6th CACR Information Security Workshop 1st Annual Privacy and Security Workshop (November 10, 2000) Incorporating Privacy into the Security Domain: Issues.

Slides:



Advertisements
Similar presentations
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
Advertisements

PIPA PRESENTATION PERSONAL INFORMATION PROTECTION ACT.
Data Protection.
1 PRIVACY ISSUES IN THE U.S. – CANADA CROSS BORDER BUSINESS CONTEXT Presented by: Anneli LeGault ACC Greater New York Chapter Compliance Seminar May 19,
What does the Data Protection Act do? It sets standards which must be satisfied when obtaining, recording, holding, using, disclosing or disposing of.
McCarthy Tétrault McCarthy Tétrault LLP An Act respecting the protection of personal information in the private sector (Quebec): « Particularities of the.
Data Classification & Privacy Inventory Workshop
6/1/2015MINISTRY OF ENERGY, COMMUNICATIONS AND MULTIMEDIA 1 PRESENTATION OF PERSONAL DATA PROTECTION BILL PRESENTATION OF PERSONAL DATA PROTECTION BILL.
Data Protection and Records Management
Introduction to the APPs and the OAIC’s regulatory approach Presented by: Este Darin-Cooper Director, Regulation and Strategy May 2015.
What if my organization conducts business across borders ? Your footnote Privacy and “Personal Information” have different meanings in different countries;
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
Property of Common Sense Privacy - all rights reserved THE DATA PROTECTION ACT 1998 A QUESTION OF PRINCIPLES Sheelagh F M.
Per Anders Eriksson
Personal Data Privacy and The Internet by Stephen Lau Privacy Commissioner for Personal Data, Hong Kong SAR at the Joint Conference of the OECD, HCOPIL,
Taking Steps to Protect Privacy A presentation to Hamilton-area Physiotherapy Managers by Bob Spence Communications Co-ordinator Office of the Ontario.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Data Protection Overview
Protecting information rights –­ advancing information policy Privacy law reform for APP entities (organisations)
13 July 2006Susan Joseph Health Privacy It’s My Business Health Records Act 2001 (Vic) eReferral Service Co-ordination System.
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
HIPAA PRIVACY AND SECURITY AWARENESS.
Protecting Your Private Parts Tracy Ann Kosa. Protecting Your Private Parts TASK Meeting, 27 February 2008 Objectives  Terminology  Privacy & Security.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Privacy & Personal Information Prepared by the CBC Law Department CONFIDENTIAL – FALL 2011.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
1 Information Sharing Environment (ISE) Privacy Guidelines Jane Horvath Chief Privacy and Civil Liberties Officer.
Data Protection Act AS Module Heathcote Ch. 12.
Privacy Professional Practice for Computer Science Guest Lecture, 05 March 2007 Philippa Lawson Director, Canadian Internet Policy & Public Interest Clinic.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
Data Protection Corporate training Data Protection Act 1998 Replaces DPA 1994 EC directive 94/46/EC The Information Commissioner The courts.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
BC Public Libraries November, 2008 Privacy Principles.
IT Applications Theory Slideshows By Mark Kelly Vceit.com Privacy Laws.
Tad and Terry Legal Issues in ILP. 28 CFR Part 23 The federal rule that governs or provides guidance for these issues. § 23.3 Applicability: These policy.
IM NETWORK MEETING 20 TH JULY, 2010 CONSULTATION WITH 3 RD PARTIES.
Malcolm Crompton APEC Information Privacy Framework: review, impact, & progress APEC Symposium on Information Privacy Protection in E Government & E Commerce.
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
An Introduction to the Privacy Act Privacy Act 1993 Promotes and protects individual privacy Is concerned with the privacy of information about people.
Information Technology & Ethics. Impact The impact of IT on information and communication can be categorized into 4 groups: privacy, accuracy, property,
LEFIS ROVANIEMI MEETING 19TH 20TH JANUARY 2007 Privacy In The Web TATYANA STEFANOVA LEX.BG BULGARIA.
APEC Privacy Framework “The lack of consumer trust and confidence in the privacy and security of online transactions and information networks is one element.
Introduction to the Australian Privacy Principles & the OAIC’s regulatory approach Privacy Awareness Week 2016.
Data protection—training materials [Name and details of speaker]
Privacy and Personal Information. WHAT YOU WILL LEARN: What personal information is. General guidelines for the collection of personal information. Your.
Privacy CSC385 Kutztown University Fall 2009 Oskars J. Rieksts.
Presented by Ms. Teki Akuetteh LLM (IT and Telecom Law) 16/07/2013Data Protection Act, 2012: A call for Action1.
Protection of Personal Information Act An Analysis on the impact.
TRANSBORDER DATA FLOWS INA MEIRING. THE PROTECTION OF PERSONAL INFORMATION ACT (“POPI”) > 'personal information' means information relating to an identifiable,
HIPAA Training Workshop #3 Individual Rights Kaye L. Rankin Rankin Healthcare Consultants, Inc.
Surveillance around the world
Privacy principles Individual written policies
Issues of personal data protection in scientific research
IT Applications Theory Slideshows
Privacy principles Individual written policies
General Data Protection Regulation
APP entities (organisations)
Data Protection Legislation
Move this to online module slides 11-56
G.D.P.R General Data Protection Regulations
OECD Guidelines Collection Limitation: should be limited to personal data, obtained by lawful and fair means, and (where appropriate) with knowledge and.
Data Protection What’s new about The General Data Protection Regulation (GDPR) May 2018? Call Kerry on Or .
GDPR Workshop MEU Symposium Prague 2018
On the Cutting Edge – Update on Privacy Legislation
PERSONAL INFORMATION BILL
IAPP TRUSTe SYMPOSIUM 9-11 JUNE 2004
PRIVACY PRESENTATION TO THE SPRING 2013 CONFERENCE BY HANK MOORLAG
Student Privacy in the age of big data
Colorado “Protections For Consumer Data Privacy” Law
Presentation transcript:

6th CACR Information Security Workshop 1st Annual Privacy and Security Workshop (November 10, 2000) Incorporating Privacy into the Security Domain: Issues and Solutions Barry Sookman, Partner, McCarthy Tétrault Chair, Internet and Electronic Commerce Law Group (Toronto) (416) C ANADA’S N ATIONAL L AW F IRM McCarthy Tétrault

C ANADA’S N ATIONAL L AW F IRM McCarthy Tétrault Importance of Privacy »Privacy protection for personal information is an important social goal OECD Guidelines 1980 OECD Guidelines 1980 Council of Europe Convention 1985 Council of Europe Convention 1985 United Nations Guidelines 1990 United Nations Guidelines 1990 CSA Model Code for Protection of Personal Information 1995 CSA Model Code for Protection of Personal Information 1995

C ANADA’S N ATIONAL L AW F IRM McCarthy Tétrault Legal Basis for Privacy »Common law »Constitutional law »Criminal law »Privacy legislation EU Directive on the Protection of Personal Information EU Directive on the Protection of Personal Information Quebec Privacy Legislation Quebec Privacy Legislation Sectorial Legislation Sectorial Legislation Bill C6 Protection of Information in the Private Sector Bill C6 Protection of Information in the Private Sector Other Provincial Legislation Other Provincial Legislation

C ANADA’S N ATIONAL L AW F IRM McCarthy Tétrault Fair Information Practice Principles »OECD Guidelines 1980 »CSA Model Code for the Protection of Personal Information »US Information Infrastructure Task Force »Bill C-6 Protection of Personal Information in the Private Sector - modifies CSA Model Code »Quebec Privacy Legislation »Foreign Legislation - EU Directive on the Protection of Personal Information, COPPA »Many reports, guidelines, and model codes set out fair information practices for private sector.

C ANADA’S N ATIONAL L AW F IRM McCarthy Tétrault Bill C-6 - Purposes »Express purposes “is to establish, in an era in which technology increasingly facilitates the circulation and exchange of information, rules to govern the collection, use and disclosure of personal information in a manner that recognizes the right of privacy of individuals with respect to their personal information and the need of organizations to collect, use or disclose personal information for purposes that a reasonable person would consider appropriate in the circumstances.”

C ANADA’S N ATIONAL L AW F IRM McCarthy Tétrault Phase-in of Act »April 13, 2000: Received Royal Assent »January 1, 2001: applies to federally regulated private sector; federal works, undertakings and businesses; inter- provincial and international disclosure for consideration »January 1, 2002: applies to personal health information »January 1, 2004: applies to all private sector commercial activities

C ANADA’S N ATIONAL L AW F IRM McCarthy Tétrault To Whom Does It Apply? »Applies to every organization in respect of personal information that (a) the organization collects, uses or discloses in the course of commercial activities; or (a) the organization collects, uses or discloses in the course of commercial activities; or (b) is about an employee of the organization and that the organization collects, uses or discloses in connection with the operation of a federal work, undertaking or business. (b) is about an employee of the organization and that the organization collects, uses or discloses in connection with the operation of a federal work, undertaking or business. »“commercial activity” means “any particular transaction, act or conduct or any regular course of conduct that is a of a commercial character”

C ANADA’S N ATIONAL L AW F IRM McCarthy Tétrault What is Personal Information? »Means “information about an identifiable individual, but does not include the name, title or business address or telephone number of an employee of an organization”. »Does not need to be sensitive or private. »Includes information relating to race, national or ethnic origin, colour, religion, age or marital status; educational or medical or criminal history; information relating to financial transactions in which the individual has been involved; any identifying number, symbol or other data assigned to the individual. »Can be in any form. »Is data collected about an identifiable individual?

C ANADA’S N ATIONAL L AW F IRM McCarthy Tétrault CSA Model Code Principles 1.Accountability 2.Identifying purposes 3.Consent 4.Limiting collection 5.Limiting use, disclosure and retention 6.Accuracy 7.Safeguards (security) 8.Openness 9.Individual access 10.Challenging compliance

C ANADA’S N ATIONAL L AW F IRM McCarthy Tétrault Identifying Purposes of Collection »The purposes for which personal information is collected must be identified by the organization at or before the time the information is collected. »The identified purposes should be specified at or before the time of collection to the individual from whom the personal information is collected. »When personal information that has been collected is to be used for a purpose not previously identified, the new purpose must be identified prior to use.

C ANADA’S N ATIONAL L AW F IRM McCarthy Tétrault Information Audits »To determine all information being collected by the organization about each product and service. »A detailed privacy analysis is performed to examine the privacy implications of the company’s information practices and especially the need to collect different categories of personal data.

C ANADA’S N ATIONAL L AW F IRM McCarthy Tétrault Technology Audits »New products and services are often subject to review by technology audits. »This inquiry is directed to determining the privacy implications that might result from the introduction or use of a new information technology product or service. »For example see Ontario Privacy Commissioner report related to Smart Card Applications.

C ANADA’S N ATIONAL L AW F IRM McCarthy Tétrault Consents »Traditionally, two types of choice/consent regimes have been considered: opt-in or opt-out. » Opt-in regimes require affirmative steps by the consumer to allow the collection and/or use of information; opt-out regimes require affirmative steps to prevent the collection and/or use of such information. »Choice can also involve more than a binary yes/no option. Entities can, and do, allow consumers to tailor the nature of the information they reveal and the uses to which it will be put. »Any choice regime should provide a simple and easily- accessible way for consumers to exercise their choice. »Difficulties associated with obtaining consents »Building systems to handle consents.

C ANADA’S N ATIONAL L AW F IRM McCarthy Tétrault Limiting Use and Disclosure of Information »Personal information must not be used or disclosed for purposes other than those for which it was collected, except with the consent of the individual or as required by law. »Principle poses challenges for: data mining data mining profiling profiling intelligent agents intelligent agents data modelling data modelling use of cookies use of cookies

C ANADA’S N ATIONAL L AW F IRM McCarthy Tétrault Data Accuracy »Personal information shall be as accurate, complete, and up-to- date as is necessary for the purposes for which it is to be used. »Information shall be sufficiently accurate, complete, and up-to- date to minimize the possibility that inappropriate information may be used to make a decision about the individual. »An organization must not routinely update personal information, unless such a process is necessary to fulfil the purposes for which the information was collected. »Personal information that is used on an ongoing basis, including information that is disclosed to third parties, should generally be accurate and up-to-date, unless limits to the requirement for accuracy are clearly set out.

C ANADA’S N ATIONAL L AW F IRM McCarthy Tétrault Security »Principle 7 states that "personal information shall be protected by security safeguards appropriate to the sensitivity of the information". »”Security safeguards shall protect personal information against loss or theft, as well as unauthorized access, disclosure, copying, use or modification". »The obligation applies regardless of the format in which the information is held.

C ANADA’S N ATIONAL L AW F IRM McCarthy Tétrault Security »Information that is made available over the Internet is particularly vulnerable to unauthorized access, disclosure and use. Here appropriate security will involve both managerial and technical measures to protect against the loss and unauthorized access, destruction, use, or disclosure of data. »Technical security measures to prevent unauthorized access might include encryption in the transmission and storage of data, limits on access through use of passwords, use of fire walls, and the storage of data on secure servers. »The security principle will require that appropriate measures being taken to guard against the unauthorized access, disclosure, copying or use of such information.

C ANADA’S N ATIONAL L AW F IRM McCarthy Tétrault Integrity »The security principle extends to security safeguards against the "modification" of personal information. »The security principle will create the need for security mechanisms to assure the integrity of information. »This principle will be particularly relevant to electronic commerce applications where transmission integrity is important such as in electronic payment systems where security is critical.

C ANADA’S N ATIONAL L AW F IRM McCarthy Tétrault Third Party Uses »The security principle includes the obligation to prevent unauthorized use of information. This principle requires the organization not only to monitor its own uses, but also uses by third parties of information. »An organization that maintains personal information on a web site might have to take measures to block access to search engines if the processing by the person launching the search is unauthorized, such as where the person performing the search seeks to use the information contrary to the limiting use principle.

C ANADA’S N ATIONAL L AW F IRM McCarthy Tétrault Retention of Information »Organizations should develop guidelines and implement procedures with respect to the retention of personal information. These guidelines should include minimum and maximum retention periods. »Personal information that is no longer required to fulfil the identified purposes should be destroyed, erased, or made anonymous. »Personal information must also be retained only as long as necessary for the fulfillment of those purposes.

C ANADA’S N ATIONAL L AW F IRM McCarthy Tétrault Individual Access »Upon request, an individual must be informed of the existence, use, and disclosure of his or her personal information and must be given access to that information. An individual must also be able to challenge the accuracy and completeness of the information and have it amended as appropriate. »Access must encompass timely and inexpensive access to data, a simple means for contesting inaccurate or incomplete data, a mechanism by which the data collector can verify the information, and the means by which corrections and/or consumer objections can be added to the data file and sent to all data recipients.

C ANADA’S N ATIONAL L AW F IRM McCarthy Tétrault Challenging Compliance »An individual shall be able to address a challenge concerning compliance to the designated individual or individuals accountable for the organization's compliance. »Organizations must put procedures in place to receive and respond to complaints or inquiries about their policies and practices relating to the handling of personal information. The complaint procedures should be easily accessible and simple to use. »Organizations must inform individuals who make inquiries or lodge complaints of the existence of relevant complaint procedures. »An organization must investigate all complaints. If a complaint is found to be justified, the organization shall take appropriate measures, including, if necessary, amending its policies and practices.

6th CACR Information Security Workshop 1st Annual Privacy and Security Workshop (November 10, 2000) Incorporating Privacy into the Security Domain: Issues and Solutions Barry Sookman, Partner, McCarthy Tétrault Chair, Internet and Electronic Commerce Law Group (Toronto) (416) C ANADA’S N ATIONAL L AW F IRM McCarthy Tétrault