Defensible Information Destruction
Ministries need to develop defensible information destruction processes that meet requirements established in the:
- Information Management Act and information schedules approved under the Act,
- Managing Government Information Policy, and
- Records and Information Management Manual (under revision).
Use the following guide to learn how to set up a defensible information destruction model for your ministry and use it to complete destructions.
Table of Contents
- Why it is Important to Have a Ministry Destruction Authorization Model
- Setting up a Ministry Destruction Authorization Model
- Step One: Get Started
- Step Two: Define Roles and Responsibilities
- Step Three: Role-Based Training
- Step Four: Determine the Ministry Documentation Standards
- Step Five: Document and Communicate the Model
- Step Six: Regularly Review Model Effectiveness
- Destruction Requirements, Types and Frequencies
- Requirements for Defensible Destruction
- Types of Destruction
- Frequency of Destruction
- Destroying Digital Information
- When to Destroy Data
- Requirements for Destroying Data
- Destroying Redundant Source Information (RSI)
- Migrated and Digitized Information
- RSI General Resources
- Defensible Destruction Templates
Part 1 – Setting Up a Model
This guide sets out how an information destruction process may be established within a ministry. Information destruction processes support accountability, access, privacy, and security requirements. Learn more...
Part 2 – Completing Destruction
Learn how to administer destruction for different types of information, including:
- physical and digital records,
- data, and
- redundant source information that has been digitized or migrated.