Changes

Jump to navigation Jump to search
m
no edit summary
Line 126: Line 126:  
=== Use and share data openly in an ethical and secure manner ===
 
=== Use and share data openly in an ethical and secure manner ===
 
* share data openly by default as per the ''Directive on Open Government and Digital Standards'', while respecting security and privacy requirements; data shared should adhere to existing enterprise and international standards, including on data quality and ethics
 
* share data openly by default as per the ''Directive on Open Government and Digital Standards'', while respecting security and privacy requirements; data shared should adhere to existing enterprise and international standards, including on data quality and ethics
 +
  <b>How to achieve:</b>
 +
    * Summarize how the architecture supports sharing data openly by default as per Directive on Open Government and Digital Standards given:
 +
        * Existing ESDC and GC data standards and policies
 +
        * International data standards;  and the Privacy Act,
 +
        * Fitness for purpose
 +
        * Ethics
 +
  <b>Tools:</b>
 +
    * Data Foundation – Implement (Leverage the  standard definition)
 +
        * Data Catalogue
 +
        * Benefits Knowledge Hub
 +
        * Data Lake (growth)
 +
        * Data Science and Machine Platform
 +
    * Theoretical Foundation
 +
        * EDRM (Conceptual and Logical)
 +
        * Business Glossary
 +
        * Departmental Data Strategy
 +
 
* ensure data formatting aligns to existing enterprise and international standards on interoperability; where none exist, develop data standards in the open with key subject matter experts
 
* ensure data formatting aligns to existing enterprise and international standards on interoperability; where none exist, develop data standards in the open with key subject matter experts
 +
  <b>How to achieve:</b>
 +
    * Summarize how the architecture  utilises existing enterprise and international data standards
 +
    * Summarize how the architecture has developed any data standards through open collaboration with key subject matter experts and the Enterprise Data Community of Practice.
 +
  <b>Tools:</b>
 +
    * Data Standards
 +
        * NIEM
 +
        * OpenData
 +
        * National Address Register
 +
        * Reference Data Repository
 +
 
* ensure that combined data does not risk identification or re‑identification of sensitive or personal information
 
* ensure that combined data does not risk identification or re‑identification of sensitive or personal information
 +
  <b>How to achieve:</b>
 +
    * Summarize how the architecture ensures the aggregation and combing of data does not pose a risk to  information  sensitivity or personal information
 +
    
=== Design with privacy in mind for the collection, use and management of personal Information ===
 
=== Design with privacy in mind for the collection, use and management of personal Information ===
 
* ensure alignment with guidance from appropriate institutional ATIP Office with respect to interpretation and application of the ''Privacy Act'' and related policy instruments
 
* ensure alignment with guidance from appropriate institutional ATIP Office with respect to interpretation and application of the ''Privacy Act'' and related policy instruments
 +
  <b>How to achieve:</b>
 +
    * Describe how the architecture aligns to guidance of the ATIP Office around  personal information  regulatory  framework; policy framework; and consent directives
 +
 
* assess initiatives to determine if personal information will be collected, used, disclosed, retained, shared, and disposed
 
* assess initiatives to determine if personal information will be collected, used, disclosed, retained, shared, and disposed
 +
  <b>How to achieve:</b>
 +
    * Has the initiative assessed  if personal information will be collected, used, disclosed, retained, shared, and disposed
 +
 
* only collect personal information if it directly relates to the operation of the programs or activities
 
* only collect personal information if it directly relates to the operation of the programs or activities
 +
  <b>How to achieve:</b>
 +
    * Summarize how the architecture ensures  the  personal information collected is directly required to the operational of the programs or activities
 +
 
* notify individuals of the purpose for collection at the point of collection by including a privacy notice
 
* notify individuals of the purpose for collection at the point of collection by including a privacy notice
 +
  <b>How to achieve:</b>
 +
    * Does the solution’s privacy notice provide the purpose for collecting this personal information
 +
    * Does the solution provide a privacy notice at the point of personal information collection
 +
 
* personal information should be, wherever possible, collected directly from individuals but can be from other sources where permitted by the ''Privacy Act''
 
* personal information should be, wherever possible, collected directly from individuals but can be from other sources where permitted by the ''Privacy Act''
 +
  <b>How to achieve:</b>
 +
    * Does the architecture collect personal information directly from the individual
 +
    * If no, what personal information is collect form other sources  and does it comply with the Privacy Act and the consent directive of the source
 +
  <b>Tools:</b>
 +
    * Target State Architecture
 +
    * Interim State Architecture
 +
 
* personal information must be available to facilitate Canadians’ right of access to and correction of government records
 
* personal information must be available to facilitate Canadians’ right of access to and correction of government records
 +
  <b>How to achieve:</b>
 +
    * Summarize how the architecture facilitates Canadian's right to access their personal information records
 +
    * Summarize how the architecture facilitates Canadian's right to correct their personal information records
 +
  <b>Tools:</b>
 +
    * Target State Architecture
 +
    * Interim State Architecture
 +
 
* design access controls into all processes and across all architectural layers from the earliest stages of design to limit the use and disclosure of personal information
 
* design access controls into all processes and across all architectural layers from the earliest stages of design to limit the use and disclosure of personal information
 +
  <b>How to achieve:</b>
 +
    * Summarize how the architecture limits the use and disclosure of personal information in accordance to the privacy legislative; policy frameworks and consent directives
 +
 
* design processes so personal information remains accurate, up‑to‑date and as complete as possible, and can be corrected if required
 
* design processes so personal information remains accurate, up‑to‑date and as complete as possible, and can be corrected if required
 +
  <b>How to achieve:</b>
 +
    * Summarize how the  architecture ensures personal information remains accurate
 +
    * Summarize how the architecture ensures personal information remains up-to-date
 +
    * Summarize how the architecture ensures personal information remains complete as possible
 +
    * Summarize how the architecture ensures personal information can be corrected if required
 +
  <b>Tools:</b>
 +
    * Non Functional Requirements
 +
    * FUnctional Requirements
 +
 
* de‑identification techniques should be considered prior to sharing personal information
 
* de‑identification techniques should be considered prior to sharing personal information
 +
  <b>How to achieve:</b>
 +
    * Outline the de-identification techniques used by the architecture in sharing personal information
 +
 
* in collaboration with appropriate institutional ATIP Office, determine if a Privacy Impact Assessment (PIA) is required to identify and mitigate privacy risks for new or substantially modified programs that impact the privacy of individuals
 
* in collaboration with appropriate institutional ATIP Office, determine if a Privacy Impact Assessment (PIA) is required to identify and mitigate privacy risks for new or substantially modified programs that impact the privacy of individuals
* establish procedures to identify and address privacy breaches so they can be reported quickly and responded to efficiently to appropriate institutional ATIP Office
+
  <b>How to achieve:</b>
 +
    * Describe how the architecture addresses the recommendations of the PIA
 +
    * If not all recommendations of the PIA are being addressed,  outline how the business will address any residual risks of the PIA
       +
* establish procedures to identify and address privacy breaches so they can be reported quickly and responded to efficiently to appropriate institutional ATIP Office
 +
  <b>How to achieve:</b>
 +
    * Are procedures established to identify and address privacy breaches
 +
    * Summarize how the architecture enables/supports these procedures
 +
  <b>Tools:</b>
 +
    * Business Process Model
    
@fr|
 
@fr|
513

edits

Navigation menu

GCwiki