Policy Bulletin

Date:
2012-07-19

Number:
350


Policy number and title:

INTERNAL SERVICES DIRECTIVE 226 USE OF ELECTRONIC RESOURCES

Why was the policy changed?

This policy has been updated to bring it in line with the Treasury Board (TB) Policy on Government Security revised in 2012, to broaden the scope of electronic resources covered by the policy, and to clarify the use of monitoring.

What has changed?

The title of the policy has been amended from "Commissioner’s Directive 226 Use of Electronic Networks" to "Internal Services Directive 226 Use of Electronic Resources". This document has been changed from a CD to an ISD as it takes its authority in government policy (i.e. Treasury Board Secretariat) rather than in the Corrections and Conditional Release Act; this reflects the recommendations of the Policy Review Task Force. It should be noted that CDs and ISDs have the same level of importance.

Two new sections entitled "Application" and "Enquiries" have been added, and the order of the paragraphs in the "Responsibilities" section has been re-arranged to comply with the policy standard and structure as a result of the Policy Review Task Force.

The ISD has been updated to reflect the TB Policy on Government Security, revised in 2012, as well as the emergence of social media.

Technical amendments have been made to clarify and reinforce the use of monitoring, and to better define appropriate use, personal use and potential disciplinary measures.

Cross-references and definitions are now found in Annex A of the ISD.

Former Annexes A and B, which included many examples of unlawful and unacceptable activities, have been removed. They were a repetition of the appendices found in the TB Policy on the Use of Electronic Networks. They have been replaced with a definition of unlawful and unacceptable activities (in the new Annex A of the ISD) with a hyperlink to the TB policy providing examples. This will reduce the risk of inconsistency between the ISD and the TB policy should the latter be revised.

How was it developed?

This policy is based on the TB Policy on the Use of Electronic Networks, which requires deputy heads to put in place policies and practices to ensure the appropriate use of electronic resources and include specific policy statements. The Information Management Services Branch revised and further developed that policy in consultation with representatives from the Security Branch, Regional Administrators, Operations, Information Management Services, Regional Information Technology Security representatives, Staff Relations, Legal Services and the Strategic Policy Division. EXCOM Members were consulted in the spring of 2009.

Accountabilities?

All individuals authorized to use CSC's electronic resources are accountable for their conduct. In addition, the policy outlines various management accountabilities related to the administration of CSC's electronic resources and defines authorization processes required to initiate investigations.

Who will be affected by the policy?

All authorized users of CSC's electronic resources.

All Budget Managers.

Expected cost?

None.

Other impacts?

Changes to manuals, guidelines, training materials, and processes are underway or completed in support of this policy.

Contact: