CANADIAN PRIVACY AND DATA RESIDENCY REQUIREMENTS. White Paper
|
|
|
- Griffin Fowler
- 10 years ago
- Views:
Transcription
1 CANADIAN PRIVACY AND DATA RESIDENCY REQUIREMENTS White Paper
2 Table of Contents Addressing compliance with privacy laws for cloud-based services through persistent encryption and key ownership... Section I: Vaultive Response to PIPEDA, PIPA (Province of Alberta), PHIPA (Province of Ontario) and FIPPA Requirements... Section II: Data Residency and Residency of Controls... Vaultive Response: Maintaining Data Privacy and Control Residency
3 Addressing Data Control and Compliance with Canadian Privacy Regulations for Cloud-based services: The adoption of cloud computing presents a new set of compliance concerns and need for best practices guidelines under privacy laws applied to both Canadian government bodies and organizations in the private sector. The Government of Canada and provincial governments have been required to manage the privacy of personal information since the passage of the Privacy Act of With the development of online commerce, requirements for the protection of personal information were extended to private sector organizations holding electronic records of personal information when the Personal Information Protection and Electronic Documents Act of 2004 was passed. The privacy laws and legislation share a set of common principles that relate to accountability, technical safeguards and limiting disclosure of personal information, at least in the context of this discussion. As cloud computing adoption grows, concerns about the integrity of safeguards for the privacy of personal information have intersected with anxiety over the implications of trans-border data flow and data residency issues that could be viewed as at odds with Canadian privacy requirements. This evolving landscape is catalyzing the initial definition of best practices related for the ownership and control of data processed in third-party environments. Addressing compliance with privacy laws for cloud-based services through persistent encryption and key ownership At the heart of the concerns that bring compliance under consideration is how organizations can continue to maintain control and protection of personal information, even when the information resides on a third-party service. Vaultive s platform is designed to complement existing cloud service provider security safeguards through an additional layer of data control capabilities based on persistent encryption and retention of the encryption keys by the organization held accountable for privacy protection. These data control capabilities enable organizations to satisfy the requirements for accountability and technical safeguards, specifically in the area of encryption. Vaultive s proxy-based approach enables organizations to seamlessly extend the trusted enterprise boundary through advanced encryption-in-use capabilities and preserve application functionality through platform extensions for Office 365 and Hosted Exchange services. In line with the Cloud Security Alliance s updated security guidance covering best practices for migrating data to the cloud, Vaultive s enterprise-grade cloud data encryption solutions enable customers to encrypt data-at-rest, data-intransit and data-in-use in the cloud. Microsoft has committed to providing Office 365 and Hosted Exchange customers the performance, scalability, security and service levels business customers expect, as well as ongoing investment in security processes and technologies. Vaultive s data control and encryption capabilities complement access management technologies for cloud-based services, such as federated identity supported by Microsoft technologies such as Active Directory Federation Server. This document provides an overview of how Vaultive s technology addresses the security, privacy and accountability requirements as defined by current Canadian privacy law, related to both government institutions and commercial organizations, specifically in the context of cloud-based services. The Personal Information Protection and Electronic Documents Act (PIPEDA) and related Personal Information Protection Act (PIPA) legislation as declared by provincial legislatures in Alberta, British Columbia, Ontario and Quebec is directed primarily at commercial organizations, while the Privacy Act of 1985 and the Freedom of Information and Protection of Privacy Act (FIPPA) covers federal and provincial organizations. Section I of this document also serves to illustrate how Vaultive can address the technical safeguards and accountability requirements as defined in the various laws. Section II addresses how Vaultive s key management and proxy-based approach enables Canadian organizations to manage border data flow and maintain residency of data controls. 3
4 Section I: Vaultive Response to PIPEDA, PIPA (Province of Alberta), PHIPA (Province of Ontario) and FIPPA Requirements PIPEDA Requirement Description of Controls 1 Vaultive Response Principle 1 Accountability An organization is responsible for personal information in its possession or custody, including information that has been transferred to a third party for processing. The organization shall use contractual or other means to provide a comparable level of protection while the information is being processed by a third party. Vaultive s design goal is to deliver a platform that directly addresses the requirements for ownership and control of personal information under an organization s custody that resides or is processed on cloud-based services. Through deployment of the Vaultive proxy, organizations can encrypt data before it leaves the trusted network, while enterprise IT retains the encryption keys. Based on advanced encryption capabilities that allow for processing of encrypted ciphers in a third-party environment while maintaining application functionality, Vaultive s platform supports the additional dimension of encryption of data in use. Vaultive s persistent encryption capabilities allow customers to satisfy requirements to encrypt data in transit to the cloud service provider, maintain encryption of data at rest while resident in the cloud, in addition to supporting encryption of data processed by a third-party service. This functionality set enables organizations to address their responsibility related to the custody of personal information as delineated under PIPEDA in two key aspects: firstly, by encrypting all personal information before it traverses a trusted boundary; and, by retaining the encryption keys to data resident on a third-party service, organizations can point to system controls to demonstrate fulfillment of the protection requirement. 1 Personal Information Protection and Electronic Documents Act, Current to September 4, 2012, CAN/CSA-Q
5 4.7 Principle 7 Safeguards The security safeguards shall protect personal information against loss or theft, as well as unauthorized access, disclosure, copying, use, or modification. Organizations shall protect personal information regardless of the format in which it is held. Vaultive s platform addresses the requirements for security safeguards to protect against loss or theft of personal information through advanced encryption techniques that span the trusted network and the service provider s environment. Based on the outcome of significant research and development in cryptography and key management, as well as ongoing product investments, the Vaultive platform maintains referential integrity to support processing of encrypted ciphers. Since the server-side processing is performed against encrypted data, data never resides in the clear outside of the trusted network. In addition, enterprise IT retains control of the encryption keys, providing an additional layer of controls to ensure protection of personal information and prevent unauthorized access. Because enterprise IT retains control of the encryption keys, disclosure requests from law enforcement agencies directed initially to the cloud service provider can be managed independently by the enterprise. Enterprise control of the encryption keys eliminates the risk that personal information can be inadvertently exposed to administrators at cloud service providers with access to customer instances. Were a hacker to be successful in their breach of the service provider s environment, the data that they would retrieve from Vaultive s customers would remain encrypted. The hacker would only gain access to the data or s if they could also hack the encryption keys directly from the responsible organization. While cloud service providers would still be required to issue a notification should a breach take place, the use of Vaultive s technology would reduce the scope of customer records that could be compromised, since they are in encrypted format. 5
6 4.7 Principle 7 Safeguards The methods of protection should include: (a) physical measures, for example, locked filing cabinets and restricted access to offices; (b) organizational measures, for example, security clearances and limiting access on a need-to-know basis; and (c) technological measures, for example, the use of passwords and encryption. Vaultive s enterprise-class cloud data encryption solutions enable customers to encrypt data-at-rest, data-in-transit and data-in-use in the cloud. Since enterprise cloud data is encrypted for the entire duration of its lifecycle (at-rest, in-transit and in-use), Vaultive s market-leading capabilities for cloud data security serve to comprehensively insulate data from unauthorized access or targeted attacks by a third party. The Vaultive approach fully addresses the risk of inadvertent exposure of confidential data to administrators at the cloud service provider as enterprises reap the benefits from the moving their Exchange infrastructure to the cloud. Vaultive employs a patent-pending form of standard 256-bit AES encryption, supplemented with additional layer of encrypted metadata. In order to significantly minimize any statistical risk that the platform s referential integrity for maintaining server-side processing of encrypted data can be compromised, Vaultive has invested heavily in several layers of compensating security measures. 4.5 Principle 5 Limiting use, disclosure, and retention: Organizations are required to comply with a subpoena or warrant issued or an order made by a court, person or body with jurisdiction to compel the production of information, or to comply with rules of court relating to the production of records While service providers are compelled to comply with requests from law enforcement agencies delivered as a subpoena or a warrant to disclose personal information, once Vaultive is deployed only enterprise IT can release the keys to decrypt the data. This allows the organization to independently manage the government request. Additionally, the Vaultive appliance can be configured to ensure that data that moves beyond a specific jurisdictional domain remains encrypted. 6
7 PIPA Requirement Description of Controls 2 Vaultive Response Reasonable Technical Safeguards to protect personal information in their custody or control Section 34 of the Personal Information Protection Act ( PIPA or the Act ) requires organizations to protect personal information in their custody or control by making reasonable security arrangements against such risks as unauthorized access, collection, use, disclosure, copying, modification, disposal or destruction. Vaultive s design goal is to deliver a platform that directly addresses the requirements for ownership and control of personal information under an organization s custody that resides or is processed on cloudbased services. Through deployment of the Vaultive proxy, organizations can encrypt data before it leaves the trusted network, while enterprise IT retains the encryption keys. Based on advanced encryption capabilities that allow for processing of encrypted ciphers in a third-party environment while maintaining application functionality, Vaultive s platform supports the additional dimension of encryption of data in use. Vaultive s persistent encryption capabilities allow customers to satisfy requirements to encrypt data in transit to the cloud service provider, maintain encryption of data at rest while resident in the cloud, in addition to supporting encryption of data processed by a third-party service. This functionality set enables organizations to address their responsibility related to the custody of personal information as delineated under PIPA in two key aspects: firstly, by encrypting all personal information before it traverses a trusted boundary; and, by retaining the encryption keys to data resident on a third-party service, organizations can point to system level controls to demonstrate fulfillment of the protection requirement. Reasonable Technical Safeguards to protect personal information in their custody or control. According to the Alberta Information and Privacy Commissioner s report on privacy breaches in the province for the period of Jan 1- April , of the 63 significant reported breaches, 14 were caused by electronic system compromises (with human error accounting for 22 of the total). These breaches were typically found to occur as a result of targeted attacks by external hackers seeking to extract large amounts of data. Were a hacker to be successful in their breach of the service provider s environment, the data that they would retrieve from Vaultive s customers would remain encrypted. The hacker would only gain access to the data or s if they could also retrieve the encryption keys directly from the responsible organization. 2 Personal Information Protection Act, Province of Alberta, January 1,
8 PHIPA Requirement Description of Controls 3 Vaultive Response Practices to Protect Personal Health Information, Security FIPPA (British Columbia Requirement) Protection of Privacy Collection, Protection and Retention of Personal Information by Public Bodies A health information custodian shall take steps that are reasonable in the circumstances to ensure that personal health information in the custodian s custody or control is protected against theft, loss and unauthorized use or disclosure and to ensure that the records containing the information are protected against unauthorized copying, modification or disposal. Description of Controls 4 A public body must protect personal information in its custody or under its control by making reasonable security arrangements against such risks as unauthorized access, collection, use, disclosure or disposal. Vaultive s persistent encryption capabilities allow customers to satisfy requirements to encrypt data in transit to the cloud service provider, maintain encryption of data at rest while resident in the cloud, in addition to supporting encryption of data processed by a third-party service. This functionality set enables organizations to address their responsibility related to the custody of personal information as delineated under PHIPA in two key aspects: firstly, by encrypting all personal information before it traverses a trusted boundary; and, by retaining the encryption keys to data resident on a third-party service, organizations can point to system level controls to demonstrate fulfillment of the protection requirement. Vaultive Response Vaultive s persistent encryption capabilities allow customers to satisfy requirements to encrypt data in transit to the cloud service provider, maintain encryption of data at rest while resident in the cloud, in addition to supporting encryption of data processed by a third-party service. This functionality set enables organizations to address their responsibility related to the custody of personal information as delineated under FIPPA in two key aspects: firstly, by encrypting all personal information before it traverses a trusted boundary; and, by retaining the encryption keys to data resident on a third-party service, organizations can point to system level controls to demonstrate fulfillment of the protection requirement. 3 Personal Health Information Protection Act, Province of Ontario, January 1, Freedom of Information and Protection of Privacy Act, [Revised Statutes of British Columbia, 1996] 8
9 FOIP Requirement Description of Controls 5 Vaultive Response Protection of Privacy Collection, Protection and Retention of Personal Information by Public Bodies...reasonable security measures are followed to protect against unauthorized access, use, alteration, destruction, or disclosure of personal information. Vaultive s persistent encryption capabilities allow customers to satisfy requirements to encrypt data in transit to the cloud service provider, maintain encryption of data at rest while resident in the cloud, in addition to supporting encryption of data processed by a third-party service. This functionality set enables organizations to address their responsibility related to the custody of personal information as delineated under FOIP in two crucial aspects: firstly, by encrypting all personal information before it traverses a trusted boundary; and, by retaining the encryption keys to data resident on a third-party service, organizations can point to system level controls to demonstrate fulfillment of the protection requirement. Section II: Data Residency and Residency of Controls Under Canadian privacy law, both federal bodies and commercial organizations domiciled within Canadian borders are responsible for the privacy and protection of personal information in their custody. This requirement applies regardless of where the data resides. While significant concerns have been articulated with regards to the probability of disclosure to US law enforcement agencies of data that resides within datacenters located within the US, the requirements pertain directly to the safeguards in place to maintain control. As noted in her formal response to a question related to compliance with the Freedom of Information and Protection of Privacy Act presented by two members of the Ontario provincial parliament about the privacy and security of personal information collected by the Ministry of Natural Resources that is currently being stored in the U.S., Ann Cavoukian, Information and Privacy Commissioner for the Province of Ontario wrote: It is important to remember that, in Ontario, there is no legislative prohibition against the storing of personal information outside of the province or Canada. In other words, Ontario law, including the Act, does not speak to this issue. However, the Act and its regulations do require provincial institutions to ensure that reasonable measures are in place to protect the privacy and security of their records containing personal information. This applies regardless of where the records are located. 5 The Freedom of Information and Protection of Privacy, Sec 38 9
10 Commissioner Cavoukian further added: The critical question for institutions which have outsourced their operations across provincial or international borders is whether they have taken reasonable steps to protect the privacy and security of the records in their custody and control. I have always taken the position that you can outsource services, but you cannot outsource accountability. Control of the keys in combination with Vaultive s encryption across the data lifecycle in transit, at rest and in use provide the foundation to satisfy requirements for control and adequate safeguards for the privacy of personal information. Trans Border Data Controls (Full document available at this link: The requirements, therefore, relate to where control of the data resides and the location of the data is not germane to the requirements. Vaultive Response: Maintaining Data Privacy and Control Residency Data residency and privacy challenges in the context of Canadian privacy compliance requirements pertain to limiting access to personal information in the custody of organizations subject to the legislation. Vaultive addresses this requirement to prevent unauthorized access by third parties through organizational control and ownership of the encryption keys and the application of persistent encryption. Once encrypted at the boundary of the trusted network, the data remains encrypted, even when processed within the cloud service provider environment. Regardless of the jurisdiction where the data resides, control of the access to the data remains with the organization that retains the encryption key. For organizations that are hesitant about trans-border data flow, Vaultive s persistent encryption ensures that data is never decrypted when resident in a third party s environment. Figure 1: Vaultive Trans-Border Data Controls About Vaultive For businesses moving to the cloud, Vaultive s encryption in use technology mitigates risk by empowering companies with control and ownership of their data wherever it resides. Vaultive s customers hold the encryption keys, letting them retain the freedom to use the cloud applications professionals rely on, while ensuring the governance and security that the business demands. Optimized for multiple cloud applications, the Vaultive platform supports best practices for the control and ownership of corporate data in the cloud as outlined by the Cloud Security Alliance. Vaultive addresses the requirements of global enterprises in financial services, life sciences and pharma, legal and professional services, manufacturing, retail and media, while also offering a costeffective solution for mid-size and smaller companies. For more information, visit or follow us on 10
Cloud Computing: Privacy and Other Risks
December 2013 Cloud Computing: Privacy and Other Risks by George Waggott, Michael Reid and Mitch Koczerginski, McMillan LLP Introduction While the benefits of outsourcing organizational data storage to
MICROSOFT OFFICE 365 PRIVACY IMPACT ASSESSMENT. Western Student E-Communications Outsourcing
MICROSOFT OFFICE 365 PRIVACY IMPACT ASSESSMENT Western Student E-Communications Outsourcing Paul Eluchok - University Privacy Officer David Ghantous - Associate Director of Technical Services Dated: August
CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES:
CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES: Privacy Responsibilities and Considerations Cloud computing is the delivery of computing services over the Internet, and it offers many potential
INFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013
INFORMATION SECURITY GUIDE Cloud Computing Outsourcing Information Security Unit Information Technology Services (ITS) July 2013 CONTENTS 1. Background...2 2. Legislative and Policy Requirements...3 3.
Privacy Law in Canada
Privacy Law in Canada Federal and provincial privacy legislation has a profound impact on the way virtually all organizations carry on business across the country. Canada s privacy laws, while likely the
Cloud Computing Contracts. October 11, 2012
Cloud Computing Contracts October 11, 2012 Lorene Novakowski Karam Bayrakal Covering Cloud Computing Cloud Computing Defined Models Manage Cloud Computing Risk Mitigation Strategy Privacy Contracts Best
SUBJECT: VOYAGEUR TRANSPORTATION CORPORATE POLICIES/PROCEDURES TITLE: PRIVACY OF PERSONAL HEALTH INFORMATION
SUBJECT: VOYAGEUR PAGE 1 1.0 PURPOSE: 1.1 To establish and document a policy which defines Voyageur s commitment to the protection of an individual s personal health information in the course of providing
Cloud Computing: Trust But Verify
Cloud Computing: Trust But Verify 14th Annual Privacy and Security Conference February 8, 2013, Victoria Martin P.J. Kratz, QC Bennett Jones LLP Cloud Computing Provision of services available on the Internet
RECORD AND INFORMATION MANAGEMENT FRAMEWORK FOR ONTARIO SCHOOL BOARDS/AUTHORITIES
PURPOSE Records and information are important strategic assets of an organization and, like other organizational assets (people, capital and technology), must be managed to maximize their value. Information
Protecting Saskatchewan data the USA Patriot Act
Protecting Saskatchewan data the USA Patriot Act Main points... 404 Introduction... 405 Standing Committee on Public Accounts motion... 405 Our response to the motion... 405 ITO, its service provider,
Privacy Law in Canada
by PATRICIA WILSON & MICHAEL FEKETE Protection of personal information remains at the forefront of public policy debate in. Federal and provincial privacy legislation has a profound impact on the way virtually
Taking care of what s important to you
A v i v a C a n a d a I n c. P r i v a c y P o l i c y Taking care of what s important to you Table of Contents Introduction Privacy in Canada Definition of Personal Information Privacy Policy: the ten
How To Ensure Health Information Is Protected
pic pic CIHI Submission: 2011 Prescribed Entity Review October 2011 Who We Are Established in 1994, CIHI is an independent, not-for-profit corporation that provides essential information on Canada s health
Accountable Privacy Management in BC s Public Sector
Accountable Privacy Management in BC s Public Sector Contents Accountable Privacy Management In BC s Public Sector 2 INTRODUCTION 3 What is accountability? 4 Steps to setting up the program 4 A. PRIVACY
CLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING?
CLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING? Lindsey Finch Senior Global Privacy Counsel Salesforce.com [email protected] David T.S. Fraser Partner McInnes Cooper [email protected]
Personal Information Protection Act ( PIPA ) Privacy-Proofing Your Retail Business Tips for Protecting Customers Personal Information 1
Personal Information Protection Act ( PIPA ) Tips for Protecting Customers Personal Information 1 More than ever before, retailers have to be prepared to deal with customers who ask questions about the
What to do When Faced With a Privacy Breach: Guidelines for the Health Sector ANN CAVOUKIAN, PH.D. COMMISSIONER
What to do When Faced With a Privacy Breach: Guidelines for the Health Sector ANN CAVOUKIAN, PH.D. COMMISSIONER INFORMATION AND PRIVACY COMMISSIONER/ONTARIO Table of Contents What is a privacy breach?...1
The Use of Cloud Computing for the Storing and Accessing of Client Information: Some Practical and Ethical Considerations
The Use of Cloud Computing for the Storing and Accessing of Client Information: Some Practical and Ethical Considerations Jeffrey D. Scott Jeffrey D. Scott, Legal Professional Corporation Practice Advisors
Considerations for Outsourcing Records Storage to the Cloud
Considerations for Outsourcing Records Storage to the Cloud 2 Table of Contents PART I: Identifying the Challenges 1.0 Are we even allowed to move the records? 2.0 Maintaining Legal Control 3.0 From Storage
THE PERSONAL INFORMATION PROTECTION AND ELECTRONIC DOCUMENTS ACT (PIPEDA) PERSONAL INFORMATION POLICY & PROCEDURE HANDBOOK
THE PERSONAL INFORMATION PROTECTION AND ELECTRONIC DOCUMENTS ACT (PIPEDA) PERSONAL INFORMATION POLICY & PROCEDURE HANDBOOK REVISED August 2004 PERSONAL INFORMATION POLICY & PROCEDURE HANDBOOK Introduction
Cloud Computing: Legal Risks and Best Practices
Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent
Data Management: Considerations for Integrating Compliance Requirements At Home and Abroad. Toronto, Ontario June 14, 2005
Data Management: Considerations for Integrating Compliance Requirements At Home and Abroad Toronto, Ontario June 14, 2005 Outsourcing Update: New Contractual Options and Risks Lisa K. Abe June 14, 2005
Law Firm Compliance: Key Privacy Considerations for Lawyers and Law Firms in Ontario
PRIVACY COMPLIANCE ISSUES FOR LAW FIRMS IN ONTARIO By Sara A. Levine 1 Presented at Law Firm Compliance: Key Privacy Considerations for Lawyers and Law Firms in Ontario Ontario Bar Association, May 6,
The Manitoba Child Care Association PRIVACY POLICY
The Manitoba Child Care Association PRIVACY POLICY BACKGROUND The Manitoba Child Care Association is committed to comply with the legal obligations imposed by the federal government's Personal Information
Doing Business. A Practical Guide. casselsbrock.com. Canada. Dispute Resolution. Foreign Investment. Aboriginal. Securities and Corporate Finance
About Canada Dispute Resolution Forms of Business Organization Aboriginal Law Competition Law Real Estate Securities and Corporate Finance Foreign Investment Public- Private Partnerships Restructuring
How to Avoid Abandoned Records: Guidelines on the Treatment of Personal Health Information, in the Event of a Change in Practice
Information and Privacy Commissioner / Ontario How to Avoid Abandoned Records: Guidelines on the Treatment of Personal Health Information, in the Event of a Change in Practice Ann Cavoukian, Ph.D. Commissioner
This procedure is associated with BCIT policy 6700, Freedom of Information and Protection of Privacy.
Privacy Breach No.: 6700 PR2 Policy Reference: 6700 Category: Information Management Department Responsible: Privacy and Records Management Current Approved Date: 2012 May 01 Objectives This procedure
M&T BANK CANADIAN PRIVACY POLICY
M&T BANK CANADIAN PRIVACY POLICY At M&T Bank, we are committed to safeguarding your personal information and maintaining your privacy. This has always been a priority for us and this is why M&T Bank (
Privacy Breach Protocol
& Privacy Breach Protocol Guidelines for Government Organizations www.ipc.on.ca Table of Contents What is a privacy breach? 1 Guidelines on what government organizations should do 2 What happens when the
Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID MOS10
Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID This Microsoft Online Services Security Amendment ( Amendment ) is between
Cloud Computing and Privacy Toolkit. Protecting Privacy Online. May 2016 CLOUD COMPUTING AND PRIVACY TOOLKIT 1
Cloud Computing and Privacy Toolkit Protecting Privacy Online May 2016 CLOUD COMPUTING AND PRIVACY TOOLKIT 1 Table of Contents ABOUT THIS TOOLKIT... 4 What is this Toolkit?... 4 Purpose of this Toolkit...
Legal Cloud Computing: Concepts and Ramifications
Legal Cloud Computing: Concepts and Ramifications April 27, 2010 Sébastien Lapointe, Holmested & Associés s.e.n.c. Legal Aspects of Cloud Computing Normal businesses using cloud computing ( CC ) face a
Cloudy With a Chance Of Risk Management
Proudly presents Cloudy With a Chance Of Risk Management Toby Merrill, ACE USA John Mullen, Nelson Levine de Luca & Hamilton Shawn Melito, Immersion Ltd. Michael Trendler, ACE INA Canada What is Cloud
Privacy Impact Assessment Guidelines for the Ontario Personal Health Information Protection Act. Ann Cavoukian, Ph.D. Commissioner October 2005
Privacy Impact Assessment Guidelines for the Ontario Personal Health Information Protection Act Ann Cavoukian, Ph.D. Commissioner October 2005 Information and Privacy Commissioner/Ontario Privacy Impact
<Choose> Addendum Windows Azure Data Processing Agreement Amendment ID M129
Addendum Amendment ID Proposal ID Enrollment number Microsoft to complete This addendum ( Windows Azure Addendum ) is entered into between the parties identified on the signature form for the
Best Practices for Protecting Individual Privacy in Conducting Survey Research
Best Practices for Protecting Individual Privacy in Conducting Survey Research CONTENTS Foreword... 1 Introduction... 2 Privacy Considerations at Each Stage of a Survey Research Project... 5 Stage 1: Issue
Policy Brief: Protecting Privacy in Cloud-Based Genomic Research
Policy Brief: Protecting Privacy in Cloud-Based Genomic Research Version 1.0 July 21 st, 2015 Suggested Citation: Adrian Thorogood, Howard Simkevitz, Mark Phillips, Edward S Dove & Yann Joly, Policy Brief:
Best Practices in Data Management - A Guide for Marketers -
Best Practices in Data Management - A Guide for Marketers - Prepared with support from the Office of the Privacy Commissioner of Canada s Contributions Program INTRODUCTION As consumers personal information
Office 365 Data Processing Agreement with Model Clauses
Enrollment for Education Solutions Office 365 Data Processing Agreement (with EU Standard Contractual Clauses) Amendment ID Enrollment for Education Solutions number Microsoft to complete 7392924 GOLDS03081
Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 EES17 --------------
w Microsoft Volume Licensing Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 Enrollment for Education Solutions number Microsoft to complete --------------
Privacy in the Cloud Computing Era. A Microsoft Perspective
Privacy in the Cloud Computing Era A Microsoft Perspective November 2009 The information contained in this document represents the current view of Microsoft Corp. on the issues discussed as of the date
Managing Contracts under the FOIP Act. A Guide for Government of Alberta Contract Managers and FOIP Coordinators
Managing Contracts under the FOIP Act A Guide for Government of Alberta Contract Managers and FOIP Coordinators ISBN 978-0-7785-6102-6 Produced by Access and Privacy Service Alberta 3rd Floor, 10155 102
Privacy Policy on the Collection, Use, Disclosure and Retention of Personal Health Information and De-Identified Data, 2010
pic pic Privacy Policy on the Collection, Use, Disclosure and Retention of Personal Health Information and De-Identified Data, 2010 Updated March 2013 Our Vision Better data. Better decisions. Healthier
Contact: Henry Torres, (870) 972-3033
Information & Technology Services Management & Security Principles & Procedures Executive Summary Contact: Henry Torres, (870) 972-3033 Background: The Security Task Force began a review of all procedures
PERSONAL INFORMATION PRIVACY POLICY FOR EMPLOYEES AND VOLUNTEERS [ABC SCHOOL]
[Insert Date of Policy] PERSONAL INFORMATION PRIVACY POLICY FOR EMPLOYEES AND VOLUNTEERS of [ABC SCHOOL] Address Independent schools in British Columbia are invited to adopt or adapt some or all of this
Privacy and Management of Health Information: Standards for CARNA s Regulated Members
Privacy and Management of Health Information: Standards for CARNA s Regulated Members September 2011 Permission to reproduce this document is granted; please recognize CARNA. College and Association of
Ministry of Children and Family Development (MCFD) Contractor s Information Management Guidelines
(This document supersedes the document previously entitled MCFD Contractor Records Guidelines) Ministry of Children and Family Development (MCFD) Contractor s Information Management Guidelines November
Report of the Information & Privacy Commissioner/Ontario. Review of the Canadian Institute for Health Information:
Information and Privacy Commissioner of Ontario Report of the Information & Privacy Commissioner/Ontario Review of the Canadian Institute for Health Information: A Prescribed Entity under the Personal
Annex 1. Contract Checklist for Cloud-Based Genomic Research Version 1.0, 21 July 2015
Annex 1. Contract Checklist for Cloud-Based Genomic Research Version 1.0, 21 July 2015 The following comprises a checklist of areas that genomic research organizations or consortia (collectively referred
The USA Patriot Act Government Briefing. Kirsten Tisdale, Chris Norman, Sharon Plater & Alexandra (Gina) Henley September 30, 2004
The USA Patriot Act Government Briefing Kirsten Tisdale, Chris Norman, Sharon Plater & Alexandra (Gina) Henley September 30, 2004 Agenda Background Overview of Government Responses and Approach Mitigation
Information Security Classification
i Information Management Information Security Classification February 2005 Produced by Information Management Branch Government and Program Support Services Division Alberta Government Services 3 rd Floor,
Privacy and Security Framework, February 2010
Privacy and Security Framework, February 2010 Updated April 2014 Our Vision Better data. Better decisions. Healthier Canadians. Our Mandate To lead the development and maintenance of comprehensive and
COUNCIL OF THE EUROPEAN UNION. Brussels, 22 November 2006 15644/06 DATAPROTECT 45 EDPS 3
COUNCIL OF THE EUROPEAN UNION Brussels, 22 November 2006 15644/06 DATAPROTECT 45 EDPS 3 COVER NOTE from: Secretary-General of the European Commission, signed by Mr Jordi AYET PUIGARNAU, Director date of
PERSONAL HEALTH INFORMATION PROTECTION ACT, 2004: AN OVERVIEW FOR HEALTH INFORMATION CUSTODIANS
PERSONAL HEALTH INFORMATION PROTECTION ACT, 2004: AN OVERVIEW FOR HEALTH INFORMATION CUSTODIANS Note: This document provides a general overview of the Personal Health Information Protection Act, 2004,
Information Security Policy. Document ID: 3809 Version: 1.0 Owner: Chief Security Officer, Security Services
Information Security Policy Document ID: 3809 Version: 1.0 Owner: Chief Security Officer, Security Services Contents 1 Purpose / Objective... 1 1.1 Information Security... 1 1.2 Purpose... 1 1.3 Objectives...
Privacy Incident and Breach Management Policy
Privacy Incident and Breach Management Policy Privacy Office Document ID: 2480 Version: 2.1 Owner: Chief Privacy Officer Sensitivity Level: Low Copyright Notice Copyright 2014, ehealth Ontario All rights
Taking care of what s important to you
National Home Warranty Group Inc. Privacy Policy Taking care of what s important to you Table of Contents Introduction Privacy in Canada Definition of Personal Information Privacy Policy: the ten principles
CLOUD COMPUTING ISSUES FOR SCHOOL DISTRICTS. Presented to the 2013 BRADLEY F. KIDDER LAW CONFERENCE. October 2, 2013
CLOUD COMPUTING ISSUES FOR SCHOOL DISTRICTS Presented to the 2013 BRADLEY F. KIDDER LAW CONFERENCE October 2, 2013 By: Diane M. Gorrow Soule, Leslie, Kidder, Sayward & Loughman, P.L.L.C. 220 Main Street
Privacy and Cloud Computing for Australian Government Agencies
Privacy and Cloud Computing for Australian Government Agencies Better Practice Guide February 2013 Version 1.1 Introduction Despite common perceptions, cloud computing has the potential to enhance privacy
British Columbia Personal Information Protection Act. Frequently Asked Questions:
British Columbia Personal Information Protection Act Frequently Asked Questions: (Further queries may be sent to Bob Stewart at the B.C. Conference Archives.) (1) What is the Personal Information Protection
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
Astaro Services AG Rheinweg 7, CH-8200 Schaffhausen. Supplementary data protection agreement. to the license agreement for license ID: between
Astaro Services AG Rheinweg 7, CH-8200 Schaffhausen Supplementary data protection agreement to the license agreement for license ID: between...... represented by... Hereinafter referred to as the "Client"
Personal Health Information Privacy Policy
Personal Health Information Privacy Policy Privacy Office Document ID: 2478 Version: 6.2 Owner: Chief Privacy Officer Sensitivity Level: Low Copyright Notice Copyright 2014, ehealth Ontario All rights
Procedure for Managing a Privacy Breach
Procedure for Managing a Privacy Breach (From the Privacy Policy and Procedures available at: http://www.mun.ca/policy/site/view/index.php?privacy ) A privacy breach occurs when there is unauthorized access
Personal Information Protection and Electronic Documents Act
PIPEDA Self-Assessment Tool Personal Information Protection and Electronic Documents Act table of contents Why this tool is needed... 3 How to use this tool... 4 PART 1: Compliance Assessment Guide Principle
Document Management in the FIPPA Era
Document Management in the FIPPA Era Kathryn Frelick DISCLAIMER This Coffee Talk presentation is provided as an information service and is not meant to be taken as legal opinion or advice. Please do not
INSTITUTE FOR SAFE MEDICATION PRACTICES CANADA
INSTITUTE FOR SAFE MEDICATION PRACTICES CANADA PRIVACY IMPACT ASSESSMENT (PIA) ON ANALYZE-ERR AND CURRENT DATA HANDLING OPERATIONS VERSION 3.0-2 JULY 11, 2005 PREPARED IN CONJUNCTION WITH: ISMP Canada
This Amendment consists of two parts. This is part 1 of 2 and must be accompanied by and signed with part 2 of 2 (Annex 1) to be valid.
Microsoft Online Subscription Agreement Amendment adding Office 365 Data Processing Agreement (with EU Standard Contractual Clauses) Amendment ID Proposal ID MOSA number Microsoft to complete This Amendment
EHR Contributor Agreement
This EHR Contributor Agreement (this Agreement ) is made effective (the Effective Date ) and sets out certain terms and conditions that apply to the sharing of Personal
Personal Information Protection and Electronic Documents Act (PIPEDA)
Introduction Personal Information Protection and Electronic Documents Act (PIPEDA) Policy and The Insurance Brokers Association of Alberta is committed to respect the privacy rights of individuals by ensuring
DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT
Advisor Article DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT By James R. Carroll, David S. Clancy and Christopher G. Clark* Skadden, Arps, Slate, Meagher & Flom Customer data security
Secure Cross Border File Protection & Sharing for Enterprise Product Brief CRYPTOMILL INC
C NNECTED Circles of Trust Secure Cross Border File Protection & Sharing for Enterprise Product Brief www.cryptomill.com product overview OVERVIEW Connected Circles of Trust is an endpoint data security
Personal Information Protection Act Information Sheet 11
Notification of a Security Breach Personal Information Protection Act Information Sheet 11 Introduction Personal information is used by organizations for a variety of purposes: retail and grocery stores
Securing Data in the Cloud
Securing Data in the Cloud Meeting the Challenges of Data Encryption and Key Management for Business-Critical Applications 1 Contents Protecting Data in the Cloud: Executive Summary.....................................................
Helpful Tips. Privacy Breach Guidelines. September 2010
Helpful Tips Privacy Breach Guidelines September 2010 Office of the Saskatchewan Information and Privacy Commissioner 503 1801 Hamilton Street Regina, Saskatchewan S4P 4B4 Office of the Saskatchewan Information
A Privacy Handbook for Lawyers PIPEDA AND YOUR PRACTICE
A Privacy Handbook for Lawyers PIPEDA AND YOUR PRACTICE Table of Contents Introduction...1 Privacy Issues in Managing a Law Practice...6 Privacy issues in Civil Litigation...16 Conclusion...26 Endnotes...28
California State University, Sacramento INFORMATION SECURITY PROGRAM
California State University, Sacramento INFORMATION SECURITY PROGRAM 1 I. Preamble... 3 II. Scope... 3 III. Definitions... 4 IV. Roles and Responsibilities... 5 A. Vice President for Academic Affairs...
VIDEO SURVEILLANCE GUIDELINES
VIDEO SURVEILLANCE GUIDELINES Introduction Surveillance of public spaces has increased rapidly over recent years. This growth is largely attributed to the significant advances in surveillance technology
3. Consent for the Collection, Use or Disclosure of Personal Information
PRIVACY POLICY FOR RENNIE MARKETING SYSTEMS Our privacy policy includes provisions of the Personal Information Protection Act (BC) and the Personal Information Protection and Electronic Documents Act (Canada),
Index All entries in the index reference page numbers.
Index All entries in the index reference page numbers. A Audit of organizations, 37-38, Access to personal information 162-163 by individual, 22, 31, 151-154 B assistance by organization, Biometrics, 123-125
The potential legal consequences of a personal data breach
The potential legal consequences of a personal data breach Tue Goldschmieding, Partner 16 April 2015 The potential legal consequences of a personal data breach 15 April 2015 Contents 1. Definitions 2.
Metadata, Electronic File Management and File Destruction
Metadata, Electronic File Management and File Destruction By David Outerbridge, Torys LLP A. Metadata What is Metadata? Metadata is usually defined as data about data. It is a level of extra information
XIT CLOUD SOLUTIONS LIMITED
DISCLOSURE STATEMENT PREPARED BY - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
