Click here to take part in a short, anonymous survey to help us improve our site.

Year: 2016

May 12, 2016 - Ron Kruzeniski, Information and Privacy Commissioner

Risk Management and Privacy Protection

Most organizations today have addressed the issue of risk management. Many have gone through a process of identifying the risks and the ways of mitigating those risks. They will have a document with the risks and the mitigating factors. Some will report to the CEO, a board council or minister on a regular basis. When... read more

Categories: BlogTags: ,

April 22, 2016 - Ron Kruzeniski, Saskatchewan Information and Privacy Commissioner

Contracting with Governments

Government, whether municipal or provincial, charge taxes and spend those taxes on services we need. By government I mean at all levels and includes school boards, universities, colleges and health regions. All of them enter into contracts with service providers. I generally believe that if you contract with an entity which uses tax dollars, your... read more

Categories: BlogTags: , , , , , , , ,

April 18, 2016 - Michael McGill, Practicum Student, Saskatchewan Polytechnic - Health Information Management Program

Ran$omware… What You Need to Know

Ransomware attacks are happening daily, in fact there is research that suggests that as many as 1600 ransomware attacks occurred per day in Canada in 2015. The attacks range from personal computers where cyber criminals are holding valuable family pictures hostage for hundreds of dollars to hospitals that are being forced to pay tens of... read more

Categories: BlogTags: , , ,

April 12, 2016 - Micheal McGill, Practicum Student, Saskatchewan Polytechnic - Health Information Management Program

Privacy Audits

A privacy audit is a technique for assuring that an organization’s goals and promises of privacy and confidentiality are supported by its practices, thereby protecting confidential information from abuse and the organization from liability and public relations problems. An audit ensures that information processing procedures meet privacy requirements by examining how information is collected, stored,... read more

Categories: BlogTags: , , ,