Instruction in the Minority Official Language – 2021 Census promotional material

Help spread the word about 2021 Census data on instruction in an official language minority in Canada. These data were released on November 30, 2022.

Quick facts

  • The 2021 Census of Population provides new data on the children eligible for instruction in the minority official language at the primary and secondary levels, based on the three criteria established by the Canadian Charter of Rights and Freedoms.
  • In 2021, 897,000 children were eligible for instruction in the minority official language at the primary and secondary levels, namely in English in Quebec (304,000) and in French in Canada outside Quebec (593,000).
  • Among the provinces and territories in Canada outside Quebec, Ontario (350,000), Alberta (67,000), British Columbia (56,000), New Brunswick (49,000) and Manitoba (30,000) had the highest population of children eligible for instruction in French.
  • Among the provinces and territories, New Brunswick (36.0%), Quebec (18.1%), Yukon (14.1%) and Ontario (12.6%) had the largest proportions of children eligible for instruction in the minority official language. About 1 in 10 children (10.5%) were eligible for instruction in French in Canada outside Quebec.
  • Across Canada, over 90% of eligible children were living within 15 kilometres of a minority official language school.
  • In Canada outside Quebec, 292,000 school-aged children attended a regular French program at a primary or secondary French-language school in Canada, representing 64.7% of eligible children aged 5 to 17. This proportion was higher in New Brunswick (80.6%) and Yukon (71.0%), but lower in British Columbia (55.7%), Newfoundland and Labrador (54.2%) and Alberta (49.6%). In Quebec, 175,000 school-aged children attended an English primary or secondary school in Canada, representing 76.2% of eligible children aged 5 to 17 in this province.
  • The new data on language of instruction show that, among persons in Canada outside Quebec aged 5 years and older, almost 1.2 million studied in a regular French program in a French-language school, 1.6 million in a French immersion program, and 137,000 in both types of programs.
  • Nearly 1 million people aged 5 and older living in Quebec at the time of the 2021 Census studied at an English primary or secondary school in Canada.

Resources

Social media content

Statistics Canada encourages our community supporters to share our content and images to their own social media accounts. You can save the images to your device and copy and paste the text content to your social media platforms.

Post 1

Almost one in eight children in Canada was admissible for instruction in the official minority language in 2021. Check out the new #2021Census data on the topic here:

bit.ly/3VR0byb

Download image for post 1

Post 1

New data from the #2021Census reveal an updated portrait on instruction in the official minority language in Canada, not only for children, but also for adults.

For more info:

bit.ly/3VR0byb

Download image for post 2

Web images

Official Language Tile (JPG, 103 KB)

Terms of use

See the terms of use for information on the approved use of official wordmarks, identifiers and content.

Date modified:

Labour and Language of Work – 2021 Census promotional material

Help spread the word about 2021 Census data on labour and language of work in Canada. These data were released on November 30, 2022.

Quick facts

  • In the face of population aging and the COVID-19 pandemic, the number of health care workers increases by over 200,000 in five years to 1.5 million in 2021.
  • The construction industry, with over 1.3 million workers, continues to be an important employer for men, who work mostly as labourers and in skilled trades.
  • Growth in professional, scientific and technical services employment outpaces that of all other industries, with 1.5 million employed in 2021.
  • Four million Canadians are working in sales and service occupations.
  • The participation rate fell from 65.2% in 2016 to 63.7% in 2021 as more baby boomers near or enter retirement age.
  • From 2016 to 2021, a record 1.3 million new immigrants came to Canada seeking opportunities, boosting labour market growth.
  • Recent immigrants in 2021 experienced lower unemployment rates than earlier cohorts.
  • Participation rates increased from 2016 to 2021 for many racialized groups, with notable increases for Korean and West Asian Canadians.
  • Participation rates declined for First Nations people and Inuit as their labour force growth lags behind their population increases.
  • In Canada's biggest cities, employment rates in 2021 are highest among those in Quebec and the Prairies.
  • The information and communication technology sector is a key employer in six Canadian high-tech hubs, and employed more than 600,000 workers nationally in 2021.
  • In May 2021, there were 4.2 million people working at home, up from 1.3 million in 2016.
  • Working at home is most prominent in big cities and among people in professional occupations—with over 5% of teleworkers relocating from where they lived 12 months earlier.
  • Despite a record-high number and share of Canadians speaking a non-official language at home, English and French remained the languages of convergence in workplaces across the country as 98.7% of workers used one of these two languages most often at work. Overall, 77.1% of workers mainly used English at work, 19.9% mainly used French, and 1.7% used English and French equally.

Resources

Social media content

Statistics Canada encourages our community supporters to post our content and images to their own social media accounts. You can save the images to your device and copy and paste the text content to your social media platforms to share.

Post 1

#DYK? Healthcare and social assistance; construction; and professional, scientific and technical services accounted for nearly one third of all employment in Canada in 2021.

To learn more, check out our new #2021Census data:

bit.ly/3gJqpDK

Download image for post 1

Post 1

In 2021, immigrants made up over one-quarter of Canada's core-aged labour force.

For more info from the #2021Census :

bit.ly/3gJqpDK

Download image for post 2

Post 31

While more Canadians than ever speak a non-official language at home, 77.1% of workers mainly used English at work, 19.9 % mainly used French, and 1.7% used both equally.

Learn more from the #2021Census data:

bit.ly/3gJqpDK

Download image for post 3

Web Images

Labour Tile (JPG, 111 KB)

Terms of use

See the terms of use for information on the approved use of official wordmarks, identifiers and content.

Date modified:

Privacy preserving technologies, part three: Private statistical analysis and private text classification based on homomorphic encryption

By: Benjamin Santos and Zachary Zanussi, Statistics Canada

Introduction

What's possible in the realm of the encrypted and what use cases can be captured with homomorphic encryption? The Data Science Network's first article in the privacy preserving series, A Brief Survey of Privacy Preserving Technologies, introduces privacy enhancing technologiesFootnote 1 (PETs) and how they enable analytics while protecting data privacy. The second article in the series, Privacy Preserving Technologies Part Two: Introduction to Homomorphic Encryption, took a deeper look at one of the PETs, more specifically homomorphic encryption (HE). In this article, we describe applications explored by data scientists at Statistics Canada in encrypted computation.

HE is an encryption technique that allows computation on encrypted data as well as several paradigms for secure computing. This technique includes secure outsourced computing, where a data holder allows a third party (perhaps, the cloud) to compute on sensitive data while ensuring that input data is protected. Indeed, if the data holder wants the cloud to compute some (polynomial) function f on their data v, they can encrypt it into a ciphertext, denoted [v], send it safely to the cloud which computes f homomorphically to obtain [f(v)], and forward the result back to the data holder, who can decrypt and view f(v). The cloud has no access to the input, output, or any intermediate data values.

Figure 1: Illustration of a typical HE workflow
Figure 1: Illustration of a typical HE workflow.

An illustration of a typical HE workflow. The data, v, is encrypted, putting it in a locked box [v]. This value is sent to the compute party (the cloud). Gears turn and the input encryption [v] is transformed into the output encryption, [f(v)], as desired. This result is forwarded back to the owner who can take it out of the locked box and view it. The cloud doesn't have access to input, output, or intermediate values.

HE is currently being considered by international groups for standardization. The Government of Canada does not recommend HE or the use of any cryptographic technique before it's standardized. While HE is not yet ready for use on sensitive data, this is a good time to explore its capabilities and potential use cases.

Scanner data

Statistics Canada collects real time data from major retailers for a variety of data products. This data describes the daily transactions performed such as a description of the product sold, the transaction price, and metadata about the retailer. This data is called "scanner data", after the price scanners used to ring a customer through checkout. One use of scanner data is to increase the accuracy of the Consumer Price Index, which measures inflation and the strength of the Canadian dollar. This valuable data source is treated as sensitive data—we respect the privacy of the data and the retailers that provide it.

The first step in processing this data is to classify the product descriptions into an internationally standardized system of product codes known as the North American Product Classification System (NAPCS) Canada 2017 Version 1.0. This hierarchical system of seven-digit codes is used to classify different types of products for analysis. For example, one code may correspond to coffee and related products. Each entry in the scanner data needs to be assigned one of these codes based on the product description given by the retailer. These descriptions, however, are not standardized and may differ widely between different retailers or across different brands of similar products. Thus, the desired task is to convert these product descriptions, which often include abbreviations and acronyms, into their codes.

After they've been classified, the data is grouped based on its NAPCS code and statistics are computed on these groups. This allows us to gain a sense of how much is spent on each type of product across the country, and how this value changes over time.

Figure 2: High level overview of the scanner data workflow with sample data
Figure 2: High level overview of the scanner data workflow with sample data.

High level overview of the scanner data workflow. First, the product descriptions are classified into NAPCS codes. Examples are given: "mochi ice cream bon bons" is assigned NAPCS code 5611121, while "chipotle barbeque sauce" is assigned 5611132. Application 2 is to assign these codes to the descriptions. The product descriptions have a few identifiers and a price value attached. Application 1 is to sort the data by these codes and identifiers, and compute statistics on the price values.

Sample dataset 1
Description ID1 ID2 Value
"mochi ice cream bon bons" 054 78 $5.31
"chipotle barbeque sauce" 201 34 $3.80

Application 2

Sample dataset 2
NAPCS ID1 ID2 Value
5611121 054 78 $5.31
5611132 201 34 $3.80

Application 1

Statistics (total, mean, variance)

Given the data's sensitivity and importance, we've targeted it as a potential area where PETs can preserve our data workflow while maintaining the high level of security required. The two tasks above have, up to now, been performed within Statistics Canada's secure infrastructure, where we can be sure the data is safe at the time of ingestion and throughout its use. In 2019, when we were first investigating PETs within the agency, we decided to experiment using the cloud as a third-party compute resource, secured by HE.

We model the cloud as a semi-honest party, meaning it will follow the protocol we assign it, but it will try to infer whatever it can about the data during the process. This means we need sensitive data to always be encrypted or obscured. As a proof-of-concept, we replaced the scanner data with a synthetic data source, which allows us to conduct experiments without putting the security of the data at risk.

Application 1: Private statistical analysis

Our first task was to perform the latter part of the scanner data workflow – the statistical analysis. We constructed a synthetic version of the scanner data to ensure its privacy. This mock scanner data consisted of thirteen million records, each consisting of a NAPCS code, a transaction price, and some identifiers. This represents about a week's worth of scanner data from a single retailer. The task was to sort the data into lists, encrypt it, forward it to the cloud, and instruct the cloud to compute the statistics. The cloud would then forward us the still-encrypted results, so we could decrypt and use them for further analysis.

Suppose our dataset is sorted into lists of the form v=(v1,,vl). It's relatively straightforward to encrypt each value vi into a ciphertext [vi] and send the list of ciphertexts ([v1],,[vl]) to the cloud. The cloud can use homomorphic addition and multiplication to calculate the total, mean, and variance and return these as ciphertexts to us (we'll see how division is handled for the mean and variance later in this article). We do this for every list, and decrypt and view our data. Simple, right?

The problem with a naïve implementation of this protocol is data expansion. A single CKKSFootnote 2 ciphertext is a pair of polynomials of degree 214 with 240-bit coefficients. All together, it may take 1 MB to store a single record. Over the entire dataset of thirteen million, this becomes 13 TB of data! The solution to this problem is called packing.

Packing

Ciphertexts are big, and we have a many small pieces of data. We can use packing to store an entire list of values into a single ciphertext, and the CKKS scheme allows us to perform Single Instruction Multiple Data (SIMD) type operations on that ciphertext, so we can compute several statistics at once! This ends up being a massive increase in efficiency for many HE tasks, and a clever data packing structure can make the difference between an intractable problem and a practical solution.

Suppose we have a list of l values, v=(v1,v2,,vl). Using CKKS packing, we can pack this entire list into a single ciphertext, denoted by [v]. Now, the operations of homomorphic addition and multiplication occur slot-wise in a SIMD fashion. That is, if u=(u1,u2,,ul) encrypts to [u], then we can compute homomorphic addition to get

[u][v]=[u+v]

where [u+v] is anFootnote 3 encryption of the list (u1+v1,u2+v2,,ul+vl). This homomorphic addition takes as much time to compute as if there was only one value in each ciphertext, so it's clear we can get an appreciable efficiency boost via packing. The downside is that we now must use this vector structure in all of our calculations, but with a little effort, we can figure out how to vectorize relevant calculations to take advantage of packing.

Figure 3: An illustration of packing. The four values can either be encrypted into four separate ciphertexts, or all be packed into one
Figure 3: An illustration of packing. The four values can either be encrypted into four separate ciphertexts, or all be packed into one.

An illustration of packing. Four values, v1,v2,v3,v4, need to be encrypted. In one case, they can all be encrypted into separate ciphertexts, depicted as locked boxes. In another, we can pack all four values into a single box. In the former case, it will take four boxes, which is less efficient to store and to work with. The latter case, packing as many values as possible, is almost always preferred.

Now I know what you are thinking - doesn't packing, which stores a bunch of values within a vector, make it impossible to compute values within a list? That is, if we have v=(v1,v2,,vl), what if I wanted v1+v2? We have access to an operation known as rotation. Rotation takes a ciphertext that is an encryption of (v1,v2,,vl) and turns it into Rot([v]), which is an encryption of (v2,v3,,vl,v1). That is, it shifts all the values left in one slot, sliding the first value into the last slot. So, by computing [v]Rot([v]), we get

(v1+v2,v2+v3,,vl+v1),

and the desired value is in the first slot.

Mathematically, packing is achieved by exploiting the properties of the cleartext, plaintext and ciphertext spaces. Recall that the encryption and decryption functions are maps between the latter two spaces. Packing requires another step called encoding, which encodes a vector of (potentially complex, though in our case, real) values v from the cleartext space into a plaintext polynomial p. While the data within p is not human-readable as-is, it can be decoded into the vector of values by any computer without requiring any keys. The plaintext polynomial p can then be encrypted into the ciphertext [v] and used to compute statistics on scanner data.Footnote 4

Efficient statistical analysis using packing

Getting back to the statistical analysis on scanner data, remember that the problem was that encrypting every value into a ciphertext was too expensive. Packing will allow us to vectorize this process, making its orders of magnitude more efficient in terms of communication and computation.

We can now begin to compute the desired statistics on our list v=(v1,v2,,vl). The first value of interest is the total, Tv=i=1lvi, obtained by summing all the values in the list. After encrypting v into a packed ciphertext [v], we can simply add rotations of the ciphertext [v] to itself until we have a slot with the sum of all the values. In fact, we can do better than this naïve strategy of l rotations and additions- we can do it in log2l steps by rotating one slot first, then by two slots, then four, then eight, and so on until we get the total Tv in a slot.

Next, we want the mean, Mv=Tv/l. To do this, we encrypt the value 1/l into the ciphertext [1/l] and send it along with the list [v]. We can then simply multiply this value by the ciphertext that we got when computing the total. It's a similar story for the variance, Vv=1/li=1l(vi-Mv)2, where we subtract the mean from [v], multiply the result by itself, compute the total again, and then multiply again by the [1/ l] ciphertext.

Let's investigate the savings that packing afforded us. In our case, we had about 13 million data points which separates into 18,000 lists. Assuming that we could pack every list into a single ciphertext, that reduces the size of the encrypted dataset by almost three orders of magnitude. But in reality, the different lists were all different sizes, with some being as large as tens of thousands of entries and others as small as two or three, with the majority falling in the range of hundreds to thousands. Through some clever manipulation, we were able to pack multiple lists into single ciphertexts and run the total, mean, and variance algorithms for them all at once. By using ciphertexts that can pack 8,192 values at once, we were able to reduce the number of ciphertexts to just 2,124. At about 1 MB per ciphertext, this makes the encrypted dataset about two gigabytes (GBs). With the cleartext data taking 84 megabytes (MB), this left us with a data expansion factor of about 25 times. Overall, the encrypted computation took around 19 minutes, which is 30 times longer than unencrypted.

Application 2: Private text classification based on homomorphic encryption

Next, we tackled the machine learning training task. Machine learning training is a notoriously expensive task, so it was unclear whether we'd be able to implement a practical solution.

Next, we tackled the machine learning training task. Machine learning training is a notoriously expensive task, so it was unclear whether we'd be able to implement a practical solution. Recall the first task in the scanner data workflow - the noisy, retailer-dependent product descriptions need to be classified into the NAPCS codes. This is a multiclass text classification task. We created a synthetic dataset from an online repository of product descriptions and tagged them with one of five NAPCS codes.

Running a neural network is basically multiplying a vector past a series of matrices, and training a neural network involves forward passes, which is evaluating training data in the network, as well as backward passes, which is using (stochastic) gradient descent and the chain rule to find the best way to update the model parameters to improve performance. All this boils down to multiplying values by other values, and by having access to homomorphic multiplication, training an encrypted network is possible in theory. In practice, this is hampered by a core limitation of the CKKS scheme: the leveled nature of homomorphic multiplications. We'll discuss this element first, and then explore the different protocol aspects designed to mitigate it.

Ciphertext levels in CKKS

In order to protect your data during encryption, the CKKS scheme adds a small amount of noise to each ciphertext. The downside is that this noise accumulates with consecutive operations and needs to be modulated. CKKS has a built-in mechanism for this, but unfortunately it only allows for a bounded number of operations on a single ciphertext.

Suppose we have two freshly encrypted ciphertexts - [v1] and [v2]. We can homomorphically multiply them to get the ciphertext [v1v2]. The problem is that the noiseFootnote 5 in this resulting ciphertext is much larger than in the freshly encrypted ones, so if we multiplied it by freshly encrypted [v3], the result would be affected by this mismatch.

What would first have to rescale the ciphertext [v1v2]. This is transparently handled by the HE library, but under the hood, the ciphertext is moved to a slightly different space. We say that [v1v2] has been moved down a level, meaning. the ciphertext started out on level L-1, and after rescaling, it is left on level L-1. The value L is determined by the security parameters we chose when we set up the HE scheme.

Now we have [v1v2] which has a normal amount of noise but is on level L -1, and the freshly encrypted [v3] which is still on level L. Unfortunately, we can't perform operations on ciphertexts that are on different levels, so we first have to reduce the level of [v3] to L-1 by modulus switching. Now that both ciphertexts are on the same level, we can finally multiply them as desired. We don't need to rescale the result of additions, but we do for every multiplication.

Figure 4: An illustration of levels
Figure 4: An illustration of levels

An illustration of levels. On the left we can see the level on which each ciphertext resides: from top to bottom, we have levels L, L-1, and L-2. Freshly encrypted v1, v2, and v3 all inhabit level L on top. After multiplying, v1v2 move down to level L-1. If we want to multiply v1v2 by v3, we need to first bring v3 down to level L-1. The resulting product, v1v2v3 lives on level L-2.

This leveled business has two consequences. One, the developer needs to be conscious of the level of the ciphertexts they're using. And two, the ciphertexts will eventually reach level 0 after many consecutive multiplications, at which point it's spent, and we can't perform any more multiplications.

There are a few options for extending computations beyond the number of levels available. The first is a process called bootstrapping, where the ciphertext is homomorphically decrypted and re-encrypted, resulting in a fresh ciphertext. This process can theoretically result in an unbounded number of multiplications. However, the added expense adds a cost to the computation. Alternatively, one can refresh the ciphertexts by returning them to the secret key holder, who can decrypt and re-encrypt them before returning them to the cloud. Sending ciphertexts back and forth adds a communication cost but this is sometimes worth it when there aren't many ciphertexts to send.

Impact of levels on our network structure

We had to consider this fundamental constraint on HE when designing our neural network. The process of training a network involves performing a prediction, evaluating the prediction, and updating the model parameters. This means that every round, or epoch, of training consumes multiplicative levels. We tried to minimize the number of multiplications needed to traverse forward and backward through the network to maximize the number of training rounds available. We'll now describe the network structure and the data encoding strategy.

The network architecture was inspired by the existing solution in production. This amounted to an ensemble model of linear learners. We trained several single layer networks separately, and at prediction time, we had each learner vote on each entry. We chose this approach because it reduced the amount of work required to train each model - less training time meant fewer multiplications.

Each layer in a neural network is a weight matrix of parameters multiplied by data vectors during the forward pass. We can adapt this to HE by encrypting each input vector into a single ciphertext and encrypting each row of the weight matrix into another ciphertext. The forward pass then becomes several vector multiplications, followed by logarithmically many rotations and multiplications to compute the sum of the outputs (recall that matrix multiplication is a series of dot products, which are a component-wise multiplication followed by computing the sum resulting values).

Preprocessing is an important part of any text classification task. Our data were short sentences which often contained acronyms or abbreviations. We chose to use a character n-gram encoding with n equal to three, four, five, and six - "ice cream" was broken into the 3-grams {"ice", "cre", "rea", "eam"}. These n-grams were collected and enumerated over the entire dataset and were used to one-hot encode each entry. A hashing vectorizerFootnote 6 was used to reduce the dimension of the encoded entries.

Similarly, to how we packed multiple lists together in the statistical analysis, we found we could pack together multiple models and train them at once. Using a value N=215 meant we could pack 16,384 values into each ciphertext, so if we hashed our data to 4,096 dimensions, we could fit four models into each ciphertext. This had the added benefit of reducing the number of ciphertexts required to encrypt our dataset by a factor of four. Meaning we could train four models simultaneously.

Our choice of encryption parameters meant we had between 12 and 16 multiplications before we ran out of levels. With a single layer network, the forward pass and backward pass took two multiplications each, leaving us room for three to four epochs before our model ciphertexts were spent. Our ensembles meant we could train several ciphertexts worth of models if desired, meaning we could have as many learners as desired at the cost of additional training time. Carefully modulating which models learned on what data helped us maximize the overall performance of the ensemble.

Our dataset consisted of 40,000 training examples and 10,000 test examples each evenly distributed over our five classes. To train four submodels for six epochs took five hours and resulted in a model that obtained 74% accuracy on the test set. Using the ciphertext refreshing tactic previously described, we can hypothetically train for as many epochs as we'd like, though every refresh adds more communication cost to the processFootnote 7. After training, the cloud sends the encrypted model back to StatCan, and we can run it in the cleartext on data in production. Or we can keep the encrypted model on the cloud and run encrypted model inference when we have new data to classify.

Conclusion

This concludes the Statistics Canada series of applications of HE to scanner data explored to date. HE has a number of other applications which might prove interesting to a national statistics organization such as Private Set Intersection, in which two or more parties jointly compute the intersection of private datasets without sharing them, as well as Privacy Preserving Record Linkage, where parties additionally link, share, and compute on microdata attached to their private datasets.

There's a lot left to explore in the field of PETs and StatCan is working to leverage this new field to protect the privacy of Canadians while still delivering quality information that matters.

Meet the Data Scientist

Register for the Data Science Network's Meet the Data Scientist Presentation

If you have any questions about my article or would like to discuss this further, I invite you to Meet the Data Scientist, an event where authors meet the readers, present their topic and discuss their findings.

Thursday, December 15
2:00 to 3:00 p.m. ET
MS Teams – link will be provided to the registrants by email

Register for the Data Science Network's Meet the Data Scientist Presentation. We hope to see you there!

References

North American Product Classification System (NAPCS) Canada 2017 Version 1.0

Cheon, J. H., Kim, A., Kim, M., & Song, Y. (2016). Homomorphic Encryption for Arithmetic of Approximate Numbers.Cryptology ePrint Archive.

C. Gentry. (2009). A fully homomorphic encryption scheme. PhD thesis, Stanford University: Craig Gentry's PhD Thesis

Zanussi, Z., Santos B., & Molladavoudi S. (2021). Supervised Text Classification with Leveled Homomorphic Encryption. In Proceedings 63rd ISI World Statistics Congress (Vol. 11, p. 16). International Statistical Institute - Statistical Science for a Better World

Date modified:

Quarterly Survey of Financial Statements: Weighted Asset Response Rate - third quarter 2022

Weighted Asset Response Rate
Table summary
This table displays the results of Weighted Asset Response Rate. The information is grouped by Release date (appearing as row headers), 2020, Q2, Q3, and Q4, and 2021, Q1 and Q2 calculated using percentage units of measure (appearing as column headers).
Release date 2021 2022
Q3 Q4 Q1 Q2 Q3
quarterly (percentage)
November 23, 2022 79.0 80.9 76.2 76.1 56.2
August 25, 2022 79.0 80.9 75.0 55.7 ..
May 25, 2022 79.0 77.3 56.7 .. ..
February 23, 2022 75.6 54.2 .. .. ..
November 23, 2021 56.7 .. .. .. ..
.. not available for a specific reference period
Source: Quarterly Survey of Financial Statements (2501)

Amendment to the Employee Wellness Surveys Privacy Impact Assessment (PIA) & Supplement to Statistics Canada's Generic PIA

Statistics Act Employment and Social Development Canada (ESDC) Employee Wellness Survey (EWS)
Privacy Impact Assessment (PIA) Summary

Introduction

This amendment applies to the Employee Wellness Surveys and Pulse Check Surveys PIA (signed by the Chief Statistician on November 5, 2021), and shall also be considered a supplement to Statistics Canada's Generic Privacy Impact Assessment for statistical survey activities as this ESDC EWS will operate under the authority of the Statistics Act on a cost-recovery basis for the client, ESDC, to be administered on employees of ESDC by Statistics Canada.

Objective

An Amendment to the Employee Wellness Surveys and Pulse Check Surveys PIA & Supplement to Statistics Canada's Generic Privacy Impact Assessment – Statistics Act Employment and Social Development Canada (ESDC) Employee Wellness Survey (EWS) was conducted to determine if there were any privacy, confidentiality or security issues with this activity and, if so, to make recommendations for their resolution or mitigation.

Description

The original EWS survey was collected under the authority of the Financial Administration Act (FAA) from Statistics Canada and Statistical Survey Operations employees and was examined in the Employee Wellness Surveys - PIA, whereas this new collection will be conducted under the authority of the Statistics Act on a cost recovery basis for ESDC on their employees. As such, while Statistics Canada's Generic Privacy Impact Assessment (PIA) addresses most of the privacy and security risks related to statistical activities conducted by Statistics Canada, this amendment and supplement is required to describe how the internal HR personal information activity framework that operates under the authority of the FAA (the original EWS) is being modified to collect personal information externally under the authority of the Statistics Act.

  • This ESDC EWS will be administered one time, with the potential for future cycles.
  • One key change is that, unlike in the original EWS analysis, linking activities involving the following PIBs will not be performed for the ESDC EWS:
  • Another change is that for this survey, the sample file will be provided by ESDC, and it will be matched, following collection, to the survey frame that will be built by Statistics Canada from the Incumbent file. The sample file will contain basic personal information for each of their employees (first and last name, email address, first official language and Personal Record Identifier [PRI]). The Incumbent file comes from Treasury Board Secretariat (TBS), and is an extract from the Public Services and Procurement Canada (PSPC) pay system. The Incumbent file is the most comprehensive administrative file available to federal Government of Canada institutions, by nature of its relation to their pay and staffing. Although it contains a great deal of information on employees, their positions, status and pay, only a small number of variables are required and retained from this file for inclusion on the survey frame – which will only be used internally at Statistics Canada for statistical processing purposes (see Section 4 for more detail on the variables taken from the Incumbent file for employees of ESDC).
  • New content has been added to the questionnaire:
    • Questions about organizational unit at a level of granularity which describes where within the ESDC portfolio an employee works down to branch or region (level 4) in order to ensure that the diverse yet distinct work environments found across portfolios and regions is represented and identifiable in the data.
    • Questions under the TBS Personal Information Bank for Employment Equity and Diversity (PSE 918) which include Indigenous Identity, Gender, and Sociodemographic Characteristics.
      • These questions will provide important context allowing to understand unique challenges experienced by unique populations which support the Call to Action on Equity, Diversity, and Inclusion "Nothing about us, without us".
    • A question which asks "Would you say you are: Heterosexual, Lesbian or gay, Bisexual, Or please specify" which provides important information about the unique experiences which may be had by different based on how a respondent identifies.
    • A question which asks "On a scale from 1 to 10, where 1 is "not at all important" and 10 is "critically important", how important is addressing psychological health and safety within ESDC? " in order to determine how much weight employees give particular services or programs.
    • A question which asks "How far along do you think ESDC is in terms of creating and sustaining a psychologically healthy and safe work environment? Use a scale from 1 to 10, where 1 is "Just getting started" and 10 is "Sustaining well established policies/programs/supports" in order go gauge employee perception of how mature ESDC is with their Mental Health strategy implementation.
    • A question which asks "Below is a list of workplace-based services and supports available to help employees cope with challenging situations and issues related to mental health. Please indicate all the services/supports of which you are aware" in order to understand which programs employees are aware of.

Risk area identification and categorization

The risk area identification has changed from the original Employee Wellness Surveys and Pulse Check Surveys (EWSPCS) PIA in the following sub-sections; privacy risk has decreased.

Risk area identification
b) Type of personal information involved and context
Only personal information, with no contextual sensitivities, collected directly from the individual or provided with the consent of the individual for disclosure under an authorized program. (this was "2" for EWSPCS, is "1" for this ESDC Statistics Act collection) 1
g) Technology and privacy
No (specific technology category was "yes" for EWSPCS and is "no" for this ESDC Statistics Act collection)

Conclusion

This assessment of the Amendment to the Employee Wellness Surveys and Pulse Check Surveys PIA & Supplement to Statistics Canada's Generic Privacy Impact Assessment – Statistics Act Employment and Social Development Canada (ESDC) Employee Wellness Survey (EWS) did not identify any privacy risks that cannot be managed using existing safeguards.

Commuting – 2021 Census promotional material

Help spread the word about 2021 Census data on commuting in Canada. These data were released on November 30, 2022.

Quick facts

  • The way Canadians commute was altered in 2021 by the pandemic, with lockdowns to slow the spread of COVID-19 and changes in how and where Canadians worked leading to 2.8 million fewer commuters, compared with five years earlier.
  • The number of Canadians "car commuting" — that is, travelling to work by car, truck or van as a driver or as a passenger—declined by 1.7 million from five years earlier to reach 11 million in May 2021. The drop in car commuting mainly occurred among those working in professional service industries, while the number of front-line workers commuting by car increased.
  • There were 245,000 fewer Canadians making car commutes of at least 60 minutes, compared with May 2016.
  • The number of people usually taking public transit to work fell from 2 million in 2016 to 1 million in May 2021, declining for the first time since the census began collecting commuting data in 1996.
  • With the economy more open and most public health measures related to the pandemic removed, the number of car commuters, at 12.8 million, had exceeded 2016 levels by May 2022. However, the number of public transit commuters, at 1.2 million, remained well below pre-COVID-19 levels.
  • Despite the drop in public transit use, the proportion of Canadians using mass transit or walking or cycling to get to work was higher than that of Americans.
  • While Canadian government investments in walking and bicycle trails continues, nearly 300,000 fewer workers were usually using active transit (walking or bicycling) as a main mode of commuting in May 2021, compared with five years earlier. By May 2022, active transit commuting in the provinces had increased to 941,000 from 788,000 in May 2021, but was still lower than the 1.1 million recorded in 2016.

Resources

Social media content

Statistics Canada encourages our community supporters to share our content and images to their own social media accounts. You can save the images to your device and copy and paste the text content to your social media platforms.

Post 1

New #2021Census data offers important insights on what getting to work in May 2021 meant for diverse groups of Canadians.

Find the newly-released data here:

bit.ly/3EI8HZf

Download image for post 1

Post 1

The number of people usually taking public transit to work fell from 2016 to 2021, declining for the first time since the census began collecting commuting data in 1996.

Learn more:

bit.ly/3EI8HZf

Download image for post 2

Post 31

With the economy more open and most public health measures removed, the number of car commuters had exceeded 2016 levels by May 2022.

Learn more:

bit.ly/3EI8HZf

Download image for post 3

Post 4

From May 2021 to May 2022, active transit commuting had increased as a main mode of commuting, but was still lower than the 1.1 million recorded in 2016.

Learn more:

bit.ly/3EI8HZf

Download image for post 4

Web images

Commuting tile (JPG, 103 KB)

Terms of use

See the terms of use for information on the approved use of official wordmarks, identifiers and content.

Date modified:

Information for respondents

Additional information

Your information may also be used by Statistics Canada for other statistical and research purposes.

Your participation in this survey is required under the authority of the Statistics Act.

Authority

Data are collected under the authority of the Statistics Act, Revised Statutes of Canada, 1985, Chapter S-19.

Confidentiality

By law, Statistics Canada is prohibited from releasing any information it collects that could identify any person, business, or organization, unless consent has been given by the respondent, or as permitted by the Statistics Act. Statistics Canada will use the information from this survey for statistical purposes only.

Data-sharing agreements

To reduce respondent burden, Statistics Canada has entered into data-sharing agreements with provincial and territorial statistical agencies and other government organizations, which have agreed to keep the data confidential and use them only for statistical purposes. Statistics Canada will only share data from this survey with those organizations that have demonstrated a requirement to use the data.

Section 11 of the Statistics Act provides for the sharing of information with provincial and territorial statistical agencies that meet certain conditions. These agencies must have the legislative authority to collect the same information, on a mandatory basis, and the legislation must provide substantially the same provisions for confidentiality and penalties for disclosure of confidential information as the Statistics Act. Because these agencies have the legal authority to compel businesses to provide the same information, consent is not requested and businesses may not object to the sharing of the data.

For this survey, there are Section 11 agreements with the provincial and territorial statistical agencies of Newfoundland and Labrador, Nova Scotia, New Brunswick, Quebec, Ontario, Manitoba, Saskatchewan, Alberta, British Columbia and the Yukon.

The shared data will be limited to information pertaining to business establishments located within the jurisdiction of the respective province or territory.

Section 12 of the Statistics Act provides for the sharing of information with federal, provincial or territorial government organizations. Under Section 12, you may refuse to share your information with any of these organizations by writing a letter of objection to the Chief Statistician, specifying the organizations with which you do not want Statistics Canada to share your data and mailing it to the following address:

Chief Statistician of Canada
Statistics Canada
Attention of Director, Investment, Science and Technology Division
150 Tunney's Pasture Driveway
Ottawa, ON
K1A 0T6

You may also contact us by email at statcan.istdinformation-distinformation.statcan@statcan.gc.ca.

For this survey, there are Section 12 agreements with the statistical agencies of Prince Edward Island, Northwest Territories and Nunavut, as well as with Public Safety Canada .

For agreements with provincial and territorial government organizations, the shared data will be limited to information pertaining to business establishments located within the jurisdiction of the respective province or territory.

Record linkage

To enhance the data from this survey and to reduce respondent burden, Statistics Canada may combine it with information from other surveys or from administrative sources.

Reporting instructions

For this questionnaire:

Please complete this questionnaire for Canadian operations of this organization.

  • Report dollar amounts in Canadian dollars.
  • Report dollar amounts rounded to the nearest dollar.
  • If precise figures are not available, provide your best estimate.
  • Enter "0" if there is no value to report.

Organization characteristics

Organization characteristics - Question identifier: 1

Which of the following does your organization currently use? Select all that apply.

  • Website for your organization
  • Social media accounts for your organization
  • E-commerce platforms and solutions
  • Web-based applications
  • Open source software
  • Cloud computing or storage
  • Internet-connected smart devices or Internet of Things (IoT)
  • Intranet
  • Blockchain technologies
  • Voice over Internet Protocol (VoIP) services
  • OR
  • Organization does not use any of the above

Organization characteristics - Question identifier: 2

What type of data does your organization store on cloud computing or storage services? Include data that are backed-up. Select all that apply.

  • Confidential employee information
  • Confidential information about customers, suppliers or partners
  • Confidential organizational information
  • Commercially sensitive information
  • Non-sensitive or public information
  • OR
  • Organization does not store data on cloud computing or storage services

Organization characteristics - Question identifier: 3

Does anyone in your organization use personally-owned devices such as smartphones, tablets, laptops or desktop computers to carry out regular work-related activities? Include devices that are subsidized by the organization.

  • Yes
  • No
  • Do not know

Cyber security environment

Cyber security environment - Question identifier: 4

Which cyber security measures does your organization currently have in place?

Include on-site and external security measures, including those provided by parent organizations or other external parties (e.g., Shared Services Canada, Treasury Board of Canada Secretariat). Select all that apply.

  • Mobile security
  • Anti-malware software to protect against viruses, spyware, ransomware, etc.
  • Web security
  • Email security
  • Network security
  • Data protection and control
  • Point-Of-Sale (POS) security
  • Software and application security
  • Hardware and asset management
  • Identity and access management
  • Physical access controls
  • OR
  • Organization does not have any cyber security measures in place
  • OR
  • Do not know

Cyber security environment - Question identifier: 5

Did any of the following parent organizations or external parties require your business or organization to implement certain cyber security measures?

Select all that apply.

  • Supplier of physical goods
  • Supplier of digitally delivered goods or services
  • Supplier of other services that are not digitally delivered
  • Customer
  • Partner
  • Canadian regulator
  • Cyber security standard or cyber security certification program
  • Federal Government lead agency, partner or service provider
  • Cyber risk insurance provider
  • OR
  • None of the above

Cyber security environment - Question identifier: 6

How many employees does your organization have that complete tasks related to cyber security as part of their regular responsibilities?

Include part-time and full-time employees. Examples of tasks these employees may complete include:

  • managing, evaluating or improving the security of networks, web presence, email systems or devices
  • patching or updating the software or operating systems used for security reasons
  • completing tasks related to recovery from previous cyber security incidents.

Exclude individuals employed by a parent organization, or external IT consultants or contractors.

If precise figures are not available, please provide your best estimate.

  • One employee
  • Two to five employees
  • 6 to 15 employees
  • Over 15 employees
  • None
  • Do not know

Cyber security environment - Question identifier: 7

What are the main reasons your organization does not have any employees that complete tasks related to cyber security as part of their regular responsibilities? Select all that apply.

  • Organization uses private sector consultants or contractors to monitor cyber security
  • Organization uses public sector consultants or contractors to monitor cyber security
  • Organization has cyber risk insurance
  • Organization is in the process of recruiting a cyber security employee
  • Organization is unable to find an adequate cyber security employee
  • Organization lacks the resources to employ a cyber security employee
  • Cyber security is not a high enough risk to the organization

Cyber security environment - Question identifier: 8

What percentage of the employees that complete tasks related to the cyber security of your organization as part of their regular responsibilities identify as the following genders? Gender refers to current gender, which may be different from sex assigned at birth and may be different from what is indicated on legal documents.

Exclude individuals employed by a parent organization, or external IT consultants or contractors.

If precise figures are not available, please provide your best estimate.

  • Female
  • Male
  • Another gender

Cyber security environment - Question identifier: 9

Did your organization share best practices or general information on cyber security risks with your employees in 2022?

Include the sharing of information through email, bulletin boards, general information sessions on subjects related to:

  • recognizing and avoiding email scams
  • importance of password complexity and basic security techniques
  • securing your web browser and safe web browsing practices
  • avoiding phishing attacks
  • recognizing and avoiding spyware.
  1. Information shared with internal IT personal
  2. Information shared with other employees
    • Yes
    • No
    • Not applicable
    • Do not know

Cyber security environment - Question identifier: 10

Did your organization provide formal training to develop or upgrade cyber security related skills of your employees or stakeholders in 2022 ? Include training provided by parent organizations or other external sources.

  1. Provided training to internal IT personnel
  2. Provided training to other employees
  3. Provided training to stakeholders such as suppliers, customers or partners
    • Yes
    • No
    • Not applicable
    • Do not know

Cyber security environment - Question identifier: 11

What are the three main reasons your organization spends time or allocates budget on cyber security measures or related skills training? Select up to three.

  • Allow employees to work remotely securely
  • Protect the reputation of the organization
  • Protect personal information of employees, suppliers, customers or partners
  • Protect trade secrets and intellectual property
  • Compliance with laws, regulations, contracts or other government organizations
  • Organization has suffered a cyber security incident previously
  • Prevent downtime and outages
  • Prevent fraud and theft
  • Secure continuity of organizational operations
  • OR
  • Organization does not spend time or money on cyber security measures or related skills training

Cyber security readiness

Cyber security readiness - Question identifier: 12

Which risk management arrangements does your organization currently have in place?

Select all that apply.

  • A written policy in place to manage internal cyber security risks
  • A written policy in place to manage cyber security risks associated with supply chain partners
  • A written policy in place to report cyber security incidents
  • Other type of written policy related to cyber security
  • A Business Continuity Plan (BCP) with processes to manage cyber security threats, vulnerabilities and risks
  • Employees with responsibility for overseeing cyber security risks and threats
  • Members of senior management with responsibility for overseeing cyber security risks and threats
  • A consultant or contractor to manage cyber security risks and threats
  • Monthly or more frequent patching or updating of operating systems for security reasons
  • Monthly or more frequent patching or updating of software for security reasons
  • Cyber risk insurance
  • OR
  • Organization does not have any risk management arrangements for cyber security

Cyber security readiness - Question identifier: 13

Which are covered under your cyber risk insurance policy? Select all that apply.

  • Direct losses from an incident
  • Restoration expenses for software, hardware, and electronic data
  • Interruptions (loss of productive time) and reputation losses
  • Third-party liability
  • Financial losses
  • Security breach remediation and notification expenses
  • Claims made by employees

Cyber security readiness - Question identifier: 14

Prior to responding to this survey, were you aware of any cyber security standards or cyber security certification programs that organizations can apply for?

Include:

  • Canadian, foreign and international standards and programs
  • standards and programs that you were aware of but your organization was not eligible for or did not apply for.

Select all that apply.

  • Cyber security standards
    • Specify which standards you were aware of
  • Cyber security certification programs
    • Specify which certification programs you were aware of
  • OR
  • Not aware of any cyber security standards or certification programs

Cyber security readiness - Question identifier: 15

Which activities does your organization undertake to identify cyber security risks?

Select all that apply.

  • Monitoring employee behaviour
  • Monitoring network and organizational systems
  • A formal assessment of cyber security risks, undertaken by an employee
  • A formal assessment of cyber security risks, undertaken by a parent organization or other external party
  • Penetration testing, undertaken by an employee
  • Penetration testing, undertaken by a parent organization or other external party
  • Assessment of the security of Internet-connected smart devices or Internet of Things (IoT) devices
  • Investment in threat intelligence
  • Complete audit of IT systems, undertaken by a parent organization or other external party
  • Organization conducts other activities to identify cyber security risks
  • OR
  • Organization does not conduct any activity to identify cyber security risks

Cyber security readiness - Question identifier: 16

How often does your organization conduct activities to identify cyber security risks? Select all that apply.

  • On a scheduled basis
  • After a cyber security incident occurs
  • When a new IT initiative or project is launched
  • On an irregular basis

Cyber security readiness - Question identifier: 17

How often is senior management in your organization given an update on actions taken regarding cyber security? Select all that apply.

  • On a scheduled basis
  • After a cyber security incident occurs
  • When a new IT initiative or project is launched
  • Senior management have tools to track cyber security issues
  • Senior management is given an update on an irregular basis
  • OR
  • Senior management is not updated on cyber security issues

Organization resiliency

Organization resiliency – Question identifier: 18

Which three cyber security risks or threats would you consider to have the most detrimental impact on your organization? Select up to three.

  • Theft or compromise of software or hardware
  • Unauthorized access, manipulation and theft of data
  • Identity theft
  • Scams and fraud
  • Improper usage of computers or network
  • Malicious software
  • Denial of Service (DoS) or Distributed Denial of Service (DDoS)
  • Disruption or defacing of web presence
  • Loss of reputation or erosion of public trust

Organization resiliency - Question identifier: 19

How concerned is your organization about its susceptibility to future cyber security risks and threats?

  • Extremely concerned
  • Very concerned
  • Somewhat concerned
  • Slightly concerned
  • Not at all concerned

Cyber security incidents

Cyber security incidents - Question identifier: 20

To the best of your knowledge, which cyber security incidents impacted your organization in 2022? Select all that apply.

  • Incidents to disrupt or deface the business or web presence
  • Incidents to steal personal or financial information
  • Incidents to steal money or demand ransom payment
  • Incidents to steal or manipulate intellectual property or organizational data
  • Incidents to access unauthorised or privileged areas
  • Incidents to monitor and track organizational activity
  • Incidents with an unknown motive
  • OR
  • Organization was not impacted by any cyber security incidents in 2022

Cyber security incidents - Question identifier: 21

In 2022, was your organization contacted by any of the following parent organizations or other external parties regarding their cyber security events because they may have involved your organization?

Select all that apply.

  • Suppliers, customers or partners
  • IT consultant or contractor
  • Persons or group that perpetrated the incidents
  • Cyber risk insurance provider
  • Police services
  • Canadian Centre for Cyber Security (Cyber Centre)
  • Office of the Privacy Commissioner
  • Regulator
  • Another government organization
  • Industry association
  • Bank or other financial institution
  • Software or service vendor
  • Other parties not mentioned above
  • OR
  • Parent organizations or other external parties did not report cyber security incidents to the organization in 2022

Cyber security incidents - Question identifier: 22

You previously indicated that parent organizations or other external parties contacted your organization about their cyber security events because they may have involved your organization in 2022. How did your organization handle those cyber security events?

Select all that apply.

  • Events were resolved internally
  • Events were resolved with the parent organization or other external party
  • Events were resolved through an IT consultant or contractor
  • Events were reported to a police service
  • Events were reported to other parents organizations or other external parties
  • Organization is currently working with the parent organization or other external party to resolve the events
  • OR
  • No action was taken by the organization

Cost of cyber security incidents

Cost of cyber security incidents - Question identifier: 23

In 2022, what was the total amount your organization spent to prevent or detect cyber security incidents? Exclude costs that were incurred specifically due to previous cyber security incidents (e.g., recovery costs from previous cyber security incidents).

If precise figures are not available, provide your best estimate in Canadian dollars.

Enter "0" if there is no value to report.

  1. Cost of employee salary related to prevention or detection
  2. Cost of training employees, suppliers, customers, or partners
  3. Cost of hiring IT consultants or contractors
  4. Cost of legal services or public relations (PR) services
  5. Cost of cyber security software
  6. Cost of hardware related to cyber security
  7. Annual cost of cyber risk insurance or equivalent
  8. Other related costs

Cost of cyber security incidents - Question identifier: 24

In 2022, what was the total cost to your organization to recover from the cyber security incidents? Exclude costs related to prevention and detection of cyber security incidents as these were asked in the previous question.

If precise figures are not available, provide your best estimate in Canadian dollars.

Enter "0" if there is no value to report.

  1. Cost of employee salary related to recovery
  2. Cost of training employees, suppliers, customers, or partners
  3. Cost of hiring IT consultants or contractors
  4. Cost of legal services or public relations (PR) services
  5. Cost of new or upgraded cyber security software
  6. Cost of new or upgraded hardware related to cyber security
  7. Increased cost of cyber risk insurance or equivalent
  8. Reimbursing suppliers, customers, or partners
  9. Fines from regulators or authorities
  10. Ransom payments
  11. Other related costs

Impact of cyber security incidents

Impact of cyber security incidents - Question identifier: 25

To the best of your knowledge, who perpetrated the cyber security incidents in 2022? Select all that apply.

Incidents to disrupt or deface the organization or web presence
Incidents to steal personal or financial information
Incidents to steal money or demand ransom payment
Incidents to steal or manipulate intellectual property or organizational data
Incidents to access unauthorised or privileged areas
Incidents to monitor and track organizational activity
Incidents with an unknown motive

  • An employee at a parent organization or other external party
  • An internal employee
  • Supplier, customer or partner
  • OR
  • Do not know

Impact of cyber security incidents - Question identifier: 26

What were the methods used by the perpetrator for the cyber security incidents? Select all that apply.

Incidents to disrupt or deface the organization or web presence
Incidents to steal personal or financial information
Incidents to steal money or demand ransom payment
Incidents to steal or manipulate intellectual property or organizational data
Incidents to access unauthorised or privileged areas
Incidents to monitor and track organizational activity
Incidents with an unknown motive

  • Exploiting software, hardware, or network vulnerabilities
  • Hacking or password cracking
  • Identity theft
  • Scams and fraud
  • Ransomware
  • Other malicious software
  • Denial of Service (DoS) or Distributed Denial of Service (DDoS)
  • Disruption or defacing of web presence
  • Abuse of access privileges by a current or former internal party
  • Other
  • OR
  • Do not know

Impact of cyber security incidents - Question identifier: 27

You previously indicated that your organization has cyber risk insurance. Did your organization attempt to make a claim on that policy after the cyber security incidents in 2022? Select all that apply.

  • Yes, we successfully made a claim against the organization's cyber risk insurance
  • Yes, we attempted to make a claim against the organization's cyber risk insurance but were unsuccessful
  • Yes, we attempted to make a claim against the organization's cyber risk insurance and it is still in progress
  • OR
  • No, we have not attempted to make a claim for any of the cyber security incidents

Impact of cyber security incidents - Question identifier: 28

How was your organization impacted by the cyber security incidents in 2022?

Select all that apply.

  • Loss of revenue
  • Loss of suppliers, customers, or partners
  • Additional repair or recovery costs
  • Prevented the use of resources or services
  • Prevented employees from carrying out their day-to-day work
  • Additional time required by employees to complete their day-to-day work
  • Damage to the reputation of the organization or erosion of public trust
  • Fines from regulators or authorities
  • Discouraged organization from carrying out a future activity that was planned
  • Minor incidents, impact was minimal to the organization
  • Other
  • OR
  • Do not know

Impact of cyber security incidents - Question identifier: 29

As a result of cyber security incidents, approximately how many hours of downtime did your organization experience in 2022?

Include:

  • total downtime for mobile devices, desktops and networks
  • time periods during which there was either reduced activity or inactivity of employees or the organization.

If precise figures are not available, provide your best estimate.

  • Hours
  • OR
  • Organization did not experience any downtime in 2022
  • OR
  • Do not know

Cyber security incidents reporting

Cyber security incidents reporting - Question identifier: 30

Did your organization report any cyber security incidents to a police service in 2022?

Include all levels of police service including federal, provincial, territorial, municipal and Indigenous.

  • Yes
  • No
  • Do not know

Cyber security incidents reporting - Question identifier: 31

Which cyber security incidents did your organization report to a police service in 2022?

Select all that apply.

  • Incidents to disrupt or deface the organization or web presence
  • Incidents to steal personal or financial information
  • Incidents to steal money or demand ransom payment
  • Incidents to steal or manipulate intellectual property or organizational data
  • Incidents to access unauthorised or privileged areas
  • Incidents to monitor and track organizational activity
  • Incidents with an unknown motive

Cyber security incidents reporting - Question identifier: 32

What were the reasons for reporting incidents to a police service in 2022? Select all that apply.

  • To reduce the damage caused by the incidents
  • To lower the probability of other organizations being impacted by the same incidents
  • To help catch the perpetrators
  • To fulfill the requirements of customers, suppliers, partners, regulators, cyber security standards or cyber security certification programs
  • Other
    • Specify other reasons

Cyber security incidents reporting - Question identifier: 33

What were the reasons for not reporting some or all of the cyber security incidents to a police service in 2022?

Select all that apply.

  • Incidents were resolved internally
  • Incidents were resolved through an IT consultant or contractor
  • To protect the reputation of the organization or stakeholders
  • Did not want to spend more time or money on the issue
  • Police service would not consider incidents important enough
  • Police service was unsatisfactory in the past
  • Unsure of where or how to report
  • Reporting process is too complicated
  • Did not think the perpetrator would be convicted or adequately punished
  • Minor incidents, not important enough for organization
  • Lack of evidence
  • Did not think of contacting a police service
  • OR
  • Organization reported all cyber security incidents to a police service in 2022

Cyber security incidents reporting - Question identifier: 34

Excluding police services, which parent organization or other external party did your organization report the cyber security incidents to in 2022?

Select all that apply.

  • Suppliers, customers or partners
  • IT consultant or contractor
  • Cyber risk insurance provider
  • Canadian Centre for Cyber Security (Cyber Centre)
  • Office of the Privacy Commissioner
  • Canadian Anti-Fraud Centre (CAFC)
  • Other government department or agency
  • Regulator
  • Industry association
  • Bank or other financial institution
  • Software or service vendor
  • OR
  • Organization did not report any cyber security incidents to a parent organization or other external parties in 2022

Cyber security incidents reporting - Question identifier: 35

What were the reasons for not reporting some or all the of the cyber security incidents to a parent organization or other external party in 2022?

Select all that apply.

  • Incidents were reported to a police service only
  • Incidents were resolved internally
  • To keep knowledge of the incidents internal
  • To protect the reputation of the organization or stakeholders
  • Lack of evidence
  • No benefit to reporting
  • Minor incidents, not important enough for organization
  • Did not think of reporting the incidents to a parent organization or other external party
  • OR
  • Organization reported all cyber security incidents to a parent organization or other external parties in 2022

Cyber security incidents reporting - Question identifier: 36

In responding to the cyber security incidents in 2022, which parent organizations or external parties did your organization contact for information or advice?

Select all that apply.

  • Suppliers, customers or partners
  • IT consultant or contractor
  • Cyber risk insurance provider
  • Legal services
  • Police services
  • Canadian Centre for Cyber Security (Cyber Centre)
  • Office of the Privacy Commissioner
  • Canadian Anti-Fraud Centre (CAFC)
  • Other Government department or agency
  • Regulator
  • Industry association
  • Bank or other financial institution
  • Software or service vendor
  • Internet community
  • Family, friends, or acquaintances
  • Computer repair shop
  • OR
  • Organization did not contact any parent organizations or external parties in 2022

Notification of intent to extract web data

Notification of intent to extract web data - Question identifier: 37

What is this organization's website address?

We may also visit this organization's website to search for additional publicly available information using automated methods, being careful not to impede the functionality of the website.

  • Website address

Current cyber security trends

Current cyber security trends - Question identifier: 38

In 2022, what was the total value of ransom payments made by your organization?

  • More than $0, but less than or equal to $10,000
  • More than $10,000, but less than or equal to $50,000
  • More than $50,000, but less than or equal to $100,000
  • More than $100,000, but less than or equal to $250,000
  • More than $250,000, but less than or equal to $500,000
  • More than $500,000
  • The organization did not make ransom payments in 2022
  • Do not know

Current cyber security trends - Question identifier: 39

In 2022, did your organization make ransom payments using cryptocurrency?

  • Yes
  • No
  • Do not know

Current cyber security trends - Question identifier: 40

In 2022, which parent organizations or external parties did your organization work with to resolve ransomware incidents?

Include all parent organizations or external parties your organization reported the ransomware incident to.

Select all that apply.

  • IT consultant or contractor
  • Cyber risk insurance provider
  • Royal Canadian Mounted Police (RCMP)
  • Other police services
  • Canadian Centre for Cyber Security (Cyber Centre)
  • Canadian Anti-Fraud Centre (CAFC)
  • Office of the Privacy Commissioner
  • Other parent organizations or external parties
  • OR
  • The organization did not work with parent organizations or external parties to resolve ransomware incidents in 2022
  • OR
  • Do not know

Current cyber security trends - Question identifier: 41

Why does your organization not have cyber risk insurance?

Select all that apply.

  • The organization's existing insurance policies cover cyber security risks
  • The cost of cyber risk insurance is too high
  • The organization's existing cyber security measures provide enough protection that cyber risk insurance is unnecessary
  • The organization had no cyber security risks
  • The organization has not considered obtaining cyber risk insurance
  • Not applicable to this organization
  • Other reasons for not having cyber risk insurance
  • OR
  • Do not know

Current cyber security trends - Question identifier: 42

Which of the following population groups do your organization's cyber security employees belong to?

Select all that apply.

  • White
  • Indigenous
  • Visible minority
  • OR
  • Do not know

Current cyber security trends - Question identifier: 43

What are the highest academic certificates, diplomas or degrees your organization's cyber security employees hold?
Select the highest academic certificate, diploma or degree that each cyber security employee holds.

  • Less than high school diploma or its equivalent
  • High school diploma or a high school equivalency certificate
  • Trades certificate or diploma
  • College, CEGEP or other non-university certificate or diploma (other than trades certificates or diplomas)
  • University certificate or diploma below the bachelor's level
  • Bachelor's degree
  • University certificate, diploma or degree above the bachelor's level
  • OR
  • Do not know

Current cyber security trends - Question identifier: 44

What cyber security certifications do your organization's cyber security employees hold?

Include certifications that are no longer active.
Exclude academic certificates, diplomas or degrees.

Select all that apply.

  • Certified Ethical Hacker
  • Certified Information Security Manager
  • Certified Information Systems Professional
  • GIAC Security Expert
  • Security+
  • Other certifications
  • OR
  • None
  • OR
  • Do not know

Current cyber security trends – Question identifier: 45

Which qualification does your organization value the most when evaluating a potential new cyber security employee?

  • Experience working in cyber security
  • Academic certificates, diplomas or degrees related to cyber security
  • Cyber security certifications
  • Other cyber security training
  • Other qualifications
    • Specify other qualifications (text box)
  • Organization has never attempted to hire a cyber security employee
  • Do not know

Current cyber security trends – Question identifier: 46

In 2022, did your organization encounter any challenges finding qualified cyber security employees or retaining existing cyber security employees?

Select all that apply.

  • Challenges finding qualified cyber security employees
  • Challenges retaining cyber security employees
  • OR
  • The organization did not encounter any challenges finding or retaining qualified cyber security employees in 2022
  • OR
  • Do not know

Current cyber security trends – Question identifier: 47

What challenges did your organization encounter when hiring cyber security employees in 2022?

Select all that apply.

  • Applicants lacking skills
  • Applicants lacking experience
  • Salary requests too high
  • Not enough time or resources for effective recruitment
  • Lack of candidate interest in the position
  • Other challenges
    • Specify other challenges (text box)
  • OR
  • Do not know

Current cyber security trends – Question identifier: 48

For which reasons did cyber security employees leave your organization in 2022?

Select all that apply.

  • Recruited by other organization
  • Limited internal promotion or development opportunities
  • High stress levels at work
  • Lack of flexibility (work-life balance)
  • Better salary
  • Other reasons
    • Specify other reasons (text box)
  • OR
  • No cyber security employees left the organization in 2022
  • OR
  • Do not know

Quarterly Financial Report for the quarter ended September 30, 2022

Statement outlining results, risks and significant changes in operations, personnel and program

A) Introduction

Statistics Canada's mandate

Statistics Canada ("the agency") is a member of the Innovation, Science and Industry portfolio.

Statistics Canada's role is to ensure that Canadians have access to a trusted source of statistics on Canada that meets their highest priority needs.

The agency's mandate derives primarily from the Statistics Act. The Act requires that the agency collects, compiles, analyzes and publishes statistical information on the economic, social, and general conditions of the country and its people. It also requires that Statistics Canada conduct the census of population and the census of agriculture every fifth year and protects the confidentiality of the information with which it is entrusted.

Statistics Canada also has a mandate to co-ordinate and lead the national statistical system. The agency is considered a leader, among statistical agencies around the world, in co–ordinating statistical activities to reduce duplication and reporting burden.

More information on Statistics Canada's mandate, roles, responsibilities and programs can be found in the 2022-2023 Main Estimates and in the Statistics Canada 2022-2023 Departmental Plan.

The Quarterly Financial Report:

  • should be read in conjunction with the 2022-2023 Main Estimates;
  • has been prepared by management, as required by Section 65.1 of the Financial Administration Act, and in the form and manner prescribed by Treasury Board of Canada Secretariat;
  • has not been subject to an external audit or review.

Statistics Canada has the authority to collect and spend revenue from other federal government departments and agencies, as well as from external clients, for statistical services and products.

Basis of presentation

This quarterly report has been prepared by management using an expenditure basis of accounting. The accompanying Statement of Authorities includes the agency's spending authorities granted by Parliament and those used by the agency consistent with the Main Estimates for the 2022-2023 fiscal year. This quarterly report has been prepared using a special purpose financial reporting framework designed to meet financial information needs with respect to the use of spending authorities.

The authority of Parliament is required before moneys can be spent by the Government. Approvals are given in the form of annually approved limits through appropriation acts or through legislation in the form of statutory spending authority for specific purposes.

The agency uses the full accrual method of accounting to prepare and present its annual departmental financial statements that are part of the departmental results reporting process. However, the spending authorities voted by Parliament remain on an expenditure basis.

B) Highlights of fiscal quarter and fiscal year-to-date results

This section highlights the significant items that contributed to the net decrease in resources available for the year, as well as actual expenditures for the quarter ended September 30.

Comparison of gross budgetary authorities and expenditures as of September 30, 2021, and September 30, 2022, in thousands of dollars
Description for Chart 1: Comparison of gross budgetary authorities and expenditures as of September 30, 2021, and September 30, 2022, in thousands of dollars

This bar graph shows Statistics Canada's budgetary authorities and expenditures, in thousands of dollars, as of September 30, 2021 and 2022:

  • As at September 30, 2021
    • Net budgetary authorities: $880,572
    • Vote netting authority: $120,000
    • Total authority: $1,000,572
    • Net expenditures for the period ending September 30: $560,849
    • Year-to-date revenues spent from vote netting authority for the period ending September 30: $33,338
    • Total expenditures: $594,187
  • As at September 30, 2022
    • Net budgetary authorities: $617,492
    • Vote netting authority: $120,000
    • Total authority: $737,492
    • Net expenditures for the period ending September 30: $384,638
    • Year-to-date revenues spent from vote netting authority for the period ending September 30: $19,201
    • Total expenditures: $403,839

Description for Table A: Departmental expenditures by Standard Object (unaudited)

This table displays the variance of departmental expenditures by standard object between fiscal 2021-2022 and 2022-2023.  The variance is calculated for year to date expenditures as at the end of the second quarter. The row headers provide information by standard object. The column headers provide information in thousands of dollars and percentage variance for the year to date variation.

Description for Appendix A: Statement of authorities (unaudited)

This table displays the departmental authorities for fiscal years 2021-2022 and 2022-2023. The row headers provide information by type of authority, Vote 105 – Net operating expenditures, Statutory authority and Total Budgetary authorities. The column headers provide information in thousands of dollars for Total available for use for the year ending March 31; used during the quarter ended September 30; and year to date used at quarter-end of both fiscal years.

Description for Appendix B: Departmental expenditures by Standard Object (unaudited)

This table displays the departmental expenditures by standard object for fiscal years 2021-2022 and 2022-2023. The row headers provide information by standard object for expenditures and revenues. The column headers provide information in thousands of dollars for planned expenditures for the year ending March 31; expended during the quarter ended September 30; and year to date used at quarter-end of both fiscal years.

Chart 1 outlines the gross budgetary authorities, which represent the resources available for use for the year as of September 30.

Significant changes to authorities

Total authorities available for 2022-23 have decreased by $263.1 million, or 26.3%, from the previous year, from $1,000.6 million to $737.5 million (Chart 1). The net decrease is mostly the result of the following:

  • A decrease of $293 million for the 2021 Census of Population and Census of Agriculture programs due to the cyclical nature of funding winding down in 2022–2023;
  • An increase of $36.8 million for the Disaggregated Data Action Plan;
  • An increase of $6.8 million for collective bargaining;
  • An increase of $28.1 million for various initiatives including Census of Environment, Quality of Life Framework for Canada, Cost Recovery & Census Program Integrity, and Supporting Access to Sexual and Reproductive Health Care Information and Services.

In addition to the appropriations allocated to the agency through the Main Estimates, Statistics Canada also has vote net authority within Vote 1, which entitles the agency to spend revenues collected from other federal government departments, agencies, and external clients to provide statistical services. The vote netting authority is stable at $120 million when comparing the second quarter of fiscal years 2021-2022 and 2022-2023.

Significant changes to expenditures

Year-to-date net expenditures recorded to the end of the second quarter decreased by $176.2 million, or 31.4% from the previous year, from $560.8 million to $384.6 million (see Table A: Variation in Departmental Expenditures by Standard Object).

Statistics Canada spent approximately 63% of its authorities by the end of the second quarter, compared with 63.7% in the same quarter of 2021-2022.

Table A: Variation in Departmental Expenditures by Standard Object (unaudited)
Departmental Expenditures Variation by Standard Object: Q2 year-to-date variation between fiscal year 2021-2022 and 2022-2023
$'000 %
(01) Personnel -9,330 -2.6
(02) Transportation and communications -46,099 -86.3
(03) Information -12,628 -78.7
(04) Professional and special services -118,754 -86.0
(05) Rentals -3,085 -17.1
(06) Repair and maintenance -558 -67.8
(07) Utilities, materials and supplies -220 -36.9
(08) Acquisition of land, buildings and works - N/A
(09) Acquisition of machinery and equipment -395 -14.6
(10) Transfer payments - N/A
(12) Other subsidies and payments 721 126.9
Total gross budgetary expenditures -190,348 -32.0
Less revenues netted against expenditures:
Revenues -14,137 -42.4
Total net budgetary expenditures -176,211 -31.4
Note: Explanations are provided for variances of more than $1 million.

Personnel: There is an overall decrease in the agency's activities as the 2021 Census was in its main operational period last fiscal year. This decrease is partly offset by the increase in salary spending due the Budget 2021 Initiatives that started towards the end of 2021-22.

Transportation and communications: The decrease is mainly due to postage costs for the mailing of Census questionnaires and related materials and travel expenditures for enumerators for 2021 Census collection which occurred last fiscal year.

Information: The decrease is mainly due to printing costs for the 2021 Census materials which occurred last fiscal.

Professional and special services: The decrease is mainly due to the remuneration of Statistics Act employees hired to conduct the 2021 Census.

Rentals: The overall decrease is mainly due to the building space rentals related to the census operations as they are winding down in 2022-2023. This decrease is partly offset by the increase of the Software Licenses and Maintenance Fees for the GCDocs Licenses caused by a timing difference in invoicing compared to last year.

Revenues: The decrease is mainly due to a timing difference in invoicing compared to last year.

C) Significant changes to operations, personnel and programs

In 2022–2023, Statistics Canada will continue processing and analysing Census data, and disseminating the remaining major 2021 Census data releases. Six data releases are planned in 2022-23. For the Census of Population, four releases took place so far (April, July, August and September) and the others are scheduled in October and November 2022. There are seven major 'themed' release dates for the dissemination of data from the 2021 Census of Population (2021 Census dissemination planning: Release plans). The Census of Agriculture took place in May of 2021. This contrasts with last year, when Statistics Canada focused on data collection and processing activities of the 2021 Census program.

The agency is managing other changes in operations and program activities with financial implications including:

  • Continued effort and collaboration to provide data and insights related to the impact of the pandemic on the society and economy;
  • New initiatives announced in the Budget 2021 are ramping up and activities related to those initiatives are on track;
  • Increase in revenues due to cyclical programs and restoring paused programs post pandemic.

D) Risks and uncertainties

Statistics Canada will address the issues and corresponding uncertainties raised in this Quarterly Financial Report by implementing corresponding risk mitigation measures captured in the 2022-23 Corporate Risk Profile and at the program level.

Statistics Canada continues to pursue and invest in modernizing business processes and tools to maintain its relevance and maximize the value it provides to Canadians. To address uncertainties, the agency is implementing the Census of Environment, the Quality of Life Framework for Canada and the Disaggregated Data Action Plan initiatives to meet the evolving needs of users and remain relevant as an agency.

Statistics Canada requires a skilled workforce to achieve its objectives; however, it is difficult to compete with other organizations in the data ecosystem and the current labour market situation. To address uncertainties, Statistics Canada proactively recruits from universities and colleges across Canada promoting a strong workplace culture, a healthy work-life balance and put forward the Equity, Diversity and Inclusion Action Plan. In addition, the Integrated Business and Human Resources plan targets attracting talented employees with an increased focus on diversity, inclusion and official languages.

Statistics Canada is collaborating with federal partners to access IT services and support to realise its modernization objectives and transition its infrastructure and applications to the Cloud, while incurring minimal impact to activities and costs. To address uncertainties, the agency is working closely with its federal partners, while adhering to the agency's notable financial planning management practices and integrated strategic planning framework.

Approval by senior officials

Approved by:

Anil Arora
Chief Statistician
Ottawa, Ontario
November 24, 2022

Kathleen Mitchell
Acting Chief Financial Officer
Ottawa, Ontario
November 24, 2022

Appendix

Statement of Authorities (unaudited)
  Fiscal year 2022-2023 Fiscal year 2021–2022
Total available for use for the year ending March 31, 2023Table note * Used during the quarter ended September 30, 2022 Year-to-date used at quarter-end Total available for use for the year ending March 31, 2022Table note * Used during the quarter ended September 30, 2021 Year-to-date used at quarter-end
in thousands of dollars
Vote 1 — Net operating expenditures 537,525 179,360 344,655 794,138 242,754 520,295
Statutory authority — Contribution to employee benefit plans 79,967 19,992 39,983 86,434 20,277 40,554
Total budgetary authorities 617,492 199,352 384,638 880,572 263,031 560,849
Table note *

Includes only Authorities available for use and granted by Parliament at quarter-end.

Return to the first table note * referrer

Departmental budgetary expenditures by Standard Object (unaudited)
  Fiscal year 2022-2023 Fiscal year 2021–2022
Planned expenditures for the year ending March 31, 2023 Expended during the quarter ended September 30, 2022 Year-to-date used at quarter-end Planned expenditures for the year ending March 31, 2022 Expended during the quarter ended September 30, 2021 Year-to-date used at quarter-end
in thousands of dollars
Expenditures:
(01) Personnel 616,003 183,705 354,558 663,309 186,653 363,888
(02) Transportation and communications 17,064 3,734 7,320 72,692 18,122 53,419
(03) Information 13,135 2,079 3,418 27,902 11,290 16,045
(04) Professional and special services 52,156 11,063 19,349 205,167 62,863 138,104
(05) Rentals 24,931 4,828 14,956 18,503 9,062 18,041
(06) Repair and maintenance 690 111 265 779 734 823
(07) Utilities, materials and supplies 2,523 162 377 1,922 377 597
(08) Acquisition of land, buildings and works 807 - -  756 - -
(09) Acquisition of machinery and equipment 10,115 734 2,307 9,485 1,162 2,702
(10) Transfer payments - - - - - -
(12) Other subsidies and payments 68 463 1,289  57 438 568
Total gross budgetary expenditures 737,492 206,879 403,839 1,000,572 290,701 594,187
Less revenues netted against expenditures:
Revenues 120,000 7,526 19,201 120,000 27,670 33,338
Total revenues netted against expenditures 120,000 7,526 19,201 120,000 27,670 33,338
Total net budgetary expenditures 617,492 199,353 384,638 880,572 263,031 560,849

Residential and Non-residential Property Assessment Values at Current Prices, 2021

Investment, Science, and Technology Division

Table of Contents

  1. Introduction
  2. Key definitions
    1. Price base date
    2. Volume state date
    3. Residential property
    4. Non-residential property
    5. Properties subject to municipal, provincial, territorial and federal payment-in-lieu
  3. Input data
    1. Data sources
    2. Unit reported
  4. Auxiliary Data
    1. Multiple Listing Service data
    2. Building permit and investment in construction data
    3. Census of Population
    4. Census of Agriculture
    5. List of CSDs from the Data Integration Infrastructure Division
  5. Classification
    1. Geography
    2. Type of Property
  6. Imputation for missing data
    1. Imputation of residential values
    2. Imputation of non-residential values
  7. Price adjustments
    1. Choice of Source Data Vintage
    2. Jurisdictions that are not price adjusted
    3. Residential Price adjustment
      1. Modelling of residential assessment data
      2. Modelling of MLS monthly resale values
      3. Residential price index for Nunavut
    4. Non-residential price adjustment
      1. Modelling of non-residential assessment data
      2. Discount Factor applied to MLS Polynomial Trend series
      3. Discount factor applied to Nunavut price index
    5. Calculating the price adjusted value
  8. Volume adjustments
    1. Residential volume adjustments
    2. Non-residential volume adjustments
  9. Removals and adjustments in accordance with typical property assessment and taxation practices
    1. Removal of CSDs on account of First Nations and other Aboriginal Groups
    2. Exclusion of exempt residential property
    3. Exclusions of schools, churches and hospitals
    4. Removal of properties subject to provincial-territorial and municipal payments-in-lieu of taxes
    5. Adjustments in the Northwest Territories and Nunavut
    6. Removal of machinery and equipment values in Alberta, Northwest Territories and Nunavut
    7. Removal of personal property values in Manitoba
    8. Mixed-use properties
  10. Quality control
    Annex 1. List of CSD types representing First Nations and other Aboriginal Groups
    Annex 2. List of Provinces and Territories with Microdata in tax year 2021

1. Introduction

The Property Values Program produces annual estimates of assessment values of properties at current prices across Canada. Finance Canada uses these estimates to determine fiscal capacity with respect to property taxes for the Equalization program and the Territorial Formula Financing (TFF) program. Footnote 1 In order to ensure comparability of the data, a number of adjustments are made, including: coding property categories to a common classification; adjusting to a common price base date and volume state (or stock) date; and imputation of missing property values in some areas. Additionally, other removals and adjustments are carried out in order to produce estimates of assessment values at current price that meet the requirements to determine fiscal capacity.

This document presents these adjustments in more detail.

2. Key definitions

a. Price base date Footnote 2

The price base date (also called the valuation date) corresponds to a fixed point in time as of when a property is valued.

b. Volume state date

The volume state date is the fixed point in time as of when the stock of properties is recorded, which also corresponds to the date where all properties are represented in an assessment roll data file.

c. Residential property

Defined as all types of property categorized as residential for assessment purposes in the majority of provinces and territories. It includes single and multi-unit properties, farm residences, cottages and vacation homes, mobile homes, and vacant lands which are lawfully usable for residential purposes.

d. Non-residential property

Defined as all types of property categorized as non-residential for assessment purposes in the majority of provinces and territories. It includes industrial, commercial and institutional properties, engineering construction and mining properties, and vacant lands which are lawfully usable for non-residential purposes.

Agricultural properties Footnote 3 (not including farm residences, which are part of residential property) as well as machinery and equipment properties are excluded from final estimates.

e. Properties subject to municipal, provincial, territorial and federal payment-in-lieu

Defined as municipal, provincial, territorial and federal government-owned property for which owners remit payment-in-lieu of tax to municipal governments or local taxation authorities for receiving municipal services. A payment-in-lieu of taxes is made to compensate a local government for some or all of the tax revenue that it loses because of the nature of the ownership or use of a particular piece of real property. Usually, no property tax is collected for buildings owned by government.

3. Input data

a. Data sources

Assessment data are collected from provincial, territorial and municipal assessment entities and are based on municipal assessment rolls. Data providers agree to provide the data on a regular basis either through formal agreements or responding per data request.

Starting in January 2018, assessment roll microdata is gradually being received from every jurisdiction, to replace the use of assessment roll aggregate data. See Annex 2.

b. Unit reported

Data are reported either at the municipality level, or at property or sub-property level.

4. Auxiliary Data

a. Multiple Listing Service data

Multiple Listing Service (MLS) data are produced by the Canadian Real Estate Association (CREA). The data are obtained via Haver Analytics, a company that is the sole distributer of CREA MLS data. MLS data are for resale homes and are comprised of dollar volume sales and number of units sold by real estate board. Data are available for all provinces and territories with the exception of Québec and Nunavut.

b. Building permit and investment in construction data

Data on the number of residential and non-residential building permits issued, investment in construction completion, by type of work (e.g., new unit, conversion, etc.), is obtained from Statistics Canada's Building and Demolition Permits (BDP) and Investment programs. The data are produced monthly, by jurisdiction.

c. Census of Population

Data from Census of population are available every five years. Between census years, yearly values, referred to as "Intercensal" values, are derived using linear interpolation. Footnote 4 These values are used at various stages of the production cycle such as for the imputation of missing values and for the estimation of farm residences.

d. Census of Agriculture

Similar to the Census of population, data from Census of Agriculture are available every five years. Yearly values ("Intercensal" values) are also derived using linear interpolation and used during the production cycle. Census of Agriculture values are used to estimate the values of farm residences in Ontario, Saskatchewan and British Columbia, provinces where such values are embedded in totals or are missing.

e. List of CSDs from the Data Integration Infrastructure Division

The list of Census Subdivisions (CSD) is produced, maintained and updated annually by the Data Integration Infrastructure Division at Statistics Canada.

5. Classification

a. Geography

The municipalities covered by the collected data are assigned to Census Subdivisions (CSDs) updated annually by Statistics Canada's Data Integration Infrastructure Division, using the Standard Geographical Classification system. The assignment of CSDs is revised yearly to reflect changes (municipal amalgamations, legal status changes, etc.) that occur during the year.

CSDs containing First Nations or other autonomous or self-governing areas are out of scope for Fiscal Arrangements purposes (see Annex 1); consequently, estimates are not produced for these CSDs.

b. Type of Property

The Type of Property Classification was reviewed to improve comparability of the data amongst provinces and territories. The classification of properties is more precise when more details are available in the data.

6. Imputation for missing data

There exist municipalities or regions that are not assessed by provincial or territorial assessment bodies, and therefore no property taxes are levied. As a result, assessment values are missing for some jurisdictions, mostly in unorganized areas. Footnote 5 Additionally, on occasion, some municipalities submit their assessment values to assessment bodies later than when the data are required. Missing property assessment values for these municipalities are imputed.

For taxation year 2021, there were 148 jurisdictions with missing data that were imputed, 138 of which were in Newfoundland-and-Labrador, 8 were in Northwest Territories and 2 were in Saskatchewan.

a. Imputation of residential values

The imputed residential value for a CSD is calculated by multiplying the number of private dwellings by the average value of owner-occupied dwellings for the CSD from the intercensal Census of Population file.

In order to produce an imputed value that best reflects the desired price base and volume state dates:

  • the number of private dwellings value is taken from the yearly intercensal file of the same year as the volume state date of the raw file; and
  • the average value of owner-occupied dwellings is taken from the yearly intercensal file or derived from assessed values of the same year as the price base date of the raw file.

The resulting imputed values are then processed and adjusted Footnote 6 using the same methodology as for raw values.

b. Imputation of non-residential values

Unlike the imputation for residential property values where dwelling values from intercensal files can be used to estimate the value of residential properties, no similar direct indicator is available for non-residential properties. Therefore, non-residential values are imputed using data of CSDs with similar Census population counts within the same province or territory.

Ratios of the total non-residential values over the total population are calculated using data from CSDs for each population class (see table 1 below) for each province and territory. These ratios Footnote 7 are then applied to the population count of the missing CSD to derive the imputed non-residential value. Most of the missing CSDs are from rural areas.

Table 1 – Population class used for imputation on non-residential values Footnote 8
Population Class Description
1 Rural
2 Small Sized Municipalities
3 Medium Sized Municipalities
4 Large Sized Municipalities

7. Price adjustments

Due to differences in assessment practices and frequency of revaluation practices, data received do not always align with the target price base date of July 1 of the year preceding the taxation year.

a. Choice of Source Data Vintage

In order to minimize price adjustments, the data from the file whose price base date most closely aligns with the target price base date is used to produce the estimates of a given taxation year. In the event that two input files have the same time interval between their price base date and the target price base date, the file with the closest volume state date is selected.

b. Jurisdictions that are not price adjusted

The following provinces do not undergo price adjustments since their price base date corresponds to the desired target price base dates:

  • Quebec
  • Alberta
  • British Columbia

c. Residential Price adjustment

i. Modelling of residential assessment data

MLS resale values are used in the reassessment of properties by assessment agencies, however they are not the only information that are used. Other information such as demolition/construction permits, renovation permits, construction costs, and other indicators are used in their complex modelling methodology. Also, MLS resale values are a subset of all residential property values as they exclude private sales as well as properties that have not sold in many years. By consequence, although they are a good indicator, MLS resale values do not always closely follow assessment values price movements.

Statistics Canada does not attempt to replicate the complex modelling of assessment agencies, but rather favours the use of price indices to price adjust assessment values to the target price base date.

For certain provinces, reassessments occur yearly or on a frequent basis and the target price base date is close to the price base date of the data received. To make better use of the assessment data collected since the onset of this program and to improve the quality of estimates, a price index is generated by calculating the polynomial trendFootnote 9 of average values by property classes. Using average values excludes the effect due to yearly changes in volume (new construction and demolition) and help isolate price movements. Such an index is called Assessment Roll Trend (AR Trend). This modelling is performed at the provincial level.

This method is used in the following provinces:

  • Newfoundland
  • Prince Edward Island
  • Nova Scotia
  • New Brunswick

ii. Modelling of MLS monthly resale values

For remaining provinces and territories (except Nunavut), in order to represent yearly price movements, a price index is generated by calculating the polynomial trend of seasonally adjusted MLS monthly average resale values. These polynomial trend series are calculated by MLS jurisdiction and applied by CSD.

This method is used in the following provinces and territories:

  • Ontario
  • Manitoba
  • Saskatchewan
  • Yukon
  • Northwest Territories

iii. Residential price index for Nunavut

As resale data do not exist for Nunavut, Statistics Canada uses data for the region of northern Quebec Footnote 10 as a proxy for this territory. Footnote 11 The property assessment data are provided by the provincial Government of Quebec.

The Nunavut residential index is calculated using an unweighted average of residential and non-residential property values reported. Footnote 12

An annual series is generated and converted into a monthly series by adding one twelfth of the dollar difference between two observations to each successive month between observed values (linear interpolation), creating a monthly index. Residential price-adjustments are then applied to Nunavut property values using the same algorithm (for ratios) designed for resale data.

d. Non-residential price adjustment

Unlike residential properties, non-residential properties (more specifically industrial, commercial, and industrial (ICI)) are not often for sale. It is therefore comparatively more difficult to find appropriate market indicators to use for non-residential price adjustment. To overcome this, the correlation between residential and non-residential price changes was analysed.

A regression analysis was performed, and a model was constructed using assessment data from four provinces: Prince Edward Island, New Brunswick, Quebec, and British Columbia. The reasons for using these specific four provinces are twofold: (1) these provinces evaluate their property stock on an annual basis Footnote 13 and (2) they report data for both assessment values and numbers of properties. This level of detail allowed the derivation of the annual non-residential price movements. The conclusion was to use the model coefficient of 0.73336 as a discount factor to the residential series.

The Discount Factor methodology was satisfactory for several years, while MLS resale values observed a constant behaviour compared to non-residential values. However, over the last 3 years, the correlation between residential and non-residential values became weaker. This combined with the fact that assessment data was collected since 2006, it became realistic to favour the development of the Polynomial Trend of Assessment Data (AR Trend) methodology to replace the Discount Factor methodology, where possible.

i. Modelling of residential assessment data

Similar to the modelling of residential assessment data, non-residential assessment data is modelled using polynomial trend of average values by broad property types.

This method is used in:

  • Newfoundland (provincial level)
  • Prince Edward Island (provincial level)
  • Nova Scotia (provincial level)
  • New Brunswick (provincial level)
  • Ontario (separate modelling for Toronto and rest of province)
  • Manitoba (separate modelling for Winnipeg and rest of province)

ii. Discount Factor applied to MLS Polynomial Trend series

For remaining provinces and territories (except Nunavut), it is not possible to model the assessment data as the reassessments cycle is long and there is not yet enough source data for modelling. In these cases, the discount factor is applied to the MLS polynomial trend series to price adjust the non-residential property values. In future, it may become possible to update this methodology, as more assessment data is received.

This method is used in:

  • Saskatchewan
  • Yukon
  • Northwest Territories

iii. Discount factor applied to Nunavut price index

Similarly, the discount factor is applied to the Nunavut residential price index.

e. Calculating the price adjusted value

The price adjustment ratio is calculated by taking the value of the index value representing the month of the target price date over the index value for the month of the price base date of the source data. This price adjustment ratio is then applied to the assessment value to yield the adjusted value.

Price Adjustment Ratio Target Price Base Date INDEX VALUE Price Base Date INDEX VALUE

Price Adjusted Value Price Adjustment Ratio x Assessment Value

8. Volume adjustments

Volume adjustments ensure that properties reflect a common volume state date of January 1st of the taxation year. For assessment data that reflects a volume state date earlier or later than the target volume state date, the value of all completed construction that occurred in the period between the two dates is estimated using Statistics Canada's monthly Building and Demolition Permits (BDP) Program or from the Investment Program and then added or subtracted, as the case may be, from the total property values. This methodology is used for both residential and non-residential property values.

a. Residential volume adjustments

For residential properties, the volume adjustment is calculated by estimating the construction that was completed in between the volume state date and the target volume state date using the investment in construction completion values.

Construction completion values represent the total investment in construction available upon completion of construction. Monthly values that fall between the volume state date and the target volume state date are summed for an estimated total volume adjustment for the period. Residential volume adjustments account for approximately 2% of total values.

b. Non-residential volume adjustments

As for residential volume adjustments, non-residential investment in construction completion values are used in the calculations of volume adjustments. Non-residential volume adjustments account for approximately 2% of total values.

9. Removals and adjustments in accordance with typical property assessment and taxation practices

a. Removal of CSDs on account of First Nations and other Aboriginal Groups

Census subdivisions containing First Nations reserves, and autonomous or self-governing areas are removed as they are deemed out of scope. Such CSDs are identified based on their CSD type.Footnote 14

b. Exclusion of exempt residential property

In some provinces, certain properties are identified as exempt from property taxes as presented in the input files received from the assessment bodies. Any value associated with these properties are excluded from estimates for the purposes of fiscal arrangements.

c. Exclusions of schools, churches and hospitals

The most important non-residential properties which are generally exempt from property taxes are schools, churches and hospitals (S/C/H).

Some provinces and territories provide detailed breakdowns of S/C/H in their assessment data. For these provinces and territories, the exact proportion of S/C/H is removed from the final estimates.

For provinces and territories where the S/C/H breakdowns are not available, the proportion of the S/C/H assessment values relative to total assessment values for non-residential properties is estimated by calculating and applying the proportion of S/C/H property values from a similar reporting province or territory. It should be noted that values for engineering and mining properties are excluded from the total assessment value for non-residential properties used in the calculation of the S/C/H proportions.

The list of provinces and territories used in the calculation of estimated S/C/H proportion depends on data availability and can change from one year to the next as microdata is received.

d. Removal of properties subject to provincial-territorial and municipal payments-in-lieu of taxes

Instead of regular property taxes, federal, provincial or municipal government usually remit a payment in lieu of taxes (PILT) for their exempt properties. However, only federal PILT property represents fiscal capacity for the consolidated provincial-territorial-municipal-local sector; provincial, territorial and municipal (PTM) PILT properties are excluded.

When breakdowns of values of PILT properties are not available, as is the case for a number of provinces and territories, these values are estimated. The estimation of PM-PILT values takes into account the S/C/H values, some of which are also PTM-PILT properties, which have already been removed. Only the "remaining" PILT values are estimated and removed.

Although the estimation methodology using aggregate assessment roll data is successful in estimating the remaining proportion to remove, the arrival of assessment roll microdata allows for a more precise estimation of remaining PILT proportions to remove.

e. Adjustments in the Northwest Territories and Nunavut

Unlike in provinces and the Yukon, property assessments in the Northwest Territories and Nunavut do not consistently follow market value standards.

Land values within the municipal taxation areas (Iqaluit in Nunavut; Yellowknife, Fort Simpson, Fort Smith, Hay River, Norman Wells and Inuvik in NWT), reflect full market value, while land values in the remainder of the two territories (i.e. in the General Taxation Areas) are, according to the data provider, based on average regional development costs.

Improvements (i.e. buildings) in both territories are assessed based on depreciated Edmonton construction costs, using Alberta's depreciation schedule. The value so determined for Yellowknife is then multiplied by a factor of 1.35, which is set out in regulations. According to the assessment data provider, this was done to reflect Yellowknife's actual construction costs relative to Edmonton's. Yellowknife's assessed building values therefore approximately reflect market value. Footnote 15

Outside of Yellowknife, in the two territories, a discount factor of 0.666 has been applied to building values initially assessed at depreciated Edmonton construction costs. This factor is also set out in regulations and, according to the assessment data provider, was introduced to encourage development. Upon data entry, this embedded 0.666 scaling factor is removed from the building values in the Northwest Territories outside of Yellowknife and Nunavut.

f. Removal of machinery and equipment values in Alberta, Northwest Territories and Nunavut

Property values for machinery and equipment (M&E) components in the non-residential category are deemed to be out of scope.

The data received from Northwest Territories and Nunavut contain a sizeable share of M&E components in the non-residential total. They are mainly embedded in the following three non-residential classes: mineral, transmission and hydrocarbon. The M&E components are removed by multiplying the reported improvement values by a deflationary factor for each of the previously mentioned three non-residential classes. These factors are provided yearly by the respondents. This treatment ensures that only real property values are included in final estimates, and that the M&E components are excluded.

In Alberta, property values for the M&E components are reported separately by the data providers and are excluded from the final estimates.

g. Removal of personal property values in Manitoba

The assessment roll in Manitoba includes personal property such goods and chattels, which are not considered real property. Such property values are excluded from the estimate.

h. Mixed-use properties

Some properties are used for both residential and non-residential purposes. In cases where no further breakdowns are available, the values of mixed-use properties are redistributed between residential and non-residential property types according to the existing distribution of total residential and non-residential property values by CSD. In cases where further breakdowns are available, mostly in jurisdictions where microdata was received, the values are assigned according to the exact breakdown. Mixed-use residential and non-residential properties that are redistributed represent 0.015% of the total valuation of properties in Canada.

One of the most common cases of mixed-use type properties are of a building consisting of ground level commercial with one or more floors of residential units above.

10. Quality control

Statistics Canada's quality assurance framework requires an assessment of data relevance, accuracy, timeliness, accessibility, interpretability and coherence. The quality of the raw input data collected from provincial, territorial and municipal assessment departments and agencies cannot be evaluated in this framework. However, confrontational analysis is performed to compare the source data to existing statistical programs and public information such as annual reports obtained from Provincial websites and assessment agencies. Any irregularities identified are carefully reviewed and analyzed before the official release of the data.

Total adjusted residential estimates, for both taxable and exempt properties, are compared to Statistics Canada's Census of Population. The coherence of the values is examined by census coverage analysis, which compares the source data to private dwelling counts and values found in Statistics Canada's Census of Population.

Annex 1. List of CSD types representing First Nations and other Aboriginal Groups Footnote 16

The following are the list of CSD types representing First Nations and other Aboriginal groups presented by province and territory.

Annex 1. List of CSD types representing First Nations and other Aboriginal Groups
Province / Territory CSD Type CSD Type description Legal Code Legal Code description Number of CSDs
NS IRI Indian reserve FL Federally legislated 2
NB IRI Indian reserve FL Federally legislated 3
ON IRI Indian reserve FL Federally legislated 1
MB IRI Indian reserve FL Federally legislated 9
MB S-É Indian settlement U Not legal municipality - aboriginal geography 1
SK IRI Indian reserve FL Federally legislated 3
SK S-É Indian settlement U Not legal municipality - aboriginal geography 1
AB IRI Indian reserve FL Federally legislated 1
BC IGD Indian government district PL Provincially legislated - legal municipality 2
BC IRI Indian reserve FL Federally legislated 3
BC NL Nisga'a land FL Federally legislated 1

Annex 2. List of Provinces and Territories with Microdata in tax year 2021

Newfoundland, Nova Scotia, Ontario, Manitoba (except Winnipeg), Saskatchewan (Swift Current only), British Columbia, Yukon, Northwest Territories, Nunavut.

Education – 2021 Census promotional material

Help spread the word about 2021 Census data on education in Canada. These data were released on November 30, 2022.

Quick facts

  • Canada continues to rank first in the G7 for the share of working-age people (aged 25 to 64) with a college or university credential (57.5%). A key factor in this is Canada's strong college sector: nearly one in four working-age people (24.6%) had a college certificate or diploma or similar credential in 2021, more than in any other G7 country.
  • From 2016 to 2021, the working-age population saw an increase of nearly one-fifth (+19.1%) in the number of people with a bachelor's degree or higher, including even larger rises in degree-holders in the fields of health care (+24.1%) and computer and information science (+46.3%).
  • In contrast, the number of working-age apprenticeship certificate holders has stagnated or fallen in three major trades fields—construction trades (+0.6%), mechanic and repair technologies (-7.8%) and precision production (-10.0%)—as fewer young workers replace the baby boomers who are retiring. Job vacancies in some industries related to these trades, such as construction and fabricated metal product manufacturing, reached record highs in 2022.
  • Recent immigrants made up nearly half of the growth in the share of Canadians with a bachelor's degree or higher. However, some immigrants' talents remain underutilized, as over one-quarter of all immigrants with foreign degrees were working in jobs that require, at most, a high school diploma. This is twice as high as the overqualification rate for Canadian-born or Canadian-educated degree holders.
  • Even foreign-educated immigrants with credentials in high-demand areas such as health care faced high rates of job mismatch: 36.5% of immigrants with a foreign degree in registered nursing worked as registered nurses or in closely related occupations, and 41.1% of immigrants with foreign medical degrees worked as doctors. This compares to job match rates of approximately 9 in 10 for the population with Canadian nursing (87.4%) or medical (90.1%) degrees.
  • The share of Canadian-born young adults (aged 25 to 34) with a bachelor's degree or higher is also rising (+2.7 percentage points from 2016 to 2021). The increase was larger among Canadian-born young women (+3.3 percentage points, reaching 39.7%) than Canadian-born young men (+2.2 percentage points, reaching 25.7%). Nonetheless, among young men the increase in this 5-year period from 2016 to 2021 was nearly as large as the increase during the 10-year period from 2006 to 2016 (+2.3 percentage points).
  • Educational gaps faced by First Nations people, Métis, and Inuit are narrowing at the high school level. In 2021, over half of Inuit aged 25 to 64 had completed high school, up from 45.4% in 2016. At the same time, gaps are widening at the level of a bachelor's degree or higher for all Indigenous groups.
  • People with credentials above the bachelor level were better able to weather the labour market shocks of the pandemic, partly due to working in industries that were more suited to remote work. They had higher employment rates and earnings in 2021 than 2016, while those with most other levels of education saw lower employment rates.

Resources

Social media content

Statistics Canada encourages our community supporters to share our content and images to their own social media accounts. You can save the images to your device and copy and paste the text content to your social media platforms.

Post 1

How many people of working-age have a college or university credential in Canada?
Find the answer and more with our new #2021Census data on education!

bit.ly/3ECC27m

#CdnEdu

Download image for post 1

Post 1

From 2016 to 2021, the working-age population saw an increase in the number of people with a bachelor's degree or higher. See which fields saw the largest rise in the #2021Census data on education:

bit.ly/3ECC27m

#CdnEdu

Download image for post 2

Post 31

New #2021Census data on education in Canada is here! Discover the role that education and training have played in the evolution of the Canadian workforce and what this means for our country.

bit.ly/3ECC27m

#CdnEdu

Download image for post 3

Web Images

Education tile (JPG, 111 KB)

Terms of use

See the terms of use for information on the approved use of official wordmarks, identifiers and content.

Date modified: