DATA THEFT OR LOSS: TEN THINGS YOUR LAWYER MUST TELL YOU ABOUT HANDLING INFORMATION by Craig Bavis and Michael Parent

Size: px
Start display at page:

Download "DATA THEFT OR LOSS: TEN THINGS YOUR LAWYER MUST TELL YOU ABOUT HANDLING INFORMATION by Craig Bavis and Michael Parent"

Transcription

1 FEATURE ARTICLE July/August 2007 DATA THEFT OR LOSS: TEN THINGS YOUR LAWYER MUST TELL YOU ABOUT HANDLING INFORMATION by Craig Bavis and Michael Parent Craig Bavis is a labour and employment lawyer with the Victory Square Law Office LLP, Vancouver BC Michael Parent is Associate Professor, Segal Graduate School of Business, Simon Fraser University. Most organizations spend vast sums on information technology to gather, manipulate, store, and use the information and data they gather. Yet, as these authors point out, managing this resource entails protecting it and complying with all laws and regulations. The authors prescribe ten best practices that should allow an organization to protect its data and comply with the law. AN INFORMATION-HANDLING CHECKLIST: 1. Does every manager and employee in the organization know which privacy legislation applies, and how it applies to information? 2. Does the organization have an appropriate privacy officer? 3. Do policies and practices reflect the 10 principles is based on? 4. Is the information collected by the organization reasonably required? 5. Does the organization safeguard information when it is accessed, used, and stored by third parties? 6. Does the organization have policies and procedures in place for employees to access their information? 7. Are there clear policies on the use of information systems? Have they been communicated to employees and consistently enforced? 8. Have managers considered how other statutory and contractual privacy rights apply to the organization? 9. Is there a contingency in place if information systems are seized? 10. Does the organization identify and protect privileged legal information? Earlier this year, the TJ Maxx group of companies (TJX), which includes the HomeSense and Winners stores, was left scrambling after hackers stole and used customer data, including credit and debit card information. As a result of this transgression, and of accusations by the U.S. Federal Trade Commission (FTC) that TJX handled its data improperly, the stock price for the company took a drop of over 5% 1. This is notable for the fact that it is significantly more than the average drop of 2.1% that researchers recently calculated for other hacked companies. 2 TJ Maxx joins a growing group of organizations whose managers do not safeguard or use employee and customer data adequately, and in doing so, expose their company to considerable financial risk. According to the Privacy Rights Clearinghouse, the security and privacy of over 100 million records have been compromised in 474 security breaches worldwide since February 15, 2005 the day that ChoicePoint, a U.S.-based consumer records company, provided over 150,000 records to fraudsters. For its laxity, ChoicePoint paid $15 million in fines and restitution. 3 Unfortunately, this situation is only going to worsen. The first 34 days of 2007 saw 35 security breaches, and over 725,000 private records compromised. At this rate, we can expect nearly 400 breaches and 10 million records compromised this year alone. What are companies doing about it? If TJ Maxx, ChoicePoint and many others are to be believed, the answer is very little, save extensive damage control after the fact the Internet equivalent of locking the corral gate after all the horses have bolted. Almost all of an organization s critical information is now kept electronically. The sad truth is that many organizations have not fully-considered the privacy and security implications surrounding these data in developing and deploying their enterprise information systems.

2 Only a portion of potential liability to organizations over the use of their information systems comes from external threats. While these threats are real, organizations that focus only on external threats do so at their peril. Managers must realize that there are potential legal claims and issues that may arise from how information is used internally, particularly as employees and unions assert privacy rights which may conflict with management rights. Organizations need to ensure that, in addition to safeguarding their data, they develop appropriate controls on how information is used and disclosed by people in their organizations. In this article, our goal is to identify the legal issues that should be considered in the development of enterprise information systems. We aim to provide senior managers and boards with a succinct checklist or oversight document that they can then use to engage their Chief Information Officers (CIOs) and auditors in meaningful dialogues about the security and privacy of data in their organizations. There are 10 critical things managers should be aware of. 1. An organization s use of information is governed by specific legislation the Personal Information and Protection of Electronic Documents Act was enacted in April, 2000 by the Canadian federal government. As of January 2004, it applies to the collection, use and disclosure of personal information by any organization in the course of commercial activity within a province and all personal information in all interprovincial and international transactions. The only exception occurs if a province has passed privacy legislation which is deemed to be substantially similar to. That legislation then applies to provincially regulated companies, except in respect of transborder transactions. Table 1 outlines the various pieces of legislation that apply to the different types of organizations in each province. Only Quebec, British Columbia and Alberta have passed privacy legislation regulating the private sector which is substantially similar to. Every jurisdiction has enacted its own legislation regulating privacy rights and access to information in the public sector. Not following the applicable legislation means that an organization is breaking the law. Each law has different rules, requirements, and penalties. It is critical that managers know which piece of legislation applies to the organization and that they comply with that legislation. For example, an individual or organization knowingly violating certain sections of can be charged with an indictable offence and a fine of up to $100,000 (, section 28). 2. requires that an organization have a privacy officer Every business needs to have a designated individual (commonly referred to as a privacy officer), not only for the practical purpose of keeping track of all of the legal restrictions on the use of information, but also because (schedule 1, section 4.1) states that an organization is responsible for personal information under its control and shall designate an individual or individuals who are accountable for the organization s compliance with the... principles [set out in ]. Ideally, this should not be the organization s Chief Information Officer (CIO). It may not be realistic to assume that one individual can handle the demands of both managing information systems and the obligations of a privacy officer. The privacy officer plays an important regulatory and compliance role in the organization - one which may conflict with the CIO s priorities. The privacy officer has to ensure that all departments in the organization are complying with, and serves as the contact person with outside organizations and individuals seeking access to information. It is a job that goes beyond monitoring how electronic information is gathered, stored, manipulated and used within the organization and requires the development of and implementation of clear policies and practices. Further, the privacy officer must investigate and respond to complaints about how the organization uses information. 3. is based on ten principles 4 An organization s obligation under goes far beyond protecting personal information from external threats. Safeguarding information is only one of the ten principles on which is based. While information technology security is important, organizations must ensure that information policies and practices meet all of the following principles: Be accountable Identify the purpose for collecting information Obtain consent from the individual the information is about Limit collection to what is reasonably needed for the purpose Limit use, disclosure and retention to what is reasonable needed Be accurate Use appropriate safeguards to protect information Be open about the organization s privacy practices and procedures Give individuals access to their information Provide recourse for individuals with complaints or inquiries 4. significantly restricts the collection of information A significant number of complaints made under are about the collection of information in ways that managers might otherwise think are reasonable. The Office of the Privacy Commissioner of Canada has found that the following instances constituted inappropriate collection of personal information: Banks requiring customers to provide a Social Insurance Number 5 ; a credit check 6 ; and a birth date 7 to open a bank account; A courier company requiring customers to provide electronic signatures to receive parcels 8 ;

3 An employer requiring employees to provide a medical note with a diagnosis for sick benefits 9 ; A bank requiring a customer to provide a Revenue Canada Notice of Assessment to qualify for a line of credit 10 ; An airline requiring customers to give their birthdate, SIN, and occupation to submit a claim for lost baggage 11 ; An employer installing video surveillance cameras that could be used to monitor employees 12 ; and A company using internet cookies for customers accessing its website Organizations are responsible for the use of information they collect even if this information is not in their possession If an organization outsources or uses third parties to provide payroll or human resources services, storage, customer relationship management (e.g. affinity programs) or process documents or records, it is still responsible for the use of that information. While the information may not be in an organization s possession, it is considered to be in that organization s control. The organization may be liable if the third party breaches with information provided to them. 14 For example, the Canadian Imperial Bank of Commerce (CIBC) is being investigated by Canada s privacy commissioner for a possible contravention of as a result of the loss of a backup data drive by its subsidiary, Talvest Mutual Funds, earlier this year. The drive in question was in transit between Montreal and Toronto. It contained personal and financial information (including date-of-birth and social insurance numbers) for 470,000 customers. 15 This is the second critical data incident for CIBC in recent years. In 2005, the bank was investigated by the privacy commissioner for repeatedly faxing sensitive customer information to a junkyard operator in West Virginia, USA for three years Individuals have a right to know how their personal information is used requires the organization to provide individuals (upon request) personal information in the organization s control, the ways in which this personal information is used, and the identities of any other organizations to which their personal information has been provided. As such, the organization needs to have policies in place to handle such requests. In Alberta, B.C, and Quebec, and in federally-regulated businesses such as banks, telecommunications and transportation companies, employees have specific rights under privacy legislation to access their employment information 17. Most collective agreements also contain similar provisions. This not only includes official personnel files, but also informal comments that supervisors may have made about employees in memos or s. The organization must ensure that it tracks how personal information is used and who has access to that information. It must also have a policy and procedures on how to process these requests in a timely and accurate manner. 7. Senior Management MUST tell employees clearly how they can use information systems Although it may seem obvious that employees should only use an organization s information technology appropriately (e.g. by not accessing pornographic or other objectionable web sites), failure to clearly communicate standards and limitations on the use of technology can limit managers ability to discipline employees for such uses and may expose an organization to liability. Additionally, if senior managers have not told employees that they may monitor Internet usage, accounts, or computers, they are then violating their privacy if they do so. Canadian courts have recognized that employees have a reasonable expectation of privacy on employer computers used by employees. The organization needs to decide if it has a reasonable basis for monitoring employees use of information technology. If so, managers need to set criteria for what will be monitored and how, (i.e. bandwidth usage, visits to certain websites, or keyword searches of s). These criteria must then be communicated, along with the reasons for and the limitations in the policy to employees, and consistently enforced across the organization. 8. There are other legal restrictions which might govern an organization s use of information Although is the most significant law which regulates how an organization uses information, other legislation and contracts also apply and, in some cases, override. For example, while the privacy legislation may restrict what information an employer can provide to a trade union about employees, it may be an unfair labour practice and a violation of the province s Labour Relations Code to refuse to provide certain information to a union which represents employees. Conversely, while privacy legislation might permit the organization to use employee medical information in a particular way, the province s Workers Compensation Act may prevent it from doing so. Other legislation, such as the Securities Act, may also restrict what financial information can be provided. Other contracts and agreements, such as collective agreements with unions, can also contain additional restrictions. It is cold comfort to human resources managers to know that while the organization has met the requirements of privacy legislation, an arbitrator has found that a particular use of information violates the collective agreement. Therefore, while the privacy protections of are important, they are not always paramount. 9. Information systems can be seized and organizations can be required to produce information Aside from, both the criminal and civil legal systems contain mechanisms that can require organizations to produce information to another party or the police, often information they might prefer not to disclose. In exceptional circumstances, information systems can be seized without prior notice. Whether the organization is a defendant or plaintiff in a lawsuit, the rules of civil litigation allow the opposing party to require it to produce information that they believe may be relevant to issues in the litigation. Although far less likely, the police and sheriffs acting under court orders can be granted the legal authority to seize information systems without notice in circumstances where advance notice of the seizure might lead to loss of the

4 information sought. For example, police may obtain a search warrant against an organization s computers to investigate breaches of obscenity laws, hate propaganda laws, or criminal harassment laws. Therefore, it is critical that the organization have a contingency plan in the event that such an order is exercised as it may find the police carting off its only server and vital workstations as evidence. Neither the best firewall in the world or full compliance with will protect the interests of an organization if there is no contingency plan for the occasion when a sheriff or the police show up with a court order to seize computers, backup disks, servers and workstations. 10. Certain information is privileged and cannot be disclosed The larger and more complex the organization, the more likely that its information systems contain communications with legal advisors, whether those advisors are lawyers in practice outside of the organization or lawyers employed by the firm. Information provided by lawyers, including legal opinions; managers communications with lawyers, including instructions; and other information provided to lawyers to prepare for litigation such as expert medical reports, are likely privileged information that an organization is not required to provide to an outside party. This includes the police or sheriffs acting under a court order. Solicitor-client privilege extends to voice mails, s, letters, and even a lawyer s bills. An organization must take steps to ensure that if it is required to produce information, this privileged information is protected and not disclosed. Information is a critical resource, and most organizations spend vast sums on information technology to gather, manipulate, store, and present this information in a timely and accurate manner to decision-makers. However, management of this resource also entails protecting it, and complying with all laws and regulations. Failure to do so can have serious consequences, not only from a legal perspective, but also in terms of firm valuations and shareholder wealth. Good governance over information and information systems reduces risk, mitigates the impact of information disasters, lowers the cost of capital, and prevents disasters in disaster recovery. Reprint: 9B07TD03 Table 1 Summary of Privacy Legislation Jurisdiction and website / Act(s) Public SectorOrganizations Private SectorOrganizations Federal AB * BC MB * NB NL NS ON * QB PEI SK * R.S.C., 1985, c. P-21 R.S.A. 2000, c. F-25 R.S.B.C. 1996, c. 165 C.C.S.M. c. F175 Protection of Personal Information Act, S.N.B. 1998, c. P-19.1; Right to Information Act, S.N.B. 1978, R-10.3 Access to Information and Protection of S.N.L. 2002, c. A-1.1 S.N.S. 1993, c.5 R.S.O. 1990, c. F.31 An Act respecting Access to Documents held by Public Bodies and the Protection of Personal Information, R.S.Q, c. A-2.1 R.S.P.E.I. 1988, c. F Privacy Act Personal Information and Protection of Electronic Documents Act, ( ) S.C. 2000, c. 5 Personal Information Protection Act, S.A. 2003, c. P-6.5 Personal Information Protection Act, S.B.C. 2003, c. 63 An Act respecting the Protection of Personal Information in the Private Sector, R.S.Q, c. P-39.1

5 S.S , c. F * These jurisdictions have also enacted additional privacy legislation specifically regarding health care information and medical records. REFERENCES 1. Press Releases, The TJX Companies, Inc. Victimized By Computer Systems Intrusion; Provides Information to Help Protect Customers, January 17, 2007 at Frequently Asked Questions, January 17, 2007 at both accessed February 6, 2007; and CIO Staff, The TJX security breach. This one s different. Way different. February 1, 2007 at accessed February 7, H. Cavusoglu, M. Birendra, R. Srinivasan, The Effect of Internet Security Breach Announcements on Market Value: Capital Market Reactions for Breached Firms and Internet Security Developers, International Journal of Electronic Commerce, Fall 2004, 9/1, pp Privacy Rights Clearinghouse, A Chronology of Data Breaches, February 3, 2007 at accessed February 7, These principles are explained in the context of the B.C. privacy legislation at accessed February 25, accessed February 25, accessed February 25, accessed February 25, accessed February 25, accessed February 25, accessed February 25, accessed February 25, accessed February 25, accessed February 25, For an example of an agreement for third party use of information, see _9.pdf accessed February 25, Lau, K. CIBC s loss of back up drive hints at lack of safeguards, IT World Canada, January 22, Available at d31412d693f2.html accessed February 26, Stewart, S. CIBC loses info on 470,000 Canadians, The Globe & Mail, January 18, Available at accessed February 26, For further explanation about the application of in the workplace, see: accessed February 25, Comment on this article Read Responses About the Authors Craig Bavis Craig Bavis is a labour and employment lawyer with the Victory Square Law Office LLP, Vancouver BC Michael Parent Michael Parent is Associate Professor, Segal Graduate School of Business, Simon Fraser University, Vancouver BC, and Visiting Professor, The University of Queensland, Australia. Printable Version Return to Home

6 Adobe Acrobat Reader is required to view articles on this site. Terms of Use Privacy Policy 2002 Ivey Business Journal (Reprinted with permission, Ivey Business Journal July/August 2007)

Index All entries in the index reference page numbers.

Index All entries in the index reference page numbers. Index All entries in the index reference page numbers. A Audit of organizations, 37-38, Access to personal information 162-163 by individual, 22, 31, 151-154 B assistance by organization, Biometrics, 123-125

More information

Personal Information Protection Act ( PIPA ) Privacy-Proofing Your Retail Business Tips for Protecting Customers Personal Information 1

Personal Information Protection Act ( PIPA ) Privacy-Proofing Your Retail Business Tips for Protecting Customers Personal Information 1 Personal Information Protection Act ( PIPA ) Tips for Protecting Customers Personal Information 1 More than ever before, retailers have to be prepared to deal with customers who ask questions about the

More information

Data Management: Considerations for Integrating Compliance Requirements At Home and Abroad. Toronto, Ontario June 14, 2005

Data Management: Considerations for Integrating Compliance Requirements At Home and Abroad. Toronto, Ontario June 14, 2005 Data Management: Considerations for Integrating Compliance Requirements At Home and Abroad Toronto, Ontario June 14, 2005 Outsourcing Update: New Contractual Options and Risks Lisa K. Abe June 14, 2005

More information

Law Firm Compliance: Key Privacy Considerations for Lawyers and Law Firms in Ontario

Law Firm Compliance: Key Privacy Considerations for Lawyers and Law Firms in Ontario PRIVACY COMPLIANCE ISSUES FOR LAW FIRMS IN ONTARIO By Sara A. Levine 1 Presented at Law Firm Compliance: Key Privacy Considerations for Lawyers and Law Firms in Ontario Ontario Bar Association, May 6,

More information

Privacy Law in Canada

Privacy Law in Canada by PATRICIA WILSON & MICHAEL FEKETE Protection of personal information remains at the forefront of public policy debate in. Federal and provincial privacy legislation has a profound impact on the way virtually

More information

CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES:

CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES: CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES: Privacy Responsibilities and Considerations Cloud computing is the delivery of computing services over the Internet, and it offers many potential

More information

Taking care of what s important to you

Taking care of what s important to you A v i v a C a n a d a I n c. P r i v a c y P o l i c y Taking care of what s important to you Table of Contents Introduction Privacy in Canada Definition of Personal Information Privacy Policy: the ten

More information

Cloud Computing: Privacy and Other Risks

Cloud Computing: Privacy and Other Risks December 2013 Cloud Computing: Privacy and Other Risks by George Waggott, Michael Reid and Mitch Koczerginski, McMillan LLP Introduction While the benefits of outsourcing organizational data storage to

More information

Credit Union Code for the Protection of Personal Information

Credit Union Code for the Protection of Personal Information Introduction Canada is part of a global economy based on the creation, processing, and exchange of information. The technology underlying the information economy provides a number of benefits that improve

More information

Insights and Commentary from Dentons

Insights and Commentary from Dentons dentons.com Insights and Commentary from Dentons On March 31, 2013, three pre-eminent law firms Salans, Fraser Milner Casgrain, and SNR Denton combined to form Dentons, a Top 10 global law firm with more

More information

ROHIT GROUP OF COMPANIES PRIVACY POLICY This privacy policy is subject to change without notice. It was last updated on July 23, 2014.

ROHIT GROUP OF COMPANIES PRIVACY POLICY This privacy policy is subject to change without notice. It was last updated on July 23, 2014. ROHIT GROUP OF COMPANIES PRIVACY POLICY This privacy policy is subject to change without notice. It was last updated on July 23, 2014. The Rohit Group of Companies ( Rohit Group, Company, our, we ) understands

More information

Boys and Girls Clubs of Kawartha Lakes B: Administration B4: Information Management & Policy: Privacy & Consent Technology

Boys and Girls Clubs of Kawartha Lakes B: Administration B4: Information Management & Policy: Privacy & Consent Technology Effective: Feb 18, 2015 Executive Director Replaces: 2010 Policy Page 1 of 5 REFERENCE: HIGH FIVE 1.4.3, 2.2.4, 2.5.3, PIDEDA POLICY: Our Commitment Boys and Girls Clubs of Kawartha Lakes (BGCKL) and the

More information

Selected Annotated Bibliography Personal Health Information, Privacy and Access

Selected Annotated Bibliography Personal Health Information, Privacy and Access A. National Personal Information Protection and Electronic Documents Act, S.C. 2000, c. 5 canlii.org/en/ca/laws/stat/sc-2000-c-5/latest/sc-2000-c-5.html Privacy Act, R.S.C. 1985, c. P-21 canlii.org/en/ca/laws/stat/rsc-1985-c-p-21/latest/rsc-1985-c-p-21.html

More information

Privacy Law in Canada

Privacy Law in Canada Privacy Law in Canada Federal and provincial privacy legislation has a profound impact on the way virtually all organizations carry on business across the country. Canada s privacy laws, while likely the

More information

POLICE RECORD CHECKS IN EMPLOYMENT AND VOLUNTEERING

POLICE RECORD CHECKS IN EMPLOYMENT AND VOLUNTEERING POLICE RECORD CHECKS IN EMPLOYMENT AND VOLUNTEERING Know your rights A wide range of organizations are requiring employees and volunteers to provide police record checks. Privacy, human rights and employment

More information

How To Ensure Health Information Is Protected

How To Ensure Health Information Is Protected pic pic CIHI Submission: 2011 Prescribed Entity Review October 2011 Who We Are Established in 1994, CIHI is an independent, not-for-profit corporation that provides essential information on Canada s health

More information

The Use of Cloud Computing for the Storing and Accessing of Client Information: Some Practical and Ethical Considerations

The Use of Cloud Computing for the Storing and Accessing of Client Information: Some Practical and Ethical Considerations The Use of Cloud Computing for the Storing and Accessing of Client Information: Some Practical and Ethical Considerations Jeffrey D. Scott Jeffrey D. Scott, Legal Professional Corporation Practice Advisors

More information

We will not collect, use or disclose your personal information without your consent, except where required or permitted by law.

We will not collect, use or disclose your personal information without your consent, except where required or permitted by law. HSBC Privacy Notice HSBC's Privacy Principles HSBC Bank Canada is a subsidiary of HSBC Holdings plc which, together with its subsidiaries and affiliates, is one of the world s largest banking and financial

More information

AN INTRO TO. Privacy Laws. An introductory guide to Canadian Privacy Laws and how to be in compliance. Laura Brown

AN INTRO TO. Privacy Laws. An introductory guide to Canadian Privacy Laws and how to be in compliance. Laura Brown AN INTRO TO Privacy Laws An introductory guide to Canadian Privacy Laws and how to be in compliance Laura Brown Air Interactive Media Senior DMS Advisor A Publication of 1 TABLE OF CONTENTS Introduction

More information

PIPEDA and Online Backup White Paper

PIPEDA and Online Backup White Paper PIPEDA and Online Backup White Paper The cloud computing era has seen a phenomenal growth of the data backup service industry. Backup service providers, by nature of their business, are compelled to collect

More information

Data controllers and data processors: what the difference is and what the governance implications are

Data controllers and data processors: what the difference is and what the governance implications are ICO lo : what the difference is and what the governance implications are Data Protection Act Contents Introduction... 3 Overview... 3 Section 1 - What is the difference between a data controller and a

More information

Protecting your privacy

Protecting your privacy Protecting your privacy Table of Contents Answering your questions about privacy Your privacy... 1 Your consent... 1 Answering your questions about privacy... 2 About cookies... 9 Behavioural Advertising/Online

More information

The Manitoba Child Care Association PRIVACY POLICY

The Manitoba Child Care Association PRIVACY POLICY The Manitoba Child Care Association PRIVACY POLICY BACKGROUND The Manitoba Child Care Association is committed to comply with the legal obligations imposed by the federal government's Personal Information

More information

Taking care of what s important to you

Taking care of what s important to you National Home Warranty Group Inc. Privacy Policy Taking care of what s important to you Table of Contents Introduction Privacy in Canada Definition of Personal Information Privacy Policy: the ten principles

More information

Cloud Computing: Trust But Verify

Cloud Computing: Trust But Verify Cloud Computing: Trust But Verify 14th Annual Privacy and Security Conference February 8, 2013, Victoria Martin P.J. Kratz, QC Bennett Jones LLP Cloud Computing Provision of services available on the Internet

More information

CLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING?

CLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING? CLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING? Lindsey Finch Senior Global Privacy Counsel Salesforce.com lfinch@salesforce.com David T.S. Fraser Partner McInnes Cooper David.fraser@mcinnescooper.com

More information

Employment and Labour Law in Canada

Employment and Labour Law in Canada by JIM HASSELL & SVEN POYSA The constant change associated with employment and labour law in poses a significant challenge for employers doing business here. That challenge is compounded by the fact that

More information

Employment and Labour Law in Canada

Employment and Labour Law in Canada Employment and Labour Law in Canada By Colin Kelly & Sven Poysa Frequent changes in Canadian employment and labour law present a significant challenge for employers doing business here. That challenge

More information

Cloud Computing: Legal Risks and Best Practices

Cloud Computing: Legal Risks and Best Practices Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent

More information

Central LHIN Governance Manual. Title: Whistleblower Policy Policy Number: GP-003

Central LHIN Governance Manual. Title: Whistleblower Policy Policy Number: GP-003 Central LHIN Governance Manual Title: Whistleblower Policy Policy Number: GP-003 Purpose: Originated: September 25, 2012 Board Approved: September 25, 2012 To set out the LHIN s obligations under the Public

More information

NOTICE OF CERTIFICATION OF IKO ORGANIC SHINGLES CLASS ACTION IN CANADA

NOTICE OF CERTIFICATION OF IKO ORGANIC SHINGLES CLASS ACTION IN CANADA NOTICE OF CERTIFICATION OF IKO ORGANIC SHINGLES CLASS ACTION IN CANADA If you are a current or former owner or lessee of a building in Canada with IKO Organic Shingles, your legal rights could be affected

More information

HIPAA Security Alert

HIPAA Security Alert Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information

More information

Strategies for occupational therapists to address elder abuse/mistreatment

Strategies for occupational therapists to address elder abuse/mistreatment Strategies for occupational therapists to address elder abuse/mistreatment Provincial Legal Information: ALBERTA Prepared by the Canadian Association of Occupational Therapists August 2011 This project

More information

Transferring Personal Information about Canadians Across Borders Implications of the USA PATRIOT Act

Transferring Personal Information about Canadians Across Borders Implications of the USA PATRIOT Act Office of the Commissariat Privacy Commissioner à la protection de of Canada la vie privée du Canada Transferring Personal Information about Canadians Across Borders Implications of the USA PATRIOT Act

More information

PACIFIC EXPLORATION & PRODUCTION CORPORATION INSIDER TRADING POLICY

PACIFIC EXPLORATION & PRODUCTION CORPORATION INSIDER TRADING POLICY PACIFIC EXPLORATION & PRODUCTION CORPORATION INSIDER TRADING POLICY Introduction: Pacific Exploration & Production Corporation (the Corporation ) encourages all employees to become shareholders on a long-term

More information

Metadata, Electronic File Management and File Destruction

Metadata, Electronic File Management and File Destruction Metadata, Electronic File Management and File Destruction By David Outerbridge, Torys LLP A. Metadata What is Metadata? Metadata is usually defined as data about data. It is a level of extra information

More information

ALBERTA OFFICE OF THE INFORMATION AND PRIVACY COMMISSIONER ORDER F2015-41. December 18, 2015 CALGARY POLICE SERVICE. Case File Number F6681

ALBERTA OFFICE OF THE INFORMATION AND PRIVACY COMMISSIONER ORDER F2015-41. December 18, 2015 CALGARY POLICE SERVICE. Case File Number F6681 ALBERTA OFFICE OF THE INFORMATION AND PRIVACY COMMISSIONER ORDER F2015-41 December 18, 2015 CALGARY POLICE SERVICE Case File Number F6681 Office URL: www.oipc.ab.ca Summary: The Complainant complained

More information

QUESTERRE ENERGY CORPORATION (the Corporation ) INSIDER TRADING AND REPORTING POLICY

QUESTERRE ENERGY CORPORATION (the Corporation ) INSIDER TRADING AND REPORTING POLICY QUESTERRE ENERGY CORPORATION (the Corporation ) INSIDER TRADING AND REPORTING POLICY The purpose of this insider policy is to summarize the insider trading restrictions to which directors, officers, consultants

More information

IN THE SUPREME COURT OF BRITISH COLUMBIA NOTICE OF CIVIL CLAIM. This action has been started by the plaintiff for the relief set out in Part 2 below.

IN THE SUPREME COURT OF BRITISH COLUMBIA NOTICE OF CIVIL CLAIM. This action has been started by the plaintiff for the relief set out in Part 2 below. IN THE SUPREME COURT OF BRITISH COLUMBIA No. ----- Vancouver Registry BETWEEN: THE BRITISH COLUMBIA CIVIL LIBERTIES ASSOCIATION Plaintiff AND: THE ATTORNEY GENERAL OF CANADA Defendant Narne and address

More information

CANADIAN PRIVACY AND DATA RESIDENCY REQUIREMENTS. White Paper

CANADIAN PRIVACY AND DATA RESIDENCY REQUIREMENTS. White Paper CANADIAN PRIVACY AND DATA RESIDENCY REQUIREMENTS White Paper Table of Contents Addressing compliance with privacy laws for cloud-based services through persistent encryption and key ownership... Section

More information

SPECIAL ISSUES IN CANADIAN IT OUTSOURCING BY C. IAN KYER AND JOHN BEARDWOOD

SPECIAL ISSUES IN CANADIAN IT OUTSOURCING BY C. IAN KYER AND JOHN BEARDWOOD SPECIAL ISSUES IN CANADIAN IT OUTSOURCING BY C. IAN KYER AND JOHN BEARDWOOD INTRODUCTION For an American service provider, doing an outsourcing in Canada is like a fan of the National League Chicago Cubs

More information

Issue #5 July 9, 2015

Issue #5 July 9, 2015 Issue #5 July 9, 2015 Breach Response Plans by Lyndsay A. Wasser, CIPP/C, Co-Chair Privacy Privacy breaches can occur despite an organization s best efforts to prevent them. When such incidents arise,

More information

DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT

DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT Advisor Article DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT By James R. Carroll, David S. Clancy and Christopher G. Clark* Skadden, Arps, Slate, Meagher & Flom Customer data security

More information

INFORMATION PRIVACY POLICY FOR WORKERS

INFORMATION PRIVACY POLICY FOR WORKERS INFORMATION PRIVACY POLICY FOR WORKERS February 2015 INFORMATION PRICACY FEBRUARY 2014 Information Privacy Policy for Workers SITA Australia Pty Ltd (ACN 002 902 650) This Information Privacy Policy for

More information

Personal Information Protection Act. Information Sheet 5: 1. Personal Employee Information

Personal Information Protection Act. Information Sheet 5: 1. Personal Employee Information Personal Information Protection Act Information Sheet 5 Introduction The Personal Information Protection Act (PIPA) governs the collection, use, disclosure, retention and protection of personal information

More information

3. Consent for the Collection, Use or Disclosure of Personal Information

3. Consent for the Collection, Use or Disclosure of Personal Information PRIVACY POLICY FOR RENNIE MARKETING SYSTEMS Our privacy policy includes provisions of the Personal Information Protection Act (BC) and the Personal Information Protection and Electronic Documents Act (Canada),

More information

Accountable Privacy Management in BC s Public Sector

Accountable Privacy Management in BC s Public Sector Accountable Privacy Management in BC s Public Sector Contents Accountable Privacy Management In BC s Public Sector 2 INTRODUCTION 3 What is accountability? 4 Steps to setting up the program 4 A. PRIVACY

More information

CYBER LIABILITY CLAIMS

CYBER LIABILITY CLAIMS CYBER LIABILITY CLAIMS TRENDS AND DEVELOPMENTS IN THE U.S. AND CANADA Animateur / Moderator: Daniel Desjardins, Senior Director Global Risk Management & Insurance, Bombardier Inc. Conférenciers / Speakers:

More information

Doing Business. A Practical Guide. casselsbrock.com. Canada. Dispute Resolution. Foreign Investment. Aboriginal. Securities and Corporate Finance

Doing Business. A Practical Guide. casselsbrock.com. Canada. Dispute Resolution. Foreign Investment. Aboriginal. Securities and Corporate Finance About Canada Dispute Resolution Forms of Business Organization Aboriginal Law Competition Law Real Estate Securities and Corporate Finance Foreign Investment Public- Private Partnerships Restructuring

More information

Section V. Jurisdictional Requirements (Section V) General Instructions

Section V. Jurisdictional Requirements (Section V) General Instructions Section V General Instructions Since the insurance legislation in the various jurisdictions in Canada is not exactly the same, certain differences must be accommodated. Everything related to each jurisdiction

More information

INSIDER TRADING POLICY AND GUIDELINES

INSIDER TRADING POLICY AND GUIDELINES INSIDER TRADING POLICY AND GUIDELINES As a public company, Northern Power Systems Corp. ( Northern Power or the Company ) and its officers, directors and employees are subject to the requirements and restrictions

More information

INFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013

INFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013 INFORMATION SECURITY GUIDE Cloud Computing Outsourcing Information Security Unit Information Technology Services (ITS) July 2013 CONTENTS 1. Background...2 2. Legislative and Policy Requirements...3 3.

More information

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change

More information

CHARITY LAW BULLETIN NO. 302

CHARITY LAW BULLETIN NO. 302 CHARITY LAW BULLETIN NO. 302 FEBRUARY 27, 2013 EDITOR: TERRANCE S. CARTER GOING MOBILE: LEGAL CONSIDERATIONS FOR MOBILE APP DEVELOPMENT By Colin J. Thurston * A. INTRODUCTION Canadian charities and not-for-profit

More information

June 2008. Canadian Teachers Federation Fédération canadienne des enseignantes et des enseignants

June 2008. Canadian Teachers Federation Fédération canadienne des enseignantes et des enseignants Addressing Cyberconduct A Brief to the Department of Justice Canada June 2008 Canadian Teachers Federation Fédération canadienne des enseignantes et des enseignants Brief to the Canadian Ministry of Justice:

More information

Introduction to Data Security Breach Preparedness with Model Data Security Breach Preparedness Guide

Introduction to Data Security Breach Preparedness with Model Data Security Breach Preparedness Guide Introduction to Data Security Breach Preparedness with Model Data Security Breach Preparedness Guide by Christopher Wolf Directors, Privacy and Information Management Practice Hogan Lovells US LLP christopher.wolf@hoganlovells.com

More information

Personal Information Protection Act Information Sheet 11

Personal Information Protection Act Information Sheet 11 Notification of a Security Breach Personal Information Protection Act Information Sheet 11 Introduction Personal information is used by organizations for a variety of purposes: retail and grocery stores

More information

Cloud Computing Contracts. October 11, 2012

Cloud Computing Contracts. October 11, 2012 Cloud Computing Contracts October 11, 2012 Lorene Novakowski Karam Bayrakal Covering Cloud Computing Cloud Computing Defined Models Manage Cloud Computing Risk Mitigation Strategy Privacy Contracts Best

More information

Cyber and Data Security. Proposal form

Cyber and Data Security. Proposal form Cyber and Data Security Proposal form This proposal form must be completed and signed by a principal, director or a partner of the proposed insured. Cover and Quotation requirements Please indicate which

More information

technical factsheet 176

technical factsheet 176 technical factsheet 176 Data Protection CONTENTS 1. Introduction 1 2. Register with the Information Commissioner s Office 1 3. Period protection rights and duties remain effective 2 4. The data protection

More information

Cloud Computing: Privacy & Jurisdiction from a Canadian Perspective

Cloud Computing: Privacy & Jurisdiction from a Canadian Perspective Cloud Computing: Privacy & Jurisdiction from a Canadian Perspective Professor Michael Geist Canada Research Chair in Internet and E-commerce Law University of Ottawa, Faculty of Law Cloud Computing - Canada

More information

Canadian Employment Law Overview for U.S. Employers

Canadian Employment Law Overview for U.S. Employers Canadian Employment Law Overview for U.S. Employers 110 Yonge Street Suite 1100 Toronto Ontario M5C 1T4 Tel: 416-862-1616 Toll Free: 1-866-821-7306 www.stringerllp.com Stringer LLP, all rights reserved

More information

M&T BANK CANADIAN PRIVACY POLICY

M&T BANK CANADIAN PRIVACY POLICY M&T BANK CANADIAN PRIVACY POLICY At M&T Bank, we are committed to safeguarding your personal information and maintaining your privacy. This has always been a priority for us and this is why M&T Bank (

More information

Insurance Journal. Defending Until the End When Does the Duty to. Volume 1, Issue 3 Editor Keoni Norgren. May 1, 2013

Insurance Journal. Defending Until the End When Does the Duty to. Volume 1, Issue 3 Editor Keoni Norgren. May 1, 2013 Insurance Journal May 1, 2013 In this Issue Volume 1, Issue 3 Editor Keoni Norgren Defending Until the End When Does the Duty to Defend End? Cyber Liability Laws in Canada Dolden Wallace Folick Welcomes

More information

INSIDER TRADING POLICY

INSIDER TRADING POLICY INSIDER TRADING POLICY NOVEMBER 2014 2 INSIDER TRADING POLICY NOVEMBER 2014 This Policy provides guidelines for directors, officers, executives, employees and consultants (collectively, WSP Team Members

More information

Identity Theft Security and Compliance: Issues for Business

Identity Theft Security and Compliance: Issues for Business Identity Theft Security and Compliance: Issues for Business The Facts Six Common Uses for Stolen Information Financial Criminal Medical DMV Social Security Terrorist The Facts A Chronology of Data Breaches

More information

CYBER SECURITY Cyber Security for Canadian Directors in the Wake of Ashley Madison

CYBER SECURITY Cyber Security for Canadian Directors in the Wake of Ashley Madison CYBER SECURITY Cyber Security for Canadian Directors in the Wake of Ashley Madison Gary Solway* Bennett Jones LLP The August release of the purported names and other details of over 35 million customers

More information

Canada. Overview. 1. What documents need to be retained and for how long?

Canada. Overview. 1. What documents need to be retained and for how long? Canada Overview Canada operates under both federal laws, which are applicable nationwide and provincial laws, which are effective in the province where the law was enacted. This overview focuses solely

More information

Hong Leong Asia Ltd.

Hong Leong Asia Ltd. Hong Leong Asia Ltd. Personal Data Protection Policy The protection of your Personal Data is important to us. This Personal Data Protection Policy ( PDP Policy ) outlines how we manage your personal data,

More information

The Cloud and Cross-Border Risks - Singapore

The Cloud and Cross-Border Risks - Singapore The Cloud and Cross-Border Risks - Singapore February 2011 What is the objective of the paper? Macquarie Telecom has commissioned this paper by international law firm Freshfields Bruckhaus Deringer in

More information

Signing the Contract - Contracture of People Managers

Signing the Contract - Contracture of People Managers CERTIFICATION APPLICATION FOR AN ELECTRONIC DOCUMENT MANAGEMENT SYSTEM This form is reserved for agencies and brokers acting on their own account and for designers of EDM systems for those agencies and

More information

SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY

SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY OBJECTIVE To provide users with guidelines for the use of information technology resources provided by Council. SCOPE This policy

More information

QUEENSLAND COUNTRY HEALTH FUND. privacy policy. Queensland Country Health Fund Ltd ABN 18 085 048 237. better health cover shouldn t hurt

QUEENSLAND COUNTRY HEALTH FUND. privacy policy. Queensland Country Health Fund Ltd ABN 18 085 048 237. better health cover shouldn t hurt QUEENSLAND COUNTRY HEALTH FUND privacy policy Queensland Country Health Fund Ltd ABN 18 085 048 237 better health cover shouldn t hurt 1 2 contents 1. Introduction 4 2. National Privacy Principles 5 3.

More information

This procedure is associated with BCIT policy 6700, Freedom of Information and Protection of Privacy.

This procedure is associated with BCIT policy 6700, Freedom of Information and Protection of Privacy. Privacy Breach No.: 6700 PR2 Policy Reference: 6700 Category: Information Management Department Responsible: Privacy and Records Management Current Approved Date: 2012 May 01 Objectives This procedure

More information

Bill 34 The New Limitation Act: Significant Changes and Transition Issues Explained

Bill 34 The New Limitation Act: Significant Changes and Transition Issues Explained Bill 34 The New Limitation Act: Significant Changes and Transition Issues Explained A Presentation for CLE Employment Law Conference 2013 Pan Pacific Hotel Vancouver, BC May 9, 2013 Carman J. Overholt,

More information

SURVEILLANCE AND PRIVACY

SURVEILLANCE AND PRIVACY info sheet 03.12 SURVEILLANCE AND PRIVACY Info Sheet 03.12 March 2012 This Information Sheet applies to Victorian state and local government organisations that are bound by the Information Privacy Act

More information

PERSONAL INFORMATION PRIVACY POLICY FOR EMPLOYEES AND VOLUNTEERS [ABC SCHOOL]

PERSONAL INFORMATION PRIVACY POLICY FOR EMPLOYEES AND VOLUNTEERS [ABC SCHOOL] [Insert Date of Policy] PERSONAL INFORMATION PRIVACY POLICY FOR EMPLOYEES AND VOLUNTEERS of [ABC SCHOOL] Address Independent schools in British Columbia are invited to adopt or adapt some or all of this

More information

The Legal Pitfalls of Failing to Develop Secure Cloud Services

The Legal Pitfalls of Failing to Develop Secure Cloud Services SESSION ID: CSV-R03 The Legal Pitfalls of Failing to Develop Secure Cloud Services Cristin Goodwin Senior Attorney, Trustworthy Computing & Regulatory Affairs Microsoft Corporation Edward McNicholas Global

More information

Helpful Tips. Privacy Breach Guidelines. September 2010

Helpful Tips. Privacy Breach Guidelines. September 2010 Helpful Tips Privacy Breach Guidelines September 2010 Office of the Saskatchewan Information and Privacy Commissioner 503 1801 Hamilton Street Regina, Saskatchewan S4P 4B4 Office of the Saskatchewan Information

More information

Directors and officers liability best practices guidelines

Directors and officers liability best practices guidelines Directors and officers liability best practices guidelines DIRECTORS AND OFFICERS LIABILITY BEST PRACTICES GUIDELINES INTRODUCTION A continuing challenge to all business is the efficient functioning of

More information

Protection for Persons in Care Act

Protection for Persons in Care Act DEPARTMENT OF COMMUNITY SERVICES Protection for Persons in Care Act Policy Manual 8/16/2013 Table of Contents Terms Used in this Manual Section 1: Introduction and Authority 2 4 Policy 1.1: Authorization

More information

Estimating the Cost of a Security Breach. By Andrew Wong. 23 Feb 2008

Estimating the Cost of a Security Breach. By Andrew Wong. 23 Feb 2008 Estimating the Cost of a Security Breach 23 Feb 2008 By Andrew Wong The Challenges As the number of companies that conduct their businesses electronically grows continuously, information security becomes

More information

CODE OF ETHICS AND BUSINESS CONDUCT

CODE OF ETHICS AND BUSINESS CONDUCT CODE OF ETHICS AND BUSINESS CONDUCT Date of Issue: 22 January 2015 Version number: 2 LUXFER HOLDINGS PLC Code of Ethics and Business Conduct Luxfer Holdings PLC is committed to conducting its business

More information

Virginia Commonwealth University Information Security Standard

Virginia Commonwealth University Information Security Standard Virginia Commonwealth University Information Security Standard Title: Scope: Data Classification Standard This document provides the classification requirements for all data generated, processed, stored,

More information

AIG INSURANCE COMPANY OF CANADA Privacy Principles

AIG INSURANCE COMPANY OF CANADA Privacy Principles AIG and Individual Privacy We at AIG Insurance Company of Canada (referred to as AIG, we, our, or us ) abide by these and want you, our applicants, policyholders, insureds, claimants, and any other individuals

More information

Code of Ethics for Professional Accountants

Code of Ethics for Professional Accountants COE Issued December 2005; revised June 2010 Effective on 30 June 2006 until 31 December 2010 Code of Ethics for Professional Accountants CODE OF ETHICS FOR PROFESSIONAL ACCOUNTANTS CONTENTS Page PREFACE...

More information

SECTION V. Each jurisdiction s requirements can now be found in this section, including filing requirements/dates and mailing addresses.

SECTION V. Each jurisdiction s requirements can now be found in this section, including filing requirements/dates and mailing addresses. SECTION V Insurers must accommodate for the differences in legislation from jurisdiction to jurisdiction in Canada. Each jurisdiction s requirements can now be found in this section, including filing requirements/dates

More information

005ASubmission to the Serious Data Breach Notification Consultation

005ASubmission to the Serious Data Breach Notification Consultation 005ASubmission to the Serious Data Breach Notification Consultation (Consultation closes 4 March 2016 please send electronic submissions to privacy.consultation@ag.gov.au) Your details Name/organisation

More information

KEY ISSUES IN PRIVACY AND INFORMATION MANAGEMENT

KEY ISSUES IN PRIVACY AND INFORMATION MANAGEMENT OSGOODE PROFESSIONAL DEVELOPMENT The OsgoodePD Webinar Series KEY ISSUES IN PRIVACY AND INFORMATION MANAGEMENT 8 focused webinars for the latest legal developments, including: Session 1: September 16,

More information

The HR Skinny: Effectively managing international employee data flows

The HR Skinny: Effectively managing international employee data flows The HR Skinny: Effectively managing international employee data flows Topics we will cover today Laws affecting HR data flows HR international data protection challenges and strategic solutions Case study

More information

Crimes (Computer Hacking)

Crimes (Computer Hacking) 2009-44 CRIMES (COMPUTER HACKING) ACT 2009 by Act 2011-23 as from 23.11.2012 Principal Act Act. No. 2009-44 Commencement except ss. 15-24 14.1.2010 (LN. 2010/003) Assent 3.12.2009 Amending enactments Relevant

More information

Protecting Saskatchewan data the USA Patriot Act

Protecting Saskatchewan data the USA Patriot Act Protecting Saskatchewan data the USA Patriot Act Main points... 404 Introduction... 405 Standing Committee on Public Accounts motion... 405 Our response to the motion... 405 ITO, its service provider,

More information

HIPAA Compliance and the Protection of Patient Health Information

HIPAA Compliance and the Protection of Patient Health Information HIPAA Compliance and the Protection of Patient Health Information WHITE PAPER By Swift Systems Inc. April 2015 Swift Systems Inc. 7340 Executive Way, Ste M Frederick MD 21704 1 Contents HIPAA Compliance

More information

Introduction to HIPAA Privacy

Introduction to HIPAA Privacy Introduction to HIPAA Privacy is published by HCPro, Inc. Copyright 2003 HCPro, Inc. All rights reserved. Printed in the United States of America. No part of this publication may be reproduced, in any

More information

PENNSYLVANIA IDENTITY THEFT RANKING BY STATE: Rank 14, 72.5 Complaints Per 100,000 Population, 9016 Complaints (2007) Updated January 29, 2009

PENNSYLVANIA IDENTITY THEFT RANKING BY STATE: Rank 14, 72.5 Complaints Per 100,000 Population, 9016 Complaints (2007) Updated January 29, 2009 PENNSYLVANIA IDENTITY THEFT RANKING BY STATE: Rank 14, 72.5 Complaints Per 100,000 Population, 9016 Complaints (2007) Updated January 29, 2009 Current Laws: A person commits the offense of identity theft

More information

THE PROPOSED CANADIAN SECURITIES ACT: CRIMINALIZING SECURITIES REGULATION IN CANADA. James D.G. Douglas November 22, 2010

THE PROPOSED CANADIAN SECURITIES ACT: CRIMINALIZING SECURITIES REGULATION IN CANADA. James D.G. Douglas November 22, 2010 THE PROPOSED CANADIAN SECURITIES ACT: CRIMINALIZING SECURITIES REGULATION IN CANADA James D.G. Douglas November 22, 2010 The Traditional Emphasis of Securities Regulation in Canada Has Been Regulatory

More information

A Privacy Handbook for Lawyers PIPEDA AND YOUR PRACTICE

A Privacy Handbook for Lawyers PIPEDA AND YOUR PRACTICE A Privacy Handbook for Lawyers PIPEDA AND YOUR PRACTICE Table of Contents Introduction...1 Privacy Issues in Managing a Law Practice...6 Privacy issues in Civil Litigation...16 Conclusion...26 Endnotes...28

More information

Recent Changes to Canadian Criminal Law and How it Affects Your Risks as Employers

Recent Changes to Canadian Criminal Law and How it Affects Your Risks as Employers EMPLOYEE SAFETY AND WORK-RELATED INJURY Recent Trends in the Law and Managing Your Risks Toronto November 29, 2007 Recent Changes to Canadian Criminal Law and How it Affects Your Risks as Employers By

More information

Lobbying in Canada: Canada s First Guide to Federal and Provincial Lobbying Laws - Explained

Lobbying in Canada: Canada s First Guide to Federal and Provincial Lobbying Laws - Explained Lobbying in Canada: Canada s First Guide to Federal and Provincial Lobbying Laws - Explained Pierre B. Meunier October 25, 2004 Introduction Intent of this presentation Provide overview of lobbying legislation

More information

Queensland WHISTLEBLOWERS PROTECTION ACT 1994

Queensland WHISTLEBLOWERS PROTECTION ACT 1994 Queensland WHISTLEBLOWERS PROTECTION ACT 1994 Act No. 68 of 1994 Queensland WHISTLEBLOWERS PROTECTION ACT 1994 Section PART 1 PRELIMINARY TABLE OF PROVISIONS Division 1 Title and commencement Page 1 Short

More information