Click here to take part in a short, anonymous survey to help us improve our site.

Tag: resource

June 23, 2020 - Sherri Fowler, Analyst

IPC change in practice for privacy breach investigations

The Office of the Information and Privacy Commissioner (IPC) is recommending the following four best practice steps when responding to a breach of privacy: Containment (as soon as possible) Notification (as soon as possible) Investigate Prevent future breaches We know many public bodies currently follow these steps. The IPC is changing its procedure and is... read more

Categories: BlogTags: ,

April 28, 2020 - Monique Meister, HIMS Practicum Student

New resource: Best Practices for Transporting PI and PHI Outside of the Office

With a pandemic impacting the world and governments asking people to social distance ourselves, many people are having to work from home and having to bring home personal information (PI) and personal health information (PHI) to do their jobs. You also hear stories of people losing their briefcases, laptops, devices, or even their vehicle being... read more

Categories: BlogTags: , ,

April 20, 2020 - Ron Kruzeniski, Information and Privacy Commissioner

Sample access request policy and checklist

In a number of reports issued by my office, we have recommended that the towns/villages/municipalities develop an operational policy regarding processing access to information requests. After a number of questions, it became clear that there didn’t seem to be a sample policy developed for small towns/villages/municipalities. Larger organizations have developed policies that are applicable to... read more

Categories: BlogTags: ,

April 17, 2020 - Sharon Young, Analyst

With a little help from our friends…

Our friends from oversight offices from other provinces and territories have developed some helpful guidance documents to work through issues that are arising from this outbreak of COVID-19. Below is a list of some of these resources. These resources are a great starting point when working through some of the access and privacy issues we... read more

Categories: BlogTags: ,