Canadian Privacy Basics - Chapter 2 Flashcards
2.1 What is private sector legislation based on?
10 fair information principles found in PIPEDA.
2.1 What are the 10 principles in PIPEDA?
- Accountability
- Identifying Purposes
- Consent
- Limiting Purposes
- Limiting Use, Disclosure and Retention
- Accuracy
- Safeguards
- Openness
- Individual Access
- Challenging Compliance
2.1.1 What is Accountability
An organization must implement procedures that protect personal information, establish procedures to receive and respond to complaints or questions, train staff, and be transparent about all these procedures and practices.
Organizations are required to appoint individuals with primary responsibility for privacy protection and makes organizations responsible for the personal information over which they have either custody or control.
2.1.1 Provide an example of how Accountability can be interpreted?
Google (2010) created Google Buzz, which allowed Google Mail contacts to be added as followers. This resulted in an abusive ex husband to know the whereabouts of his ex-wife.
2.1.2 What is the intent of the Identifying Purposes principle?
Organizations are obligated to identify and document the purposes for the collection of any personal information at or before the time of collection.
2.1.2 Can personal information be repurposed without consent of the individual?
No, this would be a privacy breach. If PI is collected for a different purpose, consent must once again be collected.
2.1.3 What is required for meaningful consent?
Meaningful consent is that which the individual knows and understands the purposes for the collection, use or disclosure of the personal information.
2.1.3 What is sensitive personal information?
Sensitive personal information is medical or financial, or information that could result in serious cases of identify theft.
2.1.3 What does implied consent become appropriate?
When the personal information being collected is innocuous and the purpose of the collection straightforward.
2.1.3 When is it ok to use an opt-in feature when asking for consent?
When the purpose of collection is straightforward and the information is innocuous,
2.1.3 When is an opt-out feature required when asking for consent?
When the information being collected is sensitive, explicit and documented.
2.1.3 Is an individual required to supply more personal information than what is required?
No, the principle specifically states: an organization shall not… require an individual to consent to the collection, use, or disclosure of information beyond that required to fulfill the explicitly specified and legitimate purpose.
2.1.3 Is consent always required?
Yes, each individual must be given the opportunity to withdraw consent.
2.1.4 What does the Limiting Purposes principle state?
Organizations are required to collect only the amount and type of personal information legitimately needed to fulfill the identified purposes.
2.1.5 What does the Limiting Use, Disclosure and Retention principle require?
Personal information shall not be used or disclosed for purposes other than those for which it was collected, except with the consent of the individual or as required by law.
Personal information shall be retained only as long as necessary for the fulfillment of those purposes.
2.1.5 What is important to remember about retaining personal information?
- Personal information that has been used to make a decision about an individual should be retained long enough to allow the individual access to the information after the decision has been made
- An organization may be subject to legislative requirements with respect to retention periods for certain types of information.
2.1.6 Why is it important to keep personal information updated while in use?
Organizations should make sure the information they are using to make decisions about providing credit or medical care to people is accurate in order to avoid inappropriate decisions or ill-fated consequences.
Note: the irony is that PIPEDA does not require PI to be kept up to date by law.
2.1.7 What are the requirements when safeguards are used?
Security safeguards must protect personal information against loss or theft as well as unauthorized access, disclosure, copying, use or modification, regardless of media type.
Information must be protected according to the sensitivity of the information (e.g. data classification).
2.1.8 What are the requirements of the Openness principle?
Policies and practices must be readily available for individuals relating to management of personal information.
Policies and practices must include:
1. Name, title and address of where complaints can be filed
2. How to gain access to PI that is held by the organization
3. A description of the type of information held by the organization, and a general statement on how it’s used
4. A copy of any information that explains the organizations policies, standards or codes.
5. The PI that is made available to related organizations, such as subsidieries.
2.1.9 What are the obligations under Individual Access?
Individuals must be informed of the existence, collection, use and disclosure of personal information.
Discrepancies in PI must be corrected.
Requests for access must be not be delayed.