Federal Privacy Commissioner on Bill c-27 news release.

Report into the 2021 cyber attack on Newfoundland health information systems released.

Privacy Commissioner of Canada announced his office is launching a joint investigation into OpenAI

Federal Privacy Commissioner launches new guidance on workplace privacy

Cybersecurity: Best Practices for Setting Up a Security Operations Centre

Alberta IPC finds risk of significant harm from stolen server.

Updates to Chapter 3 for the Guide to FOIP and the Guide to LA FOIP are now available!

Steps for effectively deploying multi-factor authentication.

Concerns about AI

Tag: personal health information

March 14, 2023 - Diane Aldridge, Deputy Commissioner

The Search for Personal Health Information

When a patient makes an access to information request for their personal health information, the search for responsive records may not be as easy as just checking out the health records department. The Health Information Protection Act (HIPA) applies to all personal health information in the custody or control of a trustee which includes all... read more

Categories: BlogTags: , , , , , , , , , , ,

July 20, 2016 - Sharon Young, Analyst

Unauthorized Access

This blog is focused on the unauthorized access to electronic health records for purposes such as curiosity, concern, personal gain, spite, or boredom, and the harm that results from such unauthorized access. I note that the majority of trustee employees or individuals in service of a trustee (including physicians) access electronic health records for purposes... read more

Categories: BlogTags: , , , , , , , ,

September 22, 2015 - Ron Kruzeniski, Information and Privacy Commissioner

Snooping: When Will People Learn?

Before being appointed Commissioner, my reading, studying and listening to the media caused me to really be concerned about staff snooping into personal information (PI) or personal health information (PHI) when there was no need to be looking. Before being appointed, I attended a conference where a speaker on security said the greatest problem for... read more

Categories: BlogTags: , , , ,