Common centralized professional services: Security requirement check lists

Important notification

Client departments and contracting authorities must submit copies of resulting contractual documentation (call up, contract, Standing offer (SO) or Supply arrangement (SA)) containing security requirements resulting from contract award to the Public Services and Procurement Canada (PSPC) Contract Security Program (CSP) at tpsgc.ssicontrats-isscontracts.pwgsc@tpsgc-pwgsc.gc.ca

The below listed 39 common Security requirement check lists (SRCL) are a result of a uniform national approach for the procurement of professional services. In the past, each professional services method of supply (MoS) had to develop their individual generic SRCLs. 39 common SRCLs have been developed by the Industrial Security Program (ISS) for use in professional services MoS.

For any questions, or to enquire if the 39 SRCLs can be used against a specific MoS, please contact the appropriate MoS SO / Supply Arrangement Authority by accessing the Contact acquisitions page.

The following includes instructions, notes and clauses for the 39 common centralized professional services SRCLs. The actual SRCLs can be found at the links associated with each SRCL section. To help contracting officers select the appropriate SRCL, please see the common centralized professional services SRCL's Summaries below.

The contract clauses associated with the common SRCLs are for use in domestic contracts only. For contracts involving foreign suppliers, the contract security clauses will be provided by the ISS specific to the contract.

The common SRCLs can no longer be used for access to Protected C information. Access to Protected C information now requires Enhanced reliability status which can only be done by the ISS on an exceptional basis. For this reason the previous common SRCLs numbers 13-18 have been removed on a temporary basis.

Common professional security requirement check list's notes/instructions

  1. A Contract/Sub-Contract/SO/SA containing a security requirement clause whereby vendor personnel must be reliability Screened/Security cleared, must not be awarded without first verifying through ISS that the vendor holds the appropriate level of facility security clearance and (if required) document safeguarding capability
  2. For contractors and or subcontractor that are not already security screened, the contracting authority may initiate a request for Private Sector Organizational Screening (PSOS) with the ISS
  3. Client departments and contracting authorities are asked to submit copies of the contractual documentation (loi, RFP, contract, RFSO or SO) containing security requirements resulting from contract award to the ISS at tpsgc.ssicontrats-isscontracts.pwgsc@tpsgc-pwgsc.gc.ca.
    For hardcopy submission only, please mail copies of contracts to:
    Public Services and Procurement Canada
    Contract Division
    2745 Iris Street
    Portage III, 0B3
    11 Laurier St
    Gatineau QC K1A 0S5
  4. If foreign suppliers will be involved in this procurement, please contact the ISS at tpsgc.ssicontrats-isscontracts.pwgsc@tpsgc-pwgsc.gc.ca for the appropriate international security clauses. In some cases, the international Alternative Solution may be available
  5. Protected and classified information/assets intended for domestic suppliers must be forwarded to the company security officer
  6. Protected and classified information/assets intended for foreign suppliers must be transmitted on a government-to-government basis via the ISS. Please contact tpsgc.dgssiprojetintl-dobissintlproject.pwgsc@tpsgc-pwgsc.gc.ca
  7. If the contract has an IT security requirement, the supplier cannot process electronically on their site until the appropriate approval is provided by ISS. The IT inspection process will only be initiated by ISS upon receipt of the awarded contract/call-up
Professional services security requirement check lists
Security requirement check list contract # Supplier / personnel security screening Supplier and its personnel Access to controlled goods? Document safeguarding?
Common professional services security requirement check list #1 Reliability
  • Commercial courier only
No No
Common professional services security requirement check list #2 Reliability
  • Access to restricted areas and no access to protected and/or classified information or assets
No No
Common professional services security requirement check list #3 Reliability
  • Access to restricted areas and no access to protected and/or classified information or assets
Yes No
Common professional services security requirement check list #4 Secret
  • Access to restricted areas and no access to protected and/or classified information or assets
No No
Common professional services security requirement check list #5 Secret
  • Access to restricted areas and no access to protected and/or classified information or assets
Yes No
Common professional services security requirement check list #6 Reliability
  • Access to protected information or assets up to protected B
No No
Common professional services security requirement check list #7 Reliability
  • Access to protected information or assets up to protected B
Yes No
Common professional services security requirement check list #8 Reliability
  • Access to protected information or assets up to protected B
  • Access to unclassified military technical data subject to Technical Data Control Regulations (TDCR)
Yes No
Common professional services security requirement check list #9 Reliability
  • Access to protected information or assets up to protected B
  • The supplier is to receive and store information or assets and uses its IT Systems to process, produce or store information or data
No Protected B
Common professional services security requirement check list #10 Reliability
  • Access to protected information or assets up to protected B
  • The supplier is to receive and store information or assets and uses its IT Systems to process, produce or store information or data
  • There will be an Electronic link between the supplier's IT systems and the government department or agency
No Protected B
Common professional services security requirement check list #11 Reliability
  • Access to protected information or assets up to protected B
  • The supplier is to receive and store information or assets and uses its IT Systems to process, produce or store information or data
Yes Protected B
Common professional services security requirement check list #12 Reliability
  • Access to protected information or assets up to protected B.
  • Access to unclassified military technical data subject to TDCR
  • The supplier is to receive and store information or assets and uses its IT Systems to process, produce or store information or data
Yes Protected B
Common professional services security requirement check list #13 to 18 Reliability
  • The common SRCLs can no longer be used for access to Protected C information. Access to Protected C information now requires Enhanced reliability status which can only be done by the ISS on an exceptional basis. For this reason the previous common SRCLs numbers 13-18 have been removed on a temporary basis
No No
Common professional services security requirement check list #19 Secret
  • Access to protected and classified information or assets up to secret
No No
Common professional services security requirement check list #20 Secret
  • Access to protected and classified information or assets up to secret
Yes No
Common professional services security requirement check list #21 Secret
  • Access to protected and classified information or assets up to secret
  • Access to unclassified military technical data subject to TDCR
Yes No
Common professional services security requirement check list #22 Secret
  • Access to protected and classified information or assets up to secret
  • The supplier is to receive and store information or assets
No Secret
Common professional services security requirement check list #23 Secret
  • Access to protected and classified information or assets up to secret
  • The supplier is to receive and store information or assets and uses its IT Systems to process, produce or store information or data
No Secret
Common professional services security requirement check list #24 Secret
  • Access to protected and classified information or assets up to secret
  • The supplier is to receive and store information or assets and uses its IT Systems to process, produce or store information or data
Yes Secret
Common professional services security requirement check list #25 Secret
  • Access to protected and classified information or assets up to secret
  • Access to unclassified military technical data subject to TDCR
  • The supplier is to receive and store information or assets and uses its IT Systems to process, produce or store information or data
Yes Secret
Common professional services security requirement check list #26 Top Secret
  • Access to protected and classified information or assets up to top secret
No No
Common professional services security requirement check list #27 Top Secret
  • Access to protected and classified information or assets up to top secret
Yes No
Common professional services security requirement check list #28 Top Secret
  • Access to protected and classified information or assets up to top secret
  • Access to unclassified military technical data subject to TDCR
Yes No
Common professional services security requirement check list #29 Top Secret
  • Access to protected and classified information or assets up to top secret
  • The supplier is to receive and store information or assets and uses its IT Systems to process, produce or store information or data
No Top Secret
Common professional services security requirement check list #30 Top Secret
  • Access to protected and classified information or assets up to top secret
  • The supplier is to receive and store information or assets and uses its IT Systems to process, produce or store information or data
Yes Top Secret
Common professional services security requirement check list #31 Top Secret
  • Access to protected and classified information or assets up to top secret.
  • Access to unclassified military technical data subject to TDCR
  • The supplier is to receive and store information or assets and uses its IT Systems to process, produce or store information or data
Yes Top Secret
Common professional services security requirement check list #32 Reliability
  • Access to protected A only information or assets
  • The supplier is to receive and store information or assets and uses its IT Systems to process, produce or store information or data
No Protected A
Common professional services security requirement check list ##33 Reliability
  • Access to protected B only information or assets
  • The supplier is to receive and store information or assets and uses its IT Systems to process, produce or store information or data
No Protected B
Common professional services security requirement check list #34 Secret
  • Access to secret only information or assets
No No
Common professional services security requirement check list #35 Top Secret
  • Access to top secret only information or assets
No No
Common professional services security requirement check list #36 Reliability and Secret
  • Access to protected A, B and secret only information or assets
  • The supplier is to receive and store protected B only information or assets
No Protected B
Common professional services security requirement check list #37 Reliability and Secret
  • Access to protected A, B and secret only information or assets
  • The supplier is to receive and store protected B only information or assets and uses its IT Systems to process, produce or store information or data
No Protected B
Common professional services security requirement check list #38 Reliability and Top Secret
  • Access to protected A, B and top secret only information or assets
  • The supplier is to receive and store protected B only information or assets
No Protected B
Common professional services security requirement check list #39 Reliability
  • Access to protected A only information or assets
  • The supplier is to receive and store information or assets and uses its IT Systems to process, produce or store information or data
Yes Protected A
Common professional services security requirement check list #40 Reliability
  • Access to protected B only information or assets
  • The supplier is to receive and store information or assets and uses its IT Systems to process, produce or store information or data
Yes Protected B
Common professional services security requirement check list #41 Secret
  • Access to secret only information or assets
Yes No
Common professional services security requirement check list #42 Top Secret
  • Access to top secret only information or assets
Yes No
Common professional services security requirement check list #43 Reliability and Secret
  • Access to protected A, B and secret only information or assets
  • The supplier is to receive and store protected B only information or assets
Yes Protected B
Common professional services security requirement check list #44 Reliability and Secret
  • Access to protected A, B and secret only information or assets
  • The supplier is to receive and store protected B only information or assets and uses its IT Systems to process, produce or store information or data
Yes Protected B
Common professional services security requirement check list #45 Reliability and Top Secret
  • Access to protected A, B and top secret only information or assets
  • The supplier is to receive and store protected B only information or assets
Yes Protected B
Date modified: