What to do When Faced With a Privacy Breach: Guidelines for the Health Sector ANN CAVOUKIAN, PH.D. COMMISSIONER
|
|
|
- Cathleen Logan
- 10 years ago
- Views:
Transcription
1 What to do When Faced With a Privacy Breach: Guidelines for the Health Sector ANN CAVOUKIAN, PH.D. COMMISSIONER INFORMATION AND PRIVACY COMMISSIONER/ONTARIO
2 Table of Contents What is a privacy breach?...1 What are the benefits of having a privacy breach protocol?...2 Guidelines on what health information custodians should do...2 Step 1: Respond immediately by implementing the privacy breach protocol... 2 Step 2: Containment - Identify the scope of the potential breach and take steps to contain it... 2 Step 3: Notification - Identify those individuals whose privacy was breached and notify them of the breach... 2 Step 4: Investigation and Remediation... 3 What happens when the IPC investigates a privacy breach?...3 What steps can you take to avoid a privacy breach?...4 IPC website...4
3 What to do When Faced With a Privacy Breach: Guidelines for the Health Sector The Personal Health Information Protection Act, 2004 (the Act) sets out the rules that persons or organizations defined as health information custodians must follow when collecting, using, disclosing, retaining and disposing of personal health information. The rules recognize the unique character of personal health information as one of the most sensitive types of personal information that is frequently shared for a variety of purposes, including care and treatment, health research, and managing our publicly funded health care system. The Act balances individuals right to privacy with respect to their own personal health information with the legitimate needs of health information custodians to collect, use and share this information. With limited exceptions, the Act requires health information custodians to obtain consent before they collect, use or disclose personal health information. The Act also makes health information custodians responsible for the secure storage and destruction of personal health information. In addition, individuals have the right to access and request correction of their own personal health information. The purpose of this paper is to provide guidance to health information custodians when they are faced with a privacy breach. WHAT IS A PRIVACY BREACH? A privacy breach occurs whenever a person has contravened or is about to contravene a provision of the Act or its regulations, including section 12(1) of the Act. Section 12(1) of the Act requires health information custodians to take steps that are reasonable in the circumstances to ensure personal health information in their custody or control is protected against theft, loss and unauthorized use or disclosure and to ensure that records containing personal health information are protected against unauthorized copying, modification or disposal. A health information custodian may become aware of a privacy breach in a number of ways. The custodian may be contacted by the Office of the Information and Privacy Commissioner (IPC) when a formal complaint has been filed by a member of the public, or where the Information and Privacy Commissioner initiates her own investigation. The health information custodian may also become aware of a breach during the normal course of business (self-identification). This paper will concentrate on situations where the health information custodian has self-identified the privacy breach or the health information custodian has been contacted by the IPC regarding a potential breach. This will generally be a situation where personal health information is stolen, lost or accessed by unauthorized persons. Many of these situations will involve unintentional breaches of the Act. For example, personal health information may be lost (a file is misplaced), stolen (laptop computers are a prime example) or inadvertently disclosed to an unauthorized person in error (a letter addressed to patient A is actually mailed to patient B). On the other hand, the health information custodian may become aware of breaches that may be intentional; for example, the unauthorized access of patient files by staff. In these cases, the health information custodian is encouraged to report the incidents to the IPC so that assistance can be provided in fulfilling their obligations under the Act (e.g. notification) and to take whatever remedial steps are necessary to prevent future similar occurrences. The IPC recommends that a health information custodian develop a privacy breach protocol which includes the actions outlined below. What to do When Faced with a Privacy Breach: Guidelines for the Health Sector 1
4 WHAT ARE THE BENEFITS OF HAVING A PRIVACY BREACH PROTOCOL? Health information custodians can respond quickly and in a coordinated manner; Roles and responsibilities of staff will be clarified; A process for effective investigations will be documented; Effective containment of the breach will be aided; Remediation efforts will be easier; and Health information custodians will be prepared for the potential involvement by the IPC. GUIDELINES ON WHAT HEALTH INFORMATION CUSTODIANS SHOULD DO Upon learning of a privacy breach, immediate action must be taken. Many of the following guidelines need to be carried out simultaneously or in quick succession. Step 1: Respond immediately by implementing the privacy breach protocol Ensure appropriate staff within your organization are immediately notified of the breach, including the Chief Privacy Officer or contact person for the purposes of the Act; Depending on the nature or seriousness of the privacy breach, there may be a need to contact senior management, patient relations or the information and technology and/or communications department within your organization; Inform the IPC Registrar of the privacy breach and work together constructively with IPC staff; and Address the priorities of containment and notification as set out in the following steps. Step 2: Containment - Identify the scope of the potential breach and take steps to contain it Retrieve the hard copies of any personal health information that has been disclosed; Ensure that no copies of the personal health information have been made or retained by the individual who was not authorized to receive the information and obtain the person s contact information in the event that follow-up is required; and Determine whether the privacy breach would allow unauthorized access to any other personal health information (e.g. an electronic information system) and take whatever necessary steps are appropriate (e.g. change passwords, identification numbers and/or temporarily shut down a system). Step 3: Notification - Identify those individuals whose privacy was breached and notify them of the breach The Act requires health information custodians to notify individuals, at the first reasonable opportunity, but does not specify the manner in which notification must be carried out; 2
5 For example, notification can be by telephone or in writing, or depending on the circumstances, a notation made in the individual s file to be discussed at his/her next appointment; There are numerous factors that may need to be taken into consideration when deciding on the best form of notification (e.g. the sensitivity of the personal health information). As a result, the health information custodian may want to contact the IPC to discuss the most appropriate form of notification; There may also be exceptional circumstances when the health information custodian may want to discuss notification with the IPC before proceeding (e.g. when notification is not possible or may be detrimental to the individual). If this is the case, the health information custodian is encouraged to contact the IPC to discuss these circumstances; When notifying individuals affected by the breach, provide details of the extent of the breach and the specifics of the personal health information at issue; Advise affected individuals of the steps that have been or will be taken to address the breach, both immediate and long-term; and Advise that the IPC has been contacted to ensure that all obligations under the Act are fulfilled (where applicable). Step 4: Investigation and Remediation Conduct an internal investigation into the matter. The objectives of the investigation are to: 1) ensure the immediate requirements of containment and notification have been addressed; 2) review the circumstances surrounding the breach; and 3) review the adequacy of existing policies and procedures in protecting personal health information; Address the situation on a systemic basis. In some cases, program-wide procedures may warrant review (e.g. a misdirected fax transmission); Advise the IPC of your findings and work together to make any necessary changes; Ensure staff are appropriately educated and trained with respect to compliance with the privacy protection provisions of the Act; and Cooperate in any further investigation into the incident undertaken by the IPC. WHAT HAPPENS WHEN THE IPC INVESTIGATES A PRIVACY BREACH? When investigating a privacy breach, the IPC will, depending on the circumstances: Ensure any issues surrounding containment and notification have been addressed; Interview individuals involved with the privacy breach or individuals who can provide information about a process; Obtain and review the health information custodian s position on the privacy breach; Ask for a status report of any actions taken by the health information custodian; What to do When Faced with a Privacy Breach: Guidelines for the Health Sector 3
6 Review and provide input and advice on current policies and procedures and any other relevant documents and recommend changes; and If appropriate or necessary, issue a report or order at the conclusion of the review. WHAT STEPS CAN YOU TAKE TO AVOID A PRIVACY BREACH? to prevent a privacy breach from occurring. These measures should include: Health information custodians governed by the Act would be well served by adopting proactive measures Educating staff about the privacy rules governing the collection, retention, use and disclosure of personal health information set out in the Act; Educating staff about the privacy rules governing safe and secure disposal of personal health information and the security of records; Ensuring policies and procedures are in place that comply with the privacy protection provisions of the Act and that staff are properly trained in this respect; Safeguarding personal health information when it is physically removed from the office or institution; for example, by ensuring that all laptops and PDA s are password protected and data is encrypted; Ensuring that a baseline of logging and auditing is in place on all systems, particularly those containing electronic health records and that staff are aware that regular audits will occur; Conducting a privacy impact assessment (PIA), where appropriate. The PIA is a process that helps determine whether new technologies, information systems and proposed programs or policies meet basic privacy requirements [For further information, see the IPC publication entitled Privacy Impact Assessment Guidelines for the Ontario Personal Health Information Protection Act, available on the website]; When in doubt, obtaining advice from your organization s legal department and Chief Privacy Officer; and Consulting with the IPC s Policy and Compliance Department in appropriate situations. IPC WEBSITE ( Resolution Summaries and Reports or Orders that are publicly available with respect to matters that the IPC has investigated are accessible through the IPC s website at They may be located via the Orders and Complaint Reports section or by using the search function. Information about the IPC s privacy complaint process can be found in the About Us How Things Work section of the website. In addition, the IPC has published a number of documents that can assist health information custodians, which are also available on the website: Frequently Asked Questions: Personal Health Information Protection Act (PDF format) The Personal Health Information Protection Act and Your Privacy (PDF format) A Guide to the Personal Health Information Protection Act (PDF format) 4
7 Your Health Information: Your Rights - Your Guide to the Personal Health Information Protection Act, A joint publication of the Ministry of Health and the IPC (PDF format) Your Health Information and Your Privacy in Our Facility Your Health Information and Your Privacy in Our Office Your Health Information and Your Privacy in Our Hospital Privacy Impact Assessment Guidelines for the Ontario Personal Health Information Protection Act Access/Correction Complaint Flow Chart Collection, Use, Disclosure Complaint Flow Chart What to do When Faced with a Privacy Breach: Guidelines for the Health Sector 5
8 Information and Privacy Commissioner/Ontario 2 Bloor Street East, Suite 1400 Toronto, Ontario M4W 1A8 Telephone : or Fax : TTY (Teletypewriter) : Website : [email protected]
Privacy Breach Protocol
& Privacy Breach Protocol Guidelines for Government Organizations www.ipc.on.ca Table of Contents What is a privacy breach? 1 Guidelines on what government organizations should do 2 What happens when the
Report of the Information & Privacy Commissioner/Ontario. Review of the Canadian Institute for Health Information:
Information and Privacy Commissioner of Ontario Report of the Information & Privacy Commissioner/Ontario Review of the Canadian Institute for Health Information: A Prescribed Entity under the Personal
Moving Information: Privacy & Security Guidelines
Information and Privacy Commissioner/ Ontario Moving Information: Privacy & Security Guidelines Ann Cavoukian, Ph.D. Commissioner July 1997 Information and Privacy Commissioner/Ontario 2 Bloor Street East
Brian Beamish. Commissioner (Acting) Ontario Information and Privacy Commission. Cyber Risk National Conference February 9, 2015
Preventing Privacy Breaches and Building Confidence in Electronic Health Records Brian Beamish Commissioner (Acting) Ontario Information and Privacy Commission Cyber Risk National Conference February 9,
Mohawk DI-r: Privacy Breach Management Procedure Version 2.0. April 2011
Mohawk DI-r: Privacy Breach Management Procedure Version 2.0 April 2011 Table of Contents 1 Purpose... 3 2 Terminology... 5 3 Identifying a Privacy Breach... 5 4 Monitoring for Privacy Breaches... 6 5
How to Avoid Abandoned Records: Guidelines on the Treatment of Personal Health Information, in the Event of a Change in Practice
Information and Privacy Commissioner / Ontario How to Avoid Abandoned Records: Guidelines on the Treatment of Personal Health Information, in the Event of a Change in Practice Ann Cavoukian, Ph.D. Commissioner
Ann Cavoukian, Ph.D.
School Psychologists: What You Should Know about the Personal Health Information Protection Act Ann Cavoukian, Ph.D. Information and Privacy Commissioner Ontario Psychological Services Northeast Toronto
This procedure is associated with BCIT policy 6700, Freedom of Information and Protection of Privacy.
Privacy Breach No.: 6700 PR2 Policy Reference: 6700 Category: Information Management Department Responsible: Privacy and Records Management Current Approved Date: 2012 May 01 Objectives This procedure
SAFEGUARDING PRIVACY IN A MOBILE WORKPLACE
SAFEGUARDING PRIVACY IN A MOBILE WORKPLACE Checklist for taking personally identifiable information (PII) out of the workplace: q Does your organization s policy permit the removal of PII from the office?
THE PERSONAL INFORMATION PROTECTION AND ELECTRONIC DOCUMENTS ACT (PIPEDA) PERSONAL INFORMATION POLICY & PROCEDURE HANDBOOK
THE PERSONAL INFORMATION PROTECTION AND ELECTRONIC DOCUMENTS ACT (PIPEDA) PERSONAL INFORMATION POLICY & PROCEDURE HANDBOOK REVISED August 2004 PERSONAL INFORMATION POLICY & PROCEDURE HANDBOOK Introduction
Information and Privacy Commissioner of Ontario. Guidelines for the Use of Video Surveillance Cameras in Public Places
Information and Privacy Commissioner of Ontario Guidelines for the Use of Video Surveillance Cameras in Public Places Ann Cavoukian, Ph.D. Commissioner September 2007 Acknowledgements This publication
Information and Privacy Commissioner of Ontario. Caller ID Guidelines
Information and Privacy Commissioner of Ontario Caller ID Guidelines Tom Wright Commissioner December 1992 Information and Privacy Commissioner of Ontario 2 Bloor Street East Suite 1400 Toronto, Ontario
Privacy Incident and Breach Management Policy
Privacy Incident and Breach Management Policy Privacy Office Document ID: 2480 Version: 2.1 Owner: Chief Privacy Officer Sensitivity Level: Low Copyright Notice Copyright 2014, ehealth Ontario All rights
A Guide. Personal Health Information Protection Act. to the. December 2004. Ann Cavoukian, Ph.D Commissioner
A Guide to the Personal Health Information Protection Act December 2004 Information and Privacy Commissioner/Ontario Ann Cavoukian, Ph.D Commissioner Dr. Ann Cavoukian, the Information and Privacy Commissioner
Information and Privacy Commissioner of Ontario. Guidelines for Using Video Surveillance Cameras in Schools
Information and Privacy Commissioner of Ontario Guidelines for Using Video Surveillance Cameras in Schools Ann Cavoukian, Ph.D. Commissioner Revised July 2009 This publication is an updated version of
PRIVACY BREACH POLICY
Approved By Last Reviewed Responsible Role Responsible Department Executive Management Team March 20, 2014 (next review to be done within two years) Chief Privacy Officer Quality & Customer Service SECTION
A Guide to Ontario Legislation Covering the Release of Students
A Guide to Ontario Legislation Covering the Release of Students Personal Information Revised: June 2011 Ann Cavoukian, Ph.D. Information and Privacy Commissioner, Ontario, Canada Commissioner, Ontario,
Privacy Guidelines for RFID Information Systems (RFID Privacy Guidelines)
Privacy Guidelines for RFID Information Systems (RFID Privacy Guidelines) Information and Privacy Ann Cavoukian, Ph.D. Commissioner June 2006 Commissioner Ann Cavoukian gratefully acknowledges the work
Guidelines on Facsimile Transmission Security
Information and Privacy Commissioner/ Ontario Guidelines on Facsimile Transmission Security Ann Cavoukian, Ph.D. Commissioner Revised January 2003 Information and Privacy Commissioner/Ontario 2 Bloor Street
Personal Health Information Privacy Policy
Personal Health Information Privacy Policy Privacy Office Document ID: 2478 Version: 6.2 Owner: Chief Privacy Officer Sensitivity Level: Low Copyright Notice Copyright 2014, ehealth Ontario All rights
Helpful Tips. Privacy Breach Guidelines. September 2010
Helpful Tips Privacy Breach Guidelines September 2010 Office of the Saskatchewan Information and Privacy Commissioner 503 1801 Hamilton Street Regina, Saskatchewan S4P 4B4 Office of the Saskatchewan Information
Privacy Impact Assessment Guidelines for the Ontario Personal Health Information Protection Act. Ann Cavoukian, Ph.D. Commissioner October 2005
Privacy Impact Assessment Guidelines for the Ontario Personal Health Information Protection Act Ann Cavoukian, Ph.D. Commissioner October 2005 Information and Privacy Commissioner/Ontario Privacy Impact
A Q&A with the Commissioner: Big Data and Privacy Health Research: Big Data, Health Research Yes! Personal Data No!
A Q&A with the Commissioner: Big Data and Privacy Health Research: Big Data, Health Research Yes! Personal Data No! Ann Cavoukian, Ph.D. Information and Privacy Commissioner Ontario, Canada THE AGE OF
Best Practices for Protecting Individual Privacy in Conducting Survey Research (Full Version)
Best Practices for Protecting Individual Privacy in Conducting Survey Research (Full Version) April 1999 Information and Privacy Commissioner/Ontario 80 Bloor Street West Suite 1700 Toronto, Ontario M5S
SUBJECT: VOYAGEUR TRANSPORTATION CORPORATE POLICIES/PROCEDURES TITLE: PRIVACY OF PERSONAL HEALTH INFORMATION
SUBJECT: VOYAGEUR PAGE 1 1.0 PURPOSE: 1.1 To establish and document a policy which defines Voyageur s commitment to the protection of an individual s personal health information in the course of providing
Guide to INFORMATION SECURITY FOR THE HEALTH CARE SECTOR
Guide to INFORMATION SECURITY FOR THE HEALTH CARE SECTOR Information and Resources for Small Medical Offices Introduction The Personal Health Information Protection Act, 2004 (PHIPA) is Ontario s health-specific
How To Ensure Health Information Is Protected
pic pic CIHI Submission: 2011 Prescribed Entity Review October 2011 Who We Are Established in 1994, CIHI is an independent, not-for-profit corporation that provides essential information on Canada s health
New HIPAA Breach Notification Rule: Know Your Responsibilities. Loudoun Medical Group Spring 2010
New HIPAA Breach Notification Rule: Know Your Responsibilities Loudoun Medical Group Spring 2010 Health Information Technology for Economic and Clinical Health Act (HITECH) As part of the Recovery Act,
INITIAL APPROVAL DATE INITIAL EFFECTIVE DATE
TITLE AND INFORMATION TECHNOLOGY RESOURCES DOCUMENT # 1107 APPROVAL LEVEL Alberta Health Services Executive Committee SPONSOR Legal & Privacy / Information Technology CATEGORY Information and Technology
EHR Contributor Agreement
This EHR Contributor Agreement (this Agreement ) is made effective (the Effective Date ) and sets out certain terms and conditions that apply to the sharing of Personal
Wellesley College Written Information Security Program
Wellesley College Written Information Security Program Introduction and Purpose Wellesley College developed this Written Information Security Program (the Program ) to protect Personal Information, as
Ann Cavoukian, Ph.D.
Protecting Privacy in an Era of Electronic Health Records Ann Cavoukian, Ph.D. Information and Privacy Commissioner Ontario Barrie and Community Family Health Team Royal Victoria Hospital Georgian College
Submission to the Standing Committee on Industry. Bill C-54, Personal Information Protection and Electronic Documents Act. Information and Privacy
Information and Privacy Commissioner Ontario / Submission to the Standing Committee on Industry Bill C-54, Personal Information Protection and Electronic Documents Act Ann Cavoukian, Ph.D. Commissioner
Personal Health Information Protection Act
Frequently Asked Questions : Personal Health Information Protection Act February 2005 Information and Privacy Commissioner/Ontario Ann Cavoukian, Ph.D Commissioner. Dr. Ann Cavoukian, the Information and
What is involved if you are asked to provide a Police Background Check?
What is involved if you are asked to provide a Police Background Check? Read on What right do employers, volunteer recruiters, regulators, landlords and educational institutions ( organizations ) have
Procedure for Managing a Privacy Breach
Procedure for Managing a Privacy Breach (From the Privacy Policy and Procedures available at: http://www.mun.ca/policy/site/view/index.php?privacy ) A privacy breach occurs when there is unauthorized access
Closing or Moving a Physician Practice
Closing or Moving a Physician Practice Background The College of Physicians & Surgeons of Alberta (CPSA) provides Standards of Practice representing the minimum standards of professional behaviour and
Privacy Investigation: The Toronto Police Service s use of Mobile Licence Plate Recognition Technology to find stolen vehicles
Information and Privacy Commissioner/Ontario Commissaire à l information et à la protection de la vie privée/ontario Privacy Investigation: The Toronto Police Service s use of Mobile Licence Plate Recognition
Personal Information Protection and Electronic Documents Act (PIPEDA)
Introduction Personal Information Protection and Electronic Documents Act (PIPEDA) Policy and The Insurance Brokers Association of Alberta is committed to respect the privacy rights of individuals by ensuring
CANADIAN PRIVACY AND DATA RESIDENCY REQUIREMENTS. White Paper
CANADIAN PRIVACY AND DATA RESIDENCY REQUIREMENTS White Paper Table of Contents Addressing compliance with privacy laws for cloud-based services through persistent encryption and key ownership... Section
Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification
Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification Type of Policy and Procedure Comments Completed Privacy Policy to Maintain and Update Notice of Privacy Practices
We ask that you contact our Privacy Officer in the event you have any questions or concerns regarding this Code or its implementation.
PRIVACY AND ANTI-SPAM CODE FOR OUR DENTAL OFFICE Please refer to Appendix A for a glossary of defined terms. INTRODUCTION The Personal Health Information Act (PHIA) came into effect on December 11, 1997,
Health Care Provider Guide
Health Care Provider Guide Diagnostic Imaging Common Service Project, Release 1 Version: 1.4 Copyright Notice Copyright 2014, ehealth Ontario All rights reserved No part of this document may be reproduced
EMBEDDING PRIVACY INTO ELECTRONIC HEALTH RECORDS. Manuela Di Re Associate Director of Legal Services Information and Privacy Commissioner of Ontario
EMBEDDING PRIVACY INTO ELECTRONIC HEALTH RECORDS Manuela Di Re Associate Director of Legal Services Information and Privacy Commissioner of Ontario Presentation Outline 1. Definitions 2. Need to Protect
DATA PROTECTION POLICY
DATA PROTECTION POLICY DATA PROTECTION POLICY Document Control Information Title Data Protection Policy Version V1.0 Author Diana Watt Date Approved 21 February 2013 Review Date Annually, on the anniversary
INSTITUTE FOR SAFE MEDICATION PRACTICES CANADA
INSTITUTE FOR SAFE MEDICATION PRACTICES CANADA PRIVACY IMPACT ASSESSMENT (PIA) ON ANALYZE-ERR AND CURRENT DATA HANDLING OPERATIONS VERSION 3.0-2 JULY 11, 2005 PREPARED IN CONJUNCTION WITH: ISMP Canada
SCHEDULE "C" to the MEMORANDUM OF UNDERSTANDING BETWEEN ALBERTA HEALTH SERVICES AND THE ALBERTA MEDICAL ASSOCIATION (CMA ALBERTA DIVISION)
SCHEDULE "C" to the MEMORANDUM OF UNDERSTANDING BETWEEN ALBERTA HEALTH SERVICES AND THE ALBERTA MEDICAL ASSOCIATION (CMA ALBERTA DIVISION) ELECTRONIC MEDICAL RECORD INFORMATION EXCHANGE PROTOCOL (AHS AND
FIPPA and MFIPPA: Bill 8 The Recordkeeping Amendments
FIPPA and MFIPPA: Bill 8 The Recordkeeping Amendments December 2015 CONTENTS Introduction...1 The Amendments What s New?...1 Is My Institution Required to Comply With These Provisions?...2 What are Records?...2
DEALERSHIP IDENTITY THEFT RED FLAGS AND NOTICES OF ADDRESS DISCREPANCY POLICY
DEALERSHIP IDENTITY THEFT RED FLAGS AND NOTICES OF ADDRESS DISCREPANCY POLICY This Plan we adopted by member, partner, etc.) on Our Program Coordinator (date). (Board of Directors, owner, We have appointed
Best Practices for Institutions in Mediating Appeals
Best Practices for Institutions in Mediating Appeals under the Freedom of Information and Protection of Privacy Act and the Municipal Freedom of Information and Protection of Privacy Act A Joint Project
The 7 Foundational Principles. Implementation and Mapping of Fair Information Practices. Ann Cavoukian, Ph.D.
Privacy by Design The 7 Foundational Principles Implementation and Mapping of Fair Information Practices Ann Cavoukian, Ph.D. Information & Privacy Commissioner Ontario, Canada Purpose: This document provides
Privacy Management Program Toolkit Health Custodians Personal Health Information Act
Office of the Information and Privacy Commissioner for Nova Scotia Privacy Management Program Toolkit Health Custodians Personal Health Information Act Introduction: This toolkit was prepared by the Information
ADMINISTRATIVE MANUAL Policy and Procedure
ADMINISTRATIVE MANUAL Policy and Procedure TITLE: Privacy NUMBER: CH 100-100 Date Issued: April 2010 Page 1 of 7 Applies To: Holders of CDHA Administrative Manual POLICY 1. In managing personal information,
Accountable Privacy Management in BC s Public Sector
Accountable Privacy Management in BC s Public Sector Contents Accountable Privacy Management In BC s Public Sector 2 INTRODUCTION 3 What is accountability? 4 Steps to setting up the program 4 A. PRIVACY
Data Protection Policy
Data Protection Policy Responsible Officer Author Date effective from July 2009 Ben Bennett, Business Planning & Resources Director Julian Lewis, Governance Manager Date last amended December 2012 Review
Information Circular
Information Circular Enquiries to: Brooke Smith Senior Policy Officer IC number: 0177/14 Phone number: 9222 0268 Date: March 2014 Supersedes: File No: F-AA-23386 Subject: Practice Code for the Use of Personal
The Advantages of Electronically Processing Freedom of Information Requests: The MNR Experience
The Advantages of Electronically Processing Freedom of Information Requests: The MNR Experience Produced by the Ministry of Natural Resources and the Office of the Information and Privacy Commissioner/Ontario
Record Keeping. Guide to the Standard for Professional Practice. 2013 College of Physiotherapists of Ontario
Record Keeping Guide to the Standard for Professional Practice 2013 College of Physiotherapists of Ontario March 7, 2013 Record Keeping Records tell a patient s story. The record should document for the
Personal Information Protection and Electronic Documents Act
PIPEDA Self-Assessment Tool Personal Information Protection and Electronic Documents Act table of contents Why this tool is needed... 3 How to use this tool... 4 PART 1: Compliance Assessment Guide Principle
3. Consent for the Collection, Use or Disclosure of Personal Information
PRIVACY POLICY FOR RENNIE MARKETING SYSTEMS Our privacy policy includes provisions of the Personal Information Protection Act (BC) and the Personal Information Protection and Electronic Documents Act (Canada),
Electronic Health Record Privacy Policies
Electronic Health Record Privacy Policies Table of Contents 1. Access and Correction Policy v1.1 2. Assurance Policy v1.1 3. Consent Management Policy v1.2 4. Inquiries and Complaints Policy v1.1 5. Logging
A Best Practice Guide
A Best Practice Guide Contents Introduction [2] The Benefits of Implementing a Privacy Management Programme [3] Developing a Comprehensive Privacy Management Programme [3] Part A Baseline Fundamentals
California State University, Sacramento INFORMATION SECURITY PROGRAM
California State University, Sacramento INFORMATION SECURITY PROGRAM 1 I. Preamble... 3 II. Scope... 3 III. Definitions... 4 IV. Roles and Responsibilities... 5 A. Vice President for Academic Affairs...
Closed Circuit Television (CCTV) code of practice. Based on the publication A Code of Practice for CCTV www.ico.gov.uk
Closed Circuit Television (CCTV) code of practice Based on the publication A Code of Practice for CCTV www.ico.gov.uk Owner: Ian Heywood Last reviewed: July 2011 Contents 1.0 Introduction... 4 2.0 CCTV
Your Agency Just Had a Privacy Breach Now What?
1 Your Agency Just Had a Privacy Breach Now What? Kathleen Claffie U.S. Customs and Border Protection What is a Breach The loss of control, compromise, unauthorized disclosure, unauthorized acquisition,
HIPAA Privacy Rule Policies
DRAFT - Policies and Procedures PRIVACY OFFICE ASSIGNMENT AND RESPONSIBILITIES APPROVED BY: SUPERCEDES POLICY: Policy #1 ADOPTED: REVISED: REVIEWED: Purpose This policy is designed to assure the establishment
Data Security Incident Response Plan. [Insert Organization Name]
Data Security Incident Response Plan Dated: [Month] & [Year] [Insert Organization Name] 1 Introduction Purpose This data security incident response plan provides the framework to respond to a security
DATA PROTECTION AND DATA STORAGE POLICY
DATA PROTECTION AND DATA STORAGE POLICY 1. Purpose and Scope 1.1 This Data Protection and Data Storage Policy (the Policy ) applies to all personal data collected and dealt with by Centre 404, whether
My Docs Online HIPAA Compliance
My Docs Online HIPAA Compliance Updated 10/02/2013 Using My Docs Online in a HIPAA compliant fashion depends on following proper usage guidelines, which can vary based on a particular use, but have several
What s New in Access, Privacy and Health Care. Brian Beamish Commissioner. Ontario Connections May 21, 2015
What s New in Access, Privacy and Health Care Brian Beamish Commissioner Ontario Connections May 21, 2015 The Three Acts The IPC ensures compliance with: o Freedom of Information and Protection of Privacy
INFORMATION EXCHANGE AGREEMENT BETWEEN THE SOCIAL SECURITY ADMINISTRATION AND THE STATE OF [NAME OF STATE], [NAME OF STATE AGENCY]
2012 MODEL STC AGREEMENT INFORMATION EXCHANGE AGREEMENT BETWEEN THE SOCIAL SECURITY ADMINISTRATION AND THE STATE OF [NAME OF STATE], [NAME OF STATE AGENCY] AS THE STATE TRANSMISSION/TRANSFER COMPONENT
Data Processing Agreement for Oracle Cloud Services
Data Processing Agreement for Oracle Cloud Services Version December 1, 2013 1. Scope and order of precedence This is an agreement concerning the Processing of Personal Data as part of Oracle s Cloud Services
Data Protection in Ireland
Data Protection in Ireland 0 Contents Data Protection in Ireland Introduction Page 2 Appointment of a Data Processor Page 2 Security Measures (onus on a data controller) Page 3 8 Principles Page 3 Fair
Posting Information on Websites: Best Practices for Schools and School Boards
Posting Information on Websites: Best Practices for Schools and School Boards A Joint Project of The Information and Privacy Commissioner/Ontario, The Upper Grand District School Board and The Peterborough,
DATA PROTECTION CORPORATE POLICY
DATA PROTECTION CORPORATE POLICY Information Management V1.1 03 July 2012 Not protectively marked This policy must be complied with fully by all Members, Officers Agents and Contractors of Plymouth City
PRIVACY COMPLAINT REPORT
PRIVACY COMPLAINT REPORT PRIVACY COMPLAINT NO. MC-030044-1 Toronto Community Housing Corporation PRIVACY COMPLAINT REPORT PRIVACY COMPLAINT NO. MC-030044-1 MEDIATOR: Giselle Basanta INSTITUTION: Toronto
