VIDEO SURVEILLANCE GUIDELINES
|
|
|
- Sheryl Douglas
- 9 years ago
- Views:
Transcription
1 VIDEO SURVEILLANCE GUIDELINES Introduction Surveillance of public spaces has increased rapidly over recent years. This growth is largely attributed to the significant advances in surveillance technology and its growing affordability, as well as the perception that video surveillance increases public safety and security. Although there is some debate regarding the deterrent effect of video surveillance technology on crime, it nevertheless remains the most common reason why public bodies and trustees (organizations) consider using surveillance systems. Regardless of the reason for using a surveillance system, it is important to recognize that cameras capture a great deal more than crimes in the making including responsible citizens going about their daily lives. And while collection of this information may appear harmless, there are laws regarding individual privacy rights and responsibilities that organizations must adhere to. The pervasive surveillance of ordinary, lawful activities can significantly interfere with an individual s right to privacy. Accordingly, organizations that are considering implementing a surveillance system must balance the benefits of surveillance against individual privacy rights in a democratic society. Purpose and scope As the use of surveillance become more prevalent in Manitoba, our office acknowledges the need for guidance when organizations consider using surveillance systems. Implementing a surveillance system requires careful consideration and forethought to minimize the impact on the privacy rights of individuals. In Manitoba, The Freedom of Information and Protection of Privacy Act (FIPPA) and The Personal Health Information Act (PHIA) recognize and protect an individual s privacy rights. FIPPA and PHIA govern the collection, use and disclosure of personal and personal health information held by organizations. These guidelines aim to assist organizations in deciding whether a proposed or existing surveillance system is operating in a privacy protective manner. For the purposes of these guidelines, we are dealing only with surveillance conducted by public bodies and trustees in open, public spaces, in public buildings, and on public transportation. These guidelines do not apply to covert surveillance being used as a case-specific investigation tool for law enforcement purposes. Private-sector organizations in Manitoba are governed by federal legislation, the Personal Information Protection and Electronic Documents Act (PIPEDA). PIPEDA sets out the ground rules for how private-sector organizations such as businesses collect, use or disclose personal information in the course of commercial activities. While our guidelines address surveillance in the public sector, many of the best practices are consistent with the surveillance guidelines for the private sector developed by the Office of the Privacy Commissioner of Canada and may be beneficial for Manitoba businesses who are contemplating a surveillance system. For specific information about overt and covert video surveillance in the private sector, please refer to the Office of the Privacy Commissioner of Canada website: Private Sector Covert Surveillance: cvs_ _e.asp Private Sector Overt Surveillance: vs_080306_e.asp Manitoba Ombudsman [email protected]
2 CONSIDERING USING SURVEILLANCE? Manitoba Ombudsman s Top 10 Considerations 1 Justifying surveillance and evaluating less privacy-intrusive options The use of a surveillance system must be justified on the basis of verifiable safety concerns or other demonstrable circumstances (for example, specific reports of incidents of crime). Organizations need to determine whether there are other measures to protect public safety or to deter or detect crime that would be reasonable and less privacy-intrusive. Video and/or audio surveillance should always be considered a last resort. If surveillance is considered, organizations should evaluate the potential impact surveillance would have on individual privacy. The organization should also establish whether the surveillance is permitted under FIPPA and PHIA. 2 Collection of personal and personal health information Under FIPPA and PHIA, any recording of personal or personal health information constitutes a collection of that information. Organizations must determine if they have the authority to collect the information in accordance with the applicable legislation before they consider a surveillance system. In addition, every component of the surveillance system must be permitted by the applicable legislation. For example, if an organization is considering the implementation of a surveillance system that collects video and audio footage, they must be able to demonstrate the purpose and the legal authority for the collection of both types of footage. This should include evidence that supports how each component fulfils the purpose for the collection. If the organization cannot identify provisions within the applicable legislation that authorizes the collection, the surveillance system should not be considered further. For more specific information regarding the collection of personal and personal health information, please refer to Manitoba Ombudsman s practice notes titled Collection and Providing Notice of Collection of Personal Information under FIPPA and Collection and Providing Notice of Collection of Personal Health Information under PHIA on the Manitoba Ombudsman s website at 3 Developing a surveillance system policy If an organization decides to implement a surveillance system, a written policy should be developed which clearly outlines the following: the rationale and objectives for implementing the surveillance system the legislative authority under FIPPA or PHIA for the collection of personal or personal health information the use of the system s equipment, including: the location of the equipment, the personnel authorized to operate the system 2
3 Thinking of video surveillance? Manitoba Ombudsman s Top 10 Considerations the personnel authorized to operate and or access the storage device and the times when surveillance will be in effect information that will be shared with the public about the surveillance system such as the personal information captured, the collection, use, disclosure, retention, destruction, security and access of the personal and personal health information the designation of a senior staff member responsible for the organization s privacy obligations under the act(s) and its policy, including name, title and phone number direction as to who is permitted to view the records, video or audio data and under what circumstances, for example, an incident has been reported or suspected a requirement that the organization will maintain control of and responsibility for the surveillance system at all times a requirement that any agreement between the organization and a contractor state that the records created while delivering the surveillance program are under the organization s control and subject to FIPPA and/or PHIA as applicable a requirement that employees and contractors review and comply with the policy and the act(s) in performing their duties and functions relating to the operation of the surveillance system and that they sign written agreements regarding their responsibilities under the policy and the act(s), including an undertaking of a pledge of confidentiality (as required by PHIA) a requirement that there is a process in place to respond appropriately to any privacy breach (see the practice notes titled Key Steps in Responding to Privacy Breaches under The Freedom of Information and Protection of Privacy Act (FIPPA) and The Personal Health Information Act (PHIA) and Reporting a Privacy Breach to Manitoba Ombudsman on the Manitoba Ombudsman s website at the incorporation of the policy, including staff and contractor obligations, into regular training and orientation programs a review of and update to the policy every two years or sooner if changes or upgrades are made to the surveillance system 4 Design and implementation of a surveillance system When designing a surveillance system, the following should be kept in mind: A surveillance system should only be installed in identified public areas where surveillance is a necessary and a viable means of deterring or detecting crime or protecting public safety. The equipment should be installed in such a way that it only monitors those spaces that have been identified as requiring surveillance. If cameras are adjustable by operators, this should be restricted, if possible, so that operators cannot adjust, zoom or manipulate the camera to overlook spaces that are not intended to be covered by the surveillance program. Equipment should not monitor the inside of areas where individuals generally have a higher expectation of privacy, for example, inside change rooms and washrooms. The use of surveillance should be restricted to time periods when there is a demonstrably higher likelihood of crime being committed and detected in the area under surveillance. Access to the surveillance system should be in a strictly controlled area. Only those who are authorized to use the system should have access to the controlled area and the surveillance equipment. Video monitors should never be in a position that enables public viewing. 3
4 Thinking of video surveillance? Manitoba Ombudsman s Top 10 Considerations 5 Notifying the public The public must be provided with reasonable and adequate notice that surveillance is or may be in operation. An organization should be as open as possible about its surveillance program and should be prepared to share information with the public about the rationale for the surveillance. This would include describing the purpose of conducting surveillance, the legal authority permitting the surveillance and the contact information of the organization s employee who can answer any questions regarding the surveillance. Providing reasonable and adequate notice may be achieved by clearly and prominently displaying a sign or poster at the perimeter of surveillance areas. 6 Using and disclosing surveillance records Information collected through video and/or audio surveillance should not be used or disclosed beyond the initial identified purpose unless it is otherwise authorized by legislation. The practice of collecting personal information for one reason and then later using the collected information for a different reason is referred to by privacy professionals as function creep. Function creep is problematic because it can lead to organizations using personal information in ways that do not meet the requirements of FIPPA or PHIA. For example, if an organization uses video surveillance at an entry to a building for law enforcement purposes and later wants to use the information to track employee attendance, the organization must first determine whether the applicable legislation authorizes the new use of the collected information. Otherwise the new use of the information may be unlawful. Organizations must also limit the use of personal and personal health information to only those employees who need to know the information to accomplish the initial purpose of the collection. Also, every disclosure of personal information must be limited to the minimum amount of information necessary to accomplish the purpose. Logs should be kept identifying when the surveillance records were utilized, by whom, and for what purpose. Additionally, logs should be kept of all instances of disclosure of the surveillance records, indicating the specific information disclosed, to whom it was disclosed, the date of the disclosure and the purpose for the disclosure. 7 Retention and destruction of surveillance records An organization should prepare a retention and destruction schedule to specify the length of time that surveillance records will be kept, when records will be destroyed, and how the records will be destroyed. A schedule should be based on a time period in which a suspected or actual incident could be revealed. If no suspected or actual incidents are revealed within that established time period, the information recorded during that time could be routinely erased or overridden. A retention period should also be established for information that reveals actual incidents; the time period should allow for appropriate action(s) to be taken in response to the information recorded, but not longer. Again, the organization should determine how surveillance records will be destroyed once a retention period has passed. 4
5 Thinking of video surveillance? Manitoba Ombudsman s Top 10 Considerations 8 Security of surveillance records All storage devices must be securely stored when not in use. For example, secure storage may include password protection of a digital device that is in a locked receptacle located in a controlled-access area. All storage devices that have been used should be numbered and dated. Storage devices that may be required for evidentiary purposes should be retained in accordance with policies until requested by law enforcement authorities. A storage device release form should be completed before any storage device is disclosed. The form should indicate: who took the device time and date the device was taken the legislative provision that permitted the disclosure of the device the legislative provision that permitted the collection of the device if the device will be returned or destroyed after use. All disclosures of storage devices should be regularly monitored and compliance with the surveillance system policy strictly enforced. If wireless technology is being used, the organization must securely encrypt the wireless transmission of all personal or personal health information. An information technology specialist should be involved with the transmission to ensure appropriate technological measures are taken. 9 Access to surveillance records Individuals have the legal right to access their personal and personal health information. This right also extends to surveillance records. Access may be granted to general information, to personal or personal health information in whole or in part, unless an exception applies under FIPPA or PHIA. Access to surveillance records may also depend on whether information that cannot legally be disclosed to an individual can reasonably be removed from the record. It may be possible to digitally black out or blur the images of other individuals in the footage, for example. 10 Auditing surveillance systems Organizations should ensure that the use and security of surveillance equipment including cameras, monitors and storage devices is periodically audited and compliant with operational policies and procedures. The audit should also address employees compliance with FIPPA or PHIA and any related policies and procedures. The results of each audit should be documented and any deficiencies or concerns identified by the audit should be addressed. Employees and contractors using the system should be aware that their activities are subject to audit. An audit clause should be added to any contract for the provision of surveillance services. Organizations should regularly review and evaluate surveillance systems to determine whether surveillance continues to be required or justified. 5
6 Conclusion Manitoba Ombudsman oversees compliance with The Freedom of Information and Protection of Privacy Act and The Personal Health Information Act by conducting investigations and reviewing privacy and access practices. The ombudsman investigates, monitors and audits compliance with the privacy protection provisions of FIPPA and PHIA. Manitoba Ombudsman may be consulted for advice or guidance regarding the potential use of a surveillance system or any significant modification or expansion of a surveillance system. Organizations should also consider seeking legal advice and consulting with their access and privacy coordinator or privacy officer before implementing a surveillance system. While it is not mandatory, a privacy impact assessment is considered a best practice and is a very useful tool to help clarify any issues prior to designing and installing a surveillance system. Because the use of video and audio surveillance is very intrusive to individual privacy rights and raises a number of controversial issues, organizations need to assess the true need and value of video surveillance. The organization must balance the benefits of using surveillance technology with the potential cost to individual privacy. ACKNOWLEDGMENTS We gratefully acknowledge the contributions of the Office of the Privacy Commissioner of Canada and the Information and Privacy Commissioner s offices in British Columbia, Alberta, Saskatchewan, Ontario, Newfoundland and Labrador to our Video Surveillance Guidelines. Our guidelines incorporate much of their collective advice and knowledge. Manitoba Ombudsman Portage Avenue Winnipeg, MB R3C 3X (phone) (toll-free in Manitoba) (fax) [email protected] (general inquiries) February 2015
Information and Privacy Commissioner of Ontario. Guidelines for the Use of Video Surveillance Cameras in Public Places
Information and Privacy Commissioner of Ontario Guidelines for the Use of Video Surveillance Cameras in Public Places Ann Cavoukian, Ph.D. Commissioner September 2007 Acknowledgements This publication
Information and Privacy Commissioner of Ontario. Guidelines for Using Video Surveillance Cameras in Schools
Information and Privacy Commissioner of Ontario Guidelines for Using Video Surveillance Cameras in Schools Ann Cavoukian, Ph.D. Commissioner Revised July 2009 This publication is an updated version of
OIPC GUIDELINES FOR THE USE OF VIDEO SURVEILLANCE SYSTEMS IN SCHOOLS
OIPC GUIDELINES FOR THE USE OF VIDEO SURVEILLANCE SYSTEMS IN SCHOOLS February 13, 2013 TABLE OF CONTENTS Page Introduction... 1 Applicability of Guidelines... 2 ATIPPA... 3 Definitions... 5 Collection
UNIVERSITY OF MANITOBA POLICY CLOSED CIRCUIT TV (CCTV) MONITORING. Part I Reason for Policy
UNIVERSITY OF MANITOBA POLICY Policy: Effective Date: October 1, 2012 Revised Date: November 20, 2012 Review Date: October 1, 2022 Approving Body: Authority: Responsible Executive Officer: Delegate: Contact:
University of Birmingham. Closed Circuit Television (CCTV) Code of Practice
University of Birmingham Closed Circuit Television (CCTV) Code of Practice University of Birmingham uses closed circuit television (CCTV) images to provide a safe and secure environment for students, staff
Policy on Public and School Bus Closed Circuit Television Systems (CCTV)
DEPARTMENT OF TRANSPORT Policy on Public and School Bus Closed Circuit Television Systems (CCTV) Responsibility of: Public Transport Division TRIM File: DDPI2010/3680 Effective Date: July 2010 Version
The Manitoba Child Care Association PRIVACY POLICY
The Manitoba Child Care Association PRIVACY POLICY BACKGROUND The Manitoba Child Care Association is committed to comply with the legal obligations imposed by the federal government's Personal Information
THE PERSONAL INFORMATION PROTECTION AND ELECTRONIC DOCUMENTS ACT (PIPEDA) PERSONAL INFORMATION POLICY & PROCEDURE HANDBOOK
THE PERSONAL INFORMATION PROTECTION AND ELECTRONIC DOCUMENTS ACT (PIPEDA) PERSONAL INFORMATION POLICY & PROCEDURE HANDBOOK REVISED August 2004 PERSONAL INFORMATION POLICY & PROCEDURE HANDBOOK Introduction
LONDON DOWNTOWN CLOSED CIRCUIT TELEVISION (CCTV) PROGRAM CODE OF PRACTICE CITY OF LONDON, ONTARIO
LONDON DOWNTOWN CLOSED CIRCUIT TELEVISION (CCTV) PROGRAM CODE OF PRACTICE CITY OF LONDON, ONTARIO Contents Page Number 1. Introduction Page 2 2. Defining the Responsible Persons Page 2 3. Purpose and Principles
Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE
Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE The District and its colleges are committed to enhancing the quality of life of the community by integrating
How To Ensure Health Information Is Protected
pic pic CIHI Submission: 2011 Prescribed Entity Review October 2011 Who We Are Established in 1994, CIHI is an independent, not-for-profit corporation that provides essential information on Canada s health
We ask that you contact our Privacy Officer in the event you have any questions or concerns regarding this Code or its implementation.
PRIVACY AND ANTI-SPAM CODE FOR OUR DENTAL OFFICE Please refer to Appendix A for a glossary of defined terms. INTRODUCTION The Personal Health Information Act (PHIA) came into effect on December 11, 1997,
Personal Information Protection and Electronic Documents Act
PIPEDA Self-Assessment Tool Personal Information Protection and Electronic Documents Act table of contents Why this tool is needed... 3 How to use this tool... 4 PART 1: Compliance Assessment Guide Principle
SUBJECT: VOYAGEUR TRANSPORTATION CORPORATE POLICIES/PROCEDURES TITLE: PRIVACY OF PERSONAL HEALTH INFORMATION
SUBJECT: VOYAGEUR PAGE 1 1.0 PURPOSE: 1.1 To establish and document a policy which defines Voyageur s commitment to the protection of an individual s personal health information in the course of providing
SURVEILLANCE AND PRIVACY
info sheet 03.12 SURVEILLANCE AND PRIVACY Info Sheet 03.12 March 2012 This Information Sheet applies to Victorian state and local government organisations that are bound by the Information Privacy Act
Law Firm Compliance: Key Privacy Considerations for Lawyers and Law Firms in Ontario
PRIVACY COMPLIANCE ISSUES FOR LAW FIRMS IN ONTARIO By Sara A. Levine 1 Presented at Law Firm Compliance: Key Privacy Considerations for Lawyers and Law Firms in Ontario Ontario Bar Association, May 6,
Highland Council Information Security Policy
Highland Council Information Security Policy Document Owner: Vicki Nairn, Head of Digital Transformation Page 1 of 16 Contents 1. Document Control... 4 Version History... 4 Document Authors... 4 Distribution...
Privacy Law in Canada
Privacy Law in Canada Federal and provincial privacy legislation has a profound impact on the way virtually all organizations carry on business across the country. Canada s privacy laws, while likely the
Corporate Policy and Procedure
Page Page 1 of 9 TAB: SECTION: SUBJECT: ROADS AND TRAFFIC TRAFFIC OPERATIONS CLOSED CIRCUIT TELEVISION (CCTV) TRAFFIC MONITORING SYSTEMS POLICY STATEMENT POLICY PURPOSE The City of Mississauga may install
INFORMATION GOVERNANCE OPERATING POLICY & FRAMEWORK
INFORMATION GOVERNANCE OPERATING POLICY & FRAMEWORK Log / Control Sheet Responsible Officer: Chief Finance Officer Clinical Lead: Dr J Parker, Caldicott Guardian Author: Associate IG Specialist, Yorkshire
Cloud Computing Contracts. October 11, 2012
Cloud Computing Contracts October 11, 2012 Lorene Novakowski Karam Bayrakal Covering Cloud Computing Cloud Computing Defined Models Manage Cloud Computing Risk Mitigation Strategy Privacy Contracts Best
Report of the Information & Privacy Commissioner/Ontario. Review of the Canadian Institute for Health Information:
Information and Privacy Commissioner of Ontario Report of the Information & Privacy Commissioner/Ontario Review of the Canadian Institute for Health Information: A Prescribed Entity under the Personal
Accountable Privacy Management in BC s Public Sector
Accountable Privacy Management in BC s Public Sector Contents Accountable Privacy Management In BC s Public Sector 2 INTRODUCTION 3 What is accountability? 4 Steps to setting up the program 4 A. PRIVACY
Corporate Information Security Policy
Corporate Information Security Policy. A guide to the Council s approach to safeguarding information resources. September 2015 Contents Page 1. Introduction 1 2. Information Security Framework 2 3. Objectives
3. Consent for the Collection, Use or Disclosure of Personal Information
PRIVACY POLICY FOR RENNIE MARKETING SYSTEMS Our privacy policy includes provisions of the Personal Information Protection Act (BC) and the Personal Information Protection and Electronic Documents Act (Canada),
Taking care of what s important to you
A v i v a C a n a d a I n c. P r i v a c y P o l i c y Taking care of what s important to you Table of Contents Introduction Privacy in Canada Definition of Personal Information Privacy Policy: the ten
Privacy Breach Protocol
& Privacy Breach Protocol Guidelines for Government Organizations www.ipc.on.ca Table of Contents What is a privacy breach? 1 Guidelines on what government organizations should do 2 What happens when the
LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction
LEEDS BECKETT UNIVERSITY Information Security Policy 1.0 Introduction 1.1 Information in all of its forms is crucial to the effective functioning and good governance of our University. We are committed
Privacy Law in Canada
by PATRICIA WILSON & MICHAEL FEKETE Protection of personal information remains at the forefront of public policy debate in. Federal and provincial privacy legislation has a profound impact on the way virtually
5.00 Employee in relation to the university, includes a volunteer and a service provider.
PROTECTION OF PRIVACY POLICY University Policy No: GV0235 Classification: Governance Approving Authority: Board of Governors Effective Date: January 1, 2010 Supersedes: June 2008 Last Editorial Change:
The potential legal consequences of a personal data breach
The potential legal consequences of a personal data breach Tue Goldschmieding, Partner 16 April 2015 The potential legal consequences of a personal data breach 15 April 2015 Contents 1. Definitions 2.
Data Protection for the Guidance Counsellor. Issues To Plan For
Data Protection for the Guidance Counsellor Issues To Plan For Author: Hugh Jones Data Protection Specialist Longstone Management Ltd. Published by the National Centre for Guidance in Education (NCGE)
Personal Information Protection Act ( PIPA ) Privacy-Proofing Your Retail Business Tips for Protecting Customers Personal Information 1
Personal Information Protection Act ( PIPA ) Tips for Protecting Customers Personal Information 1 More than ever before, retailers have to be prepared to deal with customers who ask questions about the
Credit Union Board of Directors Introduction, Resolution and Code for the Protection of Personal Information
Credit Union Board of Directors Introduction, Resolution and Code for the Protection of Personal Information INTRODUCTION Privacy legislation establishes legal privacy rights for individuals and sets enforceable
Privacy Incident and Breach Management Policy
Privacy Incident and Breach Management Policy Privacy Office Document ID: 2480 Version: 2.1 Owner: Chief Privacy Officer Sensitivity Level: Low Copyright Notice Copyright 2014, ehealth Ontario All rights
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
PROTECTION OF PERSONAL INFORMATION
PROTECTION OF PERSONAL INFORMATION Definitions Privacy Officer - The person within the Goderich Community Credit Union Limited (GCCU) who is responsible for ensuring compliance with privacy obligations,
Helpful Tips. Privacy Breach Guidelines. September 2010
Helpful Tips Privacy Breach Guidelines September 2010 Office of the Saskatchewan Information and Privacy Commissioner 503 1801 Hamilton Street Regina, Saskatchewan S4P 4B4 Office of the Saskatchewan Information
ADMINISTRATIVE PROCEDURES/REGULATIONS.
Policy: Video/Electronic Security Systems OPER-600 Division: Operations ADMINISTRATIVE PROCEDURES/REGULATIONS. 1. Approval 1.1 The relevant school administrator or manager must submit a Video Surveillance
EXAMINATION OUTLINE FOR PRIVATE INVESTIGATORS
EXAMINATION OUTLINE FOR PRIVATE INVESTIGATORS 2014 I. Ethics (18%) This area assesses the candidate s ability to comply with ethical standards of private investigators regarding privacy rights, confidentiality,
INFORMATION SHARING PROTOCOL UNDER THE YOUTH CRIMINAL JUSTICE ACT (CANADA)
INFORMATION SHARING PROTOCOL UNDER THE YOUTH CRIMINAL JUSTICE ACT (CANADA) February 2004 A partnership of: Manitoba Healthy Living Manitoba Aboriginal and Northern Affairs Manitoba Culture, Heritage and
CCTV Cameras Policy. Policy Guidelines
CCTV Cameras Policy Policy Guidelines To assist in providing the safe physical environment a CCTV surveillance system has been installed at Sydney Central on the ground floor. The area covered includes
DATA PROTECTION POLICY
DATA PROTECTION POLICY DATA PROTECTION POLICY Document Control Information Title Data Protection Policy Version V1.0 Author Diana Watt Date Approved 21 February 2013 Review Date Annually, on the anniversary
CANADIAN PRIVACY AND DATA RESIDENCY REQUIREMENTS. White Paper
CANADIAN PRIVACY AND DATA RESIDENCY REQUIREMENTS White Paper Table of Contents Addressing compliance with privacy laws for cloud-based services through persistent encryption and key ownership... Section
AN INTRO TO. Privacy Laws. An introductory guide to Canadian Privacy Laws and how to be in compliance. Laura Brown
AN INTRO TO Privacy Laws An introductory guide to Canadian Privacy Laws and how to be in compliance Laura Brown Air Interactive Media Senior DMS Advisor A Publication of 1 TABLE OF CONTENTS Introduction
How To Understand The Data Protection Act
DATA PROTECTION ACT 2002 The Basics Purpose of the Act Balance the rights of an individual with an organisation s legitimate need to process personal data Promote openness and transparency Establish and
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES:
CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES: Privacy Responsibilities and Considerations Cloud computing is the delivery of computing services over the Internet, and it offers many potential
The Manitowoc Company, Inc.
The Manitowoc Company, Inc. DATA PROTECTION POLICY 11FitzPatrick & Associates 4/5/04 1 Proprietary Material Version 4.0 CONTENTS PART 1 - Policy Statement PART 2 - Processing Personal Data PART 3 - Organisational
Information Governance Policy
Information Governance Policy 1 Introduction Healthwatch Rutland (HWR) needs to collect and use certain types of information about the Data Subjects who come into contact with it in order to carry on its
Data Security and Extranet
Data Security and Extranet Derek Crabtree Schools ICT Support Manager [email protected] Target Operating Model 2011 Merton Audit Organisation name: London Borough of Merton Periodic plan date:
DATA PROTECTION POLICY
Title Author Approved By and Date Review Date Mike Pilling Latest Update- Corporation May 2008 1 Aug 2013 DATA PROTECTION ACT 1998 POLICY FOR ALL STAFF AND STUDENTS 1.0 Introduction 1.1 The Data Protection
Privacy and Security Resource Materials for Saskatchewan EMR Physicians: Guidelines, Samples and Templates. Reference Manual
Privacy and Security Resource Materials for Saskatchewan EMR Physicians: Guidelines, Samples and Templates Guidelines on Requirements and Good Practices For Protecting Personal Health Information Disclaimer
Privacy Policy on the Collection, Use, Disclosure and Retention of Personal Health Information and De-Identified Data, 2010
pic pic Privacy Policy on the Collection, Use, Disclosure and Retention of Personal Health Information and De-Identified Data, 2010 Updated March 2013 Our Vision Better data. Better decisions. Healthier
HEALTH INFORMATION ACT (HIA) BILL QUESTIONS AND ANSWERS
HEALTH INFORMATION ACT (HIA) BILL QUESTIONS AND ANSWERS KEY HIA CONCEPTS AND PROVISIONS Q. What is the purpose of the legislation? To protect clients personal health information. To set rules on the collection,
MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP)
MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP) 201 CMR 17.00 Standards for the Protection of Personal Information Of Residents of the Commonwealth of Massachusetts Revised April 28,
SCDA and SCDA Member Benefits Group
SCDA and SCDA Member Benefits Group HIPAA Privacy Policy 1. PURPOSE The purpose of this policy is to protect personal health information (PHI) and other personally identifiable information for all individuals
Conducting Surveys: A Guide to Privacy Protection. Revised January 2007 (updated to reflect A.R. 186/2008)
Conducting Surveys: A Guide to Privacy Protection Revised January 2007 (updated to reflect A.R. 186/2008) ISBN 978-0-7785-6101-9 Produced by: Access and Privacy Service Alberta 3rd Floor, 10155 102 Street
Cloud Computing: Privacy and Other Risks
December 2013 Cloud Computing: Privacy and Other Risks by George Waggott, Michael Reid and Mitch Koczerginski, McMillan LLP Introduction While the benefits of outsourcing organizational data storage to
Ministry of Children and Family Development (MCFD) Contractor s Information Management Guidelines
(This document supersedes the document previously entitled MCFD Contractor Records Guidelines) Ministry of Children and Family Development (MCFD) Contractor s Information Management Guidelines November
The USA Patriot Act Government Briefing. Kirsten Tisdale, Chris Norman, Sharon Plater & Alexandra (Gina) Henley September 30, 2004
The USA Patriot Act Government Briefing Kirsten Tisdale, Chris Norman, Sharon Plater & Alexandra (Gina) Henley September 30, 2004 Agenda Background Overview of Government Responses and Approach Mitigation
MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)
MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...
Online Research and Investigation
Online Research and Investigation This document is intended to provide guidance to police officers or staff engaged in research and investigation across the internet. This guidance is not a source of law
Electronic Health Record Privacy Policies
Electronic Health Record Privacy Policies Table of Contents 1. Access and Correction Policy v1.1 2. Assurance Policy v1.1 3. Consent Management Policy v1.2 4. Inquiries and Complaints Policy v1.1 5. Logging
HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics
HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 5. 2. Security Standards - Organizational, Security Policies Standards & Procedures, - Administrative and Documentation Safeguards
The supplier shall have appropriate policies and procedures in place to ensure compliance with
Supplier Instructions for Processing of Personal Data 1 PURPOSE SOS International has legal and contractual obligations on the matters of data protection and IT security. As a part of these obligations
National Association of Pharmacy Regulatory Authority s Privacy Policy for Pharmacists' Gateway Canada
Introduction National Association of Pharmacy Regulatory Authority s Privacy Policy for Pharmacists' Gateway Canada This Privacy Policy describes the manner in which the National Association of Pharmacy
Data Protection. Processing and Transfer of Personal Data in Kvaerner. Binding Corporate Rules Public Document
Data Protection Processing and Transfer of Personal Data in Kvaerner Binding Corporate Rules Public Document 1 of 19 1 / 19 Table of contents 1 Introduction... 4 1.1 Scope... 4 1.2 Definitions... 4 1.2.1
INFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013
INFORMATION SECURITY GUIDE Cloud Computing Outsourcing Information Security Unit Information Technology Services (ITS) July 2013 CONTENTS 1. Background...2 2. Legislative and Policy Requirements...3 3.
RECORDS MANAGEMENT POLICY
RECORDS MANAGEMENT POLICY POLICY STATEMENT The records of Legal Aid NSW are a major component of its corporate memory and risk management strategies. They are a vital asset that support ongoing operations
2010THE LEGISLATIVE ASSEMBLY FOR THEAUSTRALIAN CAPITAL TERRITORY. WORKPLACE PRIVACY BILL 2010EXPLANATORY STATEMENT Circulated by Amanda Bresnan MLA
2010THE LEGISLATIVE ASSEMBLY FOR THEAUSTRALIAN CAPITAL TERRITORY WORKPLACE PRIVACY BILL 2010EXPLANATORY STATEMENT Circulated by Amanda Bresnan MLA OVERVIEW The objects of this Bill are to ensure that employers
The Use of Cloud Computing for the Storing and Accessing of Client Information: Some Practical and Ethical Considerations
The Use of Cloud Computing for the Storing and Accessing of Client Information: Some Practical and Ethical Considerations Jeffrey D. Scott Jeffrey D. Scott, Legal Professional Corporation Practice Advisors
Privacy and Electronic Communications Regulations
ICO lo Notification of PECR security breaches Privacy and Electronic Communications Regulations Contents Introduction... 2 Overview... 2 Relevant security breaches... 3 What is a service provider?... 3
BRITISH COUNCIL DATA PROTECTION CODE FOR PARTNERS AND SUPPLIERS
BRITISH COUNCIL DATA PROTECTION CODE FOR PARTNERS AND SUPPLIERS Mat Wright www.britishcouncil.org CONTENTS Purpose of the code 1 Scope of the code 1 The British Council s data protection commitment and
DEALERSHIP IDENTITY THEFT RED FLAGS AND NOTICES OF ADDRESS DISCREPANCY POLICY
DEALERSHIP IDENTITY THEFT RED FLAGS AND NOTICES OF ADDRESS DISCREPANCY POLICY This Plan we adopted by member, partner, etc.) on Our Program Coordinator (date). (Board of Directors, owner, We have appointed
College of DuPage Information Technology. Information Security Plan
College of DuPage Information Technology Information Security Plan April, 2015 TABLE OF CONTENTS Purpose... 3 Information Security Plan (ISP) Coordinator(s)... 4 Identify and assess risks to covered data
