<?xml version="1.0" encoding="UTF-8"?><doc title="Rescinded [2024-05-07]  - Direction on Enabling Access to Web Services: Policy Implementation Notice" documentID="32588" versionID="1" language="en" space="preserve" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:noNamespaceSchemaLocation="G:\web\xml\pols\PolicyInstrumentSchema.HTML5.xsd"><chapters><chapter anchor="1" title="Purpose"><clauses><clause anchor="1.1"><p>The purpose of this Policy Implementation Notice (PIN) is to provide direction to departments<sup id="fn1-rf"><a class="fn-lnk" href="#fn1"><span class="wb-inv">Footnote </span>1</a></sup> on enabling access to web services, in accordance with the <a href="https://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=27122">Policy on Acceptable Network and Device Use</a>.</p></clause></clauses></chapter><chapter anchor="2" title="Scope"><clauses><clause anchor="2.1"><p>This <abbr title="Policy Implementation Notice">PIN</abbr> applies to Government of Canada (GC) electronic networks for unclassified information only. Internet-based tools and services are not to be used for communicating or storing sensitive information unless approved by the institution’s security and technical authorities.</p></clause></clauses></chapter><chapter anchor="3" title="Effective date"><clauses><clause anchor="3.1"><p>This <abbr title="Policy Implementation Notice">PIN</abbr> is effective as of <time class="nowrap" datetime="2018-06-14">June 14, 2018</time>.</p></clause></clauses></chapter><chapter anchor="4" title="Application"><clauses><clause anchor="4.1"><p>This <abbr title="Policy Implementation Notice">PIN</abbr> applies to all departments that are subject to the Policy on Acceptable Network and Device Use.</p><p>Departments, agencies and organizations in the Government of Canada not subject to the Policy on Acceptable Network and Device Use are encouraged to abide by this <abbr title="Policy Implementation Notice">PIN</abbr> to the extent possible.</p><p>The heads of the following organizations are solely responsible for monitoring and ensuring compliance with this <abbr title="Policy Implementation Notice">PIN</abbr> within their organizations:</p><ul><li>Office of the Auditor General</li><li>Office of the Chief Electoral Officer</li><li>Office of the Commissioner of Lobbying of Canada</li><li>Office of the Commissioner of Official Languages</li><li>Office of the Public Sector Integrity Commissioner of Canada</li><li>Offices of the Information and Privacy Commissioners of Canada</li></ul></clause></clauses></chapter><chapter anchor="5" title="Context"><clauses><clause anchor="5.1"><p>The <abbr title="Government of Canada">GC</abbr> recognizes that open access to modern tools is essential to transforming how public servants work and serve Canadians. Open access to the Internet, including access to <abbr title="Government of Canada">GC</abbr> and external tools and services:</p><ul><li>enhances communication and digital collaboration</li><li>encourages sharing of knowledge and expertise to support innovation</li></ul><br /><p>When equipped with the right tools, public servants can work more effectively. The <abbr title="Government of Canada">GC</abbr> must adapt to meet the demands and expectations of its clients, stakeholders, partners and employees.</p></clause><clause anchor="5.2"><p>The <abbr title="Government of Canada">GC</abbr> must also apply adequate security controls to protect users, information and assets. When access to collaboration tools and sites is restricted, instead of increasing protection, the opposite occurs. Users will find a way around the blocks if it makes their life easier. From the standpoint of <abbr title="Information Technology">IT</abbr> security, connections to external tools and services are not substantially different from other connections to the Internet. Security is more than just locking things down; user experience must also be considered.</p></clause><clause anchor="5.3"><p>Adopting a balanced approach that considers user needs, supported by a pragmatic security program, will result in a more secure environment. Instead of banning access to certain tools and sites, making access open by default and encouraging the secure use of these tools and services will result in risks being better controlled. Consideration of the departmental risk profile and the department’s culture, mission and business objectives, and the threats that pertain to the departmental business activities, will also help determine the proportionate security measures needed to ensure the adequate protection of <abbr title="Government of Canada">GC</abbr> information.</p></clause></clauses></chapter><chapter anchor="6" title="Direction"><clauses><clause anchor="6.1"><p>Departments are to enable open access to the Internet for <abbr title="Government of Canada">GC</abbr> electronic networks and devices, including <abbr title="Government of Canada">GC</abbr> and external Web 2.0 tools and services, to authorized individuals, as per Section 6.1.3 of the <a href="https://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=27122">Policy on Acceptable Network and Device Use</a> (PANDU).</p></clause><clause anchor="6.2"><p>To ensure a consistent user experience government-wide while taking into consideration the departmental risk profile, departments are to reconfigure their web filtering rules to be open by default to the Internet, except for websites that support non-acceptable activities or behaviours which, as per <a href="https://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=27122#appC">Appendix C of <abbr title="Policy on Acceptable Network and Device Use">PANDU</abbr></a>:</p><ul><li>are criminal or otherwise unacceptable </li><li>violate Treasury Board or other organizational policies, codes of conduct and other published requirements</li><li>impact negatively the performance of <abbr title="Government of Canada">GC</abbr> electronic networks and devices</li><li>impede organizational operations or the delivery of services</li><li>breach the “duty of loyalty” requirement for public servants</li></ul></clause><clause anchor="6.3"><p>Departments are expected to apply web filtering rules in accordance with Appendix A of this PIN, which provides the baseline set of website categories that are to be blocked in order to comply with legal and policy requirements. All other categories, including social media and web-based collaboration or chat tools, are to be open by default. When departments limit access outside these categories, they are expected to take a risk-based approach and document a rationale for limiting such access, approved by the departmental Chief Information Officer.</p></clause><clause anchor="6.4"><p>Departments are responsible for ensuring continued compliance with the <a href="https://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=16578">Policy on Government Security</a> and Appendix E (Departmental Considerations for Security) of <abbr title="Policy on Acceptable Network and Device Use">PANDU</abbr> and are encouraged to analyze departmental security needs and implement additional security considerations (outlined in Appendix B of this <abbr title="Policy Implementation Notice">PIN</abbr>) to mitigate risk to an acceptable level, according to the departmental risk profile.</p></clause><clause anchor="6.5"><p><abbr title="Shared Services Canada">SSC</abbr> is responsible for managing web filtering tools for departments that receive their network services from <abbr title="Shared Services Canada">SSC</abbr>, as per Section 6.2 of <abbr title="Policy on Acceptable Network and Device Use">PANDU</abbr>. However, as legacy web filtering solutions were inherited from partner organizations, <abbr title="Shared Services Canada">SSC</abbr>’s ability to monitor and report is not consistent for each <abbr title="Shared Services Canada">SSC</abbr> customer. <abbr title="Shared Services Canada">SSC</abbr> is investing in an enterprise web filtering capability which will provide a better ability to monitor and report as networks evolve from the legacy infrastructure to the <abbr title="Shared Services Canada">SSC</abbr> enterprise service. <abbr title="Shared Services Canada">SSC</abbr> customers requiring information on the reporting capabilities of their web filtering service are to contact <abbr title="Shared Services Canada">SSC</abbr>.</p></clause></clauses></chapter><chapter anchor="7" title="Enquiries"><clauses><clause anchor="7.1"><p>For interpretation of any aspect of this <abbr title="Policy Implementation Notice">PIN</abbr>, contact Treasury Board of Canada Secretariat <a href="https://www.canada.ca/en/treasury-board-secretariat/corporate/contact.html#enquiries">Public Enquiries</a>.</p></clause><clause anchor="7.2"><p>Individuals at departments should contact their departmental information technology group for any questions regarding this <abbr title="Policy Implementation Notice">PIN</abbr>.</p></clause><clause anchor="7.3"><p>Individuals from a departmental information technology group may contact their <abbr title="Shared Services Canada">SSC</abbr><a href="http://service.ssc-spc.gc.ca/en/contact/partclisupport/account-exec">Service Delivery Management Executives</a> for information related to their web filtering service.</p></clause><clause anchor="7.4"><p>Individuals from a departmental information technology group may contact the <abbr title="Treasury Board of Canada Secretariat">TBS</abbr> Cyber Security (<a href="mailto:ZZTBSCYBERS@tbs-sct.gc.ca">ZZTBSCYBERS@tbs-sct.gc.ca</a>) mailbox for interpretations of this <abbr title="Policy Implementation Notice">PIN</abbr>.</p></clause></clauses></chapter><chapter anchor="8" title="References"><chapter anchor="8.1" title="Related policy instruments"><ul><li><a href="http://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=27122">Policy on Acceptable Network and Device Use</a></li><li><a href="https://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=12755">Policy on Management of Information Technology</a></li><li><a href="https://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=12742">Policy on Information Management</a></li><li><a href="https://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=16578">Policy on Government Security</a></li><li><a href="https://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=16579">Directive on Departmental Security Management</a><u></u></li><li><a href="https://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=12328">Operational Security Standard: Management of Information Technology Security (MITS)</a><u></u></li><li><a href="http://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=27907">Guideline on Acceptable and Network Device Use</a></li><li><a href="https://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=30683">Policy on Communications and Federal Identity</a></li><li><a href="https://www.canada.ca/en/treasury-board-secretariat/services/information-technology-project-management/information-management/information-management-protocol-instant-messaging-using-mobile-device.html">Information Management Protocol: Instant Messaging Using a Mobile Device</a></li></ul></chapter><chapter anchor="8.2" title="Additional Government of Canada references"><ul><li>Communications Security Establishment (CSE): <a href="https://www.cse-cst.gc.ca/en/node/265/html/22814">Overview: <abbr title="Information Technology">IT</abbr> Security Risk Management: A Lifecycle Approach</a> (Information Technology Security Guidance 33 (ITSG-33), <time class="nowrap" datetime="2012-11-01">November 1, 2012</time>)</li><li><abbr title="Communications Security Establishment">CSE</abbr>: <a href="https://www.cse-cst.gc.ca/en/node/1297/html/25231">Top 10 <abbr title="Information Technology">IT</abbr> Security Actions to Protect Government of Canada Internet-Connected Networks and Information</a> (<abbr title="Information Technology">IT</abbr> Security Bulletin for the Government of Canada 89, Version 3 (ITSB-89, Version 3), November 2014)</li><li><abbr title="Communications Security Establishment">CSE</abbr>: <a href="https://www.cse-cst.gc.ca/en/node/233/html/9869">Cyber Security Risks of Using Social Media: Guidance for the Government of Canada</a> (<abbr title="Information Technology">IT</abbr> Security Bulletin 66 (ITSB-66), November 2014)</li></ul></chapter></chapter><chapter anchor="9" title="Definitions"><dl><dt>acceptable use</dt><dd><p>Permitted use of <abbr title="Government of Canada">GC</abbr> electronic networks and devices by authorized individuals:</p><ul><li>to perform activities as a part of their official duties</li><li>for career development and other professional activities</li><li>for limited personal use that is conducted on personal time (that is, use that is not for financial gain, does not incur additional costs to the department, and does not interfere with the conduct of government business)</li></ul><p>All use of <abbr title="Government of Canada">GC</abbr> electronic networks and devices must be in compliance with:</p><ul><li>the <a href="https://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=25049">Values and Ethics Code for the Public Sector</a></li><li>all related Treasury Board policies and departmental codes of conduct and policies</li></ul><p>Use of <abbr title="Government of Canada">GC</abbr> electronic networks and devices must not:</p><ul><li>give rise to a real, potential or apparent conflict of interest </li><li>undermine the integrity of the department in any way</li></ul><p>See Appendix B of <abbr title="Policy on Acceptable Network and Device Use">PANDU</abbr>.</p></dd><dt>access</dt><dd><p>Gaining entry to an electronic network that the federal government has provided to <span class="nowrap"><abbr title="Government of Canada">GC</abbr>-authorized</span> individuals. Access to such electronic networks may be from inside or outside government premises. Access may support:</p><ul><li>telework and remote access situations</li><li>situations where authorized individuals are using electronic networks provided by the federal government on their own time for limited personal use</li></ul><p>(Source: <abbr title="Policy on Acceptable Network and Device Use">PANDU</abbr>)</p></dd><dt>authorized individuals</dt><dd>Individuals working with or for the <abbr title="Government of Canada">GC</abbr>, including employees of the federal government, casual workers, contractors, students and other people who have been authorized by the deputy head to access <abbr title="Government of Canada">GC</abbr> electronic networks and devices. (Source: <abbr title="Policy on Acceptable Network and Device Use">PANDU</abbr>)</dd><dt>defence in depth</dt><dd>The concept of protecting a computer network with a series, or layer, of defensive mechanisms such that if one mechanism fails, another will already be in place to thwart an attack.</dd><dt>electronic network</dt><dd><p>Groups of computers and computer systems that can communicate with each other, including and without limitation:</p><ul><li>the Internet</li><li><abbr title="Government of Canada">GC</abbr> electronic data networks</li><li>voice and video network infrastructure</li><li>public and private networks that are external to a department</li></ul><p>An electronic network includes wired and wireless components. (Source: <abbr title="Policy on Acceptable Network and Device Use">PANDU</abbr>)</p></dd><dt>external networks</dt><dd>Networks reached from the <abbr title="Government of Canada">GC</abbr> network and to which authorized individuals are granted access. External networks include permissible sites across the public Internet and via the World Wide Web, including services provided by parties, such as collaborative software. (Source: <abbr title="Policy on Acceptable Network and Device Use">PANDU</abbr>)</dd><dt>Internet</dt><dd>A global system of interconnected computer networks that uses the standard Internet protocol suite (TCP or IP<sup id="fn2-rf"><a class="fn-lnk" href="#fn2"><span class="wb-inv">Footnote </span>2</a></sup>) to serve users worldwide. (Source: <abbr title="Policy on Acceptable Network and Device Use">PANDU</abbr>)</dd><dt>monitoring practices</dt><dd><p>Use of a software system that:</p><ul><li>monitors an electronic network for slow or failing components</li><li>notifies the network administrator in cases of outages</li><li>can monitor the network activity of specific individuals for which there is suspicion of unacceptable network usage</li></ul><p>Recording and analysis of the use of electronic networks are used for operational purposes and for assessing compliance with government policy. (Source: <abbr title="Policy on Acceptable Network and Device Use">PANDU</abbr>)</p></dd><dt>open access</dt><dd>The provision of Internet access, in accordance with the <a href="https://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=16578">Policy on Government Security</a>, to authorized individuals via <abbr title="Government of Canada">GC</abbr> electronic networks and devices that, from the perspective of firewall settings, is substantively equivalent, irrespective of department or access medium. Internet sites that enhance productivity, communication and collaboration are not blocked, with the exception of those that present a legitimate <abbr title="Information Technology">IT</abbr> security threat and where content substantively falls into the category of unacceptable use. (Source: <abbr title="Policy on Acceptable Network and Device Use">PANDU</abbr>)</dd><dt>professional use</dt><dd><p>Refers to the use of a personal social media account for purposes related to professional activities, such as:</p><ul><li>communicating with professional associations</li><li>professional networking (for example, participating in an online conference)</li><li>gathering and sharing knowledge (for example, using Twitter to stay up to date on trends, or visiting government Facebook pages) </li><li>career development (for example, maintaining a LinkedIn profile)</li></ul><p>(Source: Guideline on Acceptable Network and Device Use)</p></dd><dt>sensitive information or asset </dt><dd><p>Information or asset that if compromised would reasonably be expected to cause an injury. Sensitive information includes:</p><ul><li>all information that falls within the exemption or exclusion criteria under the Access to Information Act and the Privacy Act</li><li>controlled goods and other information and assets that have regulatory or statutory prohibitions and controls</li></ul><p>(Source: Policy on Government Security)</p></dd><dt>unacceptable use</dt><dd><p>Any activity that violates Treasury Board or departmental policy instruments or other published requirements, including but not limited to activity or behaviour that:</p><ul><li>may give rise to criminal offences</li><li>violates federal and provincial statutes</li><li>impacts negatively on the performance of <abbr title="Government of Canada">GC</abbr> electronic networks and devices</li><li>impedes departmental operations or the delivery of services</li><li>breaches the “duty of loyalty” requirement for public servants </li><li>could be deemed to reasonably result in civil lawsuits</li></ul><p>Also see Appendix C of <abbr title="Policy on Acceptable Network and Device Use">PANDU</abbr>.</p></dd><dt>Web 2.0 (external tools and services)</dt><dd><p>Includes Internet-based tools and services that allow for participatory:</p><ul><li>multi-way information-sharing</li><li>dialogue</li><li>syndication </li><li>user-generated content</li></ul><p>Web 2.0 can include social media, collaborative technologies and cloud-based tools and services. (Source: <abbr title="Policy on Acceptable Network and Device Use">PANDU</abbr>)</p></dd></dl></chapter></chapters><appendices><appendix anchor="A" title="Appendix A: baseline configuration for web filtering"><section><h3>Table 1. Categories to be blocked</h3><p>The following table outlines the categories to be configured for blocking, as per <a href="https://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=27122#appC">Appendix C of <abbr title="Policy on Acceptable Network and Device Use">PANDU</abbr></a>. When departments limit access outside these categories, they are expected to take a risk-based approach and document a rationale for limiting such access, approved by the departmental Chief Information Officer. There may be exceptions when justified by a risk assessment and based on job function (e.g. investigations that require access to a blocked site).</p><table class="table table-bordered table-condensed"><thead><tr class="active"><th scope="col" class="text-center">Category</th><th scope="col" class="text-center">Rationale</th></tr></thead><tbody><tr><td>Anonymizer proxies (untraceable Internet traffic)</td><td>Violation of organizational or Treasury Board policies and publications</td></tr><tr><td>Child abuse</td><td>Criminal offence</td></tr><tr><td>Criminal activity</td><td>Criminal offence</td></tr><tr><td>Games</td><td>Violation of organizational or Treasury Board policies and publications</td></tr><tr><td>Hacking</td><td>Criminal offence</td></tr><tr><td>Harassment</td><td>Violation of organizational or Treasury Board policies and publications</td></tr><tr><td>Hate propaganda</td><td>Criminal offence</td></tr><tr><td>Illegal gambling</td><td>Criminal offence</td></tr><tr><td>Malicious Websites </td><td>Violation of organizational or Treasury Board policies and publications</td></tr><tr><td>Obscenity</td><td>Criminal offence</td></tr><tr><td>Peer-to-peer File Sharing (e.g. piratebay.se, utorrent.com) </td><td>Impact negatively the performance of <abbr title="Government of Canada">GC</abbr> electronic networks and devices and/or potential criminal offence</td></tr><tr><td>Phishing and fraud</td><td>Criminal offence</td></tr><tr><td>Piracy </td><td>Violation of organizational or Treasury Board policies and publications</td></tr><tr><td>Pornography</td><td>Violation of organizational or Treasury Board policies and publications </td></tr><tr><td>Sexually explicit </td><td>Violation of organizational or Treasury Board policies and publications</td></tr><tr><td>Spam URLs</td><td>Impact negatively the performance of <abbr title="Government of Canada">GC</abbr> electronic networks and devices </td></tr><tr><td>Spyware</td><td>Criminal offence</td></tr><tr><td>Terrorist, militant or extremist activities</td><td>Criminal offence</td></tr><tr><td>Violence</td><td>Criminal offence</td></tr></tbody></table></section></appendix><appendix anchor="B" title="Appendix B: security considerations"><p>Departments should apply a defence-in-depth approach, implementing measures in accordance with the threat, to manage security risks to <abbr title="Government of Canada">GC</abbr> electronic networks, devices and information, while balancing user needs. The following actions are recommended when enabling access to the Internet and web services: </p><section><h3>For managers</h3><ul><li>Ensure that staff:
 <ul><li>understand their obligation to safeguard information and assets</li><li>never use external Web 2.0 tools and services for communicating or storing sensitive information unless the service is approved by the institution’s security and technical authorities</li></ul></li><li>Update guidance on information management to:
 <ul><li>include best practices and describe how they apply to the use of public websites, tools and services, in accordance with <a href="https://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=12742">Policy on Information Management</a></li><li>indicate that when information of business value is transmitted or created via <abbr title="Government of Canada">GC</abbr> and external Web 2.0 tools and services, the information:
  <ul><li>must be capable of being extracted and documented in another format (for example, an email message or a Word document)</li><li>must be stored and retained in an official corporate repository</li><li>is subject to Access to Information and Privacy (ATIP) </li></ul></li></ul></li><li>Encourage staff to:
 <ul><li>use versions of tools that have features that provide:
 <ul><li>increased security assurances (for example, two-factor authentication) </li><li>information management controls (for example, export functionality, retention policies)</li></ul></li><li>review terms of services to understand how their data will be used and how it will be accessed</li><li>use a <abbr title="Government of Canada">GC</abbr> email address when accessing tools solely for professional use, as doing so will help information management practices be applied</li></ul></li><li>Remind staff: 
 <ul><li>to not reuse the same passwords that are used for their internal corporate credentials</li><li>to use strong authentication mechanisms (for example, multi-factor authentication) where possible to protect information from unauthorized access</li></ul></li></ul></section><section><h3>For <abbr title="Information Technology">IT</abbr> personnel</h3><ul><li>Implement modern operating systems and web browsers that are:
 <ul><li>maintained with up-to-date software </li><li>configured with appropriate host-based protections </li></ul></li><li>Filter traffic at the host or network level to mitigate threats from malicious websites and related attacks, and provide a clear rationale when blocking categories that are not included in <a href="https://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=27122#appC">Appendix C of <abbr title="Policy on Acceptable Network and Device Use">PANDU</abbr></a></li><li>Leverage the defensive services of Shared Services Canada and the Communications Security Establishment (CSE) by using managed Internet gateways in accordance with <abbr title="Communications Security Establishment">CSE</abbr>’s <a href="https://www.cse-cst.gc.ca/en/top10">Top 10 <abbr title="Information Technology">IT</abbr> Security Actions</a></li><li>Monitor and review reports from web filtering services for unusual or suspicious activity</li><li>Apply additional safeguards such as tools to prevent the loss of data, when justified by a risk assessment, taking into consideration cost and complexity </li></ul><p><a href="https://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=27122#appE">Appendix E of <abbr title="Policy on Acceptable Network and Device Use">PANDU</abbr></a> includes a non-exhaustive list of measures that can be applied to further mitigate potential threats. The <a href="http://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=27907">Guideline on Acceptable and Network Device Use</a> provides additional guidance to departmental managers and functional specialists responsible for implementing <abbr title="Policy on Acceptable Network and Device Use">PANDU</abbr>.</p></section></appendix></appendices><footnotes><footnote anchor="fn1" reference="fn1-rf" title="1" tooltip="Return to footnote 1 referrer"><p>Throughout this document, the term “department” denotes “departments” as defined in section 2 of the Financial Administration Act, with the exceptions of paragraphs (b) and (c).</p></footnote><footnote anchor="fn2" reference="fn2-rf" title="2" tooltip="Return to footnote 2 referrer"><p>Transmission Control Protocol or Internet Protocol</p></footnote></footnotes></doc>