to the potential impact of known trends, such as new demand, or change in channel preferences?
  • Rethink the business process?
  • Increase capacity?
  • Identify and implement best practices for similar services?
  • Consult stakeholders?
  • Lower service standards, if appropriate?
  • Remember to take financial resources and changing organizational priorities into account.

2.9.1 Description and associated requirement

Real-time performance information shows the current level of performance that clients can expect to be provided for a service, relative to an established standard.

The concept of “real time” means that timely information on the expected delivery of the final (service) output is available so that citizens and businesses can choose when to use government services based on that information. For example, travellers approaching Canada can check the Canada Border Services Agency’s online service to know the current wait times at a particular border crossing and decide on which to use. In publishing this information, the Canada Border Services Agency helps clients set realistic expectations about its service.

Real-time service delivery performance information can be grouped into three categories based on the frequency of updates and the speed in which information is processed:

  • Timed updates : service delivery performance information is made available to clients based on timed or scheduled events (for example, once a month, week, day or hour, as appropriate)
  • Near real-time updates : service delivery performance information is made available to clients with minimal delay (for example, a 5-minute delay)
  • Instantaneous updates : service delivery performance information is made available to clients immediately and without delay (for example, live information feed)

It is important to always include information related to indicate the frequency of updates and the date or time of the latest update.

2.9.2 Why is this important?

Although service standards inform clients about what to expect based on service performance targets, they do not provide current performance information that permits citizens and businesses to make behavioural choices when accessing government services. Real-time service delivery performance information bridges this gap.

2.9.3 Considerations in implementing the requirement

Determining the best approach to publishing real-time performance data.

 A cost-benefit analysis or other type of analysis that determines whether the benefit outweighs the implementation cost is recommended to determine the best approach to publishing real-time performance data for the operational context. The frequency and speed of updates may vary for each service depending on the type of service and context of its delivery. Departments need to:

  • consider what real time means in the context of each service, including what makes sense to clients
  • determine how best to publish real-time service delivery performance information

Service providers are best positioned to determine which frequency of update is most suited to each service.

Typically, real-time information is focused on the timing to deliver a final output to a client. However, it can also provide updates on the anticipated time frames for delivering intermediate outputs if they are anticipated by, and given directly to, clients as part of a larger process to deliver a service.

Departments and agencies should ensure that this information is easily accessible on their web presence and through any other channel of service delivery, as appropriate.

When establishing real-time service delivery performance information approaches, consider the following key characteristics:

  • easily and quickly accessed
  • relevant to the client
  • linked to service standards
  • communicated
  • transparent
  • focused on outputs, that is, whether on the final (service) output or an intermediate output

Publishing service standard information

There are two principal approaches to publishing service standard information:

  • description
  • application steps
  • service standard and target
  • real-time performance information
  • service description
  • service standard
  • annual performance for the most recent year data available

Note that real-time service performance information can be published on the service page or in a central location on the organization’s web presence that is easily accessible from the service page.

To facilitate online publishing of service standards information in both of these contexts, templates and patterns are available in the Canada.ca design system :

  • for in-service scenarios, see the template for Service initiation page: Canada.ca template
  • for performance reporting, see the template for Institutional service performance reporting page: Canada.ca template

When publishing service standards, do so in a way that is simple and clear to people using the service, and assess their accessibility through usability testing.

Understanding how different service performance metrics link together

Four distinct and complementary metrics are:

  • performance targets
  • real-time service delivery information
  • average service performance information

Departments can use these metrics together to help manage service delivery results and client expectations.

The table below provides examples of the different metrics used to assess service performance.

Examples of service performance metrics
Service standard Service standard performance target Real-time service performance information Service performance result

Applications are processed within 60 days.

The target for achieving this standard is set at 90%.

Currently processing applications within 45 days as of (date).

Updated monthly as of this date.

The service standard was met 91% of the time in fiscal year XX.

Issue a claim payment cheque within 15 business days of receiving a complete claim from the client, including all of the required claim information.

The target for meeting this standard is set at 95%

Currently issuing claim payment cheques within 10 days of receiving a complete claim as of (date).

Updated weekly as of this date.

The service standard was met 89% of the time in fiscal year XX.

Service metrics portfolio

Managers can monitor service performance over time by collecting data on:

  • implementing service standards
  • attainment of performance targets
  • performance information

The data can be analyzed to improve an individual service and better manage services across a service metrics portfolio.

A service metrics portfolio can represent all the service metrics a department has in place or represent a common set of services. Examining service metrics across a portfolio increases transparency and encourages consistency. It also facilitates the development of coherent approaches to implementing and using metrics across sectors and branches. Finally, examining service metrics as a portfolio helps ensure that all major services and client groups have been addressed.

When integrated with corporate planning and reporting activities, service metrics are a useful tool to support overall organizational management:

  • The Treasury Board Policy on Results requires departments to establish a Performance Information Profile. Service standards and real-time performance information comprise two sources of information that can be used to develop a performance measurement framework related to services.
  • Part III of the Estimates process requires that departments prepare departmental expenditure plans consisting of Departmental Plans and Departmental Results Reports , service standards and related performance information help express and formulate performance objectives and can be incorporated into the business planning process. Reporting on performance against service standards helps demonstrate progress toward expected results.
  • The Management Accountability Framework (MAF) sets out the Treasury Board’s expectations for effective performance. One of the several elements that make up the MAF is service management. Service standards and related performance information are essential components in achieving service excellence and directly contribute to advancing results-oriented management activities .

Planning for success

If a department is in the early stages of implementing service standards, it is encouraged to develop an implementation plan to enable compliance with all existing mandatory requirements related to service standards. Additionally, such a plan could be considered as a service improvement initiative or project for inclusion in the department’s overall integrated plan.

2.10.1 Description and associated requirements

A review of services consists of a systematic assessment of an organization’s services against a set of predetermined criteria to identify opportunities for service improvement, including greater effectiveness and increased efficiency.

2.10.2 Why is this important?

The regular review of services is a key practice in ensuring that services:

  • meet the evolving needs and expectations of clients
  • are efficient
  • align with the overall Government of Canada service direction

By systematically reviewing its services, the Government of Canada can improve its business processes, achieve efficiency gains, and strive for greater client-centric services.

2.10.3 Considerations in implementing the requirements

A departmental review of services does not need to be complex, but it does require:

  • a methodical approach
  • good understanding of the organization’s current service environment, its priorities and its services
  • client engagement
  • coordination with key departmental and other service stakeholders

When undertaking a review of services, steps you can take include:

  • Identifying or establishing a working group of representatives from various areas within your department that have an interest or stake in this exercise (for example, policy, program, service delivery, information management, IT, security, privacy and corporate/strategic planning areas).
  • Identifying and confirming your department’s services, referring to your departmental service inventory.
  • Developing a five-year plan that incorporates all departmental services and that identifies which services will be reviewed in each year. Keeping this plan evergreen by updating it annually to reflect changes in services or review priorities.
  • Identifying and confirming the key review questions that will be used to assess your department’s services. Applying the key review questions (below) to assess the departmental services identified for review in the given year.
  • What are the overall benefits?
  • What are the associated costs?
  • What are the risks of proceeding or not proceeding?
  • Are there opportunities to collaborate with others?
  • Can knowledge gained from experimentation be leveraged?
  • On the basis of Step 4, identify which services should be recommended for service redesign or optimization and establish a draft implementation plan with key actions, project leads and timelines. Also consider collaborating with key organizational partners in service delivery, such as program managers, the departmental CIO, communications representatives, departmental legal services, and other departmental officials, as appropriate.
  • Validate the proposed service redesign and optimization implementation plan with your organization’s senior management. When appropriate, engage in broader discussions with potential external service delivery partners (such as other departments or jurisdictions that have similar mandates, services or business processes, and clients).
  • Once approved, the service redesign and optimization initiatives should be reflected in your department’s key planning documents, including the required integrated plan, as appropriate. Refer to subsection 1.3 of this guideline for further details on integrated planning.
  • Regularly monitor the implementation of the plan and report on progress. Ensure appropriate linkages to your department’s planning documents, performance measurement framework, and any other government-wide service improvement initiatives.
  • Review and adjust your plans as required, ensuring that your service improvement initiatives address the needs of your clients and result in operational efficiencies.

Key review questions

Once you have identified your overarching goals or objectives for service improvement, you may wish to consider the following key review questions as part of your review of services.

  • Are there any specific client satisfaction issues related to the department’s services that need to be addressed? A review of performance against service standards, the results of recent audits, evaluations, surveys of client satisfaction and media articles is a good place to start.

In addition, you may wish to consider the following elements:

  • choice of service access point
  • ease of access (“findability”)
  • seamless and integrated
  • streamlined and intuitive application process
  • consistency in experience
  • proactive delivery
  • Is the service obtained through digital enablement?
  • Are any of the department’s services not available online, end to end? If not, why is this the case, and can these services be modernized to meet the online service expectations of clients? What is the uptake rate of online services relative to those offered through other channels (telephone or in person), and what can be done to improve the uptake if required?
  • streamlining business processes
  • managing service channels to increase the number and use of online services and reduce the volume of more expensive in-person and telephone services (incentives and disincentives)
  • Are there opportunities to align or integrate services or service improvement initiatives with others (within the program, department, government or other jurisdictions)? Are there better ways to deliver the service through partnerships with the private sector or by leveraging artificial intelligence? Refer to subsection 4.5 of this Guideline for information on the use of automated decision-making.

3.1 Strategic management of information and data

3.2 use of digital systems to manage information, 3.3 enabling interoperability, 3.4 release of information and data on the open government portal, 3.5 accessibility by design, 3.6 privacy and protection of personal information.

 Information and data are strategic assets that play an increasingly central role in supporting departmental operations, decision-making, and the design and delivery of services to individuals and businesses in the digital era. Information and data also underpin various legal obligations such as privacy requirements, the public’s right of access to government information, the proactive release of government information online, and the long-term preservation of Canada’s documentary heritage.

In order for information and data to be effectively leveraged for any purpose, they must first be well managed.  This supports the expected outcomes of the Policy on Service and Digital that information is managed as a strategic asset, throughout its life cycle, and is increasingly interoperable to enable reuse as well as openness and transparency, while respecting privacy and security requirements.

Treating information and data as strategic assets involves dedicating resources in order to:

  • ensure that information and data management initiatives are in line with business objectives, legal obligations and the values and expectations of Canadians
  • put in place the tools and systems needed to manage information and data effectively throughout their life cycle

Departments must know what information and data they possess, and understand their value, in order to manage it effectively and use it to support operations, service delivery and effective decision-making.

Refer to Appendix  D of this guideline for a definition and description of the terms information and data, in the context of the Policy on Service and Digital and the Directive on Service and Digital.

3.1.1 Description and associated requirements

Managing strategically involves ensuring that departments invest in the rules, tools and people needed to govern and manage information and data throughout the various stages of their life cycles.

The corresponding requirements in the Directive on Service and Digital lay out the responsibilities of the departmental CIO, managers and employees with respect to:

  • the duty to document activities and decisions of business value
  • the holistic management and governance of information and data, including creation and collection, use and reuse, and retention and disposition

The departmental CIO , in collaboration with other departmental officials as necessary, is responsible for:

Managers are responsible for:

Employees are responsible for:

The life-cycle stages of information and data are largely consistent across varying organizational contexts. They generally concern: creation and collection, management, use, sharing and retention, and disposition. At each of these key stages, it is recommended that departments manage and govern data in a responsible manner that:

  • enables interoperability
  • assures fitness for purpose
  • maximizes accessibility and discoverability
  • respects relevant security, privacy and other legal obligations, in accordance with applicable laws and policies

Periodic assessment of the value and utility of information and data can help inform approaches to retention and disposition. It can also ensure that departmental resources are allocated to the information and data deemed most valuable and useful to departmental objectives and whole-of-government priorities.

3.1.2 Why is this important?

Information and data are foundational elements of a democratic government. The Government of Canada aims to be a more open and user-centric provider of programs and services to people and business in simple, modern and effective ways that are optimized to be available anytime and anywhere, from any device. Furthermore, the duty to document activities and decisions of business value enables not only the continuous improvement to programs and services, but also the scrutiny of them.

To realize this vision, which captures the way Canadians increasingly expect to interact with government, information and data held by the government should be viewed and treated as an asset that is similar to finances or real property, both at the departmental and enterprise levels. Adopting a standard approach to the strategic management of information and data at the departmental level helps create the digital environment needed to enable accessibility, discoverability, shareability, and interoperability at the enterprise level, while also ensuring that personal information and sensitive data is protected appropriately. Using a standard approach also enables greater openness, transparency and accountability to the Canadian public.

By managing information and data strategically, departments can strengthen their capacity to adopt existing and emerging enterprise-wide information and data standards. It is expected that the standardization of information and data management and governance practices will enable the federal public service to realize the service delivery model that citizens and businesses increasingly expect, while maintaining government accountability. In this model, roles and responsibilities around client data are clearly defined, with policy and legal compliance mechanisms built-in by design. By informing clients about how their data is being stewarded, these measures also build public trust and improve the user-friendliness of government services.

3.1.3 Considerations in implementing the requirements

The Mandatory Procedures for Enterprise Architecture Assessment (Appendix A of the Directive on Service and Digital) provide enterprise architecture requirements to help ensure that information and data life-cycle management practices are aligned across government.

In addition to these requirements, the following sections lay out a set of best practices and considerations for each stage of information and data life-cycle management (creation and collection, management, use and sharing). It is recommended that departments incorporate them into their implementation plans (for example, for their departmental data strategies or, in the long term, their integrated departmental plans) or use them to supplement existing rules, methodologies, mechanisms or tools in this area. Best practices and considerations can inform departments as they achieve several key outcomes, including:

  • improved understanding of currently held information and data assets, including identifying personal information holdings
  • clearly defined roles and responsibilities for information and data assets, addressing accountability for the use or misuse of these assets
  • increased capacity to identify, recognize and manage information and data with business value and determine eligibility for release as open data and information in accordance with applicable laws (see Appendix E of this guideline)
  • regularly assessed schedules and processes for the retention and disposition of information and data assets, in accordance with the requirements of the Privacy Act, other relevant legislation or policy, and Library and Archives Canada’s disposition authorizations

1. Information and data creation and collection

Plan for information and data needs. Consider the following when thinking about the information and data needed to accomplish business objectives and make evidence-informed decisions:

  • Consider what type of information and data are needed to support or inform work objectives, and how they will be collected and accessed. The performance indicators in a program’s Performance Information Profile (PIP), as laid out in the Policy on Results (subsections 4.3.5 to 4.3.7), can help determine these needs.
  • Consider what published information and data (for example, structured data such as a relational database, unstructured data such as books, reports, articles or other online resources, and semi-structured data such as XML and JSON) may be needed. If so, consider how access to this information and data will be sought in a way that minimizes costs and avoids duplication, in accordance with privacy and other applicable legislation.
  • Consider if any information and data needed may have already been collected by another department. If so, consider how access to and reuse of this information and data will be sought in order to minimize redundancies, avoid duplication and ensure compliance with the Privacy Act and other relevant policy or legislation.
  • Consider if any of the information and data planned to be collected or created requires security classification. If so, at what level(s)?
  • Ensure you have the authority to collect personal information and data and identify the purpose of the collection.
  • the purposes for which the department is capturing the personal information
  • the privacy practices that support the administration of programs and activities
  • Consider what steps need to be taken to mitigate security, privacy or other legal risks at the outset of collecting the information or data and in order to support an “open by design” approach and improve readiness to release information and data, including to the open government portal (as set out in subsection 4.3.2.8 of the Policy) or to other publicly accessible platforms.
  • Consider what steps should be taken to ensure that the collected information or data is, or can be, disaggregated to the lowest relevant administrative level (for example, sex at birth and gender , disability status, age, ethnicity, geographical location), balancing equity considerations with the need to ensure that individuals are not identified without their knowledge or informed consent. The UK Department for International Development’s (DFID) guide to disaggregating programme data by disability provides an example of how data collection methodologies can be adapted to allow for disaggregation and add nuance to the user’s understanding of the disparities within their population of interest. While the guide is focused on disability, the overall approach can be applied to other domains. Preparing to collect data with a view to ‘leaving no one behind’ requires identifying the most relevant dimensions that contribute to explaining aggregated trends and observations. The Gender Based Analysis Plus (GBA+) framework can be leveraged to facilitate this process.  

As information and data are created and collected, identify its organizational, enterprise and public value and manage it in a way that maximizes its availability to those who need it or request it through formal or informal channels, as permitted within the current legislative and policy environment. To this end, the following practices are recommended:

  • allow for the management and maintenance of records over time
  • support import, export and interoperability
  • maintain adequate context through metadata
  • For common information and data domains, ensure alignment with enterprise-wide information and data standards, as appropriate. Follow departmental conventions for naming, metadata and classification when creating and organizing all other information and data.
  • In order to have an accurate and complete picture of the government’s decisions and actions, it is every individual employee’s responsibility to document the relevant information and data that provides evidence in support of actions and decisions taken within the context of government business (duty to document). This duty also involves documenting and tracking the purposes for which information and data are collected or used.
  • keeping that repository operational during business hours
  • performing backup and other safety measures
  • applying the appropriate security measures
  • obtaining the appropriate insurance coverage
  • exercising all other prudent asset management practices over the repository
  • Consider carefully what information needs to be documented for the purposes of reconstructing the evolution of policies and programs. Map out and document the process that culminates in a decision, such that the steps of that process and the data, information and evidence used to support it can be traced for audit or other purposes. It is not expected that all of a department’s processes be documented. Focus on the key decision-making and policy-making processes that are part of core business or that impact the public.
  • Include email and instant messages of business value when storing information and data in the corporate repository. As outlined in the Standard on Email Management , emails and other messages should not be kept on mobile devices or in email accounts, as these locations do not meet the requirements for sharing, using, safeguarding and storing information and data of business value.
  • When creating or collecting information and data of business value, ensure that metadata for key profile fields is maintained.
  • Ensure that datasets or information that are evergreen or require regular updating to maintain relevance are updated at appropriate intervals using a designated resource.
  • Respect information and data security and privacy requirements when creating, collecting, and using information and data. Refer to subsection 3.6 and subsection 4.6 of this guideline for more information on specific considerations for privacy and security. Specifically, in relation to security, also consult the Mandatory Procedures for Information Management Security Control .
  • Monitor your data and information regularly, taking into account retention periods as well as changes in technology that may impact their ongoing usability
  • conducting integrity checks
  • migrating format/media/infrastructure to newer, more reliable or standardized ones
  • regularly maintaining and logging metadata
  • Respect official languages policies and guidelines when creating or collecting information and data.

2. Information and data management

Organize information and data systematically so that they are easy to discover, access, share and reuse, as permitted within the current legislative and policy environment. Where possible, use standards, rules, tools and procedures put in place at the enterprise level or established by your organization. This practice involves:

  • Know what information and data you have by inventorying your information and data assets on a regular basis. This inventory should cover what information and data you have, where they are located, how they are stored, who stewards and has access to them, whether they are shared (outside the organization, beyond borders or jurisdictions), how they are accessed and searched, their release eligibility, and any privacy and security considerations associated with them.
  • Organize information and data systematically so that they are easy to discover, access, share, reuse and dispose of as permitted within the current legislative and policy environment.
  • Ensuring that information and data are aligned with departmental architecture taxonomies and classifications, as appropriate.
  • Ensuring that privacy requirements are met with respect to personal information and data, and guarding against unauthorized collection, access, disclosure or destruction.
  • Where relevant (for example, in cases involving sharing data between government organizations or preparing data for release or publication), ensuring that information and data are aligned with enterprise-level common architecture taxonomies and classifications. For example, if planning on sharing a dataset with information on provinces and territories, it is important to ensure that the values used to express this information align with the relevant reference data standards at the enterprise level. The same applies to data domains for which authoritative sources (for example, master data) at the enterprise level can be found.
  • Clearly defining roles, responsibilities and accountabilities for information and data in the organization, both at the working and senior levels. These can be situated as part of a broader departmental governance structure that ensures that issues related to information and data are horizontally tabled and addressed.
  • Ensuring that security, privacy and other legal risks are considered and mitigated to a degree with which the institution is comfortable in order to improve readiness to release information and data, including on the open government portal.

Protecting information and data involves preserving their integrity and authenticity. Such protection includes:

  • An information or data asset’s structure (format and links to other documents or attachments), its context (information about the sender, recipient(s), and the date and place of creation), and its content (the text, data, symbols, numerals, images, sound, graphics and other information that make up the substance of the record) are key elements that preserve the value of the data or information in any medium, provided the elements remain intact.
  • Protecting information and data against loss, damage, unauthorized access, alteration, disclosure or destruction. Such protection includes informing contractors of their responsibility to protect any information and data that has been entrusted to them, as well as their responsibilities to provide records should they be requested through an access to information request or request for personal information.
  • Marking any information and data according to their appropriate security classification(s), using the relevant metadata field in the electronic document profile (or adding a visible marking to the paper document). Avoid applying a classification that is higher or lower than merited by the information and data.
  • Adopting a “cloud first” approach to storing information and data categorized at the Protected B level or below, as outlined in subsection 4.3 of this guideline.
  • Ensuring that all government-held sensitive information and data categorized as Protected B, Protected C or Classified reside within the geographic boundaries of Canada or within the premises of a Government of Canada department located abroad (for example, diplomatic or consular mission), as outlined in subsection 4.4 of this guideline.
  • Ensuring that security classification structures are able to distinguish information and data labelled as personal information or sensitive information so that they can be properly protected and managed.
  • If a privacy breach is suspected, immediately report it to your ATIP office and work with them to implement your institution’s breach management plans to contain, manage and report on the privacy breach.
  • Protecting classified and protected information and data by ensuring that they are securely stored and properly disposed of, as required by established recordkeeping procedures, privacy and security laws and policies, and any other relevant legislation or policy.
  • In cases involving paper-based assets, storing classified information and data in approved locked cabinets. Store such assets on open shelves only if the room has been constructed according to the Secure Room “B” standards of the Royal Canadian Mounted Police.
  • Avoiding the storage or sharing of any information and data classified above the security level for which your departmental network(s) have been cleared (normally Protected A or B).
  • the Privacy Act
  • the Policy on Privacy Protection (and supporting instruments)
  • the Policy on Government Security (and supporting instruments)
  • other relevant legislation or policy
  • Implementing effective, attribute-based access control procedures to ensure that classified and protected information and data are made available only on a need-to-know basis to those who are authorized to access them. A security clearance does not automatically grant someone the right to see all information and data classified at or below the level of that clearance.

Not all information and data have the same value. Some will need to be kept over the long term to support a department’s policy, programming and service needs, or to preserve archival government records that contribute to Canada’s documentary heritage. Other information and data can be disposed of when it is deemed to be no longer useful. To this end, the following practices are recommended:

  • current departmental needs
  • whether other departments may seek to reuse it in the future
  • external parties that may find value in its release
  • Particularly for personal or sensitive information and data, set retention periods according to clearly demonstrated need for legitimate use, which is to be periodically (for example, annually) reviewed and updated accordingly.
  • Destroy transitory information and data as soon as they are no longer needed, complying with your department’s information management and security procedures. Similarly, a government institution shall dispose of personal information under the control of the institution in accordance with the regulations and in accordance with any directives or guidelines issued by the designated minister in relation to the disposal of that information. Personal information that has not served nor will serve the purpose for which it was collected should be immediately purged.
  • Cooperate with information management and data specialists to properly transfer digital or paper copies of information and data of enduring value to the Government of Canada and Canadians through Library and Archives Canada’s regulations and disposition authorizations.

3. Information and data use

In the absence of organizational frameworks, align with existing enterprise and/or international standards on the ethical and secure use of information and data. Developing or adopting a framework that addresses issues of data ethics and security can help ensure that information and data are not used (or reused) in ways that create risks or carry adverse consequences for Canadians. The UK Government’s Data Ethics Framework provides an example of a best practice in this area. The significance of data ethics is also highlighted in the Report to the Clerk of the Privy Council: A Data Strategy Roadmap for the Federal Public Service .

Assess the quality of data used or reused to ensure that it is fit for purpose. Quality assessment and control help mitigate the risk of using inaccurate or unreliable data, thus lowering the likelihood of incurring liabilities for any adverse consequences. Data quality is a core aspect of departmental data governance. Across federal organizations, there is no common approach to defining and measuring data quality. This highlights the importance of quality checks in the case of ‘third-party data’, as there is no guarantee that quality standards across organizations will be aligned. In an effort to build an enterprise-wide approach to data quality, the following dimensions have been put forward as the basis of a GC data quality framework:

  • Access: The ease with which data can be discovered and obtained by a user.
  • Accuracy: The degree to which data is free of error in its description of the real-world object(s) it is intended to represent.
  • Coherence: The degree to which data from one or more sources is comparable and linkable.
  • Completeness: The degree to which data encompasses the contextual and substantial features needed to enable its discovery and intended use.
  • Consistency: The degree to which components of data, and the relationships among them, are non-contradictory.
  • Interpretability: The degree to which data can be understood in its appropriate context.
  • Relevance: The degree to which data is deemed suitable to the purposes it is being considered for.
  • Reliability: The degree to which data is resistant to unexplainable changes over time.
  • Timeliness: The delay between the time at which data is available and the time at which the utility of using that data is highest.

Handle sensitive or personal information and data in a way that does not risk identification or re-identification, including through anonymization or pseudonymization practices that allow users to realize the value of data without compromising the privacy of the individuals or entities with whom it may be associated. While such practices may be necessary, they are not always sufficient: for example, anonymous location data could in some cases (e.g., when combined or analyzed with other data) lead to identifiable personal information. Such risks should be identified and assessed prior to using or reusing information and data. 

Build capacity for evidence-informed decision-making by instituting mechanisms that ensure that fit-for-purpose information and data are used to support each stage of a decision-making process. To maintain transparency, this process needs to be traceable or “auditable” such that the information and data used throughout their various stages can be traced and understood in the context in which they were employed. Evidence-informed decision-making, in conjunction with clear roles and responsibilities for information and data (as required under subsection 4.3.2.3 of the Policy on Service and Digital), can also improve accountability.

4. Information and data sharing

Strive to work in the open by default and steward information and data in a way that enables interoperability and reuse of information and data, subject to security, privacy or other legal limitations. Decisions to share or exchange data between government departments, including through information-sharing agreements, must be made in compliance with applicable privacy and security policy and legislation, including the Treasury Board Policy on Privacy Protection and Policy on Government Security . Refer to subsection 3.6 and subsection 4.6 of this guideline for more information on specific considerations related to privacy and security requirements. To minimize vulnerabilities to foreign actors when sharing information and data, it is also important to ensure that all Protected B, Protected C and classified materials are encrypted when in transit outside operations and security zones controlled by the Government of Canada, within Canada or internationally. Refer to the Direction on the Secure Use of Commercial Cloud Services: Security Policy Implementation Notice (SPIN) for more information.

Work to advance the objectives of the Directive on Open Government and any relevant Open Government National Action Plan commitments by proactively and purposefully releasing information and data of public value to current and future generations of Canadians. To maximize accessibility and facilitate preservation, the use of open formats for published information and data (e.g. CSV, JSON) is recommended. It is also recommended that non-sensitive information and data be released under an open licence for the public to share and reuse. Decisions to release information and data should be made in compliance with applicable privacy and security policies and legislation, as noted above. Refer to subsection 3.4 of this guideline for more information on specific considerations related to open government.

To maximize their value, information and datasets to be released to the public need to be fit for purpose. To avoid releasing “dead” information and data of little utility to users, assess and control the quality of the information and data deemed appropriate for publication. Existing or emerging enterprise and international data quality standards can be leveraged to achieve this objective. For example, Statistics Canada’s Quality Assurance Framework is useful for assessing the quality of data. The draft Open Government Data and Information Quality Standards in the Open Government Guidebook is another source of guidance on quality requirements for open data. Interdepartmentally, the Enterprise Data Community of Practice (requires an account to access this content) is currently supporting the development of an enterprise-wide standard on data quality.

Any information and data received from external parties, governmental or otherwise, need to be profiled and validated prior to their use or reuse. This practice involves, for example, evaluating the quality of the information and data, and complying with any applicable enterprise-level data standards needed to enable their structural and semantic interoperability.

3.2.1 Desscription and associated requirements

The Government of Canada is undergoing a digital transformation. An important part of this transformation includes adopting digital and automated systems to manage departmental information instead of relying on paper-based and manual processes. As the volume of information and data produced by the Government of Canada continues to grow, the need for digital systems that can perform auto-classification and other automated information management processes will increase.

The departmental CIO, in collaboration with other departmental officials as necessary, is responsible for:

3.2.2 Why is this important?

Managing information and data efficiently and effectively supports service and program outcomes and helps ensure a modern, service-oriented public service. Digital systems provide systematized support for effective information management and are key to acting in an agile and responsive manner. Services that are supported through digital systems enable seamless, secure, reliable and accessible data available anytime and anywhere, from any device.

Digital systems make it easier to collect, share and manage information and data in a timely and secure manner, and facilitate information search and retrieval. Using digital systems to manage information and data also supports more effective collaboration both internally and externally because of the ease with which the information can be shared and tracked, and allows information to be effectively managed from creation to disposition.

3.2.3 Considerations in implementing the requirement

Particular attention should be given to the following considerations when creating or choosing a digital information management system:

  • Leverage enterprise systems where possible in order to enhance interoperability and realize efficiencies.
  • Engage with users before choosing an information management system to ensure that it will meet their needs, as well as business requirements, and conduct ongoing testing with users throughout the process in order to understand how users will interact with the system and to identify glitches and pain points.
  • Ensure that digital information management systems allow for the management and maintenance of records over time; support import, export and interoperability; and maintain adequate context through metadata.
  • Develop the information management system based on business requirements in an agile manner by taking an iterative approach, running tests end to end with users, and making improvements based on user feedback.
  • Consider what security and privacy measures are required in order to appropriately secure and protect the information and data the system will need to manage, and engage with privacy and security officials to ensure that the system complies with all requirements for the collection, sharing and protection of personal information. Refer to subsection 3.6 and subsection 4.6 of this guideline for more information on specific considerations related to privacy and security requirements.
  • Consider how the information management system needs to be designed from the outset to ensure that it is accessible and usable for all employees, and ensure that you test accessibility features and all components of the system with a variety of users to make sure it meets the needs of all.
  • Map out and analyze existing business processes, and implement automation, auto-classification, machine learning and artificial intelligence, wherever feasible. Refer to subsection 4.5 of this guideline for more information on specific considerations related to automated decision-making.
  • Ensure alignment with the GC Business Capability Model to enable government-wide use.

3.3.1 Description and associated requirements

To deliver services digitally to Canadians, the Government of Canada’s systems need to communicate with each other using a common language, vocabulary and standards. They need to interoperate. The two policy and directive requirements under this theme call for deputy heads and departmental CIOs of departments to oversee the management of information and data such that interoperability is enabled to the greatest extent possible while respecting security and privacy requirements. Refer to subsection 3.6 and subsection 4.6 of this guideline for information on specific considerations related to privacy and security requirements.

These requirements reflect the Government of Canada’s acknowledgement of the opportunity that interoperability presents:

  • Information and data are invaluable assets for digital government, and they are most valuable when they have the potential to be deployed across different business contexts using interoperable systems.
  • Coupled with enterprise-level data standards, an interoperable digital environment enables effective data-sharing and reuse, and consequently reduces redundant data collection practices within and across departments.
  • Through an interoperability program, which covers the interoperability of data and systems, the Government of Canada is establishing norms, schemas, standardized tools, agreements, data structures and technologies for machines to exchange information and data effectively in order to reduce redundancy and maximize utility.
  • Developing and transforming digital systems to be interoperable requires partnership and collaboration between cross-cutting functional areas of expertise, including enterprise architecture, privacy, data, cyber security, procurement and IT.

3.3.2 Why is this important?

Getting the right information to the right people at the right time, while protecting personal information, is the key to improving digital government services for Canadians. Enabling interoperability across the Government of Canada means making possible the reuse, sharing and management of data in order to avoid duplication and maximize utility across departments.

By enabling interoperability, maximum value can be derived from information and data to:

  • improve service experiences for Canadians (for example, enabling a “tell us once” approach)
  • spark innovation across government departments, industry and civil society

In addition to ensuring that technical capabilities are in place, it is the responsibility of deputy heads and CIOs to oversee the development and application of a consistent set of rules, agreements, standardized methods and parameters. Interoperability is achieved only when these elements are developed and applied in a modern, secure and consistent way while considering the current legislative environment.

3.3.3 Considerations in implementing the requirements

The following implementation considerations clarify key concepts, describe available tools and make recommendations for deputy heads and departmental CIOs, as they are responsible for managing information and data such that interoperability is enabled. The implementation considerations are guided by the Mandatory Procedures for Enterprise Architecture (Appendix A of the Directive on Service and Digital).

Key concepts

  • Data reuse : Data reuse refers to deploying information and data assets to business contexts beyond that of their originator. In digital government contexts where reuse follows a set of standards and respects security and privacy requirements, exchanging data between government departments avoids duplication, enhances data quality, and is critical for advancing digital government service experiences for individuals and businesses. If personal information (any information about an identifiable individual) is reused or shared for a purpose (such as a department program or activity) other than that for which it collected, valid consent is generally required. Refer to subsection 3.6 of this guideline for more information on specific considerations related to privacy.
  • I nteroperability : Interoperability is a desired characteristic of a digital system wherein interfaces are able to interact to enable information and data deployment beyond the context of their originator.
  • Web service : A web service is a standardized, secure and consistent way of sharing a system’s functionality and data with other systems. Web services define the parameters for interaction for a set of functionality or data. They stipulate what functionality is provided, what data are accessible, how they are structured and how to interact with it.

How to enable interoperability

In enabling interoperability, departments could consider the following:

  • Expose system functionality as web services: The functionality of a system can be reused only when it is exposed (made accessible as web services). As an example, a legacy application that issues approvals or denials requires a web service interface (such as an Application Programming Interface (API) end point) in order to be exposed, through which another application can request approvals. Not exposing that web service would require human intervention and hinder reuse and sharing. Exposing functionality requires making it available from a technical perspective. It does not preclude the requisite controls from a security and privacy standpoint to limit access. Exposing functionality as web services increases the agility of government so that, as citizen expectations and government programs evolve, it is possible to reorganize the interactions between these systems to rapidly and effectively meet those needs. Simply put, exposing system functionality configures the Government of Canada’s digital assets as “plug and play” ready while maintaining consistent, secure and controlled access.
  • Make web services available through a well-defined interface: APIs provide an efficient, consistent and controlled way to make data accessible to other systems. Using APIs promotes reuse and sharing of data within the Government of Canada and with the Canadian public. Making the Government of Canada’s web services and data available through APIs also promotes a digital ecosystem where private industry, civil society, local governments and other external stakeholders can better align their services with those of the federal government.
  • Ensure that the data shared with other government organizations or on the open government portal adheres to enterprise data standards: As stated in subsection 4.3.1.1 of the Policy on Service and Digital , these standards include, but are not limited to, quality, accessibility, common architecture taxonomies and classifications, and life-cycle management. The Enterprise Data Community of Practice (requires an account to access this content) supports the development of data standards in these areas. For more information on how to manage information and data in a way that enables effective sharing and reuse, consult subsection 3.1 of this guideline.
  • Publish APIs that have potential for cross-departmental, inter-jurisdictional or public consumption to the Government of Canada API Store.
  • Ensure that APIs are designed according to the Mandatory Procedures on Application Programming Interfaces : These mandatory procedures govern how APIs are to be developed across the Government of Canada to better support integrated digital processes across departments. They describe how to ensure APIs are built resiliently and effectively to enable interoperability across the Government of Canada and where they should be published.
  • If personal information is shared within or outside of a department, the development of an information-sharing agreement is to be considered (see Guidance on Preparing Information Sharing Agreements Involving Personal Information ) in order to ensure that the sharing of personal information complies with applicable privacy legislation and policy. Refer to subsection 3.6 of this guideline for more information on specific considerations related to privacy.
  • Make use of the Canadian Digital Exchange Platform (CDXP) where suitable.
  • Participate in the Digital Exchange Community of Practice (DXCoP) (accessible only on the Government of Canada network), which is a forum to exchange ideas, provide insights, bring forward challenges, and highlight best practices related to interoperability and data exchange across the Government of Canada.

Tools to enable interoperability

  • The Government of Canada API Store is a digital marketplace to find and use reusable APIs. It is a centralized repository where users can find all the Government of Canada’s APIs.
  • The CDXP helps enable digital government by providing a standard environment to interconnect. The CDXP enables secure, private and real-time information and data-sharing, which allows systems to connect to support citizens and businesses. Departments can make use of the CDXP by first identifying requirements, such as what data or business service (such as address lookups) should be shared, and how the interaction should work (for example, event notification such as a death notice or real-time response required such as verification). The Government of Canada API Store is one tool of the CDXP. The CDXP program of the Office of the Chief Information Officer, TBS, is responsible for defining the use cases and best practices for leveraging CDXP components.

Appendix B: Mandatory Procedures on Application Programming Interfaces of the Directive on Service and Digital provides further requirements on how to enable interoperability and build APIs.

3.4.1 Description and associated requirement

The two policy requirements under this theme concern the public release of information and data, from different but mutually inclusive perspectives. The first obliges the deputy head of a government department to maximize publication of information and data on the open government portal, and the second obligates that the same deputy head to prioritize disclosure based on public demand.

Consequently, the two requirements must be read together and prompt a proactive approach to information and data stewardship, informed by public engagement. Specific approaches a deputy head may wish to take are outlined below.

This first requirement directs the deputy head to perform interrelated tasks relating to departmental information and data to make information and data open, while assuming a pre-existing knowledge of the department’s information and data holdings. Deputy heads must:

  • review their department’s information and data holdings for relevant security, privacy and other legal issues, including considerations for information and data as being open by design
  • ensure that information and data for publication conform to official languages and accessibility requirements
  • maximize the disclosure of information and data not subject to such considerations
  • make that information and data discoverable through the open government portal (open.canada.ca)

This responsibility implies a proactive approach to information and data management, with the identification of information and data for release at creation or collection. The requirement applies to all forms of government information and data; prioritization is subsequently expressed in the Policy’s requirement 4.3.2.9, quoted below.

Deputy heads are responsible for ensuring that personal information, as defined in the Privacy Act and the Privacy Regulations , is protected.

This second requirement of the Policy implies that deputy heads of departments perform the following three interrelated tasks relating to public demand for government information and data:

  • consider public demand for the disclosure of government information and data holdings
  • prioritize that information and data for disclosure
  • make that information and data discoverable through the open government portal

The policy requirement 4.3.2.8 requires maximizing the disclosure of all government information and data, and requirement 4.3.2.9 complements that by explaining how to prioritize those disclosures. It implies that deputy heads have an understanding of public demand for their departmental information and data holdings. Specific mechanisms that allow for such an understanding are outlined below.

Taken together, these two policy requirements may be read as follows:

  • consider relevant security, privacy and legal obligations relating to the department’s information and data holdings
  • consider public demand for the disclosure of government information and data
  • in accordance with public demand
  • in accordance with all other demands or requirements, including those identified in the Policy

3.4.2 Why is this important?

Effective information and data stewardship, meaning a whole-of-life-cycle approach to information and data management, enables many of the hallmarks of a user-centric, evidence-driven and digitally enabled public service. Publishing information and data as open resources is a core feature of effective and client-centric public services and programs, including the promotion of the following:

  • greater transparency
  • public accountability
  • effective governance
  • efficient service and program design
  • reduced work duplication
  • enhanced interdepartmental collaboration on cross-jurisdictional issues
  • increased opportunities with non-government stakeholders and service users, including economic and social program innovation

Security, privacy and other legal issues must be addressed at all stages of information and data life-cycle management. To protect privacy, personal information cannot be considered for public release, unless permitted by law

3.4.3 Considerations in implementing the requirement

Maximizing the release of information and data on the government portal (requirement 4.3.2.8 of the policy).

The term “maximize” is not defined in the Policy, and thus is to be given its dictionary definition, which is to make as large or as great as possible. The scope of possibility for maximizing release is nonetheless subject to prevailing legislation or policy instruments that require that deputy heads also assess security, privacy or other legal risks. In context, this means that information and data should be published as fully and completely as possible on the open government portal, wherever it is determined that there are no privacy, security or other legal risks that prohibit disclosure of information or data. Extensive guidance to supplement the information in this guideline is available through the Open Government Guidebook . Refer to subsection 3.6 and subsection 4.6 of this guideline for more information on specific considerations related to privacy and security requirements.

Notwithstanding the need to conduct risk assessments, it is not sufficient to state that portions of a dataset or other information contain risks and therefore that the whole record cannot be published. Rather, a serious effort is expected to be taken to separate sensitive from non-sensitive information and to publish the remainder. Institutions should consult with their ATIP office in this process to prevent the re-identification of information through the mosaic effect or other means. Accordingly, proactive risk mitigation is strongly implied by the term “maximize.” Deputy heads are thus encouraged to embrace an “open by design” approach to managing information and data, building in mitigation strategies to the creation of government records and datasets. This approach has the practical benefit of reducing administrative burdens and resource requirements associated with modifying already existing information and datasets.

Importantly, maximizing disclosure of government information and data is not a one-time activity. Many datasets and other sources of government information require regular updating. Deputy heads are encouraged to develop schedules for updating relevant information and data sources.

To the extent possible, and wherever relevant, it is recommended that deputy heads also ensure that government officials responsible for collecting data or creating datasets do so in a manner that is disaggregated by the lowest possible administrative categories. The eligibility for release of disaggregated data is subject to privacy and other legal obligations. Refer to subsection 3.6 of this guideline for further details on privacy requirements. Depending on the circumstances, maximizing disclosure of information and data also means maximizing the full breadth of the data, rather than in an aggregated form, to ensure that evidence used in creating policies and programs is appropriate and that there are no gaps. This consideration would need to be identified at creation or collection and would support other government priorities of inclusion and client-centric design.

Prioritizing information and data to be added to the government portal (requirement 4.3.2.9 of the policy)

Deputy heads retain some flexibility in how they assess public demand for information or data. These methods may include, but are not limited to the following:

  • conducting client or user surveys
  • analyzing frequent or repeat requests made under the Access to Information Act
  • consulting and engaging with relevant stakeholder groups or communities, in keeping with public engagement principles
  • reviewing requests received through interactions with the public or stakeholders, including on social media and through communication centres
  • reviewing requests received during events, including conferences, presentations, workshops with educational institutions, and hackathons
  • identifying issues or priorities of the government or department (for example, climate change, environmental issues
  • responding to requests received through the “ suggest a dataset ” feature on the open government portal

For the last of these, deputy heads are encouraged to ensure that a designated official within their organization receives and is responsible for responding to dataset suggestions originating from the open government portal.

Prioritization may also be subject to other considerations (for example, core mandate datasets disclosed as part of the Management Accountability Framework). The Policy does not define this process, although it should be understood as a discretionary exercise. As above, regarding privacy or security considerations, it is insufficient to favour one priority over another without undertaking a significant weighing exercise. Factors to consider may include:

  • the type and frequency of public demand
  • feasibility of disclosure
  • timeliness issues
  • potential impact of disclosure
  • the existence of other more appropriate mechanisms to obtain information (for example, other legislated obligations)

Where it is deemed that public demand can be met, data or information requested by the public should be published on the open government portal by employing the same considerations as for requirement 4.3.2.8.

Lastly, publication of information on the open government portal must adhere to the requirements in the Open Government Guidebook .

3.5.1 Description and associated requirements

This theme is about making digital information, as well as information, communication and technology (ICT) solutions and equipment, accessible at the outset (that is, when they are designed or created).

Accessible digital information and ICT solutions and equipment mean that they are fully usable by all, that is, by persons with and without disabilities. Accessibility allows clients and users to navigate through the information or use solutions and equipment in different ways.

In addition to being a cross-cutting consideration to keep in mind when implementing a number of requirements of the Policy on Service and Digital and the Directive on Service and Digital, accessibility is specifically mandated in the following requirements.

The CIO of Canada has a role to play in providing direction to departments as it relates to accessible ICT.

This policy requirement means that accessibility should be considered early in the process of procuring or developing new ICT solutions and equipment, that is, at the design stage. This requirement also includes considerations other than accessibility, which are explained in subsection 4.1 of this guideline.

This  requirement of the Directive is about the production and availability of accessible and usable digital information, which includes embedded content (for example, hyperlinks to other sources of information). Accessible digital information includes both web and non-web information. Non-web documents may include letters, emails, books, spreadsheets, presentations and videos that have associated user agents such as a document reader, editor or media player.

3.5.2 Why is this important?

Proactive consideration of accessibility benefits everyone in Canada, especially persons with disabilities. Accessible digital information and ICT solutions and equipment:

  • assist everyone
  • facilitate the inclusion of a diverse segment of Canadians
  • enable a significant segment of the population with diverse functional needs and abilities to participate fully and productively in all aspects of life, including effective interaction with the Government of Canada, as citizens, service clients and public servants

Accessibility is also grounded in a number of foundational statutes, including:

  • the Canadian Charter of Rights and Freedoms , which enshrines the equality of persons with disabilities
  • the Canadian Human Rights Act , which includes disability in the prohibited grounds of discrimination
  • the Accessible Canada Act , which includes requirements for federal departments to identify, remove and prevent accessibility barriers, including in the area of ICT

3.5.3 Considerations in implementing the requirements

Accessible ict solutions and equipment.

Policy requirement 4.4.2.2 applies to newly procured and developed Government of Canada ICT solutions and equipment, whether they are internal or public-facing, including IT tools and equipment for federal public servants.

Refer to the Guideline on Making Information Technology Accessible by All for implementation considerations when procuring or developing new ICT solutions and equipment that are accessible. The guideline also proposes additional considerations to improve accessibility as part of the life-cycle management of existing ICT solutions and equipment, including digital information.

Accessible digital information

The production of accessible digital information can be effectively accomplished by ensuring that information is perceivable, operable, understandable and robust to respond to the needs, abilities, work and interface techniques of a diverse group of users, as outlined in the following.

Perceivable

  • Provide text alternatives for non-text content
  • Provide captions and other alternatives for multimedia
  • make all functionality available from a keyboard
  • give users enough time to read and use content
  • do not use content that causes seizures or physical reactions (for example, rapidly flashing images)
  • help users navigate and find content
  • make it easier to use inputs other than by using a keyboard

Understandable

  • Create content that can be presented in different ways, including through assistive technologies without losing meaning
  • Ensure that users can access and interact with digital content by relying on various hardware and software products and configurations

The overarching objective of these principles is to better respond to the needs of a diverse set of users. For example, a blind user may use a screen reader or a braille display. A person who has a motor impairment may use a keyboard rather than a mouse. Other users may need to adjust font size or spacing to compensate for vision loss or cognitive disabilities.

Refer to the Treasury Board Standard on Web Accessibility for requirements applicable to public-facing web content.

Collaborative approach

Digital content production methods evolve rapidly as technology advances. Therefore, achieving consistent accessibility across departments requires a collaborative approach.

Although TBS provides guidance on digital accessible information and ensures the availability of up-to-date training, including through courses delivered by the Canada School of Public Service, departments are encouraged, through internal activities, to ensure that:

  • all employees are aware of the importance of accessibility and associated legal and policy requirements
  • employees receive regular training and updates on fundamental and emerging accessibility techniques and methods
  • practical resources are available to all employees

Practical resources and other references

  • The Treasury Board and the Public Service Commission of Canada Policy on the Duty to Accommodate Persons with Disabilities in the Federal Public Service establishes requirements for departments to create and maintain an inclusive, barrier-free environment in the federal public service to ensure the full participation of persons with disabilities.
  • Policy on the Planning and Management of Investments
  • Policy on Communication and Federal Identity
  • The Government of Canada’s Accessibility Strategy for the Public Service of Canada commits to high standards for accessibility in its policies, programs and services to all Canadians.
  • Shared Services Canada’s Accessibility, Accommodation, and Adaptive Computer Technology Program (AAACT) has a collection of guides (accessible only on the Government of Canada network) that provide practical assistance in creating accessible and usable digital information

Resources from other jurisdictions include the following:

  • Ontario Government Accessible Digital Office Document Project
  • IBM Accessibility Research (including checklists and guides)
  • Microsoft Accessibility Overview
  • GOV.UK Accessibility and assisted digital
  • Queen’s University Accessibility Hub
  • Web Content Accessibility Guidelines (WCAG) Overview
  • United Nations Convention on the Rights of Persons with Disabilities

3.6.1 Description and associated requirements

The policy requirements in this section ensure that the privacy and security of personal information held by departments is protected in all activities governed by the Policy on Service and Digital and the Directive on Service and Digital.

More detailed guidance on privacy protection can be found in the policies and directives issued in support of the administration of the Privacy Act .

These three policy requirements direct deputy heads of government departments to establish sound privacy practices to protect and manage personal information under their respective department’s control, consistent with the requirements of the following:

  • Privacy Act and Privacy Regulations
  • Policy on Privacy Protection
  • Directive on Privacy Practices
  • Directive on Privacy Impact Assessment
  • Directive on Personal Information Requests and Correction of Personal Information

Deputy heads are also required to ensure that the requirements of the Policy on Government Security for the protection of sensitive information are met.

Key requirements for the protection of privacy include:

  • ensuring that privacy practices are consistent with and respect the provisions found in the Privacy Act, the Privacy Regulations and other applicable legislation, including the institution’s enabling legislation
  • ensuring, before collecting personal information, that the institution has parliamentary authority for the program or activity for which the information is being collected and that the institution is collecting only the personal information that is directly related to and necessary for the delivery of a program or service
  • ensuring that legislative authority exists to collect and share personal information, and accountability for the governance of personal information is clear and documented
  • ensuring that a Privacy Impact Assessment for a program or activity is conducted for new or substantially modified programs or activities when personal information is used or intended to be used
  • ensuring that personal information is as accurate, up-to-date and complete as possible
  • limiting access to, and use of, personal information by administrative, technical and physical safeguards in order to protect that information
  • establishing plans and procedures for addressing privacy breaches
  • applying the institution’s standards for the retention of personal information, as well as the disposition standards as established by Library and Archives Canada
  • ensuring Government employees’ roles and responsibilities in protecting personal information are clearly documented and understood

This requirement of the Directive ensures that departmental CIOs (and other departmental officials) protect personal information and data under their control by documenting and mitigating risks. To fulfill this requirement, departmental CIOs must:

  • in collaboration with other departmental officials, establish practices for protecting and managing personal information to fulfill the requirements of the Directive on Privacy Practices regarding departmental activities that involve the creation, collection, retention, accuracy, use, disclosure or disposition of personal information under the department’s control
  • if a privacy breach is suspected, work with your ATIP office to implement your institution’s breach management plans to contain, manage and report on the privacy breach
  • identify, document, and mitigate information and data privacy and security risks and ensure compliance with the Directive on Privacy Impact Assessment as required

3.6.2 Why is this important?

The protection of privacy is an essential element in maintaining public trust. At its core, privacy is a foundational value in Canadian society that is deeply rooted in a tradition of human rights. Protection of privacy is a prior condition to the exercise of other rights, including freedom, equality, and democracy. 

The protection of privacy is a core responsibility of government and is integral to managing information held by government institutions. Canadians expect government departments to respect the spirit and requirements of the Privacy Act , the Privacy Regulations and associated policies to safeguard their privacy in a modern, data-driven environment.

These requirements aim to ensure that government departments collect, use, retain and disclose personal information in accordance with the requirements of the Privacy Act , the Privacy Regulations , and associated policies and directives.

3.6.3 Considerations in implementing the requirement

Under the Privacy Act , personal information refers to any information about “an identifiable individual that is recorded in any form.” Such information includes, for example, an individual’s address, Internet Protocol address(es), employment or medical history, personal opinions, and identifying numbers such as social insurance numbers. Some personal information (for example, health information, government-issued pieces of identification) is more sensitive than others. Generally, the more sensitive the information, the higher the risk of harm to individuals, and therefore the greater the requirements associated with ensuring its security.

Personal information must be collected, retained, used, disclosed and disposed of only in a manner that respects the provisions of the following:

Your institution’s ATIP office can advise you on these requirements. Find the contact information for ATIP coordinators in all ATIP offices across the federal government .

Security considerations

The Policy on Government Security provides direction on security controls in support of the trusted delivery of programs and services, including the protection of personal information under the Government of Canada’s control.

Mandatory Procedures for Enterprise Architecture Assessment (Appendix A of the Directive on Service and Digital ) stipulates specific procedures to be followed as they relate to business architecture, information architecture, security architecture and privacy. The Standard on Security Categorization (Appendix J of the Directive on Security Management ) provides details on security categories that must be applied to different types of information.

Departments should also consult the Standard on Security Event Reporting and the Government of Canada Cyber Security Event Management Plan .

For more information on managing cyber security events, refer to subsection 4.6 of this guideline.

4.1 Considerations at the design stage

4.2 digitally enabled operations, 4.3 cloud services, 4.4 data residency, 4.5 automated decision-making, 4.6 cyber security, 4.7 digital identity.

Canadians expect their government to adapt how it operates, designs and provides services in order to meet their needs. Technology provides an opportunity for government to better understand its clients, improve its services to meet their needs, and operate more efficiently. This section provides information on requirements related to managing technology. It outlines a balanced approach by explaining how departments can make use of new methods, tools and technologies, while ensuring that important considerations related to ethics, accessibility, protection of personal information, security and other aspects are addressed at the outset.

Among the expected outcomes of the Policy on Service and Digital is that technology is leveraged to enable business and program innovation and service delivery.

4.1.1 Description and associated requirement

This requirement requires deputy heads to ensure that accessibility, official languages, protection of personal information, the environment, and security requirements or standards are addressed by design when procuring or developing information, communication and technology (ICT) solutions and equipment.

4.1.2 Why is this important?

It is important to address requirements or standards for the following to ensure that users and clients have access to solutions and equipment that they can safely use, no matter their ability or official language spoken:

  • official languages
  • protection of personal information
  • the environment
  • security in the design of procured or developed ICT
  • contracting and other arrangements

Although various requirements already exist, this requirement of the Policy underscores the importance of addressing all of these considerations at the design stage of ICT procurement or development . There are clear benefits related to this approach, including:

  • better anticipation of root causes of issues, increasing the ability to remediate at the source
  • increased awareness of issues and risks at an early stage
  • simpler and less costly solutions by identifying potential problems at the outset and decreasing the need for retrofitting at a later stage
  • better ICT solutions and equipment for users and clients of all abilities and needs, promoting confidence in government and contributing to better experiences for users and clients
  • avoided major failures related to ICT procurement and development experienced by the Government of Canada and other jurisdictions
  • avoided breaches of relevant laws and administrative policies
  • minimized negative environmental impacts and considered greenhouse gas emissions of ICT procurement and development

4.1.3 Considerations in implementing the requirement

Before spending valuable and limited resources on designing, an essential step is to articulate the problem, identify the root cause, and communicate the desired business outcomes. Doing so allows stakeholders to understand why the problem is important, how it came to be, and what is expected to happen once the problem is resolved. This analysis:

  • creates the foundation on which all other work is built
  • provides a consistent understanding among stakeholders
  • sets a clear direction for stakeholders to work toward

In April 2018, the government of Canada articulated these aspects in their instructions for the Concept Case process. Mandatory Procedures for Concept Cases for Digital Projects (Appendix C of the Policy on the Planning and Management of Investments) describes when a concept case is necessary and provides a template to be used. Even if a project does not meet the criteria to submit a concept case, this template can still be used, as this information is important for any initiative.

Considerations at the design stage

Mandatory Procedures for Enterprise Architecture Assessment outlines the assessment framework to be used by departmental enterprise architecture review boards and the Government of Canada Enterprise Architecture Review Board to review digital initiatives, which includes procured and developed ICT solutions and equipment. These mandatory procedures guide departments in assessing their procurements and in developing ICT solutions and equipment. In addition to the requirements in these mandatory procedures, the following requirements and standards should be considered in the design of ICT solutions and equipment:

Refer to subsection 3.5 of this guideline for information on specific considerations related to newly procured or developed ICT solutions and equipment.

When procuring or developing ICT solutions and equipment, the following should be taken into consideration at the design stage:

  • Official Languages Act
  • Policy on Official Languages

Protection of personal information

  • Privacy Act
  • Personal Information Protection and Electronic Documents Act (Part 2)

Refer to subsection 3.6 of this guideline for information on specific considerations related to privacy and protection of personal information.

Environment

  • Policy on Green Procurement
  • Security of Information Act
  • Policy on Government Security
  • Appendix B: Mandatory Procedures for Information Technology Security Control
  • Appendix J: Standard of Security Categorization
  • Standard on Security Screening
  • Appendix A: Mandatory Procedures for Enterprise Architecture

Refer to subsection 4.6 of this guideline for information on specific considerations related to cyber security.

The above considerations are also key elements of providing client-centric services, which is discussed in detail in subsection 2.1 of this guideline.

4.2.1 Description and associated requirement

The Policy on Service and Digitaldefines digitally enabled operations as operations that are supported by strategically leveraging information and communications technologies, infrastructures, and the information and data they produce and collect. Simply put, this means that the government takes advantage of modern, digital means to operate and deliver services to Canadians. Doing so includes operating in a digital-first and integrated environment and supporting workers with digital tools to facilitate efficiency and effectively deliver on the goals of the Government of Canada.

Requirement for directed at departments under the Policy

4.2.2 Why is this important?

A digitally enabled government can be more responsive to emerging issues and user needs, and be more agile in its approach to decision-making, day-to-day operations, and service delivery.

An organization that is digitally enabled can be more efficient, effective and responsive because digital tools have the potential to simplify and speed up cumbersome analogue processes (e.g. paper-based applications for internal or external services). Furthermore, digitally enabled operations support an open and collaborative government and public service by providing fast, secure platforms for information and data exchange and collaboration within the Government of Canada, as well as with Canadians.

4.2.3 Considerations in implementing the requirement

A government that has digitally enabled operations allows public servants to access integrated information and data systems, which in turn provides consistency, exposes gaps and duplications, enables richer analysis, and supports multi-channel service delivery.

A digital government builds digital delivery methods into its internal operations and service design, and provides the required tools to digitally enable interactions across the public service, through all service channels, including traditional avenues such as over the telephone or in person.

See subsection 2.3 of this guideline for more information on online services.

How to digitally enable operations

Implementation considerations that could help ensure that departmental operations are digitally enabled include:

  • Reviewing existing internal and external business processes and identify those that could benefit from the use of digital tools and processes (e.g., applications for government services, licences, permits, approval processes).
  • Considering how traditionally analogue processes can be supplemented with digital mechanisms (e.g., using voice-to-text technology to offer a more inclusive experience for persons with disabilities by providing real-time text closed captioning).
  • Considering how digital tools and processes can be used to improve service delivery and client satisfaction, for example, by simplifying client access to Government of Canada services, such as a single account or where the user only has to “tell us once”, or leveraging artificial intelligence technology and analytics to gain insights into the customer experience.
  • Considering how back-end operations can be digitally optimized and made more efficient (e.g., through the use of workflows, artificial intelligence, machine learning).
  • Integrating core business applications so that systems can share information and data and reduce duplication of efforts and resources (e.g., financial application systems integrated with an Electronic Document and Records Management Solution (EDRMS)).
  • Providing a modern workplace fit-up, such as tablets or laptops, mobile computing, extended Wi-Fi capabilities, web conferencing and support for telework arrangements. A fit-up is an excellent opportunity to drive forward the digital principles of using the right tools for the job, being inclusive and providing support for those who need it. Refreshed and open work environments and tools, which promote local and interdepartmental collaboration, may contribute to employees feeling respected and supported, and to better outcomes.
  • Where possible, considering making systems and processes open by design to enable collaboration, interoperability and improved user experience.
  • Ensuring consistency and interoperability across all delivery channels, including in person, telephone and online.
  • Implementing considerations (e.g., security, privacy, accessibility) at the design stage according to subsection 4.1 of this guideline so as to continually maintain and operate services and programs and reduce likelihood of system failures.
  • Including continual improvement processes as part of your evaluation approach to ensure that systems (such as operational systems and business applications) are kept updated and modern.
  • Where relevant, leveraging a cloud-first approach, as outlined in subsection 4.3 of this guideline.
  • Regularly reviewing and updating all operational business requirements to ensure that needs are current and met (for example, operating a service-oriented department that considers workers’ evolving needs, and keeping departmental systems up-to-date to ensure security).
  • Designing processes to ensure that workers have the digital tools and training required to operate in a modern and responsive environment (for example, establishing and executing a plan for regularly replacing and upgrading hardware, providing learning opportunities and training supports to personnel, and conducting regular surveys with users to find out what digital tools they need).
  • Engaging in cross-departmental collaboration and sharing for choosing and analyzing the best use of emerging, modern and updated digital tools and services (for example, the GCdocs Information Management Directors’ Steering Committee helps prioritize new functionality to be provided by the Public Services and Procurement Canada GCdocs program and shares best practices and lessons learned for EDRMS adoption within departments).
  • Linking these activities to departmental governance and decision-making processes. See subsection 1.1 of this guideline for more information.

4.3.1 Description and associated requirements

Public cloud computing can be compared with public utilities that deliver commodities such as electricity. Instead of buying and running infrastructure itself, an organization buys computing power from a provider. In a public cloud model, vendors maintain and renew the infrastructure, upgrading applications and adding new capabilities, and customers purchase computing power on demand rather than acquiring and operating the infrastructure themselves.

The Directive on Service and Digital calls for a “cloud-first” approach, that is, that public cloud is to be considered as the primary model for systems and data that are categorized at the Protected B level or below.

Cloud is applicable to new investments and for addressing end-of-life technologies and data centre closures.

When proposals at the Protected B categorization level or below are undertaken that do not use a public cloud deployment model, they must be submitted to the GC Enterprise Architecture Review Board (GC EARB) for assessment. See subsection 1.4 of this guideline for information on when and how to submit initiatives to GC EARB. Although public cloud may not always be the optimal deployment model for technology, departments are required to demonstrate through the GC EARB that appropriate consideration has been given to deploying through a public cloud environment.

4.3.2 Why is this important?

Cloud is shifting the way IT is being delivered. Cloud allows for the improvement of the stability and security of existing systems and services and better balances supply and demand. It also enables universal access to shared systems and higher-level services, all of which can be rapidly deployed with minimal effort, leading to improved coherence and economies of scale.

Cloud services are important because Canadians increasingly expect the government to:

  • deliver digital services that give them the same quality of user experience they get from commercial service providers, such as financial institutions, online shopping services and social media services
  • deliver digital services with the agility and speed necessary to keep pace with changing legislation and government service offerings
  • minimize the IT life-cycle management costs of applications and infrastructure

4.3.3 Considerations in implementing the requirements

The table below provides a summary of the cloud deployment models available to departments and suggests when the usage of each might be appropriate.

Application strategy Innovate or migrate Migrate or tolerate Tolerate

Deployment model

is an existing commercial multi-tenant offering. Public cloud is the default deployment model for applications at or below the Protected B level. Public cloud is used when deploying new applications or when modernizing applications to address technical or business risks, including migration from legacy data centres.

are existing modern data centre facilities that are appropriate when an existing application must be migrated due to decommissioning of an at-risk legacy data centre, but the cost of refactoring or replacement required to migrate the application to a cloud environment is extremely high (that is, tens of millions of dollars for a single application). This model is not acceptable for new applications unless the data is categorized above Protected B.

are data centre facilities that existed prior to the availability of enterprise data centres.

Legacy data centres are the point of origin for application migration. They are no longer a target for application migration.

The Government of Canada Cloud Adoption Strategy describes the government strategy for adopting cloud services and provides background information, definitions and key implementation considerations.

As directed by requirement 4.1.1.2.4 of the Directive on Service and Digital, proposals of digital initiatives that are categorized at the Protected B level or below and that are using other system development and delivery options (e.g., hybrid public cloud-enterprise data centre model) must be submitted to the GC EARB before proceeding, using the GC EARB Presenter Template on the GC EARB GCcollab page . See subsection 1.4 of this guideline for information on when and how to submit initiatives to the GC EARB.

Cloud services must be used in compliance with the requirements of the Policy on Government Security and the Directive on Security Management . The Direction on the Secure Use of Commercial Cloud Services: Security Policy Implementation Notice (SPIN) supports departments in understanding the Treasury Board’s security policy requirements in the context of cloud computing and provides guidance to assist in the secure use of commercial cloud services. Additionally, tools and templates are available to help secure cloud environments:

  • Government of Canada Enterprise Security Architecture (GC ESA) Artifact Repository (requires an account to access this content)
  • Government of Canada ESA Cloud Security Initiative (requires an account to access this content)
  • Canadian Centre for Cyber Security – Publications (filter topics by “cloud security”)

Cloud services must also be used in compliance with privacy-related laws and policies. Refer to subsection 3.6 of this guideline for information on privacy and protection.

Finally, the Government of Canada provides a consolidated cloud services landing page for all public-facing cloud documentation, including strategy, risk assessments and interpretation of existing policies in the context of cloud.

4.4.1 Description and associated requirement

Data residency refers to the physical or geographic location of an organization’s data while at rest. This is distinct from data sovereignty, which refers to a country’s right to control access to and disclosure of digital information that is subject to its own legislation. For more information on data sovereignty, refer to Government of Canada White Paper: Data Sovereignty and Public Cloud .

The CIO is responsible for:

A Government of Canada approved computing facility is one that is located within the geographic boundaries of Canada or within the premises of a Government of Canada department located abroad, such as a diplomatic or consular mission. The computing facility does not need to be owned by a Canadian corporation, as this could be in violation of trade agreements to which Canada is a party.

Classified electronic data (that is, classified as Confidential, Secret or Top Secret) is data that if compromised would reasonably be expected to cause an injury to the national interest. Classified data also includes data that has regulatory or statutory prohibitions and controls. Protected B and Protected C electronic data is data that, if compromised, could cause serious or extremely grave injury to an individual, organization or government. Consult the Levels of security tool and the Standard on Security Categorization for more information on levels of security and information confidentiality categories.

4.4.2 Why is this important?

Data residency is important because it can impact Canadians’ confidence in government decisions. The public may perceive the storing of their sensitive data outside of Canada’s borders to be at risk. Data residency is also an important issue that departments face as they increasingly move information to the cloud.

There is a growing need to ensure that data is protected and complies with data residency, privacy and security requirements. For clarity, the residency policy applies to the storage of data. Data in transit is not restricted by the residency requirement.

4.4.3 Considerations in implementing the requirement

Whether the data resides in Canada or outside, departments must continue to apply appropriate controls, in accordance with the Direction on the Secure Use of Commercial Cloud Services : Security Policy Implementation Notice and the Directive on Security Management . Controls include ensuring that all Protected B, Protected C and classified Government of Canada electronic data is encrypted when in transit.

Before using cloud services to support departmental programs and services, departments are expected to identify and categorize information based on the degree of injury that could be expected to result from a compromise of its confidentiality, integrity and availability. For more information, refer to subsection 4.3 and subsection 4.6 of this guideline.

The departmental CIO is responsible for approving departmental decisions to store data outside Canada. However, in the case where a department provides internal enterprise services, it is recommended that the CIO of Canada approve decisions related to data residency.

The following criteria are to be considered when evaluating the option to store data outside Canada:

  • Reputation : It is important that Canadians continue to trust the Government of Canada and the decisions it makes. When evaluating whether to move data outside Canada, consider how an average Canadian, the media or a critic of the government would perceive the Government of Canada’s decision to store the dataset outside Canada.
  • Guidance Document: Taking Privacy into Account Before Making Contracting Decisions
  • Government of Canada White Paper: Data Sovereignty and Public Cloud
  • Trade agreements : Procurements must comply with Canada’s obligations under its trade agreements not to discriminate against suppliers that store data outside Canada. Some of those trade agreements allow the Government of Canada to restrict sensitive data to Canada where data residency is a legitimate operational requirement or for other reasons. However, any such restrictions must be imposed in accordance with the requirements of the trade agreements.
  • Market availability : If the required capabilities allow data to remain isolated to Canada, those capabilities should be considered first. However, some solutions cannot isolate data to Canada or may not yet be able to isolate data to Canada. It is important to understand how the provider will evolve the capabilities of the desired service.
  • Business value : The evaluation should weigh how any business value gained against any perceived risks of moving the data outside of Canada.
  • Technical capabilities : Consider whether there are sufficient technical capabilities available that would provide Canadians with additional assurance that data moved outside of Canada will remain protected.

The following table provides a summary of data residency restrictions.

Categorization level Data residency

Facilities located within the geographic boundaries of Canada or within the premises of a Government of Canada department located abroad are identified and evaluated as a principal delivery option.

4.5.1 Description and associated requirements

Automated decision-making is when technology is used to produce assessments about a particular individual or case meant either to directly aid a human in their decision-making or make a decision in lieu of a human.

The Policy on Service and Digitalstates that deputy heads are responsible for ensuring the responsible and ethical use of automated decision-making systems. The supporting Directive on Automated Decision-Making aims to ensure that automated decision-making systems are used in a manner that is compatible with core administrative law principles, such as transparency, accountability, legality and procedural fairness. This directive also includes an Algorithmic Impact Assessment (AIA) tool designed to help departments assess and mitigate risks associated with deploying an automated decision-making system. The AIA also helps identify the impact level of automated decision-making systems.

4.5.2 Why is this important?

This policy requirement, which applies to automated decision-making systems developed or procured on or after April 1, 2020, and supporting directive requirements, aim to reduce risks to Canadians and federal departments when using automated decision-making systems and ensure efficient, accurate, consistent and interpretable decisions which are made pursuant to Canadian law. Departments adopting automated decision-making systems should take early action so that they can address implementation concerns of bias and lack of transparency at the outset. This proactive, consistent and responsible approach also minimizes the Government of Canada’s legal liability and public-facing risks.

4.5.3 Considerations in implementing the requirements

The implementation considerations below are guided by the Directive on Automated Decision-Making (the directive).

Initiation phase

Complete the AIA early in the initiation phase, as the results of the AIA (specifically the “impact level”) will articulate the mitigation and/or consultation requirements to be addressed in the implementation plan of an automated decision-making system as required by the directive (see subsection 6.1.2 of the directive). 

Engage legal services early in order to meet the directive’s requirement to consult with institutional legal services (see subsection 6.3.8 of the directive) and maximize their value. Legal services can provide advice on the following:

  • the requirements of the explanation for decisions (see subsection 6.2.3 of the directive)
  • how to answer certain AIA questions
  • recourse options that need to be available (see subsection 6.4.1 of the directive)
  • other issues

In addition to engaging legal services, consult with your institutional Access to Information and Privacy (ATIP) office early in the process to ensure the automated decision-making system is compliant with privacy legislation and policies from the outset. In the event personal information is being leveraged by the automated decision-making system, the Privacy Act and related policy suite will articulate the applicable requirements. The institutional ATIP office will provide advice on determining whether information is personal and respecting requirements related to its use in decision-making processes.

In order to meet transparency requirements (see subsections 6.1.4 and 6.2 of the directive) and pursuant to the Directive on Open Government , consider in advance what documents and data will be published. The AIA’s “De-Risking and Mitigation Measures” section suggests several publications to mitigate risks and increase transparency and public trust. Reviewing these materials will also help ensure that official languages, privacy and accessibility are considered from the beginning.

Execution phase

Working with suppliers.

In the event that part of the implementation is contracted to suppliers, consider sharing the directive with them so that they are aware of the department’s obligations. It is the department’s responsibility to ensure that the requirements of the directive are met. 

In drafting the statement of work, consider including requirements to ensure the supplier’s participation in compliance processes, as appropriate. For example:

  • Have the supplier participate in completing the AIA (see subsection 6.1.1 of the directive) so that they can be informed of the potential impacts of the system and advise on the feasibility of certain mitigation measures proposed.
  • Have the supplier participate in the peer review (see subsection 6.3.4 of the directive). Doing so will provide additional information on the system design, testing conducted to minimize undesired outcomes, training data, and other aspects.

Finally, note that some of the directive’s requirements directly impact the clauses that must be present in the contract. Ensure that the requirements for access to components are adequately covered in the contract or licence (see subsection 6.2.5 of the directive).

Model selection

The section on model selection of the AIA is relevant only if machine learning is used in the automation of decision-making.

Being able to explain how decisions are made is critical (see subsection 6.2.3 of the directive). If generating this explanation to the client requires understanding how an artificial intelligence (AI) arrived at its result, it is important that the AI model itself be interpretable. Having an easily interpretable model can also greatly simplify testing and verifying of the system, including assessing bias. With recent impressive computational improvements, there are many techniques to achieve this. It is important that the way an explanation is derived for decisions is considered when selecting and designing a machine-learning model.

By their design, neural networks and deep learning come with greater challenges in providing an easily intelligible explanation. On the other hand, it is simpler to interpret the results of algorithms such as optimized rule lists, sparse linear models with integer coefficients and sparse decision trees, and their accuracy can be comparable in many situations. The pros and cons of each are often application-specific. Favour the simplest model that will provide the performance, accuracy, interpretability and lack of bias required.

Terminology in the AI field is not standardized. The terms “interpretability” and “explainability” are sometimes used interchangeably. Interpretability is the ability to present in understandable terms to a human how a prediction was derived by inspecting the model itself. In other words, interpretability refers to the resulting prediction being readily discernable directly from the inputs, by a human. This is highly desirable.

Explainability is a set of techniques, often applied to black-box models, to explain a prediction. In more complex cases, it may refer to the use of a second, simpler model that makes very similar predictions to the original production model to provide a clearer understanding of that prediction. Because the two models may yield different predictions in some cases, the resulting explanation can be misleading. Additional assessments may be required when the simpler model produces different predictions. Perhaps more importantly, be aware that the simpler model is only an approximation and may suggest explanations that are unrelated to what is actually going on in the original model.

4.6.1 Description and associated requirement

This section provides guidance on how to meet the requirements on cyber security that are set out in:

  • the Policy on Service and Digital;
  • the Directive on Service and Digital.

Cyber security must be considered in relation to every theme in this guideline to ensure that the Government of Canada and its information, data, applications, systems and networks are secure, reliable and trusted.

The terms “cyber security” and “IT security” are often used interchangeably, but IT security is a broader concept than cyber security.

In the Government of Canada, the terms are understood as follows.

  • IT security

IT security is the discipline of applying security controls, security solutions, tools and techniques to protect IT assets against threats from compromises throughout their lifecycle. IT security focuses on the security of both electronic data assets and physical IT assets. In other words, it covers, for example, the security of files that are stored on devices, the security of the systems used to store them and the security of the devices themselves.

Cyber security

Cyber security refers to the security of the transmission of electronic data and information across cyberspace. It covers the technology, processes, practices, and response and mitigation measures designed to protect electronic information, data and information infrastructure from mischief, unauthorized use or disruption in cyberspace. Cyber security complements IT security.

Cyber security operationalizes the IT security controls set out in subsection B.2.3 of Appendix B of the Directive on Security Management .

Ultimately, the goal of both cyber security and IT security is to preserve the confidentiality, integrity, availability, intended use, and value of electronically stored, processed, or transmitted data and information.

To make sure cyber security is appropriately managed in the Government of Canada, under the Policy on Service and Digital , deputy heads must establish clear reporting responsibilities for cyber security.

The requirements of the Directive on Service and Digital outline how the designated official for cyber security is required to respond to and manage cyber security events in the organization. To provide timely and efficient management of cyber security events and incidents, an incident management program must have:

  • supporting services and activities; and
  • strategic leadership in place to ensure informed decision-making.

Furthermore, ensuring that cyber security requirements and appropriate measures are applied to protect IT infrastructure will enable the trusted delivery of internal and external programs and services.

The designated official for cyber security (DOCS), in collaboration with the departmental CIO and chief security officer (CSO), as appropriate, is responsible for:

When identifying and establishing roles and responsibilities for reporting cyber security events and incidents, DOCS, in collaboration with the CIO and CSO, as appropriate, should consider section 5 of the GC CSEMP update, in accordance with subsection 4.1.6 of the  Directive on Security Management . The GC CSEMP provides an operational framework for managing cyber security events (including cyber threats, vulnerabilities or security incidents) that impact or threaten to impact the Government of Canada’s ability to deliver programs and services to Canadians.

4.6.2 Why is this important?

A safe and secure cyberspace is important for the security, stability, and prosperity of Canada. Good cyber security is critical to Canada’s competitiveness, socio-economic stability, and long-term prosperity.

The requirements related to this theme ensure that cyber security and any incidents or events are addressed in a consistent, coordinated and timely fashion across the Government of Canada. The requirements also ensure that appropriate cyber security measures are applied in a risk-based, life-cycle approach. Taken together, all cyber security requirements serve to enable sustainable, secure and resilient government-wide infrastructure that supports the trusted delivery of programs and services that Canadians want and expect.

4.6.3 Considerations in implementing the requirements

The following are guiding principles to be considered by the DOCS when implementing the requirements of the Directive on Service and Digital . These requirements support the implementation of the Policy on Government Security . The requirements can help to ensure that appropriate risk-based measures are applied continuously in an identify, protect, detect, respond and recover approach to information systems and services, in consultation with the departmental CIO and CSO.

The aim is to provide guidance, based on existing standards, guidelines, and practices, for departments to better understand, manage and reduce cyber security risk. This guidance can also assist the DOCS in determining which activities are most important to assure critical operations and service delivery. In turn, DOCS will help to prioritize investments and maximize the impact of each dollar spent on cyber security.

Identify: Identify and manage security risks

  • Cyber security governance and management policies and processes are established, with clear roles and responsibilities. This includes the role of the DOCS in providing leadership and oversight of cyber security, supporting the CIO and CSO

Business environment

  • Business context and stakeholder needs are understood
  • Critical services are identified and plans are in place to ensure continued delivery, in accordance with the Directive on Security Management , Appendix D: Mandatory Procedures for Business Continuity Management Control

Risk management strategy

  • Risk management processes are established, and risk tolerance is understood in support of risk-informed decision-making

Asset management

  • The identity and value of systems, applications and information are determined and documented. Such documentation includes tracking and recording all hardware and software assets in a Government of Canada–approved repository (such as, Application Portfolio Management)
  • The confidentiality, integrity and availability requirements of systems, applications and information are determined and documented based on the degree of injury that could be expected to result from a compromise. For more information, consult the Directive on Security Management , Appendix E: Mandatory Procedures for Information Management Security Control and Appendix J: Standard on Security Categorization , and the Security Categorization Tool .

Risk assessment

  • Security risks are identified, documented, managed and accepted both before systems and applications are authorized for use, and continuously throughout their operational life, in alignment with the Directive on Security Management , Appendix B: Mandatory Procedures for Information Technology Security Control
  • The impact of new programs and systems on the personal information of Canadians is evaluated through a Privacy Impact Assessment or similar privacy risk assessment

Supply chain risk management

  • Systems and applications are delivered and supported by trusted suppliers as part of a risk management approach. Such risk management includes ensuring that cyber security roles, responsibilities and requirements are included in contracting, in accordance with the Directive on Security Management , Appendix F: Mandatory Procedures for Security in Contracts and Other Arrangements Control , and that suppliers assure their cyber security posture against Government of Canada–approved security baselines
  • Third-party suppliers are routinely assessed to confirm they are meeting their contractual obligations

Protect: Implement measures to reduce security risks

Information protection processes and procedures.

  • Ensure that systems and applications are designed, deployed, maintained and decommissioned based on their value and their confidentiality, integrity and availability requirements, in alignment with the Canadian Centre for Cyber Security’s Information System Security Risk Management Activities (ITSG-33: Annex 2) and industry best practices (for example, SAFECode Fundamental Practices for Secure Software Development , ISO/IEC 27034 and Open Web Application Security Project (OWASP) )
  • Perform threat modelling and prioritize cost-effective security measures to reduce cyber threats and protect personal information
  • Implement measures to protect information systems, their components and the information they process and transmit against attacks that leverage vulnerabilities in those systems and that could have an impact on the availability or confidentiality of those systems (for example, malicious code), in accordance with the Directive on Security Management , Appendix B: Mandatory Procedures for Information Technology Security Control
  • Regularly back up information, applications and configuration settings in a secure and proven manner so that the data is encrypted, unchangeable and isolated. Regularly test restoration from backups
  • Establish a plan to ensure that vulnerabilities are managed, and promptly apply security-related patches and updates, including emergency patches. Regularly test for the presence of known vulnerabilities and common configuration errors. For more information, refer to Patch Management Guidance

Awareness and training

  • Personnel are provided with ongoing cyber security awareness training, which includes training and guidance on cyber security and risk management for senior personnel. Such training promotes a culture of awareness and education about cyber security across the organization. The Canadian Centre for Cyber Security’s Learning Hub is a source for cyber security learning activities and programs
  • Roles and responsibilities for users with administrative access, senior officials and third-party suppliers are understood

Identity management, authentication and access control

  • Leveraging digital identity services that support Government of Canada–approved trust frameworks, such as the Pan-Canadian Trust Framework , and standards, such as the Digital Trust and Identity: Part 1 (CAN/CIOSC 103-1:2020) , in accordance with the Directive on Identity Management . For more information, refer to  subsection 4.7  of this guideline
  • Granting access to identified, authenticated and authorized users or systems that require such access for their duties based on the principles of least privilege and need to know
  • Implementing multi-factor authentication where technically possible, such as for accounts with enhanced privileges (or administrator access) and remote access
  • Physical access to systems, supporting infrastructure and facilities is restricted to authorized personnel, in accordance with the Directive on Security Management , Appendix C: Mandatory Procedures for Physical Security Control

Data security

  • Systems adequately protect data at rest and data in transit using approved cryptographic protection. For more information, refer to Guidance on Securely Configuring Network Protocols (ITSP.40.062) and Cryptographic Algorithms for Unclassified, Protected A, and Protected B Information (ITSP.40.111)
  • Appropriate sanitization or destruction measures are put in place before reuse or disposal of the equipment. Such measures are commensurate with the sensitivity of the information stored and in accordance with departmental practices. For more information, refer to IT Media Sanitization (ITSP.40.006)

Protective technology

  • Ensure a management system for audit logs is implemented that includes auditing of sensitive actions or data exchange or access. For more information, refer to the Event Logging Guidance
  • Technology that is configured to limit services exposed and information exchanged to the minimum necessary is implemented. Such technology ensures that only trusted and supported operating systems, applications and computer code can execute on systems. The configurations outlined in the Directive on Service and Digital , Appendix G: Standard on Enterprise IT Service Common Configurations should be respected
  • Where available, leverage protective security services that implement cyber defence protection and threat monitoring capabilities
  • Put in place protection measures, such as encrypting data at rest, where the Government of Canada organization cannot expect physical protection, for example, when a mobile device or laptop is taken off-site, or data is stored on removable media. For more information, refer to Secure use of portable data storage devices within the Government of Canada

Maintenance

  • Maintain systems and applications in a secure, accountable and auditable manner

Detect: Detect and understand cyber security events

Detection processes.

  • Define roles and responsibilities for detection, in alignment with the GC CSEMP

Anomalies and events

  • Cyber security events and anomalous activities are detected, collected, correlated and analyzed in a timely manner

Continuous security monitoring

  • Continuously monitor information systems and assets to identify cyber security events and verify the effectiveness of protective measures

Respond: Responding to cyber security events

Response planning.

  • Prepare to respond to and recover from successful attacks. Establish an incident management plan with clearly defined actions, roles and responsibilities to ensure that cyber security incidents are contained, eradicated and recovered from in a timely manner, in alignment with the GC CSEMP . Regularly test the incident management plan and use post-test findings to inform the technical protection of the system or service
  • Put in place a plan to manage incidents that involve breaches of privacy. In the event of a privacy breach, undertake immediate action as outlined in the Directive on Privacy Practices and the Guidelines for Privacy Breaches . For more information, refer to subsection 3.6 of this guideline
  • Review information system security alerts, advisories, and directives, such as those issued by the CIO or the Canadian Centre for Cyber Security, and implement directives in accordance with established time frames

Communications

  • Identify and report cyber security incidents to relevant internal and external bodies, such as the Canadian Centre for Cyber Security ’s report a cyber incident page .
  • Conduct analyses to ensure effective response and support recovery activities
  • When an incident is discovered, mitigating measures are assessed and applied at the earliest opportunity by drawing on expert advice where necessary (such as from the Canadian Centre for Cyber Security). Activities are performed to prevent spread, mitigate the effects, and resolve the incident

Improvement

  • Incorporate lessons learned in response plans

Recover: Recovering from cyber security events

Recovery planning.

  • Recovery processes and procedures are executed and maintained when required to ensure the restoration of systems or assets affected by cyber security incidents. If necessary, the departmental business continuity plan should be invoked

Improvements

  • Incorporate lessons learned in recovery plans
  • Coordinate restoration activities with internal and external parties

To obtain a better understanding of the overall cyber security maturity posture across the Government of Canada, a Cyber Maturity Self-Assessment Tool is available through the Treasury Board of Canada Secretariat Application Portal. The tool provides a repeatable and uniform self-assessment framework that can be applied by departments. The tool also aligns with the principles in the Directive on Service and Digital . The tool will support departments in assessing their cyber security maturity against recognized best practices and identifying a path to maturity. The aim of the tool is to help improve the cyber security posture of the Government of Canada.

Additionally, tools and templates are available to help integrate security throughout the system life cycle, design and operations of a service:

  • security configuration requirements outlined in IT configurations under Appendix G: Standard on Enterprise IT Service Common Configurations
  • GC Cyber Security Management Guidelines (accessible only on the Government of Canada network)
  • Government of Canada Enterprise Security Architecture (GC ESA) Artifact Repository  (accessible only on the Government of Canada network)
  • Security of online government services
  • Security Playbook for Information System Solutions

4.7.1 Description and associated requirement

As outlined in the Directive on Identity Management , a trusted digital identity is an electronic representation of an individual or organization that is used to access services and carry out digital transactions with trust and confidence. Put simply, digital identity confirms that you are who you say you are in an online context.

A trust framework is a set of agreed-upon definitions, principles, conformance criteria, assessment approach, standards and specifications, as outlined in the Directive on Identity Management . Furthermore, it is a framework of rules that supports the use and acceptance of digital identities by defining and assessing a set of processes (for example, identity validation, identity resolution) that can be mapped to business processes and independently assessed using conformance criteria.

By leveraging trust frameworks, departments support a federated approach to digital identity that facilitates the use and acceptance of trusted digital identities between various orders of government and the private sector. Trust frameworks also ensure technical interoperability and enable compatibility with emerging technologies (for example, blockchain-based identity management approaches, zero-trust networks and digital wallets).

The Policy on Service and Digital requires that deputy heads align their departmental approaches for identity assurance with enterprise-wide expectations to support interoperability.

4.7.2 Why is this important?

Canadians expect simple, fast and convenient access to services anytime, anywhere, on any device. Digital identity can be used to accelerate these efforts. Currently, users must often have separate interactions across different platforms in order to access services, which can result in multiple, in-person visits and/or usernames and passwords. This process is time-consuming, as users usually already possess a trusted method of authentication with another department or other level of government (for example, provincial or territorial).

Transforming services to meet these expectations begins with users’ digital identity, as once an identity with the provinces, territories or Immigration, Refugees and Citizenship Canada is established and verified, all subsequent activities can occur. Put simply, digital identity is the foundation of service delivery and moving more services online, without requiring out of band authentication mechanisms. In addition, digital identity provides users with more choice and control over their digital lives as they choose which credential or trusted digital identity to authenticate themselves with and access the services they need. Leveraging approved trust frameworks would provide users with the choice to use, for example, their provincial trusted digital identity, GCKey or banking credential to access federal services.

This policy requirement ensures effective identity management and allows digital identities to be managed consistently and collaboratively across the Government of Canada and with other jurisdictions. To that end, in managing departmental approaches for digital identity by leveraging approved trust frameworks, deputy heads can integrate standardized identity levels of assurance and enable greater interoperability that is consistent with a government-wide, pan-Canadian approach.

4.7.3 Considerations in implementing the requirement

The following are some implementation considerations and useful resources:

  • Standard on Identity and Credential Assurance
  • Guideline on Defining Authentication Requirements
  • Guideline on Identity Assurance and the Government of Canada Guidance on Using Electronic Signatures
  • Leverage the Public Sector Profile of the Pan-Canadian Trust Framework (PSP-PCTF) in managing departmental approach for identity assurance and accepting trusted digital identities, where required. The PSP-PCTF is a rule framework that supports the use and acceptance of digital identities from the Government of Canada and other jurisdictions (for example, provinces and territories).
  • Use mandatory enterprise services for identity management, credential management and cyber authentication, as outline in subsection 4.1.9 of the Directive on Identity Management .
  • Ensure compatibility with the Cyber Authentication Technology Specification .
  • Ensure that privacy and security-related considerations are addressed from beginning to end. For more information, refer to subsection 3.6 , subsection 4.1 and subsection 4.6 of this guideline.

5.1 Workforce awareness, capacity and capability

5.2 chief information officer talent management and community development initiatives.

The Policy on Service and Digital sets out requirements to ensure departmental workforce awareness, capacity and capability as it relates to service, IT, information, data and cyber security to better meet departmental priorities. The Policy also sets rules on how departments can meet the needs of a digital government and client expectations for services by providing and promoting talent management and community development strategies for the service, information, IT and cyber security functional communities.

It is important to note that all activities related to managing the government workforce are to be carried out in accordance with Treasury Board policy instruments related to people management .

Among the expected outcomes of the Policy on Service and Digital is that leadership and community strategies support workforce capacity and capability for a digitally enabled and skilled public service.

5.1.1 Description and associated requirements

Departments that regularly implement activities that foster workforce awareness, capacity and capability lay the foundation for meeting the needs of clients and achieving program outcomes. At the departmental level, deputy heads are responsible for workforce awareness, capacity, and capability to meet departmental and enterprise service, information, data, IT and cyber security requirements.

Workforce capacity pertains to departments having the financial resources, employees and systems they need to deliver and meet the objectives of the organization. Workforce capability pertains to employees having the resources, tools, relationships, training, education and supervisory support to enable them to apply knowledge and skills in their day-to-day work. Awareness, on the other hand, pertains to employees knowing how digital transformation impacts their day-to-day work and understanding the considerations related to operating in the digital era, whether it is in delivering a service to Canadians, establishing a program, managing departmental operations or any other activity. In short, workforce awareness is about understanding how we do business in the digital era.

5.1.2 Why is this important?

Enhanced workforce awareness, capacity and capability result in better service experiences, improved program outcomes and operations.

There are many benefits to achieving increased workforce awareness, capacity and capability, including:

  • increased ability for the Government of Canada to adapt to change, which is especially important for the areas of management of service design and delivery, IT, information, data and cyber security, given the pace of change in these areas
  • enhanced awareness of changing stakeholder and user expectations
  • increased ability to attract and retain talent as employees develop a greater sense of belonging, self-worth and dignity due to their enhanced abilities
  • enhanced employee productivity and autonomy
  • improved ability to find innovative and creative solutions, even for new problems, as a result of increased confidence in base knowledge and skills needed to carry out everyday tasks

5.1.3 Considerations in implementing the requirement

The table below provides a non-exhaustive list of knowledge and skills related to the fields of service design and delivery, IT, information, data literacy and cyber security. “Knowledge” refers to knowledge about the specific area of management (for example, service officers having knowledge related to the service that they offer).“Skill” refers to the aptitudes needed to undertake the work (for example, service officers having the communications skills to interact with clients).

Service design and delivery, IT, information, data literacy and cyber security knowledge and skills

Knowledge of:

  • departmental mandate, objectives and priorities
  • departmental products, services and partners
  • the program and the parameters and requirements of the service that supports it
  • related programs and services for clients (for example, those provided by other departments and other levels of government)
  • any applicable service pledges, commitments and standards
  • client needs and expectations
  • service design and delivery concepts and techniques
  • existing and emerging client-engagement tools, management tools, technology and applications
  • privacy, identity management and security practices that support the service
  • official languages requirements that must be met when providing the service

Ability to:

  • demonstrate an understanding of own role and responsibilities, and those of other parties involved in providing the service
  • follow applicable Government of Canada and departmental policies, regulations and procedures relating to service
  • use effective interpersonal communication techniques to convey program/service requirements to clients, identify client needs (for example, questioning, active listening) and to maintain positive relationships
  • demonstrate a helpful, caring and professional attitude when serving clients
  • assess a situation and apply problem-solving techniques to achieve positive client-service outcomes
  • resolve client service issues, including urgent ones, in a timely manner
  • seek feedback from clients to improve the quality and efficiency of services
  • work collaboratively to provide integrated services to clients
  • provide service that is consistent with organization’s values
  • use language and actions that show respect for clients

Data literacy

Knowledge of the following:

  • conceptual: basic understanding of the concept of data and its evolving role in supporting policy, programs and services to Canadians
  • operational: knowledge of the ways in which data is managed throughout its life cycle, from collection through to disposition
  • analytical: knowledge of quantitative, qualitative, and/or mixed techniques of manipulating data to extract useful information from it, as well as of the tools needed to conduct such manipulations
  • interpretative: knowledge of how to interpret the results of data analyses in a business context and assess their applicability in that context, including knowledge of relevant policy and legislation

Ability to do the following:

  • Communication: Ability to communicate about data issues within and across functional communities
  • Planning: Ability to identify data gaps or needs in the context of a project, problem or initiative
  • Life-cycle management and governance: Ability to collect, store, organize and manage data assets throughout their life cycle, according to applicable retention and disposition schedules and relevant policy and legislation
  • Quantitative analysis: Ability to use statistical and/or mathematical methods to analyze and derive insights from data, using tools such as SAS and/or programming languages such as R, Python and JavaScript, among others
  • Qualitative analysis: Ability to analyze the content, narrative, assumptions and other qualitative dimensions of data and draw conclusions on that basis, including through coding techniques
  • Mixed-method analysis: Ability to combine multiple methods of data analysis to derive insights from data
  • Data consumption: Ability to use the information resulting from data analyses to make informed decisions or support other aspects of a business line (involves assessing the applicability and relevance of the information to the purpose it is being considered for, and determining its reliability, validity and veracity, among other dimensions of fitness)

Information and data management      

  • general knowledge and experience: knowledge of Government of Canada and departmental information and data management rules, tools and resources, including information and data governance
  • information and data management practices: information and data management policy development and implementation, information and data management operational processes, information and data protection and security procedures, protection of personal information, and compliance
  • focus on clients: identify and respond to current and future client needs, provide service excellence to internal and external clients, and negotiate and reach consensus with clients
  • communicate: listen actively to others and present appropriate information clearly and concisely
  • manage change: manage uncertainty and develop the networks and personal relationships required to facilitate change and achieve desired business outcomes
  • be aware of the organization and its environment: understand the business, structure and culture of the organization, as well as the political, social, economic and technological environments
  • analytical thinking: interpret, link and analyze information in order to understand issues
  • plan and organize: define, plan and organize activities and resources to achieve optimal results
  • identify and analyze information and data management requirements: identify, analyze, assess and define the information and data management rules, tools and resources required to manage information and data to ensure the effective and efficient conduct of business and the delivery of programs and services
  • apply implement and use information and data management rules, tools and resources: apply, implement, use and provide advice and guidance on information and data management rules, tools and resources to address information and data management requirements
  • design and develop information and data management rules, tools and resources: design, develop and recommend the information and data management rules, tools and resources needed to meet information and data management requirements

Information technology

When it comes to IT, there are a number of resources  available, including generic job descriptions, competency profiles, and competency dictionaries (all part of CIO suite of standardized HR products) for various streams, such as:

  • enterprise architecture
  • infrastructure/operations
  • application development
  • database and data administration
  • IT business line support services

These competency dictionaries and profiles describe successful performance as observable, measurable behaviours and ensure that there is common, universally understood terminology linked to performance expectations.

In addition to the knowledge and skills identified in the IT security portion of the CIO suite of competencies, the following cyber security-related knowledge and skills are important for employees working in the field.

  • Government of Canada and departmental policies and instruments relating to cyber security and IT security
  • the organization’s business context and threat environment
  • the organization’s overall security posture (for example, state of authorities to operate the various systems, plans of action and mitigation)
  • solve problems: attacks can emerge at any time, and teams must be ready to change course and solve problems quickly
  • have an agile and flexible mindset: strong teams can shift priorities to meet the challenge of the day
  • be learning-oriented: to respond to new threats, teams need to always learn new skills and methodologies to secure systems
  • collaborate: security has to be an enabler working with business owners and projects, from the outset

Actions in support of increased workforce awareness, capacity and capability

There are a number of methods and tools (formal and informal) that can be used to enhance workforce awareness and capability. Methods include training, information or orientation sessions, videos, information provided via internal collaborative tools, manager debriefs, account sign-on notifications and electronic newsletters.

There are a few specific actions that departments may want to take to support the development of workforce awareness, capacity and capability. These actions may include the following:

Upon commencement of employment

  • Provide toolkits that include information about government-wide and departmental policy requirements relating to the area of management.
  • Hold briefing sessions to ensure that employees have the knowledge they need to perform their job well.
  • Distribute information about organizational structure and the governance structure to ensure understanding of decision-making process in support of departmental priorities.
  • Provide employees with contact information of those who are involved in activities that relate to their work in order to make linkages and increase awareness on interdependencies between areas of management.

On a regular basis

  • Support training and certification opportunities.
  • Integrate learning opportunities into performance agreements and learning plans, including talent management.
  • Offer informal mentoring and coaching opportunities.
  • Organize departmental events and networking opportunities to share information and knowledge.
  • Recognize achievements during team or other meetings.
  • Develop, maintain and share a list of best practices.
  • Raise awareness and encourage experimentation with new approaches.
  • Review the learning approach or plan to ensure that it remains up to date.

In addition to its general course offerings on information management, IT, service excellence and other topics, the Canada School of Public Service (CSPS) is home to the Digital Academy . This academy offers a curriculum that supports public servants at all levels in modernizing their operations to deliver the kind of digital services that people expect. Some learning opportunities are more general in nature, while others are specialized.

The Digital Academy also hosts events as part of the “Let’s Talk Digital” and “Digital Acumen” series. These events are posted in the CSPS Events calendar . To learn about the Digital Academy’s offerings, subscribe to the Digital Academy newsletter , follow the Digital Academy on Twitter , or email the Digital Academy directly if you have specific questions.

5.2.1 Description and associated requirements

At the government-wide level , the CIO of Canada is responsible for providing enterprise-wide leadership on the development and sustainability of the information and IT functional community by using talent management and community development strategies.

This requirement is mirrored at the departmental level where departmental CIOs are required to do the same for their organization. To reinforce this, the deputy head is responsible for supporting the CIO of Canada’s enterprise-wide talent management and community development initiatives.

5.2.2 Why is this important?

Benefits of community development strategies (including talent management) for the information and IT functional communities include:

  • increased opportunities to bring people together to ensure that the communities have the resources and tools they need to carry out their functions
  • increased collaboration and sharing of information, ensuring that departments that face similar issues can learn from one another
  • increased awareness of local, national and international trends that pertain to information and IT
  • enhanced relationship-building and sense of belonging, resulting in mobility among employees working within the information and IT communities, and enhanced career pathways

5.2.3 Considerations in implementing the requirements

In their work on community development strategies, departments are encouraged to keep abreast of government-wide efforts. The CIO Suite of Generic Products provides the tools necessary to support an integrated and strategic approach to enterprise and organizational human resources management, as well as employee career planning and personal development in the field of IT and information management. The suite was developed by the community, for the community, and it continues to evolve to meet the people management needs of all community members. The suite of products includes a number of resources to support the IT and information management communities. In addition, departments are asked to actively participate in enterprise wide community development strategies to ensure the recruitment, retention and development of employees, for example, using readily available pools for staffing and participating in the annual talent management initiative led by OCIO.

Details related to various potential components of community development strategies, such as:

  • talent management
  • competencies
  • recruitment and staffing
  • other useful information

To participate in the information management and IT community, consult the IM-IT Functional Community (IFC) GCconnex page (available only on the Government of Canada network).

In developing community development strategies, departments need to ensure that appropriate linkages are made with existing human resources programs in their organization.

The logic model provides a list of outcomes that departments are expected to achieve by implementing the requirements of the Policy on Service and Digital.

Text version below:

The Policy on Service and Digital Logic Model is a collection of outcome statements that describe how the Government of Canada will advance from our current state to the desired end-state of the policy.

  • 1.1.1. The Government of Canada is an open and service-oriented organization that operates and delivers programs and services to people and businesses in simple, modern and effective ways that are optimized for digital and available anytime, anywhere and from any device. Digitally, the Government of Canada must operate as one to benefit all Canadians.
  • 1.2.1. The government operates and designs and delivers client-centric services leveraging digital methods and tools.
  • 2.1.1. Enterprise governance and planning supports integrated decision-making in service, IM, IT, and cyber security to improve services and operations.
  • 2.1.2. Digital transformation improves government operations, services and client experience
  • 2.1.3. Government has a digitally enabled and skilled public service
  • 2.2.1. Enterprise governance, planning and reporting supports integrated decision-making
  • 2.2.2. Technology is leveraged to enable business and program innovation and service delivery
  • 2.2.3. Service design and delivery is client-centric
  • 2.2.4. Information is managed as a strategic asset and is increasingly open
  • 2.2.5. Leadership and community strategies support workforce capacity and capability development
  • 2.3.1. Departments have designated officials for IT, IM, service, and cyber and established integrated governance systems
  • 2.3.2. An integrated departmental plan coordinates tech, information and service planning and supports decision making
  • 2.3.3. Departments know their clients and engage with them to understand their needs
  • 2.3.4. A lifecycle management approach is adopted in the management of information and technology assets
  • 2.3.5. Technology and information management and governance enables interoperability and transparency
  • 2.3.6. Departments equip employees with the relevant training and tools
  • 3.1.1. Policy instruments, strategic policy advice
  • 3.1.2. Advice and tools
  • 3.1.3. Recommendations
  • 3.1.4. Performance standards, reports
  • 3.1.5. Network of experts in digital government, community development
  • 3.1.6. Functional competencies and certification
  • 3.1.7. Enterprise governance structure
  • 3.2.1. Policy development
  • 3.2.2. Policy interpretation
  • 3.2.3. Research and analysis
  • 3.2.4. Monitoring and oversight
  • 3.2.5. Outreach and engagement
  • 3.2.6. Development of functional capacity tools and programs
  • 3.2.7. Enterprise governance

The outcomes shown in the logic model will be further articulated in future guidance and tools to support departments from a performance measurement perspective in their transition toward a digital government.

Appendix B: Government of Canada Digital Standards

This appendix lays out how the Government of Canada Digital Standards have guided different elements of the Policy and Directive on Service and Digital.

Research with users to understand their needs and the problems we want to solve. Conduct ongoing testing with users to guide design and development.

Directive on Service and Digital 4.2.1.1: Ensuring that client feedback, including in-service client feedback, client satisfaction surveys and user experience testing, is collected and used to improve services according to TBS direction and guidance.

Develop services using agile, iterative and user-centred methods. Continuously improve in response to user needs. Try new things, start small and scale up.

Directive on Service and Digital 4.2.1.1: Ensuring that client feedback, including in-service client feedback, client satisfaction surveys and user experience testing, is collected and used to improve services according to TBS direction and guidance.

Directive on Service and Digital 4.2.1.7: Ensuring that each service is regularly reviewed with clients, partners and stakeholders, in collaboration with the departmental CIO, as appropriate, at least once every five years to identify opportunities for improvement, including redesign for client-centricity, digital enablement, online availability and uptake, efficiency, partnership arrangements, and alternate approaches to service delivery.

Share evidence, research and decision making openly. Make all non-sensitive data, information, and new code developed in delivery of services open to the outside world for sharing and reuse under an open licence.

Policy on Service and Digital 4.3.2.8: Maximizing the release of departmental information and data as an open resource, discoverable through the Government of Canada open government portal designated by the Treasury Board of Canada Secretariat, while respecting information security, privacy, and legal considerations.

Policy on Service and Digital 4.3.2.9: Prioritizing departmental information and data to be added to the Government of Canada’s open government portal, informed by public demand.

Leverage open standards and embrace leading practices, including the use of open source software where appropriate. Design for services and platforms that are seamless for Canadians to use no matter what device or channel they are using.

Policy on Service and Digital 4.3.1.1: Prescribing enterprise-wide information and data standards for quality, accessibility, and data interoperability, including common architecture taxonomies and classifications, quality requirements, and life cycle management direction.

Take a balanced approach to managing risk by implementing appropriate privacy and security measures. Make security measures frictionless so that they do not place a burden on users.

Policy on Service and Digital 4.3.2.5: Ensuring that, when managing personal information or data, including in the context of data interoperability, the privacy of individuals is protected according to the Privacy Act and any other relevant legislation, policy or agreement.

Policy on Service and Digital 4.3.2.6: Ensuring that privacy is addressed in the context of any plan or strategy to manage departmental information or data.

Policy on Service and Digital 4.3.2.7: Ensuring that sensitive information under the department’s control is protected according to the Policy on Government Security and any relevant legislation, policy or agreement.

Policy on Service and Digital 4.4.1.8: Defining cyber security requirements to ensure that Government of Canada and departmental information and data, applications, systems, and networks are secure, reliable and trusted.

Services should meet or exceed accessibility standards. Users with distinct needs should be engaged from the outset to ensure what is delivered will work for everyone.

Policy on Service and Digital 4.2.1.1: Ensuring the development and delivery of client-centric service by design, including access, inclusion, accessibility, security, privacy, simplicity, and choice of official language.

Policy on Service and Digital 4.4.2.2: Ensuring that, for newly procured or developed information, communication, and technology solutions and equipment, applicable requirements or standards regarding accessibility, official languages, protection of personal information, the environment, and security are addressed by design.

Make sure that staff have access to the tools, training and technologies they need. Empower the team to make decisions throughout the design, build and operation of the service.

Policy on Service and Digital 4.4.2.5: Providing authorized users of the departmental electronic network and of departmental devices with open access to the Internet, including Government of Canada and external Web 2.0 tools and services that enhance productivity, communication and open collaboration, in accordance with the Policy on Government Security, and limiting access only where necessary to manage security risks and address unacceptable uses.

Policy on Service and Digital 4.5.2.1: Ensuring departmental workforce awareness, capacity, and capability to meet departmental and enterprise service, information, data, IT, and cyber security requirements.

Collect data from users only once and reuse wherever possible. Ensure that data is collected and held in a secure way so that it can easily be reused by others to provide services.

Policy on Service and Digital 4.3.1.1: Prescribing enterprise-wide information and data standards for quality, accessibility, and data interoperability, including common architecture taxonomies and classifications, quality requirements, and life cycle management direction.

Policy on Service and Digital 4.3.2.1: Ensuring that information and data are managed as a strategic asset to support government operations, service delivery, analysis and decision-making.

Make sure that everyone receives fair treatment. Comply with ethical guidelines in the design and use of systems which automate decision making (such as the use of artificial intelligence).

Policy on Service and Digital 4.4.2.4: Ensuring the responsible and ethical use of automated decision systems, in accordance with TBS direction and guidance, including:

Policy on Service and Digital 4.4.2.4.1: Ensuring decisions produced using these systems are efficient, accountable, and unbiased; and,

Policy on Service and Digital 4.4.2.4.2: Ensuring transparency and disclosure regarding use of the systems and ongoing assessment and management of risks.

Create multidisciplinary teams with the range of skills needed to deliver a common goal. Share and collaborate in the open. Identify and create partnerships which help deliver value to users.

Policy on Service and Digital 4.5.1.1: Providing enterprise-wide leadership on the development and sustainability of the information and IT functional community by using talent management and community development strategies.

Policy on Service and Digital 4.5.2.1: Ensuring departmental workforce awareness, capacity, and capability to meet departmental and enterprise service, information, data, IT, and cyber security requirements.

Directive on Service and Digital 4.5.1.1: Providing functional leadership in the department on the development and sustainability of the IT and information communities through talent management and community development strategies. 

C.1 Key terms and concepts

C.2 service management, c.3 service types, c.4 – service agreements.

This appendix provides advice on what constitutes a service under the Policy on Service and Digital. Although the Treasury Board of Canada Secretariat (TBS) can provide assistance to departments in determining their services, departments are ultimately responsible for determining what constitutes or does not constitute a service, based on their own specific operational context.

C.1.1 What is a service?

A service is the provision of a specific final output that addresses one or more needs of an intended recipient and contributes to the achievement of an outcome.

Definitions and explanations of the key terms contained in the definition of service are outlined below..

Final (service) output

  • A unit of value that is delivered directly to a client by a service.
  • An output can be tangible (for example, a passport, a licence, a payment, a permit) or intangible (for example, information, advice), and one service can produce both tangible and intangible outputs. The frequency and time frame of outputs may also vary: some might be delivered to a client only once in a period of years (for example, a passport), and others might be delivered regularly over a period of time (for example, employment insurance payments). Some final outputs might take many years to receive (for example, the certification of a new type of aircraft or the granting of a patent).
  • A requirement or desire of a target group that a program has a mandate to satisfy or reduce.
  • The starting point for both programs and services is the identification of a need. Needs are met by a program, which has the mandate and resources to address those needs. A program is delivered through one or many services. Needs are usually addressed by the output of a service.

Recipient (or client)

  • Individuals, businesses or their representatives served by or using internal or external services provided by the Government of Canada. When describing recipients’ interactions with information technologies, clients can be referred to as users.
  • An external consequence attributed, in part, to an organization, policy, program or initiative. Outcomes are not within the control of a single organization, policy, program or initiative; instead they are within the area of the organization’s influence. Outcomes are usually further qualified as immediate, intermediate, or ultimate (final), expected, direct, etc.
  • An outcome is different than an output. For example, the Department of Employment and Social Development Canada, through Service Canada, provides passport services in Canada on behalf of the Passport Program and has the authority to issue Canadian passports. The output of this service is a passport. The outcome is the ability for Canadians to travel abroad.

C.1.2 Critical services

A critical service is a service whose compromise in terms of availability or integrity would result in a high or very high degree of injury to the health, safety, security or economic well-being of Canadians or to the effective functioning of the Government of Canada. Refer to the Policy on Government Security for more information and guidance.

Your department’s security functional specialist for business continuity management (BCM) is responsible for the identification of critical services based on the Policy on Government Security (PGS) and the Directive on Security Management (DSM) (2019). This specialist is also responsible for managing the critical service data in the Critical Services module of the Clarity Tool. Additional information on the process of identifying critical services is available in A Government of Canada Guide for Developing a Business Continuity Management Program (the Guide). Any questions related to BCM and the Guide can be directed to the BCM Helpdesk at Public Safety Canada at [email protected] .

 C.1.3 How to identify services?

Text version below:

This Service Identification Tool helps identify if an activity is a service, While this tool provides general guidance, it is up to departments to make the final determination.

A service is the provision of a specific or final output that addresses one or more needs of an intended recipient and contributes to the achievement of an outcome.

Getting started: As a first step, departments are encouraged to review their Departmental Plan, program inventory and web presence to identify potential services. Once a list of potential services is established, use the following tool to confirm if your activity is indeed a service.

Some services are easy to identify; others are not and require careful consideration and discussion. For assistance in determining whether an activity or a series of activities is a service, consider using the Service Identification Tool provided above. Although this tool provides general guidance, it is up to departments to make the final determination.

Also consult the table on Service Output Types , as it identifies a broad range of services, including regulatory authorizations and penalties, that are also considered to be services.

Some key questions to ask when determining whether an activity is a service (see the Service Identification Tool diagram also provided below) are as follows:

  • Does a specific activity result in a final output to recipients or clients?
  • Are there multiple clients and recipients?
  • Is the final output produced repeatedly?
  • Are the activities contributing to the achievement of an outcome that is independent of any other service?
  • Does the activity meet the “materiality test” of supporting the well-being of individuals or the effective operation of organizations?

If the answer to most of these questions is yes, then the activity is likely a service and should be included in the service inventory.

When identifying services, keep the following in mind:

  • an applicant may not always successfully obtain a final output (for example, a request for funding)
  • a service does not always require that a service provider interact directly with a recipient (for example, weather forecast)
  • a recipient may not always request the service (for example, tax audit, mandatory inspection)
  • if the activity has service standards and entails an application process, it is likely a service

The following three examples illustrate how to determine whether an activity is a service, using the Service Identification Tool.

Example 1: AgriStability

Department : Agriculture and Agri-Food Canada

Description : Provides funding (based on the selected level of protection) when producers’ production margins fall below their reference margin. For further details, consult the AgriStability web page.

Service Test Tool Example 1: AgriStability
Questions Analysis Yes/No

The funding is the final product of the service and is what farmers were seeking when they originally applied and paid for the service. The distribution of funds is the final output.

Yes

The clients are farmers.

Yes

There are many farmers who could use this service.

Yes

The funding is given repeatedly and in different years.

Yes

AgriStability does not require additional activities or processes to ensure that it contributes to a program outcome. It also does not depend on other services.

Yes

It provides funding when producers production margins fall below their reference margin by more than 30%.

Yes

Conclusion : This is a service.

Example 2: Icebreaking

Agency : Canadian Coast Guard

Description : Supports economic activities by assisting commercial vessels to voyage ice-covered waters. For further details, consult the Canadian Coast Guard’s Icebreaking web page.

Service Test Tool Example 2: Icebreaking Program
Questions Analysis Yes/No

The icebreaking and the protection that goes along with icebreaking are the services that the client has requested and paid for. It is the final output.

Yes

Potential clients could be shipping companies or the general public.

Yes

This service is provided to many clients: commercial vessels, Arctic residents, port operators and the general public.

Yes

The ice is cleared many times during the winter, year after year.

Yes

Icebreaking does not depend on other services.

Yes

It supports economic activities by assisting commercial vessels to voyage efficiently and safely through or around ice-covered waters.

Yes

Example 3: Canada Benefits

Agency : Service Canada

Description : The Canada Benefits website is a tool that provides government-wide information about benefit programs and services for individuals. A number of government departments developed this website, including the Canada Revenue Agency, the Canada Mortgage and Housing Corporation, Canadian Heritage, Employment and Social Development Canada, the Department of Justice Canada, Service Canada, and Veterans Affairs Canada. The site also contains information on programs administered by Immigration, Refugees and Citizenship Canada and all of Canada’s provinces and territories.

For further details, consult Service Canada’s Canada Benefits web page.

Service Test Tool Example 3: Canada Benefits website
Questions Analysis Yes/No

The website is a tool that identifies various benefit programs and services based on target group and life events. It provides links to other websites. It is therefore an intermediate output, rather than a final output to a client.

No

Conclusion : This is not a service.

C.1.4 Programs vs. services

Programs provide the context for determining the services to be delivered. Programs are generally delivered through services, which contribute to achieving program objectives.

Most departments have already identified their outcomes, or expected results, in their Departmental Results Framework, which are to be reflected in their Program Inventory as required by the Policy on Results . Services contribute to achieving those expected results (outcomes).

An understanding of services first requires knowledge of the context in which they operate. Services are a component of a program that contributes to a specific set of outputs. Services deliver a final output to recipients, or clients, to support the achievement of the outcome. Services are composed of activities (processes) that lead to the final output. Figure illustrates this context.

Text version below:

This is a graphical representation of the context within which Government of Canada services operate that includes the key terms from the definition of service. It states that a program has a mandate to achieve an outcome to meet the needs of a target group. A program also has services that have the role of delivering a final product to a client that supports the achievement of an outcome to meet the needs of a target group. This role is assigned to a service based on the mandate of the program. A program has services that have a set of activities (processes) that may produce intermediate outputs that may produce a set of activities (processes) that result in delivering a final product to a client that supports the achievement of an outcome to meet the needs of a target group.

Final outputs vs. intermediate outputs

When determining whether an activity is a service, it is helpful to ask whether the activity produces an intermediate output or a final output to a client. Examples include:

  • The provision of a regulatory permit or certificate usually constitutes a final service output. The denial of a permit can also be the final service output. The approval or denial of the permit completes the series of activities from the client’s perspective.
  • Information posted on the Government of Canada website about how to apply for a permit or certificate constitutes an intermediate output, because the client must complete subsequent steps before being issued the permit.
  • Advice or information from a call centre agent is the final output of a service when the client does not have to complete subsequent activities.
  • The issuing of a new passport constitutes the final output from a service, but accepting a completed passport application does not because that activity does not conclude the interaction between the service provider and the recipient, and it does not result in a final output. In this case, the denial of a passport can be considered the final output of the service.

Relationship between activities and services

A service consists of a series of activities (processes) that result in a single final output for the recipient (or client). Each activity is not considered an individual service even though it might produce intermediate outputs.

Consider a scenario where a business owner requires a permit or certificate from the Government of Canada to be able to proceed with a specific action on business premises. The series of activities may involve the following:

  • providing an online application on the Government of Canada website for use by the business owner to apply for the permit or certificate
  • responding to a call from the business owner who may need additional information to complete an application; responding to this call supports the service (1-800 call centre)
  • receiving and processing an application, which may include assessing the application against established eligibility criteria
  • inspecting the business premises to ensure that it meets requirements
  • issuing the permit or certificate, which is the culmination of the series of activities and is the final output of the service

C.1.5 Grants and contributions as a service

The administration of grants and contributions (Gs&Cs) usually constitutes a service, as they provide a final output (funding), except in the case of statutory transfer payments made to other governments or other organizations (for example, fiscal equalization, membership dues to the North Atlantic Treaty Organization).

Gs&Cs meet the definition of a service in that there is a final output (funding), there is a need (funds), there is a recipient, and it supports an outcome or public policy goal (the reason the government is providing the G&C). Service standards are often applied to the administration of Gs&Cs.

For more information on Gs&Cs, consult the Policy on Transfer Payments .

C.1.6 Information or data as a service

Information or data is a service when it constitutes a final output to a client and when it has the other elements contained in the definition of service (that is, need, recipient and outcome), for example, a weather forecast or labour or market statistical information.

Addressing the following considerations can help in assessing whether information or data is a service:

Is the information or data the final output, or is it part of a larger process that leads to a final output? The greater the sense that the information or data is the final output, the greater the likelihood it is a service. For example, the weather forecast published to the weather website is a service because the information concludes an interaction between the service provider (the weather website) and the client (the website visitor). The interaction is concluded because the client obtains the weather forecast as a final output.

For information to be considered a service, the final output must be produced frequently or repeatedly. The more frequently the information or data is produced, the greater the likelihood that it is a service.

The greater the recipient’s need for the information, the greater the likelihood that the provision of it is a service. Consider whether access to the information helps ensure the well-being, health and safety of Canadians or economic viability of businesses and whether the lack of access to it could hinder this. For example, travel advisories or food recall warnings published to the Internet are services.

The greater the need for the information in a specified time frame, the greater the likelihood that it is a service. For example, the weather website publishes information about the weather forecast with a high degree of frequency. Contrast this to a report or document that is published on the website only once a year.

The greater the number of individuals that access the information or data as a final output, the greater the likelihood that it is a service. Given the wide range of services offered by the federal government, it is impossible to establish a threshold number because that number depends highly on the nature of the service and the operational context.

Answering yes to this question increases the likelihood that the provision of the information or data is a service. For example, a call centre agent providing information or advice in the form of a final output contributes directly to an outcome; the client has obtained customized information and advice needed to access government programs and services.

C.1.7 Other examples of services

  • Responses to access to information requests are considered as a service for all departments and agencies that process such requests. Note that the Office of the Privacy Commissioner of Canada is an oversight body that addresses Privacy Act complaints; it is not responsible for managing the intake process of ATIP requests on behalf of other institutions. Although requests may be submitted through an online portal, responses are managed and provided by departments and agencies to which the request is related.
  • Call centres are considered a service because individuals and businesses make millions of calls to the government every year to get the information they need to make time-sensitive, important decisions.
  • Public and media enquiries are considered as external services. The services result in a final output to the recipient/client, there are more than one recipient/client, the final output is produced repeatedly and the final output contributes to the achievement of an outcome.

C.1.8 Service owner vs. service provider

The activities that make up a service may be completed by one or several departments, including third-party organizations. When that is the case, it is especially important to understand the concept of service owner.

A service owner may differ from a service provider. A service owner is the organization that has the authority to offer the service. That authority is often conferred through legislation or through a regulatory or other instrument, and accountability is delegated to the appropriate level of manager.

Service management is the set of activities and practices undertaken by those responsible for designing, implementing, delivering, monitoring and continually improving the services for which they are accountable.

Effective service management enables excellence in the design and delivery of services. It also contributes to the achievement of public policy goals, delivers value for money, produces high levels of client satisfaction, and promotes confidence in government.

Individuals, businesses, and organizations in Canada expect services from the federal government to be of high quality, and they expect government to provide services that are client-centric.

Service management in the Government of Canada is governed through the Policy on Service and Digital and requires deputy heads to apply the Policy in a manner that reflects the requirement of client-centricity.

4.2.1.1  Ensuring the development and delivery of client-centric service by design, including access, inclusion, accessibility, security, privacy, simplicity, and choice of official language.

Consider well-known drivers of client satisfaction such as:

  • ease of access (clients have access to what they need when they need it)
  • timeliness (clients are satisfied with the amount of time it took to receive the service)
  • positive outcome (clients receive what they need or understand why they cannot obtain it)
  • professionalism (clients receive knowledgeable, fair, respectful, and polite service)
  • recent service experience (clients base their opinions based on their most recent service experience)

Two approaches are proposed to enable departments to identify the types of services they provide. These approaches can either be based on the:

Services external to government

  • Internal to departments

Interdepartmental

  • Internal Enterprise
  • 19 service types as identified in the Canadian Governments Reference Model (CGRM)

C.3.1 Service types based on the service recipient

When identifying service types based on the service recipient, services can be either external or internal to the government, as follows:

An external service can be defined as a service where the intended recipient is a client that is external to the Government of Canada. The following are examples of external services:

  • providing employment insurance services
  • providing visitor access to a national park
  • issuing a passport
  • providing a permit for food products to indicate that they are safe for consumption

Services internal to government

Internal services are groups of related activities and resources that the Government of Canada considers to be services in support of programs or required to meet corporate obligations of an organization. For a more detailed listing of service groupings included in internal services, consult Appendix B of the Guide on Recording and Reporting of Internal Services Expenditures .

Internal services can be grouped under 10 distinct service categories that support program delivery, regardless of the internal services delivery model in a department, as identified in the table below.

Internal service types and examples

  • Procurement processing
  • Contract management
  • Monitoring and reporting
  • Policy and procedures
  • Public opinion research
  • Corporate identity
  • Managing public consultations
  • Managing media relations
  • Advertising, fairs and exhibitions for the entire department
  • Strategic communications and advice
  • Financial planning and budgeting
  • Corporate accounting
  • Expenditure control
  • Collections and receivables
  • Accounting for assets and liability
  • Human resources planning and reporting
  • Organization design
  • Job and position management
  • Employee staffing and orientation
  • Total compensation
  • Employee performance, learning, development and recognition
  • Permanent and temporary separations
  • Workplace management and labour relations
  • Human resources systems
  • Executive services
  • Data management services
  • Records and document management services
  • Library services
  • Web content management services
  • Archival services
  • Business intelligence and decision support services
  • Information management
  • Distributed computing
  • Application and database development and maintenance
  • Production and operations computing
  • Telecommunications network (data and voice)
  • IT program management
  • Legal advisory services
  • Litigation services
  • Legislative and regulatory drafting services
  • Strategic policy and planning and government relations
  • Corporate policy, standards and guidelines
  • Investment planning
  • Departmental project management and oversight
  • Risk management
  • Performance and reporting
  • Internal audit
  • Parliamentary affairs
  • Access to information and privacy (ATIP) processing and reporting
  • Materiel planning
  • Use and maintenance of materiel
  • Office fit-up
  • Office maintenance
  • Accommodation services
  • Physical security

Internal services can be internal to a department, involve multiple departments, and be an internal enterprise type.

Internal to a department

Internal services are administered by a department to support its other programs and corporate obligations, regardless of where they are delivered in the department. These services enable the efficient and effective delivery of a department’s mandate and programs.

An interdepartmental service generally involves two or more departments in the delivery of a service. Examples are:

  • service agreements between departments and their portfolio organizations
  • service agreements between two or more departments

Internal enterprise

An internal enterprise service can be defined as a service provided by a Government of Canada department to other federal departments on a government-wide basis. Internal enterprise services may be available for use by several departments or by all departments. The following are considered internal enterprise services:

  • mandatory services, including those that are outsourced (for example, pay and pension services delivered by Public Services and Procurement Canada)
  • shared or optional services, including those that are outsourced where the intent is to deliver them on a government-wide basis (for example, Shared Services Canada’s email and network services)

C.3.2 Service types based on the service output

The Canadian Governments Reference Model (CGRM) provides a comprehensive overview of all Government of Canada service activity types. It identifies 19 service types based on the service output types and provides a set of target definitions that reflect common elements that may be considered when there are no established definition in place.

Departments are encouraged to refer to the 19 types of services when identifying and categorizing their services, as outlined in the table below.

Government of Canada Service Output Types

  • Funds; an amount of money
  • Resources; a unit of resource
  • New knowledge (can also be called intellectual property)
  • Care and rehabilitation encounters; a care and rehabilitation encounter
  • Educational and training encounters; an educational and training encounter
  • Recreational and cultural encounters; a recreational and cultural encounter
  • Movements; a movement of a person or resource
  • Advisory encounters; an advisory encounter (also known as an information encounter)
  • Matches, referrals and linkages; a match, referral or linkage
  • Advocacy and promotional encounters; an advocacy or promotional encounter
  • Periods of agreement; a period of agreement
  • Periods of permission; a period of permission granted by an authority
  • Findings; a finding
  • Rulings and judgments; a ruling or judgment
  • Penalties and periods of sanction; a penalty or period of sanction
  • Periods of protection; a period of protection
  • Interventions; an intervention
  • Rules (laws, regulations, policies, strategies, plans, designs, standards); a rule
  • Implemented changes; an implemented change may also be called a project
  • Services that acquire or dispense money
  • Fixed (standard terms) contribution (for example, fee collection)
  • Fixed grant (non-repayable)
  • Variable contribution (for example, tax collection)
  • Variable grant
  • Emergency fixed contribution
  • Emergency fixed grant
  • Emergency variable contribution
  • Emergency variable grant

Examples of Government of Canada services:

  • Employment Insurance (EI) Benefits, Employment and Social Development Canada
  • Environmental Funding, Community Interaction Program, Environment and Climate Change Canada
  • Canada Student Grants and Canada Student Loans, Employment and Social Development Canada
  • Services that acquire or dispense units of resources or periods of use of a resource.
  • Includes labour, energy, land, facilities, movable assets and supplies, but excludes funds, information and rules (the latter are treated as distinct types of output [services]).
  • Emergency consumable (for example, drugs)
  • Equipment for use (for example, computers)
  • Period of scheduled labour
  • Period of unscheduled labour
  • Provide immediate standard revocable tracked resource from stock
  • Routine consumable (for example, water supply)
  • Space for disposal (for example, land for sale)
  • Space for use (for example, rented building for accommodations)
  • Workplace Technology Devices Provisioning, Shared Services Canada
  • Videoconferencing, Shared Services Canada
  • Aircraft parking, Transport Canada
  • Services that conduct research and produce information that was not known or derivable through computation or procedural means
  • No subtypes identified to date
  • Labour market information, Employment and Social Development Canada
  • Research and testing on vehicles and child car seats, Transport Canada
  • Tides, Currents and Water Levels (CHS), Fisheries and Oceans Canada
  • Services that provide social or medical care or rehabilitation to people or that repair, upgrade, maintain or renovate property and natural features
  • Response to an emergency care or rehabilitation requirement
  • Response to a non-emergency care or rehabilitation requirement
  • Rehabilitation Services and Vocational Assistance Program, Veterans Affairs Canada
  • Clinical Care, Direct Service Delivery, Indigenous Services Canada
  • Architecture and Engineering, Public Services and Procurement Canada
  • Services that provide educational and training experiences to people
  • Pre-designed repeatable education or training course
  • Custom education or training designed at time of request
  • Learning Services, Canada School of Public Service
  • Cadets and Junior Canadian Rangers, National Defence
  • Aircraft Operations and Maintenance Training, Transport Canada
  • Services that provide experiences of a recreational or cultural nature to people
  • Pre-designed repeatable recreational or cultural encounter
  • Recreational or cultural encounter designed at time of request
  • Access to Parks Canada’s places, Parks Canada
  • Access to cultural activities, The National Battlefields Commission
  • Military history and heritage, National Defence
  • Services that move people and resources from point to point (includes energy, movable assets, supplies, funds, information)
  • At one extreme, energy, materials and people are moved, while at another extreme, information in the form of letters, email and messages are moved.
  • Scheduled transport and standard route (for example, subway service, pipeline)
  • Scheduled transport and custom route (for example, limousine service, postal service, email service)
  • Scheduled custom transport and route (for example, military transport service, shipping service)
  • Immediate standard transport and custom route (for example, own vehicle)
  • Immediate custom transport and custom route
  • Public ports, utilities and other services, Transport Canada
  • Flight Operations, Transport Canada
  • Services that provide an encounter during which data, information or advice is conveyed to a party or a system
  • At one extreme, a lawyer advises a recipient, while at another extreme, a recipient acquires information from an online database, publication, etc.
  • A standard advisory encounter is any advisory encounter where information is supplied from a database or through a prescriptive (computational, finite) analysis (either self-determined by the recipient or determined by the provider).
  • A custom advisory encounter is one where information is supplied after a skilled but non-prescriptive analysis of the recipient’s requirements.
  • Access to Information and Privacy, Department of Finance Canada
  • Crime Prevention Inventory, Public Safety, Public Safety Canada
  • Provision of distress and safety communications, Fisheries and Oceans Canada
  • Marine program weather services, Environment and Climate Change Canada
  • Ministerial correspondence (government-wide)
  • Services that match, refer or link one party (requestor) to another party (responder) and in which the provider has an explicit or implicit duty to both parties in the match
  • Prescriptive (computational) match between a requestor and known and finite range of responders
  • Non-prescriptive match between a requestor and an unknown or partially known range of responders may require locating additional responders as part of service delivery
  • Job bank for employers, Employment and Social Development Canada
  • Job Bank: Find a Job, Employment and Social Development Canada
  • Employee Assistance Services, Health Canada
  • Clean Growth Hub, Innovation, Science and Economic Development Canada
  • Services that advocate or argue for positions or market government policies, programs and services by influencing, persuading or increasing awareness in people
  • Pre-designed repeated encounter, such as courtroom arguments or media exposures
  • Encounters designed at time of request or delivery, such as direct persuasion
  • Processing landowner complaints, National Energy Board
  • Orders-in-council, Privy Council Office
  • International trade and investment, Global Affairs Canada
  • Services that resolve disputes or create agreements between parties
  • Response in dispute resolution in potentially harmful circumstances
  • Routine response, for example, in agreement renewals
  • Occupational Health and Safety Tribunal Canada, Employment and Social Development Canada
  • Review and appeal hearings, Veterans Review and Appeal Board.
  • Services that express government authority by granting permission for a period of time to engage in activities, possess or control property or resources, or hold status, authority or privileges
  • Recognition of revocable privileges or status, for example, pilot’s licence, landed immigrant, heritage site
  • Recognition of inalienable rights, for example, citizenship and marital status
  • Immediate permission granting special powers, for example, deputizing
  • Immediate permission for an irreversible action, for example, search warrant
  • Licensing for pilots and personnel, Transport Canada
  • Regular passport, Immigration, Refugees and Citizenship Canada
  • Temporary Resident Visa (TRV), Immigration, Refugees and Citizenship Canada
  • Issuance of permits, Parks Canada
  • Permits for trade in protected species, Environment and Climate Change Canada
  • Migratory game bird-hunting permits, Environment and Climate Change Canada
  • Services that inspect, investigate and analyze to uncover information and prepare findings and recommendations consistent with criteria and constraints such as the law, policy, approved standards and guidelines, etc., or consistent with credible opinion
  • Repeatable and periodic finding following a prescribed procedure, purchase recommendation
  • Finding prepared to a specified requirement, for example, crime investigation
  • FINTRAC policy interpretations, Financial Transactions and Reports Analysis Centre of Canada
  • Services that apply rules and dispense impartial decisions
  • A routine ruling, for example, a scheduled court case
  • Income tax rulings, Canada Revenue Agency
  • Advance rulings and national customs rulings, Canada Border Services Agency
  • Review and appeal hearings, Veterans Review and Appeal Board
  • Services that sanction, force compliance, mete out punishment and apply penalties
  • Standard predetermined penalty, for example, a fine, dismissal
  • Penalty determined according to criteria or specification, for example, a prison sentence
  • Non-revocable standard sanction, for example, loss of citizenship
  • Non-revocable custom sanction, for example, provisional duty imposed following a Special Import Measures Act Decision
  • Canadian sanctions, Global Affairs Canada
  • Pre-removal risk assessment, Immigration, Refugees and Citizenship Canada
  • Services that guard people and resources, including land, facilities, movable assets, supplies, funds and information, from threats
  • This service type provides proactive protection through monitoring, warning, guarding, storing, eliminating threats and reducing risks
  • Protection is provided in the form of surveillance and guarding of people and property against real or perceived risk, violence, crime, accidents, and natural or synthetic hazards, and includes the stewardship measures necessary to ensure its continuance
  • Scheduled guarding of standard threats to people or property, for example, building security
  • Scheduled guarding tailored to specific threats, for example, police escort, email spam prevention
  • Emergency guarding against standard threats, for example, fire alarm
  • Emergency guarding against known and unknown threats, for example, quarantine order, curfew
  • Law enforcement, Parks Canada
  • Classified infrastructure, Shared Services Canada
  • Services that intervene, respond to threats and emergencies, give aid, and restore order
  • This service type provides reactive protection, which is delivered in the form of an alleviating response to a specific request for assistance for people or property experiencing real or potential risk, violence, accidents, and natural or synthetic hazards, and includes the stewardship measures necessary to ensure its continuance
  • Pre-defined intervention, for example, fire suppression
  • Intervention designed to specific requirement, for example, military intervention
  • Federal leadership on the Passenger Protect Program, Public Safety Canada
  • CANUTEC, Canadian Transport Emergency Centre, Transport Canada
  • Services that create or amend laws, regulations, policies, strategies, standards, plans and designs
  • Regular rule-making, for example, a law, a policy, a plan
  • Emergency rule-making, for example, emergency measures or actions
  • Regulatory development under the First Nations Commercial and Industrial Development Act, Crown-Indigenous Relations and Northern Affairs
  • Environmental assessment done by review panels, Canadian Environmental Assessment Agency
  • Rule-making, Canadian Transportation Agency
  • Emergency management exercises, Public Safety Canada
  • Emergency response assistance plans, Transport Canada
  • Services that create new or elicit changes to existing organizations, programs, services, practices, systems and property
  • Law Enforcement and Policing Research Unit, Public Safety Canada
  • Workplace solutions, Public Services and Procurement Canada

A service agreement is a formal administrative understanding between two or more parties that articulates the terms and conditions of a particular service relationship between two or more parties.

Establishing service agreements is a sound management practice in any type of service owner or service provider arrangement when, for example, a Government of Canada service is provided by one department to, or on behalf of, another department.

Service agreements can enhance governance, accountability and service quality by clearly defining roles, responsibilities, processes and performance expectations. The practice of establishing service agreements is strongly recommended for any type of service owner, service provider or collaborative service relationship. Aspects of the service relationship that are typically documented in a service agreement include scope, governance, operations, finances, performance and implementation.

Service agreements serve three primary functions:

  • articulate the expectations of the parties to the agreement
  • provide a mechanism for governance and issue resolution
  • act as a scorecard against which to examine performance and results

For additional information and tools for this aspect of service management, consult the two TBS guidelines on service agreements:

  • the Guideline on Service Agreements: An Overview provides an overview of service agreements and is geared toward senior managers and executives
  • the Guideline on Service Agreements: Essential Elements describes the essential elements of these agreements and is intended for individuals responsible for developing or reviewing service agreements

Since some agreements may entail complex legal issues, consider consulting your department’s Legal Services prior to finalizing your service agreement.

For service agreements that involve personal information, refer to Guidance on Preparing Information Sharing Agreements Involving Personal Information .

Comparing the terms

Some practitioners use the terms ‘information’ and ‘data’ interchangeably, while others view data as being a part or constituent of information (or vice versa). While the Policy on Service and Digital supports the integrated management of information and data (along with cyber security, service delivery and IT), the two terms are intended to be conceptually and practically distinct. (See Appendix A of the Policy on Service and Digital for policy definitions of information and data.)

Data refers to quantitative, qualitative or other types of digitally mediated representations that are collected or created either automatically (for example, by sensors) or through manual human labour (for example, data entry into a database or Excel spreadsheet). As descriptive representations, data generally correspond to factual entities (this can include personal information), although the degree of their objectivity can vary significantly. Data could also describe other data – this is known as metadata. What distinguishes data – structured, unstructured or otherwise – from information is that it has not undergone evaluation (for example, to assess its fitness for use), cleansing (for example, to ensure that there is only one value for each Canadian province or territory), been processed, or analyzed. As a result, the value of “raw” and unorganized data to a consumer tends to be relatively low because it does not convey the appropriate context and meaning needed for informed decision-making Footnote 3 .

In contrast, information is meaningful data placed within its appropriate context. In that sense, information includes data, as per the definition of information in the Policy on Service and Digital (Appendix A) . Data, once processed, structured and contextualized, can be leveraged as information. Information then is the result of an active process of preparing and analyzing data to help answer a question or support a particular objective such as the provision of a service. In other words, information can be described as actionable data. Even though it can be used by consumers or decision-makers, information is not necessarily of high quality. Moreover, whereas written text (for example, reports, briefings) has traditionally been viewed as information, the rise of techniques such as natural language processing has transformed it into a form of unstructured data. Having been evaluated, processed and/or analyzed, information can be used as evidence to inform policy and programming, as well as support the provision of services to citizens and businesses.

The definitions used by the European Commission for information and data summarize the relationship described so far. Data is defined as “concrete objective facts, measurements or observations that need to be processed to generate information.” Information, on the other hand, “can be generated when data is categorised, analysed, interpreted, summarised and placed in context that gives it structure and meaning.” For example, the individual responses of a sample of public servants to a survey question about the extent of their satisfaction with their workspaces represent data points. Yet to conclude that the percentage of public servants who are highly satisfied with their workspaces has increased by 35% when compared with the results of last year’s survey represents information derived from these (and other) data points.

Based on the distinction outlined in this section, departments are advised to distinguish between the management of data and the management of information. While they are not to be understood as mutually exclusive, their varying life cycles demand distinct practices.

For additional guidance on how to meet the requirements of the Standard for Systems that Manage Information and Data and the Standard for Managing Metadata, please refer to the Information and Data Management page.

Information and data of business value is defined in the Government of Canada as “published and unpublished materials, regardless of medium or form, that are created or acquired because they enable and document decision-making in support of programs, services and ongoing operations, and support departmental reporting, performance and accountability requirements.” Any information and data that is not identified as having business value is considered transitory.

The distinction between information and data of business value and transitory information and data is relevant when it comes to:

  • attaching metadata
  • having authority to delete the information

The distinction between information and data of business value and transitory information and data is not relevant when it comes to:

  • assigning a security marking
  • protecting any personal information it contains
  • responding to a request under the Access to Information Act or Privacy Act
  • subjecting information and data to a litigation hold

As stated in the Directive on Service and Digital, it is the departmental CIO’s responsibility to identify information and data of business value in their organization. Refer to Guidance on Identifying Information of Business Value for more information. While many departments will have identified the same or similar information and data as having business value (for example, memoranda, briefing notes, records of decision), it is necessary to examine the specific functions and activities of the organization in order to arrive at an accurate listing of what has business value. It is then up to managers to inform employees of their duty to document activities and decisions of business value and employees to carry out that requirement in their daily work.

In order to ensure the ongoing value of these information and data resources of business value, collect them along with any relevant metadata (for example, subject, author, transmittal data) to ensure that they are complete, authentic and reliable. Retain information and data of business value in accordance with departmental records management standards and procedures, stored or profiled within a designated corporate repository, and protected against damage and loss.

The following are examples of the types of information and data that may have business value and which you might create, acquire or collect to document business functions and activities:

  • transactions : orders, receipts, requests, confirmations
  • interactions between clients, vendors, partners
  • planning documents : budgets, forecasts, work plans, blueprints (technical or engineering designs), information architecture schematics
  • reports, policy, briefing notes, memoranda, or other papers that support business activities : all significant versions (those that were circulated for comment or that contain comments related to the substance of the content and provide evidence of the document’s evolution), the final product, distribution information
  • meeting documents : agendas, official minutes, records of decision
  • records of contact with lobbyists (in accordance with the Lobbying Act , which requires designated public office-holders to retain information about contact with lobbyists)
  • committee documents : terms of reference, list of members
  • form letters or templates used to collect responses, related instructions, completed responses in any format
  • client records : applications, evaluations, emails, assessments
  • records of discussions , deliberations or any situation related to any of the above that further documents the decisions made along with the logic used
  • information and data resources that could provide additional information for auditing and monitoring activities and programs

Appendix F: Guidance on Information Technology Provisions and User and Workpoint Profiles

This section provides guidance in support of the following standards of the Directive on Service and Digital :

  • Standard on Information Technology User and Workpoint Profiles
  • Standard on Information Technology Provisions

As set out in requirement 4.4.3.1 of the Directive on Service and Digital , the departmental Chief Information Officer is responsible for “providing IT services that are responsive to departmental priorities and to the needs of program delivery and business.”

As guidance, when selecting end-user device software, choose solutions from Shared Services Canada’s list of base software when the list offers software in that category.

Page details

  • Skip to main content
  • Skip to "About this site"

Language selection

  • Search and menus

Integrated business plan / Natural Resources Canada. : M1-14E-PDF

Permanent link to this Catalogue record: publications.gc.ca/pub?id=9.850908&sl=0

  • MARC XML format
  • MARC HTML format
Publication information
Department/Agency Canada. Natural Resources Canada.
Title Integrated business plan / Natural Resources Canada.
Variant title Natural Resources Canada integrated business plan
Publication type Series
Language [English]
Other language editions
Format Electronic
Note(s) Issued also in French under title: Plan d'activités intégré.
Publishing information [Ottawa] : Natural Resources Canada
Chronology Began with 2010-2013; ceased with 2013-2016.
Frequency Annual
Catalogue number
Subject terms
Issues
Click to expand Click to expand Click to expand Click to expand

Request alternate formats