<?xml version="1.0" encoding="ISO-8859-1"?><doc title="Directive on Identity Management" documentID="32609" versionID="1" language="en" space="preserve" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:noNamespaceSchemaLocation="G:\web\xml\pols\PolicyInstrumentSchema.HTML5.xsd"><notetoreader>The Directive on Identity Management took effect on July 1, 2019.  It replaced the Directive on Identity Management that was in effect from July 1, 2009 to June 30, 2019.</notetoreader><chapters><chapter anchor="1" title="Effective  date"><clauses><clause anchor="1.1">This directive takes effect on July 1, 2019. </clause><clause anchor="1.2">This directive replaces the Directive on Identity  Management, dated July 1, 2009. </clause></clauses></chapter><chapter anchor="2" title="Authorities"><clauses><clause anchor="2.1">This directive is issued pursuant to the same authorities  indicated in section 2 of the Policy on Government Security.</clause></clauses></chapter><chapter anchor="3" title="Objectives and expected results"><clauses><clause anchor="3.1">The objectives  of this directive are as follows: 
    <clauses><clause anchor="3.1.1">To manage identity in a  manner that mitigates risks to personnel and organizational and national  security, while protecting program integrity and enabling trusted  citizen-centred service delivery; </clause><clause anchor="3.1.2">To manage identity consistently and collaboratively within the Government  of Canada and with other jurisdictions and industry sectors, where identity of  employees, organizations, devices and individuals is required; and</clause><clause anchor="3.1.3">To manage credentials, authenticate users or accept  trusted digital identities for the purposes of administering a program or  delivering an internal or external service.</clause></clauses></clause><clause anchor="3.2">The expected results of this directive are as follows:
    <clauses><clause anchor="3.2.1">Interoperability,  as appropriate, that supports participation in arrangements for trusted digital  identity; and  </clause><clause anchor="3.2.2">Integration of  a standardized identity assurance level framework into departmental programs,  activities and services, consistent with a government-wide approach.</clause></clauses></clause></clauses></chapter><chapter anchor="4" title="Requirements"><clauses><clause anchor="4.1">Program and service delivery  managers are responsible for the following:
    <clauses><clause anchor="4.1.1">Applying identity management  requirements when any of the following conditions apply:
        <clauses><clause anchor="4.1.1.1">Unique identification is  required to administer a federal program or service enabled by legislation;</clause><clause anchor="4.1.1.2">Disclosure of identity is  required before receiving a government service, participating in a government  program, or becoming a member of a government organization; or</clause><clause anchor="4.1.1.3">Accuracy and rightful use by  individuals, organizations and devices of credential and identity information are  required;</clause></clauses></clause><clause anchor="4.1.2">Ensuring that there is a  need and the lawful authority for identification to support program  administration, government-wide service delivery and, as required, to facilitate  law enforcement, national security and defence-related activities;</clause><clause anchor="4.1.3">Documenting identity  management risks, program impacts, required levels of assurance, and risk  mitigation options;</clause><clause anchor="4.1.4">Selecting sufficient and appropriate  identity attributes to distinguish a unique identity to meet program needs, in  a manner that balances risk and flexibility and allows other methods of  identification, where appropriate;</clause><clause anchor="4.1.5">Evaluating  identity and credential risks by assessing potential impacts to a program, activity,  service or transaction; </clause><clause anchor="4.1.6">Applying  the required identity and credential assurance levels and related controls for  achieving assurance level requirements, in accordance with Appendix A: Standard  on Identity and Credential Assurance; </clause><clause anchor="4.1.7">Accepting  trusted digital identities provided through an approved trust framework as an  equivalent alternative to in-person interactions, by assessing the following: 
        <clauses><clause anchor="4.1.7.1"><strong>Identity and  program-specific information:</strong> Selecting sufficient and appropriate attributes  to uniquely identify individuals and personal information required to  administer a program or deliver a service;</clause><clause anchor="4.1.7.2"><strong>Identity  assurance and credential assurance</strong>, as outlined in Appendix A: Standard  on Identity and Credential Assurance;</clause><clause anchor="4.1.7.3"><strong>Identity registration:</strong> Associating identity and personal information with a credential issued to an  individual; and</clause><clause anchor="4.1.7.4"><strong>Notice and  consent:</strong> Ensuring that notices are clear, appropriate for the purpose, and  accessible in order to obtain meaningful consent for the collection, use and  disclosure of personal information; </clause></clauses></clause><clause anchor="4.1.8">Consulting the Chief Information Officer for the  Government of Canada when establishing agreements or adopting trust frameworks;  and</clause><clause anchor="4.1.9">Using mandatory enterprise services for identity  management, credential management and cyber authentication. </clause></clauses></clause><clause anchor="4.2">Heads of Human Resources are  responsible for the following:
    <clauses><clause anchor="4.2.1">Assigning each federal public  service employee a unique Personal Record Identifier (PRI) for the management  of employee-related information and transactions; and</clause><clause anchor="4.2.2">Assigning an additional unique  identifier to each employee who must be identified to an organization external  to the federal public service.</clause></clauses></clause></clauses></chapter><chapter anchor="5" title="Roles of other government organizations"><clauses><clause anchor="5.1">The roles of other government  organizations in relation to this directive are described in section 5 of the Policy  on Government Security.</clause></clauses></chapter><chapter anchor="6" title="Application"><clauses><clause anchor="6.1">This directive applies to the  organizations described in section 6 of the Policy on Government Security.</clause></clauses></chapter><chapter anchor="7" title="References"><clauses><clause anchor="7.1">The references indicated in  section 8 of the Policy on Government Security apply to this directive.</clause></clauses></chapter><chapter anchor="8" title="Enquiries"><clauses><clause anchor="8.1">Members  of the public may contact <a href="https://www.canada.ca/en/treasury-board-secretariat/corporate/contact.html#enq">Treasury  Board of Canada Secretariat Public Enquiries</a> for information about this directive.</clause><clause anchor="8.2">Individuals  from departments should contact their departmental security management group  for information about this directive. </clause><clause anchor="8.3">Individuals  from the departmental security group may contact the Security Policy Division  at the Treasury Board of Canada Secretariat by email at <a href="mailto:SEC@tbs-sct.gc.ca">SEC@tbs-sct.gc.ca</a> for interpretation of any aspect of this directive.</clause></clauses></chapter></chapters><appendices><appendix anchor="A" title="Appendix A: Standard on Identity and Credential Assurance"><p>Provides details on the minimum requirements for establishing an identity or credential assurance level for a Government of Canada program or service.  The Standard on Identity and Credential Assurance can be found here: <a href="/pol/doc-eng.aspx?id=32612">https://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=32612</a></p></appendix><appendix anchor="B" title="Appendix B: Definitions"><p>Definitions to be  used in the interpretation of this directive can be found in Appendix B of  the Policy on Government Security. </p></appendix></appendices></doc>