We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byAusten Colt
Modified about 1 year ago
S-1 © RGP & UW-CISA 2010 Business & Technology Environment Summer 2010 Robert G Parker
S-2 © RGP & UW-CISA 2010 Business & Technology Environment Summer 2010 Robert G Parker
S-3 © RGP & UW-CISA 2010 Crisis Management Privacy Social Networks eDiscovery / eEvidence Cloud Computing Parallel Programming Agenda
S-4 © RGP & UW-CISA 2010 Privacy
S-5 © RGP & UW-CISA 2010 Privacy USA: Supreme Court Canada: No Jail Time
S-6 © RGP & UW-CISA 2010 Privacy As patrons enter a bar they’ll have their ID cards swiped through a data reader and their photo taken. If the patron causes trouble in the bar, an “alert” will be placed on file are shared with other bars Times Colonist – July 2009
S-7 © RGP & UW-CISA 2010 Privacy Privacy Commissioner David Loukidelis ruled earlier this week that the technology used by about 100 bars and clubs involved in Barwatch across the province violates section 7(2) of the B.C. Personal information protection Act Times Colonist – August 8, 2009
S-8 © RGP & UW-CISA 2010 Privacy Bars can still scan driver’s licences but can only collect the name, photo, birthdate and gender. They can no longer collect driver’s licence numbers. Information must be destroyed within 24 hours unless the patron is determined to be violent or unsafe Protecting Society vs. Protecting Individual Rights
S-9 © RGP & UW-CISA 2010 Privacy Social Worker took home paper lists of 1,400 welfare recipients Breach discovered but “victims” not notified for 6 months Breach not disclosed to the provincial Privacy Commissioner Canada Lacks Privacy Breach Notification Laws
S-10 © RGP & UW-CISA 2010 Privacy Social Worker “Richard Perran” was actually “Richard Ernest Wainwright” who had a criminal record for credit card fraud and counterfeiting. Call were made for increased background checks and increased due diligence in hiring practices Identity Theft Issues The Impact of Criminal Convictions on Future Employment
S-11 © RGP & UW-CISA 2010 Privacy Backlash! Reputational Damage Government bureaucracy not usually affected Public sentiment was stirred Was it enough to bring changes?
S-12 © RGP & UW-CISA 2010 Privacy Breach Notification Laws are proposed for PIPEDA Are they Robust enough to protect the victims? Will have to report to the Federal Privacy Commissioner if they have experienced a material data breach of personal information: Factors to determine materiality Sensitivity of information Number of customers affected Internal assessment that the breach is not the result of a systemic problem The threshold to compel institutions to notify customers will be higher. Public notification must occur “when the organization deems the breach to pose a real risk of significant harm, such as identity theft or fraud, or damage to reputation In the US (State law) there is no threshold – they MUST be transparent
S-13 © RGP & UW-CISA 2010 Privacy Numbered Swiss bank accounts may no longer be private The law does have some interesting aspects Cash hoarded away by corrupt politicians will be seized by Swiss officials and redistributed to aid agencies. Ferdinand Marcos –Philippine’s Sani Abacha – Nigeria Valdimiro Montesunoe – Peru Jean-Claude ‘baby-Doc” Duvalier - Haiti Assets Seized: Who determines if they are corrupt? Could this be extended to corrupt business officials ?
S-14 © RGP & UW-CISA 2010 Privacy Identity theft and privacy breaches continue to go unreported because of current Canadian privacy laws. Canadian organizations such as Winners provided transparency after TJ Max in the USA had done so following a privacy breach involving Winners customers' date.
S-15 © RGP & UW-CISA 2010 Privacy Most of may us have experienced some discomfort from immigration and customs officials Well! Not all immigration and customs officials are unfriendly 2007-08 1,607 Complaints 2008-08 1,421 Complaints
S-16 © RGP & UW-CISA 2010 Privacy Entered Canada at 5:00 pm on October 18, 2009 Four hours later she received a “Friend” request on Facebook Not knowing the person she ignored the Facebook “Friend “ request Next day the same person asked why she had ignored his “Friend “ request She wrote him back asking how he knew her He responded “I don’t mean to creep you out. I met you and thought you were stunning. I think we kinda shared chemistry.” He went to describe her! An investigation revealed that the guard had captured images and names of female travellers as he conducted primary processing and sent the information to his personal eMail
S-17 © RGP & UW-CISA 2010 Privacy The press wants access to various court documents, including search warrants Time is involved in obtaining and providing such documents Some judges do not release documents to court clerks and therefore are unavailable The process is inconsistent amongst court houses
S-18 © RGP & UW-CISA 2010 Privacy The press start a campaign to get access The courts start to charge $6.00 per request
S-19 © RGP & UW-CISA 2010 Privacy Press Wanted: Free access for the press Consistent availability throughout the court system Ability to print court proceedings Privacy of the individual who was the subject of an erroneous search warrant Privacy of individuals given the presumption of innocent until proven guilty Privacy Issues
S-20 © RGP & UW-CISA 2010 Privacy By an 8-1 margin, the bench concluded that the press – in a world of tweeters and bloggers – is an ill defined group and to grant wholesale constitutional immunity “ would blow a giant hole in law enforcement” Solicitor client privilege and police informants are among the few class privileges that exist in Canada and courts have been cool to broaden the field Does this open up to police, and the courts, the ability to obtain evidence from the “tweeter” (via their service providers, etc) rather than only from traditional media?
S-21 © RGP & UW-CISA 2010 Privacy We are seeing increased video surveillance by police and others Personal video cameras have captured police actions Video cameras are becoming accepted “protection” for both parties in law enforcement Retention and Disclosure are the Issues
S-22 © RGP & UW-CISA 2010 Privacy Little public input into privacy This person went to great detail: Right of access to records in control of a public body. Except in limited specific cases Controls in the manner in which public bodies collect, use and disclose personal information Individuals, except in limited circumstances, should have the right to have access to information about them held by public bodies Individuals should have the right to request corrections to information about them held by public bodies Individuals should the right to an independent review of decisions made by a public body public bodies under the legislation
S-23 © RGP & UW-CISA 2010 Privacy Section 215: Only Requires a “Process” for FBI Increasing “privacy” protection from the Patriot Act in the US
S-24 © RGP & UW-CISA 2010 Privacy Privacy has not really caught on in Canada Canadians, in general, do not display “emotions” about privacy breaches or misuse of their information. Canadians appear ambivalent to increased use of video cameras and video recording at public events Canadian “Do Not Call” legislation allows significant unwanted contact Changes to PIPEDA will not address key deficiencies Lack of transparency rules Does not address non-commercial activities Does not address human resources Niche groups, civil liberties groups, etc are the most active in taking stands against use of personal information in Canada The private sector is still not embracing privacy standards based on “fair information practices”
S-25 © RGP & UW-CISA 2010 Privacy Service opportunities may exist for the profession to assist clients, but without : Stronger privacy legislation Public awareness of their privacy rights; and the will to protect those rights A compelling event Privacy seems like a smouldering issue which has yet to capture the interest of Canadians Professionals can assist business in addressing privacy through: Creating an appropriate privacy organization Conducting risk management reviews over personal information, particularly security Creating processes to operationalize an entity’s privacy policies
S-1 © RGP & UW-CISA 2010 Business & Technology Environment Summer 2010 Robert G Parker.
Presentation by Mark Grady Vancouver Island University June 13, 2012.
Canada’s Breach Reporting Law What you need to know Timothy M. Banks, CIPP/C Dentons Canada LLP July 21, 2015.
TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 2: Legislating Privacy: Your Rights.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
Introduction to the Australian Privacy Principles & the OAIC’s regulatory approach Privacy Awareness Week 2016.
1 Raymond Doray Conflicts between the new Canadian Money Laundering Act and the rules of professional conduct and ethics September 13, 2002.
IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, address, bank/credit.
I.D. Theft Alaska’s New Protection of Personal Information Act Ed Sniffen Senior Assistant Attorney General Alaska Department of Law.
The Problem Solvers TM Privacy Rights: Minors and Parents Michael J. Hewitt Marcel Daigle Singleton Urquhart LLP.
Introduction to the APPs and the OAIC’s regulatory approach Presented by: Este Darin-Cooper Director, Regulation and Strategy May 2015.
IM NETWORK MEETING 20 TH JULY, 2010 CONSULTATION WITH 3 RD PARTIES.
Information Technology & Ethics. Impact The impact of IT on information and communication can be categorized into 4 groups: privacy, accuracy, property,
An Introduction to the Privacy Act Privacy Act 1993 Promotes and protects individual privacy Is concerned with the privacy of information about people.
1 PRIVACY ISSUES IN THE U.S. – CANADA CROSS BORDER BUSINESS CONTEXT Presented by: Anneli LeGault ACC Greater New York Chapter Compliance Seminar May 19,
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
Prevention of Identity Theft. Why now, Why us? Federal Trade Commission (FTC) regulations for Identity Theft which may not apply, but it is good business.
Protecting information rights – advancing information policy Privacy law reform for APP entities (organisations)
Juvenile Expunction: Myths and Facts OFFICE OF THE JUVENILE DEFENDER 2015.
Employee Law Module What you need to do to protect credit history and the documents that you will need for employment. The information in this module comes.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
Obtaining, Storing and Using Confidential Data October 2, 2014 Georgia Department of Audits and Accounts.
Quick Quiz Identity Theft Protection and Your Law Firm.
Public Records Overview and Case Update: September 11, 2015 presentation Patricia Gleason Special Counsel for Open Government.
FERPA RVCC FACULTY FERPA WORKSHOP OCTOBER 2011 DAN PALUBNIAK REGISTRAR.
Our Court System Terms, procedures, and ideas you need to know.
FIRMA April 2010 DATA BREACHES & PRIVACY Christine M. Farquhar Managing Director, Compliance J.P. Morgan U.S. Private Banking.
Privacy and Personal Information. WHAT YOU WILL LEARN: What personal information is. General guidelines for the collection of personal information. Your.
IDENTITY THEFT 2015 ANNUAL TRAINING By: Denise Goff.
WHO’S IN YOUR “WALLET” WHO’S IN YOUR “WALLET” YOU BETTER “RECOGNIZE” YOU BETTER “RECOGNIZE” STEPPING $200 $200 $300 $400 $500 $400 $300 $200 $500 $400.
BC Public Libraries November, 2008 Privacy Principles.
Civil Liberties. It is often said in the American justice system that it is better to allow ten guilty people to go free than to let one innocent person.
School Law and the Public Schools: A Practical Guide for Educational Leaders, 5e © 2012 Pearson Education, Inc. All rights reserved. Chapter 7 Liability.
Identity Theft Ashley Gowin Sabrina Prophet. What is Identity Theft? Identity theft is when someone uses your personal information such as your name,
31 October The African Policing Civilian Oversight Forum (APCOF) is a network of state and civil society African practitioners active in policing.
The Legalities of using U.S.(foreign) Servers with Canadian students by Erin Gibbs and Rob Airey.
Consumer Credit Info Ms. Mary Roberts Clarke County High School Family and Consumer Sciences Dept.
US Constitution and Right to Privacy Generally only protects against government action Doesn’t obligate government to do something, but rather to refrain.
Forensic Accounting. Agenda Definition History Skills Business scandals Cases.
Outline of presentation Brief introduction of Facebook as a social networking tool Research questions Methods Findings and Results Some Experimentation.
Credit Legislation Dr. Josephine Turner, CFP IFAS, University of Florida.
Legal aspects of forensics. Civil Law private law ◦ Regulates noncriminal relationships between individuals, businesses, agency of government, and other.
Practical Analysis of Obstacles Encountered by Legal Services as Part of Access to Information Requests Presentation to the Canadian Institute at the Conference.
Texas House of Representatives Committee on Criminal Jurisprudence Testimony of Randall S. James Banking Commissioner Texas Department of Banking August.
What is the exclusionary rule Explain stop and frisk What is the plain view doctrine What did Miranda v Arizona require police to do What happens.
Judicial Branch Basics and “Due Process”. Basic Structure of the Judicial Branch Supreme Court (original and appellate jurisdiction) 13 Circuit Courts.
Mark S. Hayes – Blake, Cassels & Graydon LLP Privacy and Security – Some Observations Mark S. Hayes, Blake, Cassels & Graydon LLP 7th CACR Privacy and.
Right to Privacy: The Unwritten Right. Right to Privacy Right to Privacy: Right protecting citizens from unreasonable interference by government.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
"Can I give this out?" What Frontline Staff Need to Know About FOI and Privacy 2010 LGMA Administrative Professionals' Conference Paul Hancock, City of.
© 2017 SlidePlayer.com Inc. All rights reserved.