Data and Information Security Classification Standard Guideline - 2021
Data and Information Security Classification Standard Guideline - 2021
Version: 2.0
https://imtpolicy.sp.alberta.ca
Classification: Public
DATA AND INFORMATION SECURITY CLASSIFICATION GUIDELINE
Contents
Guide Statement .........................................................................................................................3
Authority......................................................................................................................................3
Scope .........................................................................................................................................3
Guide Description .......................................................................................................................3
Guide Specification .....................................................................................................................3
Security Classification Levels ......................................................................................................4
Assessing Data and Information .................................................................................................4
Security Classification Assessment Scenarios ............................................................................5
Applying Security Classification ..................................................................................................6
Data and Information from Other Jurisdictions ............................................................................7
Roles and Responsibilities ..........................................................................................................8
Compliance ...............................................................................................................................10
References and Supporting Resources .....................................................................................10
https://imtpolicy.sp.alberta.ca 2
Classification: Public
DATA AND INFORMATION SECURITY CLASSIFICATION GUIDELINE
Guideline Statement
This guide outlines the standardized approach for the application of security classification to
data and information in the custody and/or under the control of the Government of Alberta
(GoA). The approach detailed in this guide supports implementation of the Data and Information
Security Classification Standard and aligns with the data and information security classification
levels established by the Government of Canada.
Authority
The Data and Information Security Classification Standard (A000025) and supporting guide are
issued under the authority of the Records Management Regulation:
4(2) For the purpose of providing the details for the operation of the records
management program, the Minister may establish, maintain and promote policies,
standards and procedures for the creation, handling, control, organization, retention,
maintenance, security, preservation, disposition, alienation and destruction of records in
the custody or under the control of departments and for their transfer to the Provincial
Archives of Alberta.
Scope
This guide is recommended for all departments defined under section 14 of Schedule 11 of the
Government Organization Act and agencies, boards and commissions as defined in schedule 1
of the Freedom of Information and Protection of Privacy Regulation.
Agencies, boards and commissions that are not contained within schedule 1 of the Freedom of
Information and Protection of Privacy Regulation are encouraged to align with this guide.
Guideline Description
Security classification supports decision making regarding how data and information should be
managed (e.g., storage, access permissions, etc.). In accordance with the Data and Information
Security Classification Standard and the Metadata – Core Content Standard, data and
information security classification is mandatory and must be applied to all data and information
in the custody and/or under the control of the GoA.
Guideline Specification
Security classification is determined by examining both the content of the data and information
and the context in which the data and information exists. The application of security
classification to data and information is a process that requires a thorough assessment of the
potential for injury to individuals, governments and/or private sector institutions in the event the
integrity, availability, sensitivity and/or value of the data and information is compromised.
Because the selection and application of security classification is informed by context, security
classification is not static; a change in the appropriate security classification could be triggered
by a reassessment of data and information (either due to prescribed review periods or as data
and information moves through the information management lifecycle). Ultimately, business
areas will need to establish internal processes and guidelines to enable the consistent
implementation and review of security classifications.
Regardless of security classification level, data and information that are, or are reasonably
anticipated to be, subject to litigation holds and/or access requests made under the Freedom of
https://imtpolicy.sp.alberta.ca 3
Classification: Public
DATA AND INFORMATION SECURITY CLASSIFICATION GUIDELINE
Information and Protection of Privacy Act must be provided to the relevant litigation hold contact
or department Freedom of Information and Protection of Privacy (FOIP) Office for evaluation.
NOTE: Classifying data or information as Public does not require that it be made available to
the public. Business areas determine if data and information will be published after
considering the impact and value of publication.
Data or information that have already been classified using levels from the now-superseded
Information Security Classification Standard may need to be updated; however, the security
classification selected under the superseded standard may no longer accurately reflect the
context in which the data or information exists.
The following chart offers a basic comparison of the levels in the superseded standard and the
levels in the current standard, but business areas must assess all data and information to
ensure that the appropriate current security classifications are applied:
SUPERSEDED CURRENT
UNRESTRICTED PUBLIC
PROTECTED PROTECTED A
CONFIDENTIAL PROTECTED B
RESTRICTED PROTECTED C
Develop a Collaboratively
Engage all relevant
consistent internal assess data and Security
stakeholders as
process to asses information to classification is
identified under
and implement determine approved and
Roles and
security appropriate security applied
Responsibilities
classification classification
https://imtpolicy.sp.alberta.ca 4
Classification: Public
DATA AND INFORMATION SECURITY CLASSIFICATION GUIDELINE
Determining security classification requires an assessment of the potential risks for individuals,
governments and/or private sector institutions in the event the integrity, availability, sensitivity or
value of the data or information is compromised; the more severe the risk (or the more severe
the consequences of a risk), the stronger the classification. This assessment of potential risks
must consider:
the context in which data and information exists, including (but not limited to):
o regulatory requirements;
o the information management lifecycle stage of the data and information; and
o factors external to government (e.g., elections, fiscal cycle, public emergencies, etc.).
the likelihood that potential injuries may occur; and
all potential injuries that could result from data and information being compromised.
As data or information moves through the information management lifecycle, or as the context in
which it exists changes, the applied security classification may need to be re-assessed. For
example, due to sensitive financial and political implications, draft versions of the provincial
budget typically have a higher security classification (e.g., Protected B or Protected C);
however, the finalized provincial budget that is made available to Albertans has the security
classification Public.
Assessing data and information for the purposes of security classification involves extensive
collaboration between multiple stakeholders, each of whom contributes important knowledge
about the context in which data and information exists.
https://imtpolicy.sp.alberta.ca 5
Classification: Public
DATA AND INFORMATION SECURITY CLASSIFICATION GUIDELINE
Barring the inclusion of any information that would result in an elevated classification,
fulfilled/completed RFPs may be classified as Public.
https://imtpolicy.sp.alberta.ca 6
Classification: Public
DATA AND INFORMATION SECURITY CLASSIFICATION GUIDELINE
maintains both Protected B and Protected C data and information, the system is classified as
Protected C). Consequently, applying security classification to a system or application means
that all data and information maintained by the system are subject to controls established for
that security classification (e.g., a record classified as Public maintained in a system classified
as Protected B would be subject to Protected B controls).
Record
Classifying at the record level can be beneficial when a system or application contains many
different types of records with different security classifications, ranging from Public to
Protected C. For example, instead of applying a Protected C classification to a system or
application, which would subject all data and information maintained in the system or application
to Protected C controls, classifying at the record level will enable a system or application to
fulfill multiple security and access requirements.
Field
Within certain types of systems and applications, security classification may be applied to fields
(such as specific Excel columns or certain metadata fields in a database). There may be a need
to classify at this level if certain fields require a higher security classification. For example, a
Human Resources spreadsheet may have the security classification of Protected A, but feature
a column that contains Protected C information.
Applying security classification at a field level enables additional security and access controls to
be applied as required without restricting access to data and information with a lower security
classification.
If the data or information received from another jurisdiction lacks security classification, the data
and information may be subject to the GoA security classification standard—meaning it must be
properly assessed and classified in collaboration with the originating jurisdiction.
https://imtpolicy.sp.alberta.ca 7
Classification: Public
DATA AND INFORMATION SECURITY CLASSIFICATION GUIDELINE
Information controllers (often the head of a program or branch) have the responsibility and
decision making authority for data and/or information throughout its lifecycle, including creating,
classifying, restricting, regulating and administering its use or disclosure. Information controllers
are responsible for:
determining security classification after appropriate collaboration and/or consultation;
ensuring adherence to the Information Security Management Directives;
providing advice on legislative and policy requirements for data and information security;
and
ensuring that data and information and systems/applications are entrusted to appropriate
information custodians.
NOTE: Depending on the situation, the role of information controller and information
custodian may be occupied by the same person/business area/department/etc.
https://imtpolicy.sp.alberta.ca 8
Classification: Public
DATA AND INFORMATION SECURITY CLASSIFICATION GUIDELINE
https://imtpolicy.sp.alberta.ca 9
Classification: Public
DATA AND INFORMATION SECURITY CLASSIFICATION GUIDELINE
Compliance
Consequences of non-compliance with this policy could result in damage to Government of
Alberta’s reputation, expose Albertans to harm and/or incur unnecessary costs.
Depending on the severity of non-compliance, either informal or formal requests and/or
follow-ups may be made by Enterprise Information Management, Corporate Internal
Audit Services, Corporate Information Security Office, Office of the Information Privacy
Commissioner, and/or Public Service Commission.
Legislated disciplinary action (i.e., Public Service Act) may be taken depending on the
severity of non-compliance.
Contact
Subject When to Contact Contact
Information If you have inquiries on how to Senior Records Officers Contact
Management manage government information. List
Information Access If you have inquiries regarding FOIP Office or Coordinator
and Privacy personal information and/or the Lookup
protection of privacy.
Information Security If you have inquiries regarding Sector Information Security
information security. Officers Contact List
Transfers, Storage If you have inquires about records Transfers, Storage and
and Disposition transfers, storage and/or Disposition Contact
disposition.
https://imtpolicy.sp.alberta.ca 10
Classification: Public