1. Purpose
The purpose of this policy is to ensure that the identities and personal information of confidential sources, tipsters, and cooperating individuals are strictly protected. This protection preserves trust, encourages information sharing, and safeguards both sources and CTM personnel.
2. Scope
This policy applies to:
All CTM personnel, full-time, part-time, contract staff, volunteers, and interns
All information identifying or linked to confidential sources, whistleblowers, or cooperating individuals
All CTM systems, databases, paper records, and communications containing source information
3. Policy Statement
Identifying information of sources must only be accessed by authorized personnel on a strict need-to-know basis.
Unauthorized disclosure of source identities is strictly prohibited and may result in disciplinary and legal consequences.
All investigative reports, case files, and communications must anonymize or redact source details when shared outside authorized personnel.
4. Access & Handling
Source information is restricted to personnel assigned to the specific investigation or as approved by CTM leadership.
All source data must be stored securely:
Digital records must be encrypted and stored on access-controlled systems
Physical records must be kept in locked cabinets or secure rooms
Access logs must document all personnel who view, handle, or update source information.
5. Communication Protocols
Do not disclose source identities in meetings, emails, reports, or public communications unless legally required.
When sharing investigative findings externally, use anonymized identifiers (e.g., Source A, Tip #123).
Any legal request to reveal a source must be escalated to CTM leadership and legal counsel before disclosure.
6. Source Interaction Guidelines
Obtain voluntary, informed consent from sources regarding how their information will be used and protected.
Ensure sources understand limitations of confidentiality, including circumstances under which legal obligations may require disclosure.
Avoid placing sources in unsafe situations; take precautions to protect their identity and physical safety.
7. Breach of Source Confidentiality
Any suspected or confirmed disclosure of a confidential source must be reported immediately to a supervisor or designated leadership.
Breaches will be investigated, documented, and may result in disciplinary action, including termination or referral to legal authorities.
Corrective measures must be implemented to prevent recurrence.
8. Training
All personnel must complete mandatory training on handling confidential sources, privacy protection, and legal obligations.
Refresher training will be provided annually or when policy updates occur.
9. Oversight & Accountability
Supervisors are responsible for ensuring compliance with this policy in all investigations and operations.
CTM leadership will periodically audit source handling practices to ensure adherence to policy and legal requirements.
Non-compliance may result in disciplinary action, up to and including termination.
10. Policy Review
This policy shall be reviewed annually or when relevant legal standards or operational procedures change.
Updates must be documented and communicated to all personnel with access to confidential source information.