In case of discrepancies, the official PDF version of this policy takes precedence.
The Act respecting the governance and management of information resources of public bodies and government enterprises (L.R.Q., c. G-1.03), known in French as Loi sur la gouvernance et la gestion des ressources informationnelles des organismes publics (LGGRI), imposes obligations on academic institutions in their capacity as public bodies. In order to meet its regulatory and legislative obligations, Vanier College must adopt, implement, maintain and enforce an information security policy that establishes the implementation of formal information security processes to ensure risk management, access management and incident management.
Where discrepancies exist between this policy and the aforementioned Act, the Act takes precedence. Any new directive issued based on the LGGRI is considered force of law and is also considered applicable even if not explicitly quoted herein.
In addition to the information security management frameworks, the College must comply with applicable laws, regulations and standards.
1.01 This policy is a key element to ensure the realization of the mission and the institutional objectives of the College, to maintain its reputation and to comply with the applicable legal, regulatory and contractual requirements.
1.02 The main objective of this policy is to communicate the College's determination and commitment to managing information security risks effectively and efficiently. The approach adopted is aimed at identifying the stakeholders and defining their roles, and designing and implementing measures to effectively safeguard the security of information assets.
1.03 The policy also promotes user awareness of the risks associated with information handling and emphasizes the importance of maintaining the availability, integrity, and confidentiality of information throughout its lifecycle, regardless of the medium or means of communication.
2.01 This policy is intended for all users, that is, anyone who has access to the data and/or information assets of the College regardless of employment status, including contract workers and exchange personnel as well as any/all partners, suppliers or other stakeholders.
2.02 This policy applies to all information that the College holds, uses, or safeguards in the course of fulfilling its mission, throughout its entire lifecycle and regardless of its form, medium, or location. It encompasses data owned by the College, data held or used by partners, suppliers, or other stakeholders on behalf of the College, as well as third-party information retained by the College to support its functions.
2.03 Any activity involving the use, disclosure, or preservation, in any form, of data or information assets owned by or used by the College is covered by the policy, whether on premises, off site, or for users working remotely.
This policy applies from the earliest phase of design or creation of the data or information asset and during the development, realization or modification of the asset or any associated business processes.
2.04 The policy covers all aspects of digital data security including information technology, ensuring consistent protection across all environments and formats.
5.1 Governance and Accountability
Roles and Responsibilities
In this policy and its application, the following mandates are assigned to different stakeholders:
5.1.01 Board of Directors
5.1.02 Auditors (external and mandated by MEES/MCN)
5.1.03 Director General
5.1.04 Coordonnateur Organisationnel des Mesures de Sécurité de l’Information (COMSI)
5.1.05 Chef de la Sécurité de l’Information Organisationnelle (CSIO)
5.2 Guidelines
5.2.1 Physical security of buildings and premises
The College will ensure the physical security of College premises where data and information assets are stored. The College will establish and update an access list of authorized personnel that it is verified and updated periodically or during a significant organizational change.
5.2.2 Protection of information
Information security must be ensured throughout its life cycle and the means used to ensure it must be proportional to its value and the risks to which it is exposed and such that private personal information as defined in law 25 has appropriate safeguards around its use and collection. Thus, any information that the College holds, processes or transmits must be subject to security measures designed to ensure availability, integrity, and confidentiality of the information. To achieve this, all individuals are given authorization for accessing only the information assets deemed necessary to their role, equipment and services are regularly maintained, contingency plans and alternatives exist for essential services, and all persons under the scope of this policy are also made aware of threats and risks to information security.
5.2.3 Service Continuity
The College maintains reliable processes, systems, and technologies that support service continuity. The College also establishes and regularly updates contingency plans, provides alternative solutions for essential services, and ensures that high-availability systems are in place to support uninterrupted access to critical information.
5.2.4 Integrity and Security of Information Assets
The College is committed, as per LGGRI, to ensuring the integrity of its information by preventing unauthorized alteration or destruction and by maintaining it on stable, durable media. The College applies technological and procedural safeguards that verify, throughout the information’s lifecycle, that it remains complete and unaltered.
5.2.5 Confidentiality and Authentication Safeguards
The College, in accordance with the Records Classification and Management Policy managed by Corporate Affairs, collects and retains only the information necessary to fulfill its mission, in accordance with applicable legislation. Access to this information is strictly controlled through authentication mechanisms and access profiles as required by LGGRI, ensuring that only authorized individuals, devices, or systems can view or handle it.
Each administrative unit is accountable for managing the security of the information assets under its control, including those delegated to third parties.
5.3 Particular Provisions
5.3.1 Security and Security Awareness
The Vanier College community is regularly made aware of information regarding security risks and how to protect themselves per the LGGRI including the requirement on information security training.
5.3.2 Disposal of old computer systems and equipment
The rules for the safe destruction of any microcomputer equipment declared as “surplus movable property” and any removable computer media intended for disposal or entrusted to a supplier must be applied in a timely manner and in accordance with the Directive concernant le traitement et la destruction de tout renseignement, registre, donnée, logiciel, système d’exploitation ou autre bien protégé par un droit d’auteur, emmagasiné sur un équipement micro-informatique ou sur un support informatique amovible of the Treasury Board of Quebec.
The same applies to any microcomputer or removable media equipment entrusted to a supplier for repair, maintenance, destruction or retrieval of the information stored therein.
Disposal of information, documents, equipment, or materials—whether obsolete, surplus, or transferred for maintenance or destruction—is carried out in accordance with approved procedures and retention schedules to prevent unauthorized access or disclosure.
5.3.3 Document management and destruction
Vanier College’s IST department shall support the Director of Communications and Corporate Affairs in the application of Vanier’s “Records Classification and Management Policy” by providing the tools and technical support required.
5.3.4 Right of inspection
The College shall exercise, in conformity with the legislation and the regulations in force, the right of inspection on any use of its informational assets.
5.3.5 Compliance with Intellectual Property and Software Use Regulations
All users must comply with the requirements for the use of products, documents and information, in respect of which there may be an intellectual property right. Thus, the use of proprietary software and free software must comply with the Copyright Act, RSC 1985, c C-42.
Information Systems and Technology Services will ensure that its software licenses are properly managed. Only software provided by the College must be used.
The use of any other software is subject to a specific authorization from the College’s COMSI.
5.3.6 Payment Card Industry Data Security Standard (PCI DSS)
Vanier College must comply with the Payment Card Industry Data Security Standards (PCI DSS) to protect all cardholder data. PCI DSS requirements, established by major credit card companies, govern how payment card data is processed, transmitted, stored, and disposed of. The College’s PCI DSS Departmental Responsibilities & Procedures outline these obligations and ensure proper internal controls.
The College does not process payment cards on its own systems; instead, it outsources all payment card transactions to approved, PCI compliant external vendors to reduce risk and compliance scope. When payment card transactions occur in on campus merchant operations, these standards fully apply to all campus users, external merchants, systems, and networks that handle payment card data, including account numbers, cardholder names, expiration dates, service codes, and any sensitive authentication data. All merchant activities involving PCI DSS must be reviewed and approved annually by the Director of Financial Services.
5.4 Administrative Measures and Sanctions
5.4.1 Reporting
The College shall have an incident reporting procedure.
Every user has an obligation to protect the information assets made available to him or her by the College. To this end, the user shall report, without delay, to their manager or to IST HelpDesk any act likely to represent a real or presumed infringement of the security of the information. Qualified incidents will be referred to Corporate Affairs to be logged in the register of confidentiality incidents as per Article 63.11 of Act respecting Access to documents held by public bodies and the Protection of personal information.
The COMSI must also be notified when a security incident occurs, in order to determine the measures to be taken to resolve the problem, as may be required.
5.4.2 Sanctions
When a user contravenes this policy or its attendant directives, they may incur disciplinary, administrative or legal action, depending on the severity of their action. Such measures may include suspension of privileges, reprimand, suspension, dismissal or otherwise, in accordance with the provisions of collective agreements, other agreements or contracts.
The College may transmit to any judicial authority the information gathered and which leads it to believe that an infringement of any law or regulation in force has been committed.
5.5 Final Dispositions
5.5.1 Policy application and monitoring
The COMSI and CSIO are responsible for the application and monitoring of this policy.
5.5.2 Entry into force
This policy comes into effect on the date of its adoption by the Board of Governors. As of that date, it replaces all previously adopted versions of this Policy.
This Policy shall be reviewed at least once each 5 years, or sooner if required in accordance with ongoing changes to legislative and regulatory obligations, taking into account new governmental orientations as well as the evolution of information security best practices.