Presentation is loading. Please wait.

Presentation is loading. Please wait.

Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.

Similar presentations


Presentation on theme: "Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick."— Presentation transcript:

1 Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick

2 Overview Criminal Code Public sector privacy legislation Private sector privacy legislation Sector-specific legislation

3 Criminal Code

4 Interception and seizure of private communications Prohibitions –Wire-to-wire communications –Wireless (radio-based) communications –Systems manager exception (quality control, unauthorized use, mischief) Interception (wiretap) warrants –Content –Routing (“envelope”) data Search and seizure warrants 3d party production orders

5 Public sector privacy legislation Privacy Act –“Personal information” under control of a “government institution” Provincial legislation

6 Private sector privacy legislation

7 PIPEDA Personal Information Protection and Electronic Documents Act

8 History EU Directive (1995) –“adequate level of protection” CSA Model Code (1996) Phased implementation –Full effect January 1, 2004

9 Jurisdiction Commercial activities (federal & provincial) Employee information (federal only) Exemptions –Privacy Act –Personal or domestic purposes –“substantially similar” provincial statutes (intra-provincial information only)

10 Overview Personal information Privacy principles Oversight and enforcement

11 Personal Information Definition –“information about an identifiable individual... [except] the name, title or business address or telephone number of an employee of an organization” Intimacy not required Collection v. generation irrelevant Anonymity and aggregation

12 Privacy Principles

13 Interpretive tools Schedule (“shall” v. “should”) (s. 5(2)) Reasonableness (s. 5(3)) –“An organization may collect, use or disclose personal information only for purposes that a reasonable person would consider are appropriate in the circumstances.”

14 The Schedule

15 Accountability Designated person 3d party transfers –Mere processing (contractual protections) –Disclosure (must comply with Act)

16 Notice of purposes New purposes

17 Informed consent No conditions for non-essential information –e.g. “no SIN, no connection” Form of consent –Sensitivity of information –Express v. implied –“Opt-in” v. “opt-out” Withdrawal of consent –Subject to legal and contractual restrictions

18 Exceptions to consent Collection –Interests of person and consent can’t be obtained –Investigation of breach of contract or law –Journalistic, artistic, or literary purpose –Publicly available and in regulations Use –Investigation of breach of law –Health or security emergency –Statistical or scholarly research (restrictions) –Publicly available and in regulations –Collected under ss. 7(1)(a) or (b)

19 Exceptions to consent con’t Disclosure –Organization’s lawyer –Debt collection –Court order –Law enforcement and national security (where legal entitlement) –Investigation of breach of contract or law (to or by investigative body) –Health or security emergency –Statistical or scholarly research (restrictions) –Archives –100 years or 20 years after death –Publicly available and in regulations –Compliance with law

20 Limiting collection Only for identified purposes

21 Limiting use, disclosure and retention No additional purposes without consent Retain only for as long as necessary to fulfill purpose for which information collected Retain long enough to enable access to information used for decision Guidelines and procedures encouraged, including minimum and maximum retention periods

22 Accuracy Accurate, complete, and up-to-date

23 Safeguards Loss or theft, unauthorized access, etc. Measures vary with sensitivity of information Technological measures (e.g. encryption) Employee training

24 Openness Policies in readily accessible form Contact information Means for access to information General description of types of information held

25 Access Confirmation of existence Right of review Disclosure of information to third parties (list) Minimal or no cost Due diligence and time limits Amendment and corrections

26 Exceptions to Access 3d party information Solicitor-client privilege Confidential commercial information Health or security of 3d party Compromise legal investigation Information generated from formal dispute resolution process Notification of access request to government for law enforcement (government veto)

27 Challenging compliance Procedures and notification Duty to investigate Appropriate remedies

28 Oversight and Enforcement

29 Privacy Commissioner Complaints PC’s power to initiate Investigative powers and mediation Reports (confidentiality and shaming) Audits Education, research, and compliance assistance

30 Federal Court Complainant Privacy Commissioner Remedies

31 Provincial Legislation Non-commercial Employees in provincial sector Commissioners’ order-making powers Jurisdictional issues


Download ppt "Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick."

Similar presentations


Ads by Google