Confidential Source Protection Policy

1. Purpose

The purpose of this policy is to ensure that the identities and personal information of confidential sources, tipsters, and cooperating individuals are strictly protected. This protection preserves trust, encourages information sharing, and safeguards both sources and CTM personnel.

2. Scope

This policy applies to:

All CTM personnel, full-time, part-time, contract staff, volunteers, and interns

All information identifying or linked to confidential sources, whistleblowers, or cooperating individuals

All CTM systems, databases, paper records, and communications containing source information

3. Policy Statement

Identifying information of sources must only be accessed by authorized personnel on a strict need-to-know basis.

Unauthorized disclosure of source identities is strictly prohibited and may result in disciplinary and legal consequences.

All investigative reports, case files, and communications must anonymize or redact source details when shared outside authorized personnel.

4. Access & Handling

Source information is restricted to personnel assigned to the specific investigation or as approved by CTM leadership.

All source data must be stored securely:

Digital records must be encrypted and stored on access-controlled systems

Physical records must be kept in locked cabinets or secure rooms

Access logs must document all personnel who view, handle, or update source information.

5. Communication Protocols

Do not disclose source identities in meetings, emails, reports, or public communications unless legally required.

When sharing investigative findings externally, use anonymized identifiers (e.g., Source A, Tip #123).

Any legal request to reveal a source must be escalated to CTM leadership and legal counsel before disclosure.

6. Source Interaction Guidelines

Obtain voluntary, informed consent from sources regarding how their information will be used and protected.

Ensure sources understand limitations of confidentiality, including circumstances under which legal obligations may require disclosure.

Avoid placing sources in unsafe situations; take precautions to protect their identity and physical safety.

7. Breach of Source Confidentiality

Any suspected or confirmed disclosure of a confidential source must be reported immediately to a supervisor or designated leadership.

Breaches will be investigated, documented, and may result in disciplinary action, including termination or referral to legal authorities.

Corrective measures must be implemented to prevent recurrence.

8. Training

All personnel must complete mandatory training on handling confidential sources, privacy protection, and legal obligations.

Refresher training will be provided annually or when policy updates occur.

9. Oversight & Accountability

Supervisors are responsible for ensuring compliance with this policy in all investigations and operations.

CTM leadership will periodically audit source handling practices to ensure adherence to policy and legal requirements.

Non-compliance may result in disciplinary action, up to and including termination.

10. Policy Review

This policy shall be reviewed annually or when relevant legal standards or operational procedures change.

Updates must be documented and communicated to all personnel with access to confidential source information.