Event Security Companies in London
Event Security Companies in London
Event Security Companies in London
ADDRESS: 58 Lancaster street Southwark London SE1 ORY, UNITED KINGDOM WEBSITE: http://www.ieventsecurity.co.uk PHONE NUMBER: 02080902606
Introduction
1.1 Purpose and scope
This document establishes the operational standard for the organization and administration of security as required by the Security policy. The standard contains both requirements, indicated by use of the word "must" in sentences appearing in italics, and recommended safeguards, indicated by use of the word "should." security services in london
1.3 Concept
It can be useful to the management of the departmental security function to view security as a sub-system within the overall administrative and management system. Inputs to the security system include:
Policy support from the deputy head. The services and support of related administrative functions. Information on both departmental needs and security threats. Support in carrying out individual security responsibilities from all employees.
Within the security system there are policies, procedures and practices to support the coordination of physical security, personnel security and information technology security. Outputs of the security system include:
Application of safeguards to information and assets throughout their life cycle. Education of staff on their security responsibilities. Evaluation of the continued relevance of safeguards. event security companies in london
The systems concept of security offers flexibility within a standard approach. Threat and risk assessments should identify security factors unique to specific departments and locations. These factors should then be reflected in the specific safeguards chosen. For example, if required, an asset may receive more than the minimum protection for its classification level or designation.
Another feature of the systems concept is that, should any part of a system become inoperative or suspect, another part can be substituted, a temporary alternative installed, or another part of the system upgraded, to maintain integrity.
1.4 Guidance
For advice and assistance regarding this standard contact the organizations listed in Appendix A.
All security documentation evolves through a five-step process: needs identification and definition, response development, consultation and review, approval and promulgation. Responsibility for these steps is shown in Chart 2. Chart 2: Security documentation - roles and responsibilities Process Security policy Operational Standards Lead agencies, coordinated by TBS Technical Documentation Lead agencies, coordinated by TBS
Needs identification
TBS
Lead agencies, coordinated by TBS Advisory committee Treasury Board or TBS TBS
information technology, contracts, property, materiel, finance, telecommunications, health and safety, fire protection, access to information and privacy, audit, and personnel. For these reasons, the Security policy requires departments to appoint a departmental security officer (DSO) responsible for developing, implementing, maintaining, coordinating and monitoring a departmental security program consistent with the policy and its standards. The DSO should have direct access to the deputy head to report probable security breaches or illegal acts, as warranted and in accordance with the DSO's Mandate. security companies london To ensure effective communication between the different elements of security, functional relationships and reporting requirements should be set out in departmental policy. Because of the important role played by the Minister's Office in the conduct of departmental business, the DSO should ensure an on-going working relationship with the officials responsible for the management of the Minister's Office. DSOs should also be familiar with the manual entitled Administrative Practices: Guidelines for Minister's Offices prepared by the Treasury Board Secretariat. security services london In summary, the organization of the security function should support the coordination of the elements of security, as well as coordination with related functions.
4. Information security
4.1 Reviewing information holdings
A thorough review of information holdings and assets, to identify material that requires either classification or designation, should precede the application of all security standards.
What types of information are considered sensitive? What types of information are not considered sensitive? How to mark information to show the minimum security standards to apply.
The guide should also identify officials to classify or designate information not governed by the guide. Departments should restrict the number of delegated authorities for this function and ensure that those exercising this authority have a demonstrable and continuing need to exercise it.
Information that is publicly available is not to be classified or designated. To develop a classification and designation guide, departments should follow the following process:
Systematically review information holdings against the criteria set out in the guidelines in Appendix A to the Security policy. Assign the proper classification level to information sensitive in the national interest. Assign the proper designation level to information sensitive in other than the national interest. Whenever possible, determine the duration of classification or designation by showing the date or event that triggers declassification or downgrading. hire security guards On a periodic basis, review with the departmental access to information and privacy coordinator decisions made to exempt information as a result of requests under the Access to Information Act and the Privacy Act. This is to ensure that departmental classification criteria remain relevant and effective.
Departments should examine carefully the guidelines in Appendix A to the Security policy, the specific provisions of the Access to Information Act and the Privacy Act, and the "Access to Information" and the "Privacy and Data Protection" volumes of the Treasury Board Manual to determine what information may qualify as classified or designated information and may therefore warrant safeguarding. Also, see Appendix C to this standard for additional guidance on classifying information affecting the national interest.
salary range of public servants). This paragraph places certain limitations on the definition of personal information. (d) Business information Paragraphs 20(1)(a) and (b) of the Access to Information Act establish exemptions for the following types of information:
Trade secrets of a third party. Financial, commercial, scientific or technical information that is confidential information supplied to a department by a third party and treated by it consistently as confidential. Information that could reasonably be expected to result in financial loss or gain to, or to prejudice the competitive position of a third party. Information the disclosure of which might reasonably be expected to interfere with contractual or other negotiations of a third party. Businesses or other organizations provide much of this information. There is an expectation on the part of the third party, and an obligation on the part of government departments, to protect this type of information adequately. It should therefore be designated as other sensitive information and marked PROTECTED. In some instances, third parties will mark such information confidential, confidential business information, or given in confidence. Departments should treat this information as if it bears the marking PROTECTED, regardless of the marking put on it by the third party.
(e) Advice Section 21 of the Access to Information Act sets out exemptions for certain classes of information relating to the internal decision-making processes of government the disclosure of which would interfere with departmental operations. Determination of injury or harm within the advice exemption should be judged on the basis of the impact disclosure will have on the department's and the government's ability to carry on similar internal decision-making processes, and to consult and deliberate in a confidential manner and to give candid advice. The scope of information covered by this exemption is strictly limited. There is considerable difference between advice, recommendation, consultation or deliberation about a major government initiative and the purchase of office equipment. The best guide to exercising the discretion needed is common sense and good judgment. It is also essential to bear in mind that, even though there is no exemption for advice in the Privacy Act, it is extremely important to protect advice given in deciding about individuals.
When information is classified in the national interest, a further judgment is needed to determine the classification level. The level depends on the gravity of the detrimental effects that might reasonably be expected to occur from compromise. The levels of classification are as follows:
Top secret: applies to the very limited amount of information that, if compromised, could reasonably be expected to cause exceptionally grave injury to the national interest. Secret: applies to information that, if compromised, could reasonably be expected to cause serious injury to the national interest. Confidential: applies when compromise could reasonably be expected to cause injury to the national interest.
Most classified information will be at the confidential level. In light of the broad concept of national interest and certain assumptions that can be made about generic threats, these classification levels call for the application of minimum standard safeguards, as well as additional safeguards based on departmental threat and risk assessments. Minimum standards are also required as a result of international agreements and arrangements concerning shared classified information. There are three levels of designation:
Extremely sensitive: applies to the very limited amount of information that, if compromised, could reasonably be expected to cause extremely grave injury outside the national interest, for example, loss of life. Particularly sensitive: applies to information that, if compromised, could reasonable be expected to cause serious injury outside the national interest, for example, loss of reputation or competitive advantage. Low-sensitive: applies to information that, if compromised, could reasonably be expected to cause injury outside the national interest, for example, disclosure of an exact salary figure.
Minimum standard safeguards also apply to the different levels of designated information. These safeguards differ from those that apply to classified information, based on differences in generic threat assessments. Also, owing to its unique nature in each department, extremely sensitive, designated information warrants special safeguards based on case-by-case threat and risk assessment.
Information containing medical, psychiatric or psychological descriptions. Information compiled and identifiable as part of an investigation into a possible violation of law.
Information on the eligibility for social benefits or the determination of benefit levels (this would not include cheques or other such payment documents). Information on a completed income tax return. Information describing an individual's finances, that is, income, assets, liabilities, net worth, bank balances, financial history or activities, or creditworthiness. Information containing personal recommendations or evaluations, character references or personnel evaluations. Information concerning an individual's racial or ethnic origin or religious or political beliefs and associations or lifestyle.
Particularly sensitive, personal information exists in both large quantities throughout government and in large concentrations within certain departments. The high risk of theft or loss of this type of information means departments should take special care to properly identify it and to apply appropriate safeguards.
Have certain conditions been placed on the collection of the personal information that would lead the individual to believe that special protective measures would be taken? Is the information of a nature such that the individual would expect the government to take very special protective measures without actually being informed that this would occur?
Is the information very current and for that reason more sensitive, or has the passage of time possibly reduced that sensitivity so that disclosure under specific circumstances would lead to no measurable injury to the individual's privacy?
Gravity of injury.
Can it be surmised that compromise of the information carries with it the chance of causing serious injury? Serious injury is to be interpreted as lasting harm or embarrassment that will have direct negative effects on an individual's career, reputation, financial position, safety, health or well-being. There may be other factors unique to certain institutions that should be added to invasion-ofprivacy considerations.
Personal information collected by departments requires protection throughout its life cycle. Examples of this type of information include interviews, reports, application forms, and questionnaires. When a statistical study or survey involves processing personal information, the code that correlates data to an individual respondent must be destroyed as soon as possible, under a schedule approved by the National Archivist. Contracts for the collection of personal information should include the following points:
An undertaking to protect the information, to refrain from disclosure to any other person or organization and to use the information only for the purpose specified in the agreement. An undertaking to make the information available only to employees of the contractor who have undergone proper screening and have a need to know the information. That each employee to whom the information is made available shall sign a statement showing that he or she undertakes, as a condition of employment, to respect the sensitive nature of the information and to observe the requirements of the Privacy Act and any other conditions specified by the department governing the use of this information. That the department may terminate the contract if the contractor breaches confidentiality obligations.
IT information, software, hardware and facilities. IT services. Environmental support systems (for example, power and air conditioning).
Departmental security policies should require inventories of sensitive IT assets and assign accountability accordingly. Inventories should include an indication of the replacement and acquired value of IT assets, as this can serve as a useful criteria for the selection of safeguards. In addition, threat and risk assessments should include a statement of sensitivity to indicate confidentiality, integrity and availability attributes that warrant safeguarding. See Chapter 2-3 for more information regarding information technology security.
7. Protecting personnel
The Canada Labour Code makes departments responsible for the safety and health of employees at work. (See Sections 124 and 125, Chapter L-2, Canada Labour Code, Part II.) Therefore, threat and risk assessments should include consideration of employees in roles where they may be subject to security threats. Examples of such roles include front-desk jobs where employees may encounter hostile or emotionally upset members of the public, and high-profile positions where employees may be threatened by severely disturbed persons or publicity seekers. See Chapter 2-2 of this volume for references on protecting personnel.
8. Selecting safeguards
8.1 General
Departments must apply safeguards on the basis of threat and risk assessments, as well as security standards. This is to ensure consideration of the specific security problems in any given situation. The risk management approach described below falls within the framework provided in the government Risk Management policy. For more information on this policy, see Part III of the "Materiel, Services and Risk Management" volume of the Treasury Board Manual.
security. A threat and risk assessment is required to determine if and what additional safeguards are needed; these are to be implemented if it is cost-effective to do so. Use of the markings "CONFIDENTIAL", "SECRET", and "TOP SECRET" signals the application of minimum standards. In the absence of cost-effective safeguard options, the movement of sensitive information and assets to another, more secure site should be considered.
Enhanced Reliability Check Operations zone; container from Securit Equipment Guide or equivalent, based on TRA Single envelope; lst class mail With conditions attached: mail, messenger, courier or authorized person
Shredder, as listed in Security Equipment Guide Ensure receiving secure fax machine in Security Zone, with confirmed recipient present Use secure phone (Type I or II STU III) in appropriate location Mandatory physical and IT access controls, approved cryptography
Threat and risk assessment by user Threat and risk assessment by manger and user Discretionary or mandatory physical and IT access controls, based on TRA
More comprehensive guidance is available in operational and technical standards. Threat and risk assessments should be used to determine the need for more stringent safeguards. Chart 4: Limited examples of minimum safeguards for CLASSIFIED information Confidential Personnel screening Paper handling and storage Level 1 security clearances Secret Level II security clearance Top Secret Level III security clearance
Security zone; container from Operations zone, container from Security Security Equipment Guide, Equipment Guide, based on TRA based on TRA
Mailing in Canada Single envelope; lst class mail Paper destruction Facsimile transmission Telephone conversations
Shredder, as listed in Security Equipment Guide Ensure receiving secure fax machine in Operations Zone with confirmed recipient present. Ensure receiving secure fax machine in Security Zone, with confirmed recipient present.
Personal computer Mandatory physical and IT access controls; approved cryptography use on networks More comprehensive guidance is available in operational and technical standards. Threat and risk assessments should be used to determine the need for more stringent safeguards.
Reduce risk, for example by improving security. Avoid risk, for example by changing operations. Remove or reduce safeguards that are not required. Contain risk by preparing business resumption plans.
The Security policy requires departments to complete threat and risk assessments (TRA) for sensitive information and assets as part of the risk management approach to security. The threat and risk assessment process is a part of risk management concerned with defining what requires protection, analyzing and assessing threats, analyzing and assessing risks, and making recommendations for the management of risk. Other aspects of risk management are management decision, implementation and effectiveness review. The system to manage a security risk should be compatible with those for managing other risk in the same area, for example, fire.
The process that follows is not intended to limit a department's own security operation nor to restrict its access to sources of threat and risk information. See article 2.3 of Chapter 2-3 for information on the threat and risk assessment process for information technology.
9.3 Process
The development of a threat and risk assessment includes four broad steps:
Preparation: determining what to protect and defining the scope of the assessment. Threat assessment: determining what to protect against. Risk assessment: determining if existing or proposed safeguards are appropriate. Recommendations: identifying what should be done to provide appropriate protection.
An outline of each of these steps is provided below. Preparation The first step is to identify the types of information and assets that may require safeguarding and the scope of the assessment. A statement of the nature of the business carried out by the organization will assist in the identification of information or asset sensitivity, importance and value. Threat assessment Threats specific to classified information and assets should be examined to verify if conditions of minimum threat apply. Where minimum threat conditions apply, the next step is to assess the implementation of the minimum safeguards prescribed in the standards. Special conditions that could warrant additional or different safeguards apply where, for example, classified information and assets are targeted or located in a hostile environment. Threats specific to designated information and assets, personnel, information systems or services should be described in detail. Use of the standard investigative questions who, what, when, where, why, and how is recommended. Departmental security records should be consulted for information on security infractions and violations. Also information regarding the experience at similar or neighbouring facilities or systems should be obtained. Close attention should be paid to times or handling processes during which the information or asset is most vulnerable (for example, during periods between public access and restricted access hours or while in transit). If possible, the specific threat assessment should include any threat information that pertains to the department as a whole and should be reviewed by a regional or departmental security official.
CSIS, for assessments of espionage, sabotage or terrorism threats, as specified in Section 2 of the CSIS Act, to departmental information and assets. The RCMP, for threat information and advice on threat and risk assessments related to criminal matters, physical security, computer security and other relevant aspects of information technology security. CSE, for technical threat information relating to COMSEC and other relevant aspects of information technology security.
See Appendix A for the addresses of these organizations. Departments with facilities abroad containing sensitive information and assets should maintain liaison with the Department of Foreign Affairs and International Trade through their security office. The managers responsible for health, safety and emergency preparedness should be consulted regarding threats that are also a security concern, such as fire. Next, the likelihood and consequences of a threat occurring should be assessed. Likelihood The likelihood of the threat occurring should be evaluated in terms of "low", "medium" or "high." Low means there is no history and the threat is considered unlikely to occur. Medium means there is some history and an assessment that the threat may occur. High means there is a significant history and an assessment that the threat is quite likely to occur. The term "not applicable" may be used to indicate that a threat is considered not to be relevant to the situation under review. There are various methods for assigning numerical values for estimated levels of threat. Often, however, these methods can easily become complicated and they may require interpretation to become meaningful. Therefore, the use of descriptive terms is recommended. Consequences Having considered the likelihood of a threat occurring, it can then be useful to state what consequences would result. This is a restatement of the assessment made when classifying and designating information and assets regarding the potential injury compromise might cause. In the case of classified information and assets, the consequences of compromise are expressed in terms that relate to the classification level: serious injury, very serious injury or exceptionally grave injury. For designated information and assets, personnel and services, consequences should be expressed in terms such as "loss of trust", "loss of privacy", "loss of asset", or "loss of service." Risk assessment
The next step is to evaluate vulnerabilities that may permit a threat to cause harm. Assess existing and proposed safeguards as completely satisfactory; satisfactory in most aspects; or unsatisfactory. Use of a departmental checklist of standard safeguards is recommended. If some aspects of the security system remain unassessed, this should be recorded. Help in assessing safeguards may be obtained from the lead agencies. Ideally, before requesting help with this step, the threat assessment will have been completed. Where this has not been possible, assistance with the entire process should be requested. Recommendations The threat and risk assessment should result in a report to management. The report should provide recommendations in order of priority to reduce or eliminate security risks. It should also indicate resource implications, including finances, personnel, equipment and time. A useful threat and risk assessment is one that provides the manager with an appreciation of the security status of the area or system concerned. The TRA should enable the manager to make an informed decision on safeguards to be applied or removed. To illustrate the use of the threat and risk assessment terminology, an example of an outline is provided on the following page. Sample Threat and Risk Assessment Summary FACILITY: District Office. BUSINESS: Administration of benefit program. Clients are interviewed in an operations zone. INFORMATION/ASSETS: Particularly sensitive, personal information on both paper and electronic files. LOCATION OF ASSETS: Approved containers within a security zone. Office is in downtown area; a move is planned.THREATS: Sample Threat and Risk Assessment Vandalism: Theft: Computer failure:
Low - Minor delay in service. Low - Loss of service, confidentiality, trust. Medium - Loss of service and trust. Loss during planned move;
RISK: Generally low risk since existing security measures are satisfactory. Exceptions:
Medium risk of loss due to computer failure in view of unsatisfactory computer backup procedures. Medium risk of loss during planned move due to lack of procedures for secure transfer of files to new location.
RECOMMENDATIONS:
Develop and implement computer backup procedures. Develop and implement procedures for security of paper files during the planned move.
Note: Greater detail on the nature of threats and on security measures should be available in supporting documentation
Designated information should be marked at the time it is created or collected. Further, designated information must be marked if it is to be disclosed beyond the organizational unit that created or collected it. The only exception is routine information exchanged with the individual or organization that is the subject of the information. For instance, there is no need to mark a cheque sent to an individual or his or her official representative. See Appendix D for additional information on the security marking of sensitive information.
The requirement to declassify or downgrade sensitive information applies also to that provided from one department to another. Where possible, before declassifying or downgrading any information orginating from another department, the originator must be consulted. The originator can be represented by the office of origin. Information may be transferred to the department or government that originated it for declassification or downgrading. In most circumstances, however, it will be more practical, especially with a large volume of information simply to consult the other department or government about whether it is appropriate to declassify or downgrade the information. When it is not possible to consult with the originator, departments should develop alternative procedures and include these in their classification and designation guides. This will be necessary, for example, when the originating department has been disbanded or reorganized in such a way as to make it impossible to consult effectively or efficiently with the originator. A decision to declassify a document from another department should not be taken lightly. Where consultation with the originator is impractical or not possible, and there is doubt regarding the continued need for protection, procedures should require consultation with the appropriate officials. For example, the Access to Information Co-ordinator will be able to advise on whether exemptions or exclusions may still apply.
Where sensitive information moves with a transfer of functions, the receiving department is deemed to be the originating department.
12.8 Review
Departments should encourage users or originators of sensitive information to review its sensitivity on a continuing basis. Where appropriate, the information is to be declassified or downgraded and marked accordingly.
consultation should take place only when an established and acceptable system of liaison and consultation exists. The Department of Foreign Affairs and International Trade should be kept informed of these consultations.
A description of the types of information to be shared. The purposes for which the information is being shared. A stipulation that the information is to be distributed only on a need-to-know basis within a recipient department. A description of all the administrative, technical and physical safeguards required to protect the information involved. A requirement that the recipient maintain a list of all officials, by position, who have access to the information. The conditions for disclosing information to third parties. The name, title and signature of the appropriate officials in both the originating department and the receiving province and the period covered by the agreement.
These elements should be considered for agreements according to the degree of injury that could result if the information were compromised. Conditions for disclosure to third parties referred to above include obtaining the authority of the originating federal department in all cases before disclosing the information to third parties. Another condition is that such disclosure must be made under the terms and conditions specified by the originating department. Further, the agreement should warn that failure to abide by this provision will lead to an end of the sharing of such information. Limited circumstances exist where confidential or secret information may be provided to outside organizations without the requirement for a security clearance. Examples include programs approved by the deputy head for the sharing of classified information with provincial governments. Under no circumstances is top secret information to be provided without the recipient being security cleared at Level III.
Note that Chapter 3-5 of the "Privacy and Data Protection" volume of the Treasury Board Manual sets out the components for agreements when sharing personal information with foreign governments, international and provincial organizations. Subsection 8(2) of the Privacy Act imposes special conditions on the sharing of personal information. These conditions are discussed in Section 6 of the "Privacy and Data Protection" volume. The components for these agreements can, however, be adjusted appropriately to consider third party business information, law enforcement information, and the like, to deal with situations outside the Privacy Act.
Keeping staff aware of their responsibilities and the part they must play in implementing and maintaining security within the department. Gaining and maintaining the commitment of staff to, and acceptance of, those responsibilities and actions.
Awareness training creates a sensitivity to threats and provides details on departmental policy and procedures for protecting departmental information and assets. It should be impressed upon staff at all levels that security is part of their everyday duties, rather than an optional extra or someone else's job.
To be effective, awareness training must be continually reinforced. Security officers may find it a useful practice to circulate departmental regulations periodically through newsletters or bulletins to all personnel and to conduct lectures from time to time on various security subjects.
Departments conducting security inspections and investigations must have policies that establish the conditions under which these will be carried out. Security inspection policies and procedures must be clear, unequivocal and comprehensive; reasonable in the circumstances; and brought to the attention of employees before being implemented. They must also conform with the collective bargaining regime or any collective agreement in force. Informing employees of inspection and investigation policies and procedures before they are implemented means giving reasonable notice to existing employees and advice on application or commencement for new employees. Where appropriate, the consent of the affected individuals should be obtained. There is a need for prudence where inspections begin to merge with criminal investigations. That is, inspections are to be confined to the conditions set out in departmental policies; they are not to be deliberately used to by-pass the procedural requirements of the criminal law. In particular, inspections should not be used as a pretext for carrying out a search for or to gather evidence of criminal wrong-doing without reasonable grounds. Policies should require that security breaches and violations be reported promptly and procedures should explain how and to whom such reports should be made. Employees should also be informed of the reasons for inspection and investigation policies and procedures and their cooperation in implementing them should be encouraged. Departmental inspection and investigation policies should be reviewed by departmental legal services before implementation.
The immediate reporting to the deputy head of possible breaches of security. The immediate reporting to CSIS of probable breaches of security involving classified information or assets. Reporting to the appropriate law enforcement authority breaches suspected of constituting criminal offences. Where applicable, informing the department that originated the information or other assets involved that a breach of security has occurred. Informing other departments that have information or assets involved in a breach of security of the circumstances and findings that affect them. Assessing injury as soon as possible whenever it is probable that a breach of security has occurred and reporting this to the deputy head.
Clearly minor incidents need not be reported to CSIS; the potential injury to the national interest should be taken into account in such cases. Reports should be made through the DSO. To report probable breaches to CSIS, use the address and telephone number listed in Appendix A.
16.8 Evidence
In all instances where sensitive information might fall under public scrutiny as a result of judicial action, the departmental security officer must consult with departmental legal services. Departmental personnel who might be required to testify or give evidence in a legal proceeding connected with a criminal offence should document such matters to support any testimony required from them.
Appendix B - References
"Access to Information" volume, Treasury Board Manual Administrative Practices: Guidelines for Ministers' Offices, Treasury Board Secretariat Guide to Managing Guard Services (SSB/SG-29), Royal Canadian Mounted Police, 1993 "Information Management" volume, Treasury Board Manual "Materiel, Services and Risk Management" volume, Treasury Board Manual "Privacy and Data Protection" volume, Treasury Board Manual Security Guards, Uniformed (CAN/CGSB133.1-87), Canadian General Standards Board
Security Guards, Supervisors (CAN/CGSB133.2-92), Canadian General Standards Board Telework policy, Chapter 2-4, "Human Resources" volume, Treasury Board Manual Security Services - Commissionaires and other Guards, Chapter 370, Customer Manual (Materiel Management), Government Services Canada
Diplomatic plans and negotiations whose essential purpose is the maintenance of the safety and security of the nation. Aspects of negotiating processes (e.g., strategy, tactics, and positions) which would give another nation unfair advantage. Analyses of, or commentaries on, the domestic affairs of another nation, the disclosure of which would not be in Canada's interest. Diplomatic correspondence exchanged with foreign states or international organizations of states or official correspondence exchanged with Canadian diplomatic missions or consular posts abroad. Quite likely much official correspondence would not be classified such as correspondence on the internal administration of missions and cultural and public information programs. Tactical and strategic defence plans, operations or exercises, including the characteristics of equipment and military techniques and the scale, movement and placement of forces. Information obtained or prepared for the purpose of intelligence relating to defence or the detection, prevention or suppression of subversive or hostile activities. This encompasses both raw data (information obtained) as well as the refined product or analysis (information prepared). Methods of, and scientific or technical equipment for, collecting, assessing or handling information relating to international relations, defence and security and intelligence. Communications or cryptographic systems of Canada or foreign states used in the conduct of international affairs, the defence of Canada or states allied or associated with Canada, or in relation to the detection, prevention or suppression of subversive or hostile activities. Lawful investigations into activities suspected of being threats to the security of Canada within the meaning of the Canadian Security Intelligence Service Act and investigative techniques and plans for such investigations.
Given the nature of the information involved, it would normally be found in the Privy Council Office, the Department of Foreign Affairs and International Trade, the Department of National Defence and the national security and intelligence agencies. Investigations pertaining to the security of Canada (paragraphs 16(1)(a)(iii), 16(1)(b) and 16(1)(c) ATIA) Information qualifying for classification under this category is very restrictive in that the information must relate to threats to the security of Canada described in Section 2 of the Canadian Security Intelligence Service Act. Only a limited number of departments hold such information, most notably the CSIS and the RCMP. To qualify for classification the information must meet the following criteria:
The information was obtained or prepared by those limited number of investigative bodies, listed in regulations made pursuant to the access or privacy legislation. The information was obtained or prepared during a lawful investigation. The information pertains to activities suspected of constituting threats to the security of Canada within the meaning of the Canadian Security Intelligence Service Act.
Information relating to investigative techniques or plans for specific lawful investigations in relation to the above would also qualify for classification in the national interest.
The currency, coinage or legal tender of Canada. Contemplated changes in tariff rates, taxes, duties or any other revenue source. Contemplated changes in the conditions of operation of financial institutions. Contemplated sale or purchase of securities or of foreign or Canadian currency.
This category is intended to cover management of the national economy. Such information would normally be found in the Department of Finance, the Bank of Canada, and Revenue Canada.
Secret information
Mark SECRET in the upper right corner of each page. Number each copy, show the copy number on the face of each copy and maintain a distribution list.
Confidential information
Mark CONFIDENTIAL in the upper right corner of the face of the document. Control copies of confidential documents in the same way as secret documents, when warranted by a threat and risk assessment.
Designated information
Subject to discretionary exceptions, mark designated documents with the PROTECTED in the upper right corner of the face of the document. In addition, the reason for the sensitivity of information marked PROTECTED or the type of safeguard required may be added. The following letters may be used to signal appropriate safeguards for designated information: "A" for low-sensitive; "B" for particularly sensitive; and "C" for extremely sensitive.