Document Imaging and Data Capture Services, Centralized Client Mail Centre

With a streamlined centralized mail process, Veterans will no longer have to worry about where to send their mail. Most incoming mail to the Department will be sent to Matane, Quebec by 2014, making it easier for Veterans to send their mail where it needs to be. The consolidation of departmental addresses will happen in phases.

VAC is partnering with Public Works Government Services Canada (PWGSC) to help centralize the mail process. PWGSC’s Document Imaging Services in Matane, Quebec allows departments to modernize and green their operations by replacing paper copies with digital information and to improve their client service by having electronic access to information.

Because of this modernization, VAC employees are now able to process the same information simultaneously. Veterans will not be required to resubmit documentation and this centralization will contribute to faster decision-making and turnaround times for Veterans and their families.

The PIA identified the need to update program specific Personal Information Banks which are available to assist individuals exercise their rights under the Privacy Act. The PIA for this initiative has been submitted to Treasury Board Secretariat (TBS) and the Office of the Privacy Commissioner (OPC).

Description of the class of record and the Personal Information Bank associated with the program or activity:

Class of Records and Personal Information Banks can be reviewed at: VAC's Info Source Chapter

Legal Authority for Program or Activity

There is an over-arching authority that permits PWGSC to offer document imaging services to line departments, such as VAC . TBS ' Common Services Policy , issued under the authority of section 7 of the Financial Administration Act, provides the direction for PWGSC to deliver these services on behalf of organizations such as VAC .

Risk Area Identification & Categorization

The following section contains risks identified in the PIA for the new or modified program. A risk scale has been included. The numbered risk scale is presented in ascending order: the first level represents the lowest level of potential risk for the risk area; the fourth level (4) represents the highest level of potential risk for the given risk area. Please refer to “Appendix C” of the TBS Directive on PIA s to learn more about the risk scale.

  1. Type of Program or Activity
  2. Type of Personal Information Involved and Context
  3. Program or Activity Partners and Private Sector Involvement
  4. Duration of the Program or Activity
  5. Program Population
  6. Technology & Privacy
    1. Does the new or modified program or activity involve the implementation of a new electronic system, software or application program including collaborative software (or groupware) that is implemented to support the program or activity in terms of the creation, collection or handling of personal information? Risk to privacy - No While VAC 's implementation of the PWGSC document imaging solution is new, this is not a new system or process for PWGSC .
    2. Does the new or modified program or activity require any modifications to IT legacy systems and / or services? Risk to privacy - No
    3. Enhanced identification methods - This includes biometric technology (i.e. facial recognition, gait analysis, iris scan, fingerprint analysis, voice print, radio frequency identification (RFID), etc.) as well as easy pass technology, new identification cards including magnetic stripe cards, "smart cards" (i.e. identification cards that are embedded with either an antenna or a contact pad that is connected to a microprocessor and a memory chip or only a memory chip with non-programmable logic). Risk to privacy – No
    4. Use of Surveillance - This includes surveillance technologies such as audio/video recording devices, thermal imaging, recognition devices, RFID , surreptitious surveillance / interception, computer aided monitoring including audit trails, satellite surveillance, etc. Risk to privacy – No
    5. Use of automated personal information analysis, personal information matching and knowledge discovery techniques - For the purposes of the Directive on PIA , government institution are to identify those activities that involve the use of automated technology to analyze, create, compare, cull, identify or extract personal information elements. Such activities would include personal information matching, record linkage, personal information mining, personal information comparison, knowledge discovery, information filtering or analysis. Such activities involve some form of artificial intelligence and/or machine learning to uncover knowledge (intelligence), trends/patterns or to predict behavior. Risk to privacy – No