Commissioner's Directive

Date:
2013-02-07

Number:
226

Use of Electronic Resources

Issued under the authority of the Commissioner of the Correctional Service of Canada


Policy Bulletin 385


Policy Objective

1. To ensure the appropriate use of the Correctional Service of Canada's (CSC) electronic resources.

Authorities

2. Treasury Board Policy on Government Security (2012)

Treasury Board Policy on the Use of Electronic Networks (1998)

Application

3. This Directive applies to CSC employees as well as any other individuals who have been authorized to use CSC's electronic resources (referred hereafter as authorized individuals).

Responsibilities

4. The Chief Information Officer (CIO) will:

  1. establish procedures for authorizing individuals to access CSC's electronic resources;
  2. establish a process for ensuring that authorized individuals receive appropriate training and information on the proper use of these resources; and
  3. establish monitoring procedures and designate individuals who will monitor the use of electronic resources.

5. The Director, Information Technology Security, will:

  1. provide direction and information on the interpretation of lawful and acceptable use of CSC's electronic resources; and
  2. ensure that reports of suspected unlawful or unacceptable activity pertaining to the use of CSC' electronic resources are investigated, as per section 6.1.7 of the Treasury Board Policy on Government Security.

6. Managers will report all instances of suspected unlawful or unacceptable activities pertaining to the use of CSC's electronic resources to the Director, Information Technology Security, or the Regional Manager, Information Technology Security, at the regional level. The national and regional Departmental Security Officers will be advised.

7. On the recommendation of the Director, Information Technology Security, and the Departmental Security Officer, managers will seek legal advice in cases of suspected unlawful or unacceptable uses of CSC's electronic resources.

8. Individuals authorized to use CSC's electronic resources (authorized individuals) will:

  1. abide by the laws, government policies, directives and any other instructions published by CSC, on the use of electronic resources;
  2. take reasonable measures to control the use of their password, user identification or computer accounts. This includes assuming responsibility for any actions or costs arising from the unauthorized use of electronic resources;
  3. use information technology security features (e.g. encryption, virus and data protection) provided by the CSC;
  4. ensure that their communications using CSC's electronic resources do not reflect badly on CSC or the Government of Canada and comply with any policies pertaining to professional conduct and the use of social media;
  5. report suspected unlawful or unacceptable activities to their manager(s); and
  6. seek clarification from the Director, Information Technology Security, when in doubt as to whether a planned use is acceptable and lawful.

Authorized Uses Of Electronic Resources

Use for Official Business

9. Electronic resources must be used for official business. This includes, but is not limited to, creating, accessing, manipulating, storing and transmitting:

  1. electronic mail messages (email);
  2. electronic records or information on CSC managed electronic resources;
  3. information on the CSC Intranet; and
  4. information on the Internet.

Personal Use

10. Limited personal use of CSC's electronic resources by authorized individuals is permitted only when such use:

  1. occurs on the individual's personal time within normal working hours;
  2. does not incur any unauthorized additional cost to the CSC;
  3. observes rules governing professional conduct and prohibitions related to unlawful and unacceptable conduct as outlined in this policy and elsewhere;
  4. employs only those information technology products authorized and installed by CSC- authorized Information Management/ Information Technology (IM/IT) personnel;
  5. does not require CSC to provide additional privacy protection for personal information stored, transmitted or processed beyond that which is already provided; and
  6. allows CSC to read the contents of communications and files and access personal information pursuant to the section entitled "Monitoring" in this directive.

Prohibited Uses Of Electronic Resources

11. Authorized individuals are prohibited from using government electronic resources to:

  1. operate, transmit or store games or other entertainment software;
  2. maintain or support a personal private business or to assist relatives, friends, or other persons in such activities; or
  3. conduct any unlawful or unacceptable activity or to store or transmit information relating thereto, except where specifically authorized as part of an official investigation.

12. Offender access to CSC's electronic resources is prohibited except where specifically authorized by CSC policy for approved purposes such as an educational or work program, in compliance with applicable rules related to the protection of personal information (see Commissioner' Directive 730 – Inmate Program Assignments and Payments).

Monitoring

Routine Monitoring

13. Routine monitoring of electronic resources will be performed by staff designated by the Chief Information Officer to assess performance, to protect the availability, integrity, confidentiality, value and intent of use of government assets and to ensure compliance with government policy. Routine monitoring may involve:

  1. identifying the size and type(s) of file(s) suspected of causing problems;
  2. identifying patterns of usage;
  3. determining the originator, intended recipient and subject line of email messages;
  4. testing for viruses; and
  5. keyword searches on networks, computer systems and electronic storage devices.

14. CSC's electronic resources automatically log the identity of individuals and their activities while on the resource(s).

15. Copies of files and email records (including "draft" records) are automatically backed up and retained on a daily basis.

Incidental Monitoring

16. To the greatest extent possible, the CSC seeks to preserve individual privacy; however, users should be aware that their use of CSC's electronic resources is not private. While CSC does not routinely read email or file content, under certain circumstances, CSC may monitor the activity and accounts of individual users including, but not limited to, individual login sessions, communications, email and file content.

17. All cases of individual monitoring must be authorized in advance by either the Director, Information Technology Security, the Director General, Security, or the Assistant Commissioner, Human Resource Management, except:

  1. for the cases specified in paragraph 18a;
  2. for the cases required by law; or
  3. when this type of monitoring is necessary to respond to legitimate emergency situations.

Monitoring for Unlawful Activity and Unacceptable Conduct

18. If there are reasonable grounds to suspect that an authorized individual is misusing electronic resources, including during personal use, monitoring without notice, including viewing the content of individual email records or files, may occur under the following circumstances:

  1. the authorized individual has voluntarily made electronic files or email accessible to CSC or to the public;
  2. it is necessary to do so to protect the integrity, ensure the security and/or the liability exposure of CSC;
  3. there are reasonable grounds to suspect that the authorized individual has utilized CSC's electronic resources in the commission of a violation of CSC or other government policy;
  4. there are reasonable grounds to suspect that the authorized individual is using electronic resources for an unlawful or unacceptable activity;
  5. an account appears to be engaged in unusual or unusually excessive activity, as indicated by the routine monitoring of general activity and usage patterns; or
  6. upon the receipt of a warrant or other legal instrument from a law enforcement agency.

19. Individuals who are obliged to read the content of electronic communications as part of an investigation must keep the information confidential and use it only for the purposes authorized.

Disciplinary Measures And Sanctions

20. CSC may pursue disciplinary measures or sanctions in cases of unlawful and/or unacceptable activity related to the use of its electronic resources. Disciplinary measures will be commensurate with the seriousness and circumstances of the unlawful and/or unacceptable activity. In cases where disciplinary measures are required, Labour Relations must be consulted to ensure that the application of disciplinary measures is consistent across CSC.

21. Disciplinary measures may include:

  1. a verbal or written reprimand;
  2. restrictions on access to the electronic resources;
  3. review of an individual' reliability status or security clearance; and
  4. suspension or termination of employment.

22. Following consultation with Legal Services, CSC will report suspected unlawful activities related to the use of its electronic resources to law enforcement authorities.

Enquiries

23. Strategic Policy Division
National Headquarters
Email: Gen-NHQPolicy-Politi@csc-scc.gc.ca

Commissioner,

Original Signed by:

Don Head

Annex A: Cross-References and Definitions

Cross-references

Related Legislation
Treasury Board Policies and Publications
CSC Policies and Guides

Guide to Information Security
Laptop Computers – Safeguards to Remember
Security Manual – Security of Information and Assets
Standards of Professional Conduct

Definitions

Authorized individuals:
CSC employees as well as contractors and any other individuals who have been authorized by a CSC authority to access CSC's electronic resources.
Electronic resource:
any equipment or interconnected system or subsystem of equipment that is used in the automatic acquisition, storage, manipulation, management, movement, control, display, switching, interchange, transmission, or reception of data or information. Within the context of this document, electronic resources refer to all electronic resources owned and operated by CSC.
Personal use:
an activity that is conducted for purposes other than accomplishing official or otherwise authorized activity.
Social media:
interactive web-based platforms that allow for participants with distinct social/user profiles to create, share and interact with user generated content, which can include text, images, video and audio (e.g. Facebook, Twitter, YouTube and collaborative technologies, such as Wikis, Google Docs).
Unacceptable activity:
any activity that violates CSC, TB or other government policy (for examples, see Appendix B of the TB Policy on the Use of Electronic Networks), or that violates the limitations on personal use as set out in this policy and in Appendix C of the above-mentioned TB policy.
Unlawful activity:
criminal offences, contraventions of non-criminal regulatory federal and provincial statutes, and actions that make an authorized individual or an institution liable to a civil lawsuit. For examples, refer to Appendix A of the Treasury Board (TB) Policy on the Use of Electronic Networks.