MINUTE TAKING TIPS. How to keep your minutes FIPPA friendly

Similar documents
Privacy Policy on the Responsibilities of Third Party Service Providers

ORDER MO Appeal MA Township of Minden Hills. July 31, 2013

Privacy Incident and Breach Management Policy

BOARD POLICY POLICY TITLE. Records and Information Management 1.0 PURPOSE

Information Security Policy. Document ID: 3809 Version: 1.0 Owner: Chief Security Officer, Security Services

4.7 Website Privacy Policy

Policy & Procedure. This policy applies to all records in the custody and control of SMGH.

ORDER MO-2114 Appeal MA York Regional Police Services Board

SASKATCHEWAN OFFICE OF THE INFORMATION AND PRIVACY COMMISSIONER INVESTIGATION REPORT F Saskatchewan Workers Compensation Board

Posting Information on Websites: Best Practices for Schools and School Boards

ADMINISTRATIVE MANUAL Policy and Procedure

PRIVACY BREACH MANAGEMENT POLICY

Information Management and Protection Policy

DATA PROTECTION AND DATA STORAGE POLICY

Information Governance Policy

Graduate Calendar

POLICY ON HARASSMENT, SEXUAL HARASSMENT AND DISCRIMINATION PROHIBITED BY LAW

Disciplinary Policy and Procedure

THE RESEARCHER S GUIDE TO DATA PRIVACY

COLLEGE POLICY MANUAL

Graduate Calendar

Scottish Rowing Data Protection Policy

Guidelines on Data Protection. Draft. Version 3.1. Published by

Liverpool Hope University. Equality and Diversity Policy. Date approved: Revised (statutory changes)

INFORMATION GOVERNANCE STRATEGY

Certified Alcohol & Drug Counselor (CADC) Appendix B. Code of Ethical Standards

Guide to Identifying Personal Information Banks

Personal Details Surname Surname at birth, if different Any other names by which you have been known

An Executive Overview of GAPP. Generally Accepted Privacy Principles

Applicability: All Employees Effective Date: December 6, 2005; revised January 27, 2009 Source(s):

The Freedom of Information and Protection of Privacy Act

LEGISLATION COMMITTEE OF THE CROATIAN PARLIAMENT

Panellists guidance for moderating panels (Leadership Fellows Scheme)

British Columbia Personal Information Protection Act. Frequently Asked Questions:

NHS Business Services Authority HR Policies Recruitment and Selection

UNIVERSITY OF SOUTHAMPTON DATA PROTECTION POLICY

Certified Substance Abuse Counselor (CSAC) Code of Ethics Principle 1: Non-Discrimination Principle 2: Responsibility Principle 3: Competence

CODE OF ETHICS. Approved: June 2, 2014 Effective: December 1, 2014

Subject Access Request (SAR) Procedure

Data Compliance. And. Your Obligations

As an approved member of RMCA and as part of their ongoing membership, each Member shall:

CORPORATE POLICY & PROCEDURE NO. 7 INFORMATION GOVERNANCE POLICY. December 2014

ROEHAMPTON UNIVERSITY DATA PROTECTION POLICY

CROATIAN PARLIAMENT 1364

Information Governance Policy

ALL PARENTS HAVE THE FOLLOWING RIGHTS: THE RIGHT TO A FREE PUBLIC SCHOOL EDUCATION.

City of Cleveland Social Media Policy

NEW JERSEY STATE POLICY PROHIBITING DISCRIMINATION IN THE WORKPLACE

POLICY FRAMEWORK AND STANDARDS INFORMATION SHARING BETWEEN GOVERNMENT AGENCIES

(Chapter No. not allocated yet) COMMISSION FOR EQUALITY AND HUMAN RIGHTS ORDINANCE

DATA PROTECTION POLICY

#3: SAMPLE CONSENT FORM

BRIGHAM AND WOMEN S HOSPITAL

Application Form - Support Staff. Applicant Name... Position Applied for...

INFORMATION GOVERNANCE POLICY

The Youth Drug Detoxification and Stabilization Act

HIPAA Notice of Privacy Practices

Sustainable Supplier Charter. UNIT4 Business Procedures

PERSONAL INJURIES ASSESSMENT BOARD DATA PROTECTION CODE OF PRACTICE

UNIVERSITY OF DENVER STURM COLLEGE OF LAW STUDENT BAR ASSOCIATION CONSTITUTION (Last updated April 17, 2016)

PSYCHOLOGICAL HARASSMENT POLICY

How To Become A Member Of The Business Honor Society Of Alpha Beta Gamma

Information Governance Policy

Proposed Code of Ethical Principles for Professional Valuers

Conducting an Effective Neighborhood Association Meeting. Adapted from City of Arlington, Texas

Information Governance Policy

Application Form Trainee Solicitors

ORANGE COUNTY SOCIAL MEDIA POLICY

Wright. Doctor of Psycholog y Program in Clinical Psycholog y I N S T I T U T E

Information which may be refused (with reference to the Part 2 of Code on access

1. Each employee is responsible for managing college records in a responsible and professional manner.

DOCUMENTATION Practice Standard

Conducting Surveys: A Guide to Privacy Protection. Revised January 2007 (updated to reflect A.R. 186/2008)

CODE OF CONDUCT as adopted by the Board of Directors on 20 February 2015

ELEMENT FINANCIAL CORPORATION CODE OF BUSINESS CONDUCT AND ETHICS

LONDON DOWNTOWN CLOSED CIRCUIT TELEVISION (CCTV) PROGRAM CODE OF PRACTICE CITY OF LONDON, ONTARIO

Consultation on the introduction of diversity succession planning for board appointments and the lowering of the 150 employees threshold for

How to write a policy to prevent. Harassment. by Louise Pohl

INFORMATION GOVERNANCE POLICY

SUBJECT ACCESS REQUEST PROCEDURE

COLLINS FOODS LIMITED (the COMPANY) CODE OF CONDUCT

EQUAL OPPORTUNITIES POLICY STATEMENT AND CODE OF PRACTICE

MINISTRY OF COMMUNICATIONS AND INFORMATION TECHNOLOGY (Department of Information Technology) NOTIFICATION New Delhi, the 11th April, 2011

Personal Information Protection Policy for Small and Medium-Size Businesses

PRIVATE HEALTH INSURANCE INTERMEDIARIES CODE OF CONDUCT JUNE 2015 VERSION 2

Transcription:

MINUTE TAKING TIPS How to keep your minutes FIPPA friendly

DID YOU KNOW MINUTES ARE CONSIDERED RECORDS UNDER FIPPA? As of June 10 th, 2006 Carleton University came under the Freedom of Information and Protection of Privacy Act (FIPPA). All personal information under the control of the university is subject to the rules and regulations set out in this legislation. minutes. The Freedom of Information and Protection of Privacy Act defines a record for the purposes of the Act as any record of information, no matter how made. This includes The Act further provides that every person has a right of access to a record or a part of a record in the custody or under the control of the institution in our case Carleton University. This means that minutes can be accessed by individuals through a request for access to information. WHEN DRAFTING YOUR MINUTES, ALWAYS ASSUME THEY WILL BE MADE AVAILABLE TO THE PUBLIC! The Act also protects personal privacy and regulates access to and disclosure of personal information. Personal Information (PI) includes identifying details about an individual. PI also includes the personal opinions and views of an individual as well as the views or opinions about an individual. With few exceptions, PI may only be disclosed with the consent of the individual to whom it relates. Therefore, it is best to try to omit altogether any data that would constitute PI under FIPPA in order to avoid an invasion of personal privacy (also known as a privacy breach). By keeping this in mind and following the steps provided in this guide you should have no trouble making sure your minutes stay FIPPA Friendly. For the full section on what constitutes personal information under FIPPA please refer to the appendix at the end of this guide. WHY KEEP MINUTES? Minutes are a vital aspect to the operations of the university and should contain enough information to: Ensure that open meetings are carried out in a transparent and accountable manner; Maintain an accurate historical record of an officially convened meeting; and Provide a reliable permanent record of the proceedings to those who were not in attendance, allowing for a clear understanding of the business that was conducted and why. Minute Taking Tips 1

WHAT SHOULD BE IN YOUR MINUTES As a minimum standard, your minutes should contain the following pieces of information: The nature of the meeting regular or special (if special, state the purpose); The name of the body - associated office, department or organization holding the meeting; Date, time and location of the meeting; The list of those invited - attendees and regrets; Names of the meeting Chair and Secretary; Record of motion to call the meeting to order; A record of all motions that were presented and discussed; What was decided, what action will be taken and who will do it; Record of motion to adjourn; Date and place of the next meeting. WHAT TO LEAVE OUT Exclude conversation, comments or discussions which are off topic; Avoid detailed chronicles of lengthy discussions that reach no conclusion; Do not use direct speech or direct quotes except as formal motions; Avoid emotional or intemperate language; Do not record each participant s contribution towards the discussion. The focus of the minutes should be on collective not personal action. WAYS TO KEEP YOUR MINUTES FIPPA FRIENDLY MINUTES SHOULD ADHERE TO THE FOLLOWING STANDARDS WHEN CREATED: Focus on documenting the processes and outcomes of the meeting, not transcribing verbatim what was said (unless it is a motion); Include only factual and concise statements about each issue discussed, omitting unnecessary details; Provide sufficient contextual information to enable the reconstruction of the actions that led to a decision; Do not include unsubstantiated or subjective information or opinions; Protect the privacy of individuals by avoiding the use of personal information without losing the meaning, importance and context of what was said. It is possible for an individual to give their consent to have their opinions recorded, but even so, always endeavour to avoid identifying attendees by name (use the passive voice instead) and always stick to the facts. Focus on final outcome not step-by-step notation. Minute Taking Tips 2

To Be Clear Minutes should be a record of what was done in a meeting, and not a record of what was said by individuals. If the minutes are also to summarize the discussion, this should be in an objective manner that captures the key points made, without identifying those who made them. It is especially important to follow the rule against verbatim minutes when sensitive issues are discussed. Even if the severing of personal information is possible, it still makes the document look questionable in terms of transparency, as illustrated below: WHAT YOU SHOULD NOT DO: Ms. Carleton, a professor of Computer Science, thinks that budgetary surplus should be directed more towards computer advancement in order to keep up with the pace of today s technological evolution and that the university has selfishly ignored this aspect of advancement in favour of other initiatives. BAD MINUTE-TAKING RESULTS IN MESSY SEVERING: Ms. Carleton, a professor of Computer Science, thinks that budgetary surplus should be directed more towards computer advancement in order to keep up with the pace of today s technological evolution and that the university has selfishly ignored this aspect of advancement in favour o other initiatives. OPTIMAL FORMAT: THIS DOES NOT REFLECT TRANSPARENCY It was suggested that budgetary surplus should be directed more towards computer advancement in order to keep up with technological evolution. The meaning and importance of the statement has not been lost, but the personal identifier and opinion are unnecessary to understanding the issue being discussed and should be omitted. Minute Taking Tips 3

BUT WHAT IF YOU HAVE TO INCLUDE PERSONAL INFORMATION? Sometimes the subject matter of a meeting makes it necessary to record personal information as it is vital to the discussion. If you must include personal information, do so in a manner that makes it easily severable from the main body of minutes without resulting in black out sections as illustrated above. At times it may be necessary to identify a speaker, but use a business title if this occurs; i.e. the President or the Dean of --- as opposed to an actual name. Proper organization of minutes into open and closed sections is vital when creating good, comprehensive minutes. This makes it easier to provide access to public information as it is not mixed in with confidential information. APPENDIX personal information as per s. 2(1) of the Act means recorded information about an identifiable individual, including, i. information relating to the race, national or ethnic origin, colour, religion, age, sex, sexual orientation or marital or family status of the individual, ii. information relating to the education or the medical, psychiatric, psychological, criminal or employment history of the individual or information relating to financial transactions in which the individual has been involved, iii. any identifying number, symbol or other particular assigned to the individual, iv. the address, telephone number, fingerprints or blood type of the individual, v. the personal opinions or views of the individual except where they relate to another individual, vi. correspondence sent to an institution by the individual that is implicitly or explicitly of a private or confidential nature, and replies to that correspondence that would reveal the contents of the original correspondence, vii. the views or opinions of another individual about the individual, and viii. the individual s name where it appears with other personal information relating to the individual or where the disclosure of the name would reveal other personal information about the individual; Minute Taking Tips 4