Data Privacy is January 28, 2023. Our office has put together a brief presentation, to learn more please see our blog which has a link to the presentation here.

Tag: technology

January 16, 2023 - Ron Kruzeniski, Information and Privacy Commissioner

Live Streaming a Public Meeting

The Legislative Assembly broadcasts its proceedings over the internet. Each word spoken by an MLA is recorded and published in Hansard. Hansard is available to the public. Similarly, committees of the Legislative Assembly are public, sometimes broadcasted and recorded in Hansard. Both video and text are available on the Legislative Assembly web site at (www.legassembly.sk.ca/). Committees can decide to... read more

Categories: BlogTags: , ,

November 22, 2022 - Tristan Hungle, Director of Corporate Services

Cybersecurity Awareness

October was Cybersecurity awareness month in Canada. Cybersecurity is everyone within an organization’s responsibility, and a solid regime requires proper policies, procedures, technical safeguards, and training. Ask any cybersecurity expert, and they will tell you the single biggest risk to an organization’s systems and information is the people who already have access to it. A... read more

Categories: BlogTags: , , ,

June 11, 2021 - Ron Kruzeniski, Information and Privacy Commissioner

Facial recognition – the path forward?

The media has focused considerable attention on facial recognition (FR). Access and privacy commissioners have been focusing on the issue too. The Ontario Commissioner has just posted an excellent blog on Mugshots to megabytes:  facial recognition has made privacy protection more urgent than ever. The privacy protection authorities for each province and territory of Canada... read more

Categories: BlogTags: , ,

April 9, 2020 - Sharon Young, Analyst

Phishing attacks: in ordinary times and during a pandemic

A combination of workers getting used to working-from-home and the anxiety and fears arising from the outbreak of COVID-19 may be leaving workers and organizations vulnerable to cyber attacks. For example, malicious actors may set up email accounts to impersonate supervisors and coworkers and trick workers into providing information about themselves or the organization. Such... read more

Categories: BlogTags: , , ,