Privacy Protection in the Digital Workplace

Size: px
Start display at page:

Download "Privacy Protection in the Digital Workplace"

Transcription

1 Privacy Protection in the Digital Workplace We as a society don t tolerate discrimination in the workplace, or harassment. Why would we tolerate invasion of privacy? 1 By Pat Flaherty and Sarah Whitmore Privacy has been described by the Supreme Court of Canada as an essential component of what it means to be free. 2 Protection of an individual s right to privacy is predicated on the assumption that all information about a person is in a fundamental way his own, for him to communicate or retain. 3 The importance of privacy has been acknowledged as a fundamental human right; but just as no other recognized human rights or Charter rights are absolute, the right to privacy must also yield to competing rights in certain circumstances. In the workplace, the employer s rights to monitor quality control and employee productivity as well as to ensure a safe and harassment-free workplace often warrant an incursion on employees rights to privacy. Governing the appropriate balance to be struck between employers rights and employees privacy interests is a patchwork of privacy legislation, individual employment contracts, Charter rights, and the newly recognized tort of intrusion upon seclusion. 4 As technology has advanced and facilitated the spread of information and the ease with which organizations can communicate and store personal information, the need for employers to monitor their employees has become more acute. Employees use of computers, the Internet, , and social media at work (for work-related and non-work-related purposes) presents new concerns for employers, including the effect of such use on productivity, workplace harassment, and their liability for their employees online activities. Employers may be found liable for their employees online defamatory remarks, copyright and trademark infringement, harassment, and other illegal conduct in the course of employment. Workplace harassment may be more readily facilitated through the use of company or through the sharing of hateful or offensive material from the Internet. As a result of these concerns, many employers take the position that monitoring their employees computer usage and online activities is necessary to detect activity that may negatively affect the business. Furthermore, employers may have a duty to monitor employees in order to meet the legal occupational health and safety obligations to provide a harassmentfree and non-discriminatory workplace. 5 This paper was originally presented at The Law Society of Upper Canada's Special Lectures 2012: Employment Law and the New Workplace in the Social Media Age program on April 25 and 26, A. Zborosky, Personal Information Privacy and Electronic Document Act From the Perspective of Employees and Unions (Address to the Canadian Bar Association Mid-Winter Meeting, February 2004) at 7. 2 R. v. O Connor, [1995] 4 S.C.R. 411 at para R. v. Tessling, 2004 SCC 67 at para On January 18, 2012, the Ontario Court of Appeal recognized a private right of action for intentional intrusion upon one s seclusion, though the court avoided calling the new nominate tort one of invasion of privacy in Jones v. Tsige, 2012 ONCA 32 [Jones]. 5 R. Gary Dickson, QC, and Sandra Barreth, Privacy Laws and Virtue Testing in the Workplace (Presentation for the Canadian Bar Association, Saskatchewan Branch), 3 February 2006 at 8.

2 - 2 - On the other hand, the digital workplace also presents new and increased risks to employees privacy. A reality of the digital workplace is that employees use employer-owned technology to send and share personal information over the Internet, , and social-media sites. For example, employees communicate with other employees and unrelated third parties over their employer s server; they store their financial records on their employer-owned computers; they access and use social-media sites from their employer s Internet network; and they use employer-owned smart phones and other PDAs as if the devices were their own. These practices and other new technologies have also given employers the ability to more readily track or monitor their employees personal information and performance. Technologies exist to allow employers to scan s, track Internet usage, monitor keystrokes, search hard drives, and monitor an employee s movements on and off the job. As a result, the quantity and accessibility of employees personal information in the workplace have exponentially increased, giving rise to greater concern for their privacy rights. This paper examines the balance that is currently being struck in the private sector digital workplace between Canadian employers rights to monitor their employees to ensure performance and workplace safety, on the one hand, and employees rights to privacy, on the other. More specifically, we focus on the employer s right to monitor employees use of , social media, and company-owned computers and vehicles. We also consider the issue of employers conducting background checks on prospective employees via social media. Before examining these various issues, we outline the legislative framework surrounding Canadian employees privacy rights in the workplace. A. Privacy Rights in the Canadian Workplace A private sector employee s right to privacy is contained in a patchwork of rights codified in various pieces of legislation and arising from the common law. The nature and scope of protection given to an employee s personal information vary according to the province and sometimes the sector in which the employee is working. In Ontario and several other provinces, 6 there is a gap in legislative protection for private sector employees privacy rights. These provinces have not enacted private sector privacy legislation of general application, and, as discussed below, the federal privacy legislation does not extend to provincially regulated private sector employers collection, use, and disclosure of employees personal information. 1) Federal Legislative Protection Canada s main private sector privacy legislation is the federal Personal Information Protection and Electronic Documents Act. 7 PIPEDA applies to all collection, use, and/or disclosure of personal information in the course of commercial activity by an organization and imposes several main privacy-related obligations on organizations subject to its provisions. 8 Personal information is defined broadly in PIPEDA and currently includes information about an employee other than name, title, and business address and telephone number. 9 PIPEDA has limited application in most workplaces. With respect to personal information about employees, consistent with the constitutional division of powers in Canada, PIPEDA applies only to federally regulated employers (those engaged in a federal work, undertaking or business and employers in the three territories). Consequently, PIPEDA does not apply to provincially regulated employers. 6 The only provinces that have enacted provincial privacy legislation of general application are British Columbia, Alberta, and Quebec. 7 S.C. 2000, c. 5 [PIPEDA]. 8 PIPEDA, s. 4(1)(a). 9 PIPEDA, s. 2(1) definition of personal information. Note that the amendments to PIPEDA currently pending before Parliament as Bill C-12 amend this definition to remove the exclusion of the stipulated employee information from the definition of personal information. However, Bill C-12 also adds a definition of business contact information (which includes name, position or title, work address, phone and fax number, address, and similar information) that is exempted from the obligations in part I of PIPEDA to the extent that the business contact information is used to communicate with the employee in relation to their employment. Further, section 4(1)(b) of PIPEDA is amended to make clear that personal information collected from an applicant for employment is subject to the same obligations as employee information.

3 - 3-2) Provincial Legislative Protection With the exception of employment related to federal works, undertakings, and businesses governed by PIPEDA, the provinces have jurisdiction over matters pertaining to employment. Quebec, Alberta, and British Columbia have each enacted privacy legislation 10 that regulates the collection, use, and disclosure of employees personal information by organizations that are not otherwise federally regulated. As an aside, each of these laws has been deemed substantially similar to PIPEDA by the federal privacy regulator, the Privacy Commissioner of Canada, though the manner in which they deal with employees personal information is not uniformly consistent with PIPEDA. These provincial laws apply to employees personal information in private sector organizations within each of those provinces, but they do not regulate the personal information of employees working for federally regulated employers; that personal information is regulated by PIPEDA. Outside Quebec, Alberta, and British Columbia, therefore, a legislative gap exists with respect to the rules governing the protection of employees personal information in the non-federally regulated private sector workplace. 3) Differences between PIPEDA and the Provincial Legislation Under PIPEDA, employers may collect, use, and disclose employees personal information only for purposes that a reasonable person would consider appropriate under the circumstances and, in most cases, only when the employee s consent has been obtained. 11 The legislation in British Columbia and Alberta is similar and provides that employers can collect, use, and disclose employee personal information only for purposes that are reasonable and only once the employee has been notified before or during the collection. 12 Neither the BC PIPA nor the Alberta PIPA requires employers to seek the consent of employees before using or disclosing their employees personal information. 13 In Quebec, the onus on employers is more stringent. The Quebec Act requires that prior to collecting employee information, an employer must inform the employee of the purpose for which the information will be collected, the manner in which it will be used, and who will have access to it. 14 4) The Criminal Code and Surveillance The Criminal Code of Canada 15 contains an offence that applies to employers workplace surveillance and monitoring. Section 184 of the Code makes it an offence to wilfully intercept a private communication. 16 Intercept includes listening, recording, or acquiring a communication. The meaning of private communication involves a fact-specific inquiry centred on the expectation of privacy associated with the nature of the communication. Therefore, if the employer has the employee s express or implied consent, it is unlikely that a court would find that the employee had an expectation of privacy in the communication. A recent phenomenon relating to surveillance is the use of GPS data as a method of monitoring employees who make use of employer-owned vehicles. The collection of GPS data likely constitutes the collection of personal information concerning the employee insofar as it shows an employee s movements and whereabouts. GPS tracking of federally regulated employees is therefore subject to PIPEDA. The Office of the Privacy Commissioner of Canada (Office) has considered employers collection of personal information through GPS and set out a tripartite test to determine if the collection is reasonable under PIPEDA: 10 An Act Respecting the Protection of Personal Information in the Private Sector, R.S.Q. c. P-39.1 [Quebec Act]; Personal Information Protection Act, S.A. 2003, c. P-6.5 [Alberta PIPA]; and Personal Information Protection Act, S.B.C. 2003, c. 63 [BC PIPA]. 11 PIPEDA, s. 5(3) and Principle BC PIPA; Alberta PIPA. 13 This stands in contrast to the general provisions in both the BC PIPA and the Alberta PIPA, which simply require consent before the collection, use, or disclosure of personal information. 14 Quebec Act, s R.S.C. 1985, c. C-46 [the Code]. 16 Ibid., s. 184.

4 Is the measure demonstrably necessary to meet a specific need and is it likely to be effective in meeting that need? 2. Is the loss of privacy proportional to the benefit gained? 3. Is there a less privacy-invasive way of achieving the same end? 17 In addition, the Office has described reasonable purposes for the use of GPS tracking to include the following: 1. managing safety and development (e.g., allowing for follow-up when vehicles were stationary for an inordinate period of time and allowing for the management of dangerous driving habits); 2. promoting asset protection and management (e.g., allowing for the recovery of stolen vehicles and reducing the wear on vehicles through better route management); and 3. enhancing customer service (e.g., through improved scheduling services and driver/dispatch communications). 18 It is not considered reasonable to use GPS tracking as a method of determining employee performance unless the employer has a clear policy outlining an appropriate process of warnings, and progressive monitoring is established and made clear to employees. Employees in the private sector who are not protected by PIPEDA, provincial privacy regimes, or rights under a collective bargaining agreement must resort to the common law for protection, including perhaps to the newly minted tort of intrusion upon seclusion (described in further detail below) if they wish to complain about their employer s use of GPS tracking. The use of GPS devices to track employees in non-employer vehicles is an entirely different manner and engages other common law rights protected under laws of trespass and nuisance. 5) Human Rights Legislation Provincial human rights legislation, such as that in Ontario, may provide some degree of protection for employees personal information resulting from the requirement that employers approach all aspects of employment (hiring, training, discipline, and firing) in a manner that does not discriminate on a prohibited ground (race, ancestry, place of origin, colour, ethnic origin, citizenship, creed, sex, sexual orientation, age, record of offences, marital status, family status, or disability). 19 This requirement has led many employers to avoid collecting personal information from employees that relates to these aspects. An employer that obtains this information could be vulnerable to an allegation that subsequent employment decisions relating to the employee were based on that information. B. The Common Law Approach to Employers Rights and Employees Privacy In Ontario and all the other provinces that do not have private sector privacy legislation private sector employees privacy interests are governed largely by a combination of common law protections of privacy and contractual provisions. Applicable contractual provisions may be found in the employment agreement or may be stand-alone policies of employers that bind employees. Employers in all provinces and sectors have always been permitted (and are often encouraged) to put in place clear workplace privacy and computer-use policies, including policies that stipulate how personal information will be collected, used, and disclosed and delineate permissible use of employer-supplied technology (such as PDAs, computers, and other devices) that can collect and preserve employee personal information and the personal information of nonemployees with whom the employee deals. Where these policies are permissible and enforced, courts have held that an employee s privacy rights are not infringed by an employer who monitors the employee in 17 PIPEDA Case Summary # PIPEDA Case Summary # Ontario Human Rights Code, R.S.O. 1990, c. H.19 at s. 5(1).

5 - 5 - accordance with the terms of the policy. 20 In addition, employees have no reasonable expectation of privacy regarding information stored on work-issued devices if the employer implements a policy that indicates otherwise. 21 Private sector employers in the provinces that lack provincial privacy legislation have a wider latitude to monitor their employees compared with their counterparts in federally regulated sectors or in British Columbia, Alberta, and Quebec. However, a recent decision of the Ontario Court of Appeal may have filled, at least partly, the legislative gap and extended greater protection to employees privacy interests in those provinces. On January 18, 2012, the Ontario Court of Appeal confirmed the existence of a right of action for intentional breach of privacy rights the tort of intrusion upon seclusion. 22 Following US privacy jurisprudence, the court ruled that to make out the tort of intrusion upon seclusion, the plaintiff must plead and prove that (1) the defendant intentionally or recklessly intruded on the plaintiff s private affairs or concerns; (2) there was an absence of lawful justification; and (3) the intrusion, viewed objectively, was highly offensive, causing distress, humiliation, or anguish. Proof of loss is not an element of the cause of action. 23 The court took steps to restrict the application of the cause of action to deliberate and significant invasions of personal privacy. 24 However, given the potential power imbalance that exists in the employer-employee relationship and the nature of the personal information about employees that is often readily available to employers, misuses of personal information in the workplace might be argued to fall within the sphere of conduct that the court had envisioned as giving rise to liability. As a result, depending on the circumstances including whether the employer has policies established permitting the collection, use, or disclosure of employees personal information the tort of intrusion upon seclusion may apply to breaches of privacy in the digital workplace. If the employer has a clear policy that permits it to monitor employees computer usage and online activities, an employee who has been subjected to such monitoring will be unable to use the intrusion upon seclusion cause of action. 25 Therefore, the court s reasoning reinforces the need for employers to maintain clear and consistently enforced computer-use and Internet policies. C. Protection of Personal Information in the Workplace under the Charter The Supreme Court of Canada has recognized a right to privacy subsumed in sections 7 and 8 of the Charter. 26 Employees who are engaged by state actors may have Charter protection for their privacy interests in the workplace. This protection was considered by the Ontario Court of Appeal in Cole, 27 discussed in greater detail below. However, it is important to note that private sector employers are not directly subject to the Charter. Finally, the common law of employment still must develop in a manner that is consistent with Charter values, including the recognized right to privacy thereunder. D. Examples of the Balance between Employers Rights and Employees Privacy Interests A review of three recent decisions (one each in respect of employers governed by PIPEDA, by provincial privacy legislation, and by the Charter) indicates that s or social-media messages concerning an employee can fall within the definition of personal information 28 and that employees have an expectation of privacy regarding information stored on company-owned computer equipment if the 20 R. v. Cole, 2011 ONCA 218 [Cole]. 21 Ibid. at para Jones, above note Ibid. at para Ibid. at para In these cases, the employee would be unable to make out the second element of the cause of action, which requires that the intrusion occurred without lawful justification, see para. 71 in Jones, above note R. v. Dyment, [1988] 2 S.C.R. 417 at 427; Hunter v. Southam Inc., [1984] 2 S.C.R. 145 at Above note Bell Canada v. Johnson (2008), 70 C.P.R. (4th) 1 (Fed. Ct.) [Bell Canada].

6 - 6 - employer does not have a privacy policy in place that indicates otherwise. 29 As a result, unreasonable monitoring of an employee s digital activities may amount to a breach of privacy laws or the Charter (where applicable) in appropriate circumstances. The cases suggest that monitoring may be reasonable if the employer suspects that the employee is or has been engaged in fraud, breach of the employment contract (including time theft) or some other unlawful activity. Where less intrusive means are unavailable to investigate these issues, it is more likely that the employer s monitoring would be considered reasonable. Finally, where the employer has a clear and consistently enforced policy in place, monitoring may be viewed as more acceptable. 1) Bell Canada v. Johnson: Employees Work s Are Personal Information In Bell Canada, 30 the Federal Court of Canada determined that PIPEDA does not require employers to provide employees with access to all s stored on the employer s network that relate to the employee and that contain personal information concerning the employee. Johnson, an employee of Bell Canada, made an access request under PIPEDA seeking s concerning me in this company from all sources. The court observed that there was no issue that s sent in the course of business are accessible through PIPEDA; the question was whether personal s sent by employees at work were accessible. Since the court determined that the exemption for personal information used solely for personal purposes found in section 4(2)(b) applied only to individuals, it focused its analysis on section 4(1). That section provides that PIPEDA applies only to personal information collected, used, or disclosed in the course of commercial activities or about an employee that the organization collects in connection with a federal work, undertaking or business. The court held that only information collected because the organization has a commercial need for it is captured by PIPEDA: Information collected in connection with the operation of the business requires that there be a business purpose for the information. There is none with respect to personal s. The implication of the court s decision is that employee s are private, personal information, meaning that PIPEDA does not permit an employer s collection, use, or disclosure of these types of s without the employee s consent, because there is no commercial need for the employer to do so. Even when an employee has consented, the collection, use, or disclosure must be reasonable in order to comply with PIPEDA. 2) Alberta Privacy Commissioner Order: Use of Keystroke Monitoring Technology May Be Reasonable in Certain Circumstances In a public-sector case in Alberta, 31 the Alberta Information and Privacy Commissioner determined that a regional library s installation of keystroke monitoring technology on one of its employees computers was unreasonable in the circumstances and contravened the Alberta Freedom of Information and Protection of Privacy Act. 32 The commissioner observed that the library s undisclosed use of the software amounted to surveillance of the employee. The use of the software may have been reasonable if the employee was suspected of committing fraud using the library-owned information technology equipment; however, on the facts of the case, there were less intrusive means available to the library for managing the employee and therefore the monitoring breached the Act. Although this decision emanates from the public sector, it demonstrates that, in certain circumstances, employers subject to privacy legislation may be permitted to monitor their employees computer usage without providing the employees with advance notice Cole, above note Above note Alberta Information and Privacy Commissioner Order F available at 32 R.S.A. 2000, c. F The Alberta Act requires that public bodies that collect personal information inform the individual of the purpose for which the information is collected, the legal authority for the collection, and the contact information of an employee of the public body who can answer questions about the collection (s. 34(2)).

7 - 7-3) R. v. Cole: Employees May Expect Privacy of Information Stored on Employer-Owned Computers In Cole, a high school teacher was charged with possession of child pornography and unauthorized use of a computer contrary to the Criminal Code. While conducting regular server maintenance, a computer technician accessed the teacher s school-board-issued laptop and found sexually explicit images of an underage student. The technician copied the photos onto a disk and reported his findings to the principal, who then asked the teacher to hand over the laptop. A second search of the computer was conducted by a school board official who copied the temporary Internet files onto another disk. Both disks and the laptop were turned over to the police, who then performed a warrantless search and charged the teacher under the Criminal Code. The Court of Appeal determined that the teacher s Charter rights were breached by the police but not by his employer. In reaching its decision, the court found that the teacher had a reasonable expectation of privacy regarding personal material he stored on his work-issued laptop. The court relied on the trial judge s findings of fact that the teacher and his colleagues used their computers to regularly store sensitive personal information and that although the school board owned the computer, it gave de facto control of the computers to the teachers. Moreover, the school board did not have a clear policy in place permitting it to monitor, search, or otherwise police the teacher s laptop use. Although it was lawful for the police to look at the disk containing images of the student, it was unlawful for the police to copy the laptop s entire hard drive or to search the disk containing the temporary Internet files. The lack of exigency, the teacher s privacy interests over his browsing history, and the broad nature of the search contributed to the unreasonableness and unlawfulness of the police search under section 8 of the Charter. With respect to the school board, the court concluded that neither the technician s search nor the school board official s search breached the teacher s Charter rights, since the first search occurred during routine maintenance and the second search constituted reasonable follow-up to the initial findings. a) Implications of the Cole Decision The implications of Cole for private sector employers are not necessarily far-reaching. First, the decision arose out of a criminal proceeding, so although the case creates a helpful precedent for employees whose workplace privacy is breached through a warrantless police search, it does not create any new sources of liability for employers. Second, the case was decided in the Charter context and the court s analysis assumed that the Charter applied to the school board. The court s analysis thus applies only to employers subject to the Charter. Despite the limited direct application this case may have for private sector employers, the court s reasoning still provides important lessons for them. Most important, the decision in Cole clarifies that an employee s privacy interests are not simply negated because the employer owns the technology used by the employee. Employers can no longer rely on the mere ownership of property to insulate themselves from claims that employees have a reasonable expectation of privacy regarding their personal information stored on employer-issued technology. 34 The court s reasoning in Cole also highlights the importance for employers of having a clear, consistently enforced computer-usage and/or computer-monitoring policy in place to minimize employees privacy expectations. E. Conducting Background Checks via Social Media The digital workplace has also transformed the hiring process. Employers are no longer restricted to the references given by prospective employees and can instead conduct their own online research. A 2009 US poll found that 45 percent of employers conducted background checks via some form of social media throughout their hiring process. 35 These background checks can include a variety of actions but may be as simple as viewing a candidate s Facebook profile or reading the person s blog posts; or the checks may be 34 Lisa Talbot, Litigation: Privacy in the Private Sector Workplace (2011) Commercial Litigation Review 9:2 at Elizabeth Denham, Work and Play in the Age of Social Networking, 12 May 2010.

8 - 8 - as thorough as hiring an organization to search for every bit of information on social media about the prospective employee. 36 When employers or organizations hired on behalf of employers search social media for individuals, the collection, use, or disclosure of that information is subject to PIPEDA and the provincial private sector privacy legislation. 37 Individuals in provinces that lack private sector privacy legislation have recourse for improper social-media background checks under PIPEDA, because the provisions relied upon in this circumstance are not specific to the employee-employer relationship. As a result of an ever-increasing use of social media and the development of online personalities, employers must now be wary of the possibility that their employees may have online personas that would negatively impact the business. What better time to weed out these employees than at the interview stage? However, despite the potential perceived benefits to conducting background checks through social media, the risks associated with these checks mean that employers who misuse this hiring technique may run the risk of breaching privacy legislation. Researching social media on a person may produce a huge amount of irrelevant or inaccurate information. Canadian privacy legislation requires organizations to take steps to ensure that the information they are collecting is accurate. 38 Breach of the accuracy requirement amounts to breach of the legislation. 39 Furthermore, the Federal Court of Canada has awarded damages, albeit a modest amount, to an individual for inaccurate information disclosed by an organization. 40 A recent decision of the BC Information and Privacy Commissioner provides useful insight into when these background searches may be permissible. 41 The commissioner launched an investigation into the BC New Democratic Party after the media reported that the party had requested all leadership candidates Facebook passwords (and other social-media passwords) in order to conduct a background search to vet the candidates social-media usage for inappropriate material. The party s explanation for the background searches was the desire to avoid repeating the situation that had occurred in the 2009 provincial election, when a candidate was forced to withdraw after inappropriate Facebook photos were discovered on his profile. The investigation concluded that although the NDP had obtained the candidates consent and had identified the purpose for its request, as required under the BC PIPA, the collection was nonetheless unreasonable and therefore a breach of that Act. The commissioner explained that reasonableness must be assessed in light of various factors, including the purpose of the collection and surrounding circumstances, the quantity and type of information collected, and the uses to which the information would be put. The surrounding circumstances in this case included the fact that collecting information on a particular person s Facebook account will result in obtaining third-party information that concerns people who have not consented to the collection and that is often likely to be inaccurate or out of date. This decision suggests that if a social-media background check is somehow confined to exclude any thirdparty information and steps are taken to check the accuracy or timeliness of the information, these checks may be permissible under privacy legislation. It also seems unlikely that individuals who determine that they have been the target of social-media background searches would have a right of action against the organization for intrusion upon seclusion. Depending on the quantity and scope of information collected, it is at least arguable that an organization is lawfully entitled to review the contents of a prospective employee s social-media usage in order to assess the employee s suitability for employment. Furthermore, given the proliferation of employers that are using social media for background checks as part of their hiring processes and the reality that information on social-media sites concerning individuals is often 36 Guidelines for Social Media Background Checks, October 2011, at Ibid. at For example, Schedule 1 to PIPEDA, Principles 4.6 and Nammo v. Transunion of Canada Inc., 2010 FC 1284 at paras. 33, Ibid. 41 P11-01-MS Summary of the Office of the Information and Privacy Commissioner s Investigation of the BC NDP s use of social media and passwords to evaluate candidates.

9 - 9 - posted by the individual, it seems unlikely that a reasonable person would conclude that there was a highly offensive intrusion into the individual s private affairs capable of causing distress, humiliation, or anguish. F. Conclusion and Lessons Learned This review of cases suggests that Canadian employers in the private sector would be wise to implement and consistently enforce clear policies that permit them to monitor their employees computer and Internet usage. The policy can be a stand-alone document or can be included as terms in the employment agreement or as part of an employee code of conduct. What is important is that the policy clearly state the reasons that might give rise to the employer s monitoring. For example, these reasons could include protecting (1) the integrity of data; (2) the monitoring systems; (3) the confidentiality of information and data belonging to the company, its employees, clients, suppliers, and so on; (4) the company s compliance with applicable laws (including intellectual property laws); and (5) employees and the workplace environment from harassment and discrimination. 42 These policies enable employers to ensure quality control, productivity standards, and a safe and harassment-free workplace, while also providing employees with clear guidelines and expectations. 42 Talbot, above note 34 at 17.

Internal Investigations, Data Analytics and Employee Privacy in Online/Computer Activity

Internal Investigations, Data Analytics and Employee Privacy in Online/Computer Activity Internal Investigations, Data Analytics and Employee Privacy in Online/Computer Activity Prepared for: The Essential Privacy, Access to Information, CASL Forum November 24, 2014 Dr. Andrea Slane University

More information

Social Media In the Workplace

Social Media In the Workplace Social Media In the Workplace By Randy Green and John Michael Ekblad 306 West Church Street, Champaign, IL 61820 (217)352-1800 Overview: Social Media What is it? Risks Presented Properly Regulating Employee

More information

Doing Business. A Practical Guide. casselsbrock.com. Canada. Dispute Resolution. Foreign Investment. Aboriginal. Securities and Corporate Finance

Doing Business. A Practical Guide. casselsbrock.com. Canada. Dispute Resolution. Foreign Investment. Aboriginal. Securities and Corporate Finance About Canada Dispute Resolution Forms of Business Organization Aboriginal Law Competition Law Real Estate Securities and Corporate Finance Foreign Investment Public- Private Partnerships Restructuring

More information

Cloud Computing: Privacy and Other Risks

Cloud Computing: Privacy and Other Risks December 2013 Cloud Computing: Privacy and Other Risks by George Waggott, Michael Reid and Mitch Koczerginski, McMillan LLP Introduction While the benefits of outsourcing organizational data storage to

More information

Insurance Journal. Defending Until the End When Does the Duty to. Volume 1, Issue 3 Editor Keoni Norgren. May 1, 2013

Insurance Journal. Defending Until the End When Does the Duty to. Volume 1, Issue 3 Editor Keoni Norgren. May 1, 2013 Insurance Journal May 1, 2013 In this Issue Volume 1, Issue 3 Editor Keoni Norgren Defending Until the End When Does the Duty to Defend End? Cyber Liability Laws in Canada Dolden Wallace Folick Welcomes

More information

POLICE RECORD CHECKS IN EMPLOYMENT AND VOLUNTEERING

POLICE RECORD CHECKS IN EMPLOYMENT AND VOLUNTEERING POLICE RECORD CHECKS IN EMPLOYMENT AND VOLUNTEERING Know your rights A wide range of organizations are requiring employees and volunteers to provide police record checks. Privacy, human rights and employment

More information

Aiyaz A. Alibhai Sarah G. Fitzpatrick. Social Media in the Workplace Employer Liability Issues

Aiyaz A. Alibhai Sarah G. Fitzpatrick. Social Media in the Workplace Employer Liability Issues Aiyaz A. Alibhai Sarah G. Fitzpatrick Social Media in the Workplace Employer Liability Issues Social Media in the Workplace 1. Risk Management & Sources of Liability 2. Claims involving Potential Employees

More information

Law Firm Compliance: Key Privacy Considerations for Lawyers and Law Firms in Ontario

Law Firm Compliance: Key Privacy Considerations for Lawyers and Law Firms in Ontario PRIVACY COMPLIANCE ISSUES FOR LAW FIRMS IN ONTARIO By Sara A. Levine 1 Presented at Law Firm Compliance: Key Privacy Considerations for Lawyers and Law Firms in Ontario Ontario Bar Association, May 6,

More information

Client Alert December 2011

Client Alert December 2011 Client Alert December 2011 In This Issue: Global Recruitment and Social Media Hiring Traps Global Trends The Americas Canada United States Latin America Europe France Germany United Kingdom Asia Pacific

More information

Digital Evidence meets the Charter: Peer-to-Peer (P2P) File-Sharing Networks

Digital Evidence meets the Charter: Peer-to-Peer (P2P) File-Sharing Networks Volume 22, No. 1 September 2012 Criminal Justice Section Digital Evidence meets the Charter: Peer-to-Peer (P2P) File-Sharing Networks A case comment on R. v. Spencer and R. v. Trapp Brock Jones 1 A. Peer-to-Peer

More information

CLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING?

CLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING? CLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING? Lindsey Finch Senior Global Privacy Counsel Salesforce.com lfinch@salesforce.com David T.S. Fraser Partner McInnes Cooper David.fraser@mcinnescooper.com

More information

Taking care of what s important to you

Taking care of what s important to you A v i v a C a n a d a I n c. P r i v a c y P o l i c y Taking care of what s important to you Table of Contents Introduction Privacy in Canada Definition of Personal Information Privacy Policy: the ten

More information

Privacy Law in Canada

Privacy Law in Canada by PATRICIA WILSON & MICHAEL FEKETE Protection of personal information remains at the forefront of public policy debate in. Federal and provincial privacy legislation has a profound impact on the way virtually

More information

Policy Statement. Employee privacy, data protection and human resources. Prepared by the Commission on E-Business, IT and Telecoms. I.

Policy Statement. Employee privacy, data protection and human resources. Prepared by the Commission on E-Business, IT and Telecoms. I. International Chamber of Commerce The world business organization Policy Statement Employee privacy, data protection and human resources Prepared by the Commission on E-Business, IT and Telecoms I. Introduction

More information

How to write a policy to prevent. Harassment. by Louise Pohl

How to write a policy to prevent. Harassment. by Louise Pohl How to write a policy to prevent Harassment by Louise Pohl Contents Introduction... 7 Section 1: Legal obligations for employers and employees... 9 Employer liability...10 The scope of human rights law...

More information

This agreement applies to all users of Historica Canada websites and other social media tools ( social media tools or social media channels ).

This agreement applies to all users of Historica Canada websites and other social media tools ( social media tools or social media channels ). Social Media Terms of Use Social media is an integral part of Historica Canada s communications efforts, offering an additional model to engage with participants, colleagues, other stakeholders and the

More information

PHIPA Potpourri. Judith Goldstein, Legal Counsel Information and Privacy Commissioner/Ontario. IPC Mediators April 21, 2015

PHIPA Potpourri. Judith Goldstein, Legal Counsel Information and Privacy Commissioner/Ontario. IPC Mediators April 21, 2015 PHIPA Potpourri Judith Goldstein, Legal Counsel Information and Privacy Commissioner/Ontario IPC Mediators April 21, 2015 Powers of the Commissioner The Powers the Commissioner has to conduct a review

More information

What is involved if you are asked to provide a Police Background Check?

What is involved if you are asked to provide a Police Background Check? What is involved if you are asked to provide a Police Background Check? Read on What right do employers, volunteer recruiters, regulators, landlords and educational institutions ( organizations ) have

More information

Federation of Law Societies of Canada. Ottawa, November 26, 2013

Federation of Law Societies of Canada. Ottawa, November 26, 2013 Submission to the Standing Senate Committee on Banking, Trade and Commerce in Respect of Bill C-4 (a second Act to implement certain provisions of the budget tabled in Parliament on March 21, 2013 and

More information

Human Resources People and Organisational Development. Disciplinary Procedure for Senior Staff

Human Resources People and Organisational Development. Disciplinary Procedure for Senior Staff Human Resources People and Organisational Development Disciplinary Procedure for Senior Staff AUGUST 2015 1. Introduction 1.1 This procedure applies to Senior Staff. Senior Staff includes: 1.1.1 the Vice-Chancellor

More information

How To Use The Blog Safely And Responsibly

How To Use The Blog Safely And Responsibly BLOG PROTOCOL DRI maintains this site (the "Site") for your personal entertainment, information, education, and communication. Please feel free to browse the Site. You may not download material displayed

More information

SURVEILLANCE AND PRIVACY

SURVEILLANCE AND PRIVACY info sheet 03.12 SURVEILLANCE AND PRIVACY Info Sheet 03.12 March 2012 This Information Sheet applies to Victorian state and local government organisations that are bound by the Information Privacy Act

More information

Privacy Update Recent Updates in Privacy Law

Privacy Update Recent Updates in Privacy Law Privacy Update Recent Updates in Privacy Law Kathryn Frelick DISCLAIMER This Coffee Talk presentation is provided as an information service and is not meant to be taken as legal opinion or advice. Please

More information

COUNCIL OF THE EUROPEAN UNION. Brussels, 22 November 2006 15644/06 DATAPROTECT 45 EDPS 3

COUNCIL OF THE EUROPEAN UNION. Brussels, 22 November 2006 15644/06 DATAPROTECT 45 EDPS 3 COUNCIL OF THE EUROPEAN UNION Brussels, 22 November 2006 15644/06 DATAPROTECT 45 EDPS 3 COVER NOTE from: Secretary-General of the European Commission, signed by Mr Jordi AYET PUIGARNAU, Director date of

More information

LEGAL UPDATE INFORMATION AND PRIVACY DECISION USE OF EMPLOYEE MONITORING SOFTWARE BY THE DISTRICT OF SAANICH

LEGAL UPDATE INFORMATION AND PRIVACY DECISION USE OF EMPLOYEE MONITORING SOFTWARE BY THE DISTRICT OF SAANICH LEGAL UPDATE - A Publication - Vol. 03, INFORMATION AND PRIVACY DECISION USE OF EMPLOYEE MONITORING SOFTWARE BY THE DISTRICT OF SAANICH On March 30, 2015, Information and Privacy Commissioner for British

More information

Workplace Anti-Harassment Policy (Alberta)

Workplace Anti-Harassment Policy (Alberta) Workplace Anti-Harassment Policy (Alberta) Intent It is public policy in Canada to recognize the dignity and worth of every person and to provide for equal rights and opportunities free of discrimination.

More information

Privacy Law in Canada

Privacy Law in Canada Privacy Law in Canada Federal and provincial privacy legislation has a profound impact on the way virtually all organizations carry on business across the country. Canada s privacy laws, while likely the

More information

Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1

Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1 Dundalk Institute of Technology Acceptable Usage Policy Version 1.0.1 1 Document Location..\DkIT_Policy_Documents\Policies Revision History Date of this revision: Date of next review: Version Revision

More information

3. Consent for the Collection, Use or Disclosure of Personal Information

3. Consent for the Collection, Use or Disclosure of Personal Information PRIVACY POLICY FOR RENNIE MARKETING SYSTEMS Our privacy policy includes provisions of the Personal Information Protection Act (BC) and the Personal Information Protection and Electronic Documents Act (Canada),

More information

Employment and Labour Law in Canada

Employment and Labour Law in Canada by JIM HASSELL & SVEN POYSA The constant change associated with employment and labour law in poses a significant challenge for employers doing business here. That challenge is compounded by the fact that

More information

Employment Contracts: tips, traps and techniques (613) 231-8348 (613) 231-8227

Employment Contracts: tips, traps and techniques (613) 231-8348 (613) 231-8227 Employment Contracts: tips, traps and techniques Melynda Layton Julian Walker (613) 231-8348 (613) 231-8227 melynda.latyon@nelligan.ca julian.walker@nelligan.ca February 18, 2005 Introduction Every organization

More information

I. Issues Surrounding Email/Computer Monitoring and Searches of an Employee's Property

I. Issues Surrounding Email/Computer Monitoring and Searches of an Employee's Property I. Issues Surrounding Email/Computer Monitoring and Searches of an Employee's Property In recent years, employers have had to become concerned with protecting their legitimate business interests while

More information

Queensland WHISTLEBLOWERS PROTECTION ACT 1994

Queensland WHISTLEBLOWERS PROTECTION ACT 1994 Queensland WHISTLEBLOWERS PROTECTION ACT 1994 Act No. 68 of 1994 Queensland WHISTLEBLOWERS PROTECTION ACT 1994 Section PART 1 PRELIMINARY TABLE OF PROVISIONS Division 1 Title and commencement Page 1 Short

More information

Virginia Commonwealth University Police Department

Virginia Commonwealth University Police Department Virginia Commonwealth University Police Department NUMBER SECTION CHIEF OF POLICE EFFECTIVE REVIEW DATE 2 9 1/2013 2/2013 SUBJECT SOCIAL MEDIA GENERAL The department endorses the secure use of social media

More information

CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES:

CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES: CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES: Privacy Responsibilities and Considerations Cloud computing is the delivery of computing services over the Internet, and it offers many potential

More information

SOCIAL MEDIA IN THE WORKPLACE. Prepared for the Ontario Bar Association June 7, 2013 Program. Employment Law Update. Doug MacLeod & Lily MacLeod

SOCIAL MEDIA IN THE WORKPLACE. Prepared for the Ontario Bar Association June 7, 2013 Program. Employment Law Update. Doug MacLeod & Lily MacLeod SOCIAL MEDIA IN THE WORKPLACE Prepared for the Ontario Bar Association June 7, 2013 Program Employment Law Update Doug MacLeod & Lily MacLeod MacLeod Law Firm: Employment & Labour Lawyers www.macleodlawfirm.ca

More information

Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent

Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent Scope Information Services Regulations for the Use of Information Technology (IT) Facilities at the University of Kent 1. These regulations apply to The Law All students registered at the University, all

More information

Personal Information Protection Act Information Sheet 11

Personal Information Protection Act Information Sheet 11 Notification of a Security Breach Personal Information Protection Act Information Sheet 11 Introduction Personal information is used by organizations for a variety of purposes: retail and grocery stores

More information

ORDER MO-2114 Appeal MA-060192-1 York Regional Police Services Board

ORDER MO-2114 Appeal MA-060192-1 York Regional Police Services Board ORDER MO-2114 Appeal MA-060192-1 York Regional Police Services Board Tribunal Services Department Services de tribunal administratif 2 Bloor Street East 2, rue Bloor Est Suite 1400 Bureau 1400 Toronto,

More information

AN INTRO TO. Privacy Laws. An introductory guide to Canadian Privacy Laws and how to be in compliance. Laura Brown

AN INTRO TO. Privacy Laws. An introductory guide to Canadian Privacy Laws and how to be in compliance. Laura Brown AN INTRO TO Privacy Laws An introductory guide to Canadian Privacy Laws and how to be in compliance Laura Brown Air Interactive Media Senior DMS Advisor A Publication of 1 TABLE OF CONTENTS Introduction

More information

HIGH SCHOOL FOR RECORDING ARTS

HIGH SCHOOL FOR RECORDING ARTS Adopted Revised High School for Recording Arts Bullying Prohibition Policy 1. Purpose Students have the right to be safe and free from threatening situations on school property and at school activities

More information

Computer Facilities and External Networks Acceptable Use by Students

Computer Facilities and External Networks Acceptable Use by Students Related Policies Copyright Media Usage Offshore Data Hosting Privacy Web Publishing Purpose Policy Computer facilities and external networks are made available as resources for use by students in Catholic

More information

The Credit Reporting Act

The Credit Reporting Act 1 CREDIT REPORTING c. C-43.2 The Credit Reporting Act being Chapter C-43.2 of The Statutes of Saskatchewan, 2004 (effective March 1, 2005). NOTE: This consolidation is not official. Amendments have been

More information

SASKATCHEWAN OFFICE OF THE INFORMATION AND PRIVACY COMMISSIONER INVESTIGATION REPORT F-2012 003. Saskatchewan Workers Compensation Board

SASKATCHEWAN OFFICE OF THE INFORMATION AND PRIVACY COMMISSIONER INVESTIGATION REPORT F-2012 003. Saskatchewan Workers Compensation Board Date: August 29, 2012 File No.: 2008/101 SASKATCHEWAN OFFICE OF THE INFORMATION AND PRIVACY COMMISSIONER INVESTIGATION REPORT F-2012 003 Saskatchewan Workers Compensation Board Summary: The Commissioner

More information

Recent Developments in Workplace Technologies and Privacy

Recent Developments in Workplace Technologies and Privacy PRIVACY 2013 UPDATE PAPER 3.1 Recent Developments in Workplace Technologies and Privacy These materials were prepared by Frances C. Doyle, with the assistance of Magdalena Wojda, both of Harris & Company

More information

Crimes (Computer Hacking)

Crimes (Computer Hacking) 2009-44 CRIMES (COMPUTER HACKING) ACT 2009 by Act 2011-23 as from 23.11.2012 Principal Act Act. No. 2009-44 Commencement except ss. 15-24 14.1.2010 (LN. 2010/003) Assent 3.12.2009 Amending enactments Relevant

More information

REVIEWED BY Q&S COMMITTEE ON THE 4 TH JUNE 2015. Social Media Policy

REVIEWED BY Q&S COMMITTEE ON THE 4 TH JUNE 2015. Social Media Policy Social Media Policy SOCIAL MEDIA POLICY This Policy applies to all academy staff regardless of their employment status. It is to be read in conjunction with the E Safety and Data Security Policy. This

More information

CHAPTER 124B COMPUTER MISUSE

CHAPTER 124B COMPUTER MISUSE 1 L.R.O. 2005 Computer Misuse CAP. 124B CHAPTER 124B COMPUTER MISUSE ARRANGEMENT OF SECTIONS SECTION PART I PRELIMINARY 1. Short title. 2. Application. 3. Interpretation. PART II PROHIBITED CONDUCT 4.

More information

Supreme Court of Canada Creates New Test for Police to Search Cell Phones Without a Warrant

Supreme Court of Canada Creates New Test for Police to Search Cell Phones Without a Warrant Supreme Court of Canada Creates New Test for Police to Search Cell Phones Without a Warrant On December 11, 2014, the Supreme Court of Canada released R. v. Fearon, a decision that addresses when police

More information

John McGowan and Tim Pinos Corporate Counsel Seminar Series 2008. Vicarious Liability. June 3, 2008. 2007 2008 Cassels Brock

John McGowan and Tim Pinos Corporate Counsel Seminar Series 2008. Vicarious Liability. June 3, 2008. 2007 2008 Cassels Brock John McGowan and Tim Pinos Corporate Counsel Seminar Series 2008 Vicarious Liability June 3, 2008 Overview Vicarious Liability Background Office Parties Social Host Liability Employee Internet Use Cell

More information

SAMPLE RETURN POLICY

SAMPLE RETURN POLICY DISCLAIMER The sample documents below are provided for general information purposes only. Your use of any of these sample documents is at your own risk, and you should not use any of these sample documents

More information

A Manager s Guide to Reasonable Accommodation

A Manager s Guide to Reasonable Accommodation A Manager s Guide to Reasonable Accommodation This guide is the responsibility of the Public Service Agency Province of British Columbia TABLE OF CONTENTS INTRODUCTION...2 KEY CONCEPTS...3 A. The Concept

More information

DISCIPLINE RUTLAND. limited by guarantee. Registered in England and Wales.

DISCIPLINE RUTLAND. limited by guarantee. Registered in England and Wales. DISCIPLINE POLICY FOR STAFF OCTOBER 2014 HARINGTON SCHOOL RUTLAND office@haringtonschool.com www. haringtonschool.com Harington School. Registered Company Number 9031174. Company limited by guarantee.

More information

Policy No: 2-B8. Originally Released: 2001. Date for Review: 2016

Policy No: 2-B8. Originally Released: 2001. Date for Review: 2016 Topic: Information and Communication Technology use by Students Policy No: 2-B8 Policy Area: Standing Committee: Education Religious Education and Curriculum Committee Originally Released: 2001 Date for

More information

Canadian Employment Law Overview for U.S. Employers

Canadian Employment Law Overview for U.S. Employers Canadian Employment Law Overview for U.S. Employers 110 Yonge Street Suite 1100 Toronto Ontario M5C 1T4 Tel: 416-862-1616 Toll Free: 1-866-821-7306 www.stringerllp.com Stringer LLP, all rights reserved

More information

Law Office Searches: A Primer 1. Ian R. Smith Fenton, Smith Barristers Toronto, Ontario

Law Office Searches: A Primer 1. Ian R. Smith Fenton, Smith Barristers Toronto, Ontario Law Office Searches: A Primer 1 by Ian R. Smith Fenton, Smith Barristers Toronto, Ontario Introduction This paper is intended for the lawyer who finds him- or herself in the following unpleasant situation:

More information

Internet & Technology Usage in the Networked Workplace: Legal Implications

Internet & Technology Usage in the Networked Workplace: Legal Implications Internet & Technology Usage in the Networked Workplace: Legal Implications EDDY D. VENTOSE PROFESSOR OF LAW UNIVERSITY OF THE WEST INDIES, CAVE HILL CAMPUS The Employment Process 2 Recruitment Process

More information

Cloud Computing Contracts. October 11, 2012

Cloud Computing Contracts. October 11, 2012 Cloud Computing Contracts October 11, 2012 Lorene Novakowski Karam Bayrakal Covering Cloud Computing Cloud Computing Defined Models Manage Cloud Computing Risk Mitigation Strategy Privacy Contracts Best

More information

USE OF EMPLOYEE MONITORING SOFTWARE

USE OF EMPLOYEE MONITORING SOFTWARE INVESTIGATION REPORT F15-01 USE OF EMPLOYEE MONITORING SOFTWARE BY THE DISTRICT OF SAANICH Elizabeth Denham Information and Privacy Commissioner for BC March 30, 2015 CanLII Cite: 2015 BCIPC No. 15 Quicklaw

More information

BOBCAT COMPUTING POLICY

BOBCAT COMPUTING POLICY BOBCAT COMPUTING POLICY The overarching policy governing computing and networking at Jones is the Policy on Acceptable Use of Electronic Resources. The policy is reprinted in its entirety below. Faculty,

More information

Personal Information Protection Act ( PIPA ) Privacy-Proofing Your Retail Business Tips for Protecting Customers Personal Information 1

Personal Information Protection Act ( PIPA ) Privacy-Proofing Your Retail Business Tips for Protecting Customers Personal Information 1 Personal Information Protection Act ( PIPA ) Tips for Protecting Customers Personal Information 1 More than ever before, retailers have to be prepared to deal with customers who ask questions about the

More information

Glasgow Kelvin College. Disciplinary Policy and Procedure

Glasgow Kelvin College. Disciplinary Policy and Procedure Appendix 1 Glasgow Kelvin College Disciplinary Policy and Procedure Document Control Information Status: Responsibility for Document and its implementation Responsibility for document review: Current version

More information

National Association of Pharmacy Regulatory Authority s Privacy Policy for Pharmacists' Gateway Canada

National Association of Pharmacy Regulatory Authority s Privacy Policy for Pharmacists' Gateway Canada Introduction National Association of Pharmacy Regulatory Authority s Privacy Policy for Pharmacists' Gateway Canada This Privacy Policy describes the manner in which the National Association of Pharmacy

More information

Derbyshire Constabulary GUIDANCE ON THE SAFE USE OF THE INTERNET AND SOCIAL MEDIA BY POLICE OFFICERS AND POLICE STAFF POLICY REFERENCE 09/268

Derbyshire Constabulary GUIDANCE ON THE SAFE USE OF THE INTERNET AND SOCIAL MEDIA BY POLICE OFFICERS AND POLICE STAFF POLICY REFERENCE 09/268 Derbyshire Constabulary GUIDANCE ON THE SAFE USE OF THE INTERNET AND SOCIAL MEDIA BY POLICE OFFICERS AND POLICE STAFF POLICY REFERENCE 09/268 This guidance is suitable for Public Disclosure Owner of Doc:

More information

PRAIRIE SPIRIT SCHOOL DIVISION NO. 206, BOX 809, 121 KLASSEN STREET EAST, WARMAN, SK S0K 4S0 -- PHONE: (306) 683-2800

PRAIRIE SPIRIT SCHOOL DIVISION NO. 206, BOX 809, 121 KLASSEN STREET EAST, WARMAN, SK S0K 4S0 -- PHONE: (306) 683-2800 PRAIRIE SPIRIT SCHOOL DIVISION NO. 206, BOX 809, 121 KLASSEN STREET EAST, WARMAN, SK S0K 4S0 -- PHONE: (306) 683-2800 ADMINISTRATIVE POLICY NO. 511 IMPLEMENTATION JANUARY 2014 EMPLOYEE ACCEPTABLE USE POLICY

More information

Strategies for occupational therapists to address elder abuse/mistreatment

Strategies for occupational therapists to address elder abuse/mistreatment Strategies for occupational therapists to address elder abuse/mistreatment Provincial Legal Information: ALBERTA Prepared by the Canadian Association of Occupational Therapists August 2011 This project

More information

The Legal Guide to Employee Monitoring

The Legal Guide to Employee Monitoring Written on behalf of SurfControl >Notice This document serves as a guide for general information only; it should not be considered as legal advice. We make no warranty and accept no liability as to the

More information

Court Record Access Policy

Court Record Access Policy SUPREME COURT OF BRITISH COLUMBIA Court Record Access Policy The Supreme Court of British Columbia 800 Smithe Street Vancouver, BC V6Z 2E1 www.courts.gov.bc.ca Page 1 of 39 TABLE OF CONTENTS PART I: GENERAL

More information

Data controllers and data processors: what the difference is and what the governance implications are

Data controllers and data processors: what the difference is and what the governance implications are ICO lo : what the difference is and what the governance implications are Data Protection Act Contents Introduction... 3 Overview... 3 Section 1 - What is the difference between a data controller and a

More information

PIPA and the Hiring Process

PIPA and the Hiring Process PIPA and the Hiring Process April 10, 2006 INTRODUCTION Any private sector employer who collects, uses or discloses personal information about employees or job applicants has to comply with British Columbia

More information

Terms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer

Terms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer 1 Terms & Conditions In this section you can find: - Website usage terms and conditions 1, 2, 3 - Website disclaimer -Acceptable internet use policy 1,2,3,4 - Acceptable email use policy 1, 2 - Copyright

More information

Faculty/Staff/Community Mountain Home School District Computer and Network Appropriate Use Policy

Faculty/Staff/Community Mountain Home School District Computer and Network Appropriate Use Policy Faculty/Staff/Community Mountain Home School District Computer and Network Appropriate Use Policy Mountain Home School District is responsible for securing its network and computer systems against unauthorized

More information

POLICY. Responsible Use of Social Media

POLICY. Responsible Use of Social Media POLICY Responsible Use of Social Media Contact Officer Director of Personnel Director of Communications & Participation Senior Project Manager: Corporate Policies (Policy author) Purpose The primary aims

More information

Catalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect.

Catalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect. PRIVACY POLICY 1. Introduction Catalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect. We will only collect information that

More information

INTERNET, EMAIL AND COMPUTER USE POLICY.

INTERNET, EMAIL AND COMPUTER USE POLICY. INTERNET, EMAIL AND COMPUTER USE POLICY. CONSIDERATIONS Code of Conduct Discipline and termination policy Privacy Policy Sexual Harassment policy Workplace Health & Safety Policy LEGISLATION Copyright

More information

Overview of. Health Professions Act Nurses (Registered) and Nurse Practitioners Regulation CRNBC Bylaws

Overview of. Health Professions Act Nurses (Registered) and Nurse Practitioners Regulation CRNBC Bylaws Overview of Health Professions Act Nurses (Registered) and Nurse Practitioners Regulation CRNBC Bylaws College of Registered Nurses of British Columbia 2855 Arbutus Street Vancouver, BC Canada V6J 3Y8

More information

OBJECTS AND REASONS. (a) the regulation of the collection, keeping, processing, use or dissemination of personal data;

OBJECTS AND REASONS. (a) the regulation of the collection, keeping, processing, use or dissemination of personal data; OBJECTS AND REASONS This Bill would provide for (a) the regulation of the collection, keeping, processing, use or dissemination of personal data; (b) the protection of the privacy of individuals in relation

More information

E-COMMERCE GOES MOBILE: SEEKING COMPETITIVENESS THROUGH PRIVACY

E-COMMERCE GOES MOBILE: SEEKING COMPETITIVENESS THROUGH PRIVACY E-COMMERCE GOES MOBILE: SEEKING COMPETITIVENESS THROUGH PRIVACY Oana Dolea 7 th Annual Leg@l.IT Conference March 26th, 2013 Montreal, Canada INTRODUCTION Mobile e-commerce vs. E-commerce Mobile e-commerce:

More information

Protecting your privacy

Protecting your privacy Protecting your privacy Table of Contents Answering your questions about privacy Your privacy... 1 Your consent... 1 Answering your questions about privacy... 2 About cookies... 9 Behavioural Advertising/Online

More information

INFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013

INFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013 INFORMATION SECURITY GUIDE Cloud Computing Outsourcing Information Security Unit Information Technology Services (ITS) July 2013 CONTENTS 1. Background...2 2. Legislative and Policy Requirements...3 3.

More information

POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406. APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014

POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406. APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014 POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406 SECTION: 400 : Facilities and Equipment Page 1 of 8 APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014 CROSS

More information

BASIC CONCEPTS IN EMPLOYMENT LAW

BASIC CONCEPTS IN EMPLOYMENT LAW BASIC CONCEPTS IN EMPLOYMENT LAW Jeffrey A.L. Kriwetz Partner Garfinkle, Biderman LLP Suite 801 1 Adelaide Street East Toronto, Ontario M5C 2V9 416.869.1234 ext. 234 416.869.0547 (fax) jkriwetz(ii2garfinkle.com

More information

USE OF INFORMATION TECHNOLOGY FACILITIES

USE OF INFORMATION TECHNOLOGY FACILITIES POLICY CI-03 USE OF INFORMATION TECHNOLOGY FACILITIES Document Control Statement This Policy is maintained by the Information Technology Department. Any printed copy may not be up to date and you are advised

More information

Credit Union Code for the Protection of Personal Information

Credit Union Code for the Protection of Personal Information Introduction Canada is part of a global economy based on the creation, processing, and exchange of information. The technology underlying the information economy provides a number of benefits that improve

More information

British Columbia Personal Information Protection Act. Frequently Asked Questions:

British Columbia Personal Information Protection Act. Frequently Asked Questions: British Columbia Personal Information Protection Act Frequently Asked Questions: (Further queries may be sent to Bob Stewart at the B.C. Conference Archives.) (1) What is the Personal Information Protection

More information

CREATIVE OPPORTUNITIES WEBSITE TERMS OF USE RECRUITERS

CREATIVE OPPORTUNITIES WEBSITE TERMS OF USE RECRUITERS CREATIVE OPPORTUNITIES WEBSITE TERMS OF USE RECRUITERS These terms and conditions ("Terms") apply to you if you use of the Website (as defined below) as an Employer or Recruiter (as defined below) If you

More information

Terms of Service. Your Information and Privacy

Terms of Service. Your Information and Privacy These terms of service (the "Terms") govern your access to and use of the Online File Storage ("OFS") websites and services (the "Service"). The Terms are between DigitalMailer, Incorporated and Digital

More information

Disciplinary and Dismissals Policy

Disciplinary and Dismissals Policy Policy Purpose/statement/reason for being Disciplinary and Dismissals Policy E.G - MIP is designed to strengthen the effectiveness of individual s contribution to the Council s success. Purpose The Disciplinary

More information

Index All entries in the index reference page numbers.

Index All entries in the index reference page numbers. Index All entries in the index reference page numbers. A Audit of organizations, 37-38, Access to personal information 162-163 by individual, 22, 31, 151-154 B assistance by organization, Biometrics, 123-125

More information

FIDELITY APPLICANT PRIVACY AND PROTECTION NOTICE

FIDELITY APPLICANT PRIVACY AND PROTECTION NOTICE FIDELITY APPLICANT PRIVACY AND PROTECTION NOTICE Last Updated: November 2012 FMR LLC and its affiliated entities ( Fidelity ) value your trust and are committed to the responsible management, use and protection

More information

The Resource Newsletter for Home and Hospice Care March 2010. Home Care The Law

The Resource Newsletter for Home and Hospice Care March 2010. Home Care The Law The Resource Newsletter for Home and Hospice Care March 2010 & Home Care The Law LEGAL HOT TOPIC: Employee Monitoring: Know the Risks or Risk Major Liability by Robert W. Markette, Jr., CHC. This issue

More information

APPROPRIATE USE OF INFORMATION POLICY 3511 TECHNOLOGY RESOURCES ADOPTED: 06/17/08 PAGE 1 of 5

APPROPRIATE USE OF INFORMATION POLICY 3511 TECHNOLOGY RESOURCES ADOPTED: 06/17/08 PAGE 1 of 5 PAGE 1 of 5 PURPOSE Triton College s computer and information network is a continually growing and changing resource supporting thousands of users and systems. These resources are vital for the fulfillment

More information

Updated February 15, 2008 MINISTRY OF HEALTH SOFTWARE SUPPORT ORGANIZATION SERVICE LEVEL AGREEMENT

Updated February 15, 2008 MINISTRY OF HEALTH SOFTWARE SUPPORT ORGANIZATION SERVICE LEVEL AGREEMENT BETWEEN: HER MAJESTY THE QUEEN IN RIGHT OF THE PROVINCE OF BRITISH COLUMBIA, represented by the Minister of Health ( the Ministry as the Province as applicable) at the following address: Assistant Deputy

More information

Data Protection Division Guidance Note Number 10/08

Data Protection Division Guidance Note Number 10/08 Gibraltar Regulatory Authority Data Protection Division Data Protection Division Data Protection Division Guidance Note Number 10/08 Monitoring of Staff Guidance Note Number 10/08 Issue Date: 06/11/2008

More information

ALBERTA OFFICE OF THE INFORMATION AND PRIVACY COMMISSIONER ORDER F2015-41. December 18, 2015 CALGARY POLICE SERVICE. Case File Number F6681

ALBERTA OFFICE OF THE INFORMATION AND PRIVACY COMMISSIONER ORDER F2015-41. December 18, 2015 CALGARY POLICE SERVICE. Case File Number F6681 ALBERTA OFFICE OF THE INFORMATION AND PRIVACY COMMISSIONER ORDER F2015-41 December 18, 2015 CALGARY POLICE SERVICE Case File Number F6681 Office URL: www.oipc.ab.ca Summary: The Complainant complained

More information

GPS Tracking of Employees: Balancing Employees Right to Privacy with Employers Right to Know

GPS Tracking of Employees: Balancing Employees Right to Privacy with Employers Right to Know GPS Tracking of Employees: Balancing Employees Right to Privacy with Employers Right to Know The Law, Potential Issues, and Best Practices. By Brian J. Moore and Ashley C. Pack Presenters Bi Brian J. Moore

More information

LEGISLATION COMMITTEE OF THE CROATIAN PARLIAMENT

LEGISLATION COMMITTEE OF THE CROATIAN PARLIAMENT LEGISLATION COMMITTEE OF THE CROATIAN PARLIAMENT 2300 Pursuant to its authority from Article 59 of the Rules of Procedure of the Croatian Parliament, the Legislation Committee determined the revised text

More information

Conditions of Use. Communications and IT Facilities

Conditions of Use. Communications and IT Facilities Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other

More information

Policy on the Security of Informational Assets

Policy on the Security of Informational Assets Policy on the Security of Informational Assets Policy on the Security of Informational Assets 1 1. Context Canam Group Inc. recognizes that it depends on a certain number of strategic information resources

More information