Guideline for developing a security plan for safeguarding controlled goods

Registrants in the Controlled Goods Program (the program) must develop a security plan for every work site where controlled goods are examined, possessed or transferred.

On this page

1. Purpose

This guideline assists registrants in the program develop and implement a security plan for the safeguarding of controlled goods against unauthorized examination, possession and transfer. Section 7 of this guideline includes a security plan template, for companies to complete. It is recommended that this guideline and the security plan template be reviewed in their entirety prior to developing a security plan.

Registered person refers to an individual, a partnership or other business enterprise that is registered in the program.

For the purposes of this guideline and referenced security plan template, “registered person” will be referred to as a “company”.

2. Application

As a condition of registration in the program, section 10 of the Controlled Goods Regulations requires that companies who are registered in the program establish and implement a security plan for each place of business in Canada where controlled goods are kept.

3. Definitions

The following definitions apply to this security plan guideline:

3.1 Access

To be in a position to examine, possess or transfer controlled goods.

3.2 Authorized individual

An owner or senior official of the organization who is identified as a business official and signed section H of the application for registration (PDF, 592KB) for that organization.

3.3 Controlled goods

Controlled goods are primarily goods, including components and technical data that have military or national security significance, which are controlled domestically by the Government of Canada and defined in the Schedule to the Defence Production Act. Controlled goods can be in the form of tangible items such as parts or components, printed material or electronic data.

3.4 Designated official

A business official or other employee of the organization who has been appointed by the authorized individual and has successfully completed the mandatory training for designated officials.

3.5 Examine

To consider in detail or subject to an analysis in order to discover essential features or meaning.

3.6 International student

An individual who is authorized by a study permit or by the Immigration and Refugee Protection Regulations to engage in studies in Canada and who is not an officer, director or employee of a company registered in the program.

3.7 Possess

Either actual possession, where the person has direct physical control over a controlled good at a given time, or constructive possession, where the person has the power and the intention at a given time to exercise control over a controlled good, either directly or through another person or persons.

3.8 Shall and must

A firm and bonding requirement.

3.9 Temporary worker

An officer, director or employee of a company registered in the program who is neither of the following:

3.10 Transfer

With respect to a controlled good, to dispose of it or disclose its content in any manner.

3.11 Visitor

An individual, other than an international student, who is not an officer, director or employee of a company registered in the program who is neither of the following:

4 Developing a security plan

The following components must be considered in creating a security plan:

4.1 Development and implementation

A security plan must be developed and implemented for each place of business in Canada where controlled goods are kept. A unique security plan can be developed and implemented for each place of business; or, you may elect to complete a single security plan that will cover all registered sites. If a single security plan is chosen, the company must ensure that the procedures used to safeguard the controlled goods collectively reflect the conditions at all sites. This may require separate sections within the security plan to reflect the conditions and procedures for individual sites.

4.2 Risk assessment and management

Companies are uniquely placed to assess and manage the risk towards the controlled goods in their possession. Risk is based on actual or possible threats against the controlled goods. Some examples are, but not limited to:

4.3 Required measures

The following measures must be included in the security plan:

4.4 Varied content

A security plan template can be found at the end of this guideline. The security requirements and the content of a security plan will inevitably differ from one company to another. The security plan template may therefore be amended as required in order to reflect the type of controlled goods, physical conditions at the site and the company’s procedures to safeguard the controlled goods, while ensuring that all required measures have been included.

Refer to section 7. Security plan template

4.5 Maintenance and application

A security plan must be developed and maintained, and must also be effectively applied throughout the period of registration.

5. Mandatory information to be included in a security plan

The following elements must be included in a security plan:

5.1 Legal name of the company

The security plan must identify the company by its legal name. Business and operational names may also be added as a secondary form of identification.

5.2 Site address

The complete civic address of each site where controlled goods are kept must be incorporated into the security plan. Post Office Box (P.O. Box) addresses do not constitute a civic address.

5.3 Security organization

The company’s security organization must include the key positions tasked with safeguarding the controlled goods and identify the persons responsible. The security organization must include the identities of the authorized individual and the designated official(s).

5.4 Responsibilities of the security organization

The responsibilities of each member of the security organization must be outlined. The responsibilities of the authorized individual and the designated official(s) are listed in the security plan template. Additional responsibilities may be outlined as deemed appropriate for the organization.

5.5 Additional responsibilities

Additional responsibilities for the safeguarding of controlled goods may include, but are not limited to, the identity of the person/position that is responsible for:

5.6 Procedures to monitor the controlled goods

This section is used to describe how the controlled goods are safeguarded from unauthorized examination, possession or transfer. The following information must be included in this section:

5.7 Breaches

Describe the procedures and investigative steps that the company will follow in the event of a security breach, or a suspected security breach, involving controlled goods. Define what constitutes a security breach: theft; loss; unauthorized examination, possession or transfer; willful damage and tampering with controlled goods; are some examples. The program must be advised within 3 days upon discovery of a potential security breach involving controlled goods. The required steps to be included in the security plan are provided in the security plan template.

5.8 Training

All officers, directors, employees, temporary workers and international students shall undergo initial training prior to accessing the controlled goods. This training must take into account the content of the security plan and establish:

A record of initial training and annual review is recommended.

5.9 Security briefings

Describe the procedure for briefing visitors who are visiting the site for the purpose of examining, possessing and transferring controlled goods. The following statements must be included:

6. Execution of the security plan

The following actions must be undertaken as part of the execution of the security plan:

6.1 Review and update

The security plan is a living document. It must be reviewed on a regular basis, and updated as required to reflect any changes to the conditions at the site as well as changes in requirements imposed by the program. It must be made available to all officers, directors, employees and temporary employees, who are in a position to examine, possess or transfer controlled goods.

6.2 Integration into existing plans

The contents of the controlled goods security plan may be incorporated into an existing security plan provided that the requirements contained in this guideline are included.

6.3 Application period

The company must ensure that the security plan is effectively applied throughout the period of registration.

6.4 Final approval

Final approval of the security plan will occur during a compliance inspection. The inspector will review the plan to ensure that it meets the requirements of the Controlled Goods Regulations and that the plan’s procedures match the conditions at all places of business, whether collectively or individually by site.

7. Security plan template

Consult the security plan template to assist the organization in complying with this guideline.

Security requirements differ from one company to another. The security plan template may be amended to reflect the type of controlled goods, physical conditions at the site and procedures to safeguard the controlled goods that are unique to each company. The company’s individual situation must be taken into consideration when developing the security plan.

Security plan template for controlled goods

8. More information

Establishing and maintaining a security plan: Guideline on Controlled Goods Program registration

Page details

Date modified: