Loi Sur La Protection Des Renseignements Personnels

Total Page:16

File Type:pdf, Size:1020Kb

Loi Sur La Protection Des Renseignements Personnels CANADA CONSOLIDATION CODIFICATION Privacy Act Loi sur la protection des renseignements personnels R.S.C., 1985, c. P-21 L.R.C. (1985), ch. P-21 Current to September 11, 2021 À jour au 11 septembre 2021 Last amended on August 12, 2021 Dernière modification le 12 août 2021 Published by the Minister of Justice at the following address: Publié par le ministre de la Justice à l’adresse suivante : http://laws-lois.justice.gc.ca http://lois-laws.justice.gc.ca OFFICIAL STATUS CARACTÈRE OFFICIEL OF CONSOLIDATIONS DES CODIFICATIONS Subsections 31(1) and (2) of the Legislation Revision and Les paragraphes 31(1) et (2) de la Loi sur la révision et la Consolidation Act, in force on June 1, 2009, provide as codification des textes législatifs, en vigueur le 1er juin follows: 2009, prévoient ce qui suit : Published consolidation is evidence Codifications comme élément de preuve 31 (1) Every copy of a consolidated statute or consolidated 31 (1) Tout exemplaire d'une loi codifiée ou d'un règlement regulation published by the Minister under this Act in either codifié, publié par le ministre en vertu de la présente loi sur print or electronic form is evidence of that statute or regula- support papier ou sur support électronique, fait foi de cette tion and of its contents and every copy purporting to be pub- loi ou de ce règlement et de son contenu. Tout exemplaire lished by the Minister is deemed to be so published, unless donné comme publié par le ministre est réputé avoir été ainsi the contrary is shown. publié, sauf preuve contraire. Inconsistencies in Acts Incompatibilité — lois (2) In the event of an inconsistency between a consolidated (2) Les dispositions de la loi d'origine avec ses modifications statute published by the Minister under this Act and the origi- subséquentes par le greffier des Parlements en vertu de la Loi nal statute or a subsequent amendment as certified by the sur la publication des lois l'emportent sur les dispositions in- Clerk of the Parliaments under the Publication of Statutes compatibles de la loi codifiée publiée par le ministre en vertu Act, the original statute or amendment prevails to the extent de la présente loi. of the inconsistency. LAYOUT MISE EN PAGE The notes that appeared in the left or right margins are Les notes apparaissant auparavant dans les marges de now in boldface text directly above the provisions to droite ou de gauche se retrouvent maintenant en carac- which they relate. They form no part of the enactment, tères gras juste au-dessus de la disposition à laquelle but are inserted for convenience of reference only. elles se rattachent. Elles ne font pas partie du texte, n’y figurant qu’à titre de repère ou d’information. NOTE NOTE This consolidation is current to September 11, 2021. The Cette codification est à jour au 11 septembre 2021. Les last amendments came into force on August 12, 2021. dernières modifications sont entrées en vigueur Any amendments that were not in force as of Septem‐ le 12 août 2021. Toutes modifications qui n'étaient pas en ber 11, 2021 are set out at the end of this document un‐ vigueur au 11 septembre 2021 sont énoncées à la fin de der the heading “Amendments Not in Force”. ce document sous le titre « Modifications non en vigueur ». Current to September 11, 2021 À jour au 11 septembre 2021 Last amended on August 12, 2021 Dernière modification le 12 août 2021 TABLE OF PROVISIONS TABLE ANALYTIQUE An Act to extend the present laws of Canada that Loi visant à compléter la législation canadienne en protect the privacy of individuals and that provide matière de protection des renseignements individuals with a right of access to personal personnels et de droit d’accès des individus aux information about themselves renseignements personnels qui les concernent Short Title Titre abrégé 1 Short title 1 Titre abrégé Purpose of Act Objet de la loi 2 Purpose 2 Objet Interpretation Définitions 3 Definitions 3 Définitions 3.01 For greater certainty 3.01 Précision 3.02 Application 3.02 Portée Designation Désignation 3.1 Power to designate Minister 3.1 Désignation d’un ministre Collection, Retention and Disposal of Collecte, conservation et retrait des Personal Information renseignements personnels 4 Collection of personal information 4 Collecte des renseignements personnels 5 Personal information to be collected directly 5 Origine des renseignements personnels 6 Retention of personal information used for an 6 Conservation des renseignements personnels utilisés à administrative purpose des fins administratives Protection of Personal Information Protection des renseignements personnels 7 Use of personal information 7 Usage des renseignements personnels 8 Disclosure of personal information 8 Communication des renseignements personnels 9 Record of disclosures to be retained 9 Relevé Personal Information Banks Fichiers de renseignements personnels 10 Personal information to be included in personal 10 Renseignements personnels versés dans les fichiers de information banks renseignements personnels Current to September 11, 2021 iii À jour au 11 septembre 2021 Last amended on August 12, 2021 Dernière modification le 12 août 2021 Privacy Protection des renseignements personnels TABLE OF PROVISIONS TABLE ANALYTIQUE Personal Information Index Répertoire de renseignements personnels 11 Index of personal information 11 Publication du répertoire Access to Personal Information Accès aux renseignements personnels Right of Access Droit d’accès 12 Right of access 12 Droit d’accès Requests for Access Demandes de communication 13 Request for access under paragraph 12(1)(a) 13 Demande de communication prévue à l’al. 12(1)a) 14 Notice where access requested 14 Notification 15 Extension of time limits 15 Prorogation du délai 16 Where access is refused 16 Refus de communication Access Exercice de l’accès 17 Form of access 17 Exercice de l’accès Exemptions Exceptions Exempt Banks Fichiers inconsultables 18 Governor in Council may designate exempt banks 18 Fichiers inconsultables Responsibilities of Government Responsabilités de l’État 19 Personal information obtained in confidence 19 Renseignements personnels obtenus à titre confidentiel 20 Federal-provincial affairs 20 Affaires fédéro-provinciales 21 International affairs and defence 21 Affaires internationales et défense 22 Law enforcement and investigation 22 Enquêtes 22.1 Information obtained by Privacy Commissioner 22.1 Renseignements obtenus par le Commissaire à la protection de la vie privée 22.2 Public Sector Integrity Commissioner 22.2 Commissaire à l’intégrité du secteur public 22.3 Public Servants Disclosure Protection Act 22.3 Loi sur la protection des fonctionnaires divulgateurs d’actes répréhensibles 22.4 Secretariat of National Security and Intelligence 22.4 Secrétariat du Comité des parlementaires sur la sécurité Committee of Parliamentarians nationale et le renseignement 23 Security clearances 23 Enquêtes de sécurité 24 Individuals sentenced for an offence 24 Individus condamnés pour une infraction 25 Safety of individuals 25 Sécurité des individus Personal Information Renseignements personnels 26 Information about another individual 26 Renseignements concernant un autre individu Privilege and Professional Secrecy Secret professionnel et privilège 27 Protected information — solicitors, advocates and 27 Renseignements protégés : avocats et notaires notaries Current to September 11, 2021 iv À jour au 11 septembre 2021 Last amended on August 12, 2021 Dernière modification le 12 août 2021 Privacy Protection des renseignements personnels TABLE OF PROVISIONS TABLE ANALYTIQUE 27.1 Protected information — patents and trademarks 27.1 Renseignements protégés : brevets et marques de commerce Medical Records Dossiers médicaux 28 Medical record 28 Dossiers médicaux Complaints Plaintes 29 Receipt and investigation of complaints 29 Réception des plaintes et enquêtes 30 Written complaint 30 Plaintes écrites Investigations Enquêtes 31 Notice of intention to investigate 31 Avis d’enquête 32 Regulation of procedure 32 Procédure 33 Investigations in private 33 Secret des enquêtes 34 Powers of Privacy Commissioner in carrying out 34 Pouvoirs du Commissaire à la protection de la vie privée investigations pour la tenue des enquêtes 35 Findings and recommendations of Privacy 35 Conclusions et recommandations du Commissaire à la Commissioner protection de la vie privée Review of Exempt Banks Examen des fichiers inconsultables 36 Investigation of exempt banks 36 Enquêtes sur les fichiers inconsultables Review of Compliance with Sections Contrôle d’application des articles 4 à 4 to 8 8 37 Investigation in respect of sections 4 to 8 37 Enquêtes Reports to Parliament Rapports au Parlement 38 Annual report 38 Rapport annuel 39 Special reports 39 Rapports spéciaux 40 Transmission of reports 40 Remise des rapports Review by the Federal Court Révision par la Cour fédérale 41 Review by Federal Court where access refused 41 Révision par la Cour fédérale dans les cas de refus de communication 42 Privacy Commissioner may apply or appear 42 Exercice du recours par le Commissaire à la protection de la vie privée, etc. 43 Application respecting files in exempt banks 43 Recours concernant les fichiers inconsultables 44 Hearing in summary way 44 Procédure sommaire 45 Access to information 45 Accès aux renseignements 46 Court to take precautions against disclosing 46 Précautions à prendre contre la divulgation 47 Burden of proof 47 Charge de la preuve 48 Order of Court where no authorization to refuse 48 Ordonnance de la Cour dans les cas où le refus n’est pas disclosure found
Recommended publications
  • Protecting Privacy Under the Fourth Amendment
    Protecting Privacy Under the Fourth Amendment The Fourth Amendment' has explicitly been held to protect personal privacy2 since at least the mid-nineteenth century.3 Experts in many fields, including law, psychology, philosophy and sociology, believe that privacy is vitally important to all human beings,' and the Supreme Court has 1. The Fourth Amendment provides that: The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized. U.S. CONST. amend. IV. Under the Fourteenth Amendment, the states must comply with the provisions of the Fourth Amendment. Mapp v. Ohio, 367 U.S. 643, 655 (1961). 2. As a constitutional concept, privacy is an elusive yet fundamental value. Although the word "privacy" does not appear in the Constitution, the Supreme Court has recognized a constitutional right to privacy based upon provisions of the First, Third, Fourth, Fifth, and Ninth Amendments and their respective "penumbras." Griswold v. Connecticut, 381 U.S. 479, 484-85 (1965); cf Beaney, The ConstitutionalRight to Privacy in the Supreme Court, 1962 SUP. CT. REV. 212, 215 ("The nearest thing to an explicit recognition of a right to privacy in the Constitution is contained in the Fourth Amendment".) This right to privacy is a "fundamental personal right, emanting 'from the totality of the constitutional scheme.' " Griswold v. Connecticut, 381 U.S. 479, 494 (1965) (Goldberg, J., con- curring) (quoting Poe v.
    [Show full text]
  • Privacy in the Employment Relationship, Practical Law Practice Note 6-517-3422 (2017)
    Privacy in the Employment Relationship, Practical Law Practice Note 6-517-3422 (2017) Privacy in the Employment Relationship by Thomas H. Wilson, Vinson & Elkins LLP and Corey Devine with Practical Law Labor & Employment Maintained • USA (National/Federal) This Practice Note provides an overview of privacy issues in employment, which may arise in various contexts, such as background checks, drug testing, email and other electronic surveillance and tracking by GPS. Invasion of privacy claims are highly fact-intensive and largely dependent on state law. This Note contains information that is general and not jurisdiction-specific. Contents Overview of Privacy Laws Background Checks Background Checks Conducted Internally by the Employer Background Checks Conducted Externally by a Third Party Employment Testing of Applicants or Employees Drug Testing Polygraph Tests HIV or AIDS Tests Medical and Physical Examinations Other Types of Testing Employee Personnel Records Employee Medical Records Sensitive Personally Identifiable Information Employee Electronic Communications Monitoring of Emails and Internet Usage Requiring Disclosure of Electronic Account Access Information Monitoring of Telephone Calls Video Surveillance of Employee Behavior on the Job Searching Employee Surroundings on the Job No Expectation of Privacy in Common Areas Employer Limits © 2017 Thomson Reuters. No claim to original U.S. Government Works. 1 Privacy in the Employment Relationship, Practical Law Practice Note 6-517-3422 (2017) Employees' Lawful, Off-Duty Activities Tracking Employee Movements by GPS Privacy Concerns Consent and Notice Other Considerations Monitoring and Employee Rights Under the National Labor Relations Act Information about Employees Relevant to Health and Safety This Note provides a general overview of the key legal principles involved in employee privacy in the private employment context.
    [Show full text]
  • INTRUSIVE MONITORING: EMPLOYEE PRIVACY EXPECTATIONS ARE REASONABLE in EUROPE, DESTROYED in the UNITED STATES Lothar Determannt & Robert Spragueu
    INTRUSIVE MONITORING: EMPLOYEE PRIVACY EXPECTATIONS ARE REASONABLE IN EUROPE, DESTROYED IN THE UNITED STATES Lothar Determannt & Robert SpragueU TABLE OF CONTENTS I. INTRODUCTION ................. ...................... 980 II. EMPLOYER MONITORING AND EMPLOYEE PRIVACY-U.S. PERSPECTIVE ............................ 981 A. WORK-RELATED EMPLOYER MONITORING........................................981 B. WORK-RELATED EMPLOYEE PRIVACY ................ ....... 986 1. Work-Related Rights to Privag Under the Constitution.....................986 2. Work-Related Rights to Privag Under the Common Law..................990 3. Statutog Rjghts to Privag................................. 993 a) The Electronic Communications Privacy Act ............... 995 C. INTRUSIVE WORKPLACE MONITORING AND EMPLOYEE PRIVACY................................................ 1001 1. Employer Access to PersonalWeb-Based Applications..................... 1007 2. Webcams ...................................... 1009 3. GPS ..................................... 1012 D. WORKPLACE PRIVACY TRENDS IN THE UNITED STATES............... 1016 III. EMPLOYER MONITORING AND EMPLOYEE PRIVACY-EUROPEAN PERSPECTIVE .. ................... 1018 A. LAWS IN EUROPE-OVERVIEW ................ ............. 1019 B. CIVIL RIGHTS PROTECTIONS FOR PRIVACY AT THE EUROPEAN LEVEL............................. .......... 1019 ( 2011 Lothar Determann & Robert Sprague. t Dr. iur habil, Privatdozent, Freie Universitat Berlin; Adjunct Professor, University of California, Berkeley School of Law and Hastings College
    [Show full text]
  • Mr. Bruno Gencarelli Head of Unit for International Data Flows and Protection European Commission [email protected]
    Mr. Bruno Gencarelli Head of Unit for International Data Flows and Protection European Commission [email protected] 26 July 2019 Re: Access Now Responds to Privacy Shield Review Questionnaire - Third review Dear Mr. Gencarelli, Thank you for your invitation to provide information and observations on the European Commission’s third annual review of the EU-U.S. Privacy Shield arrangement, the mechanism to facilitate the transfer and processing of the personal data of individuals from the European Union to and within the United States. Access Now is an international organisation that defends and extends the digital rights of users at risk around the world.1 By combining innovative policy, user engagement, and direct technical support, we fight for open and secure communications for all. Access Now maintains a presence in 13 locations around the world, including in the policy centers of Washington, DC and Brussels.2 Access Now regularly analyzes data transfer arrangements under EU law, including the Safe Harbor arrangement that was invalidated by the Court of Justice of the European Union in 2015, and the Privacy Shield which replaced it.3 Users benefit from a free, open, and secure internet that is enabled by legal certainty for stakeholders to operate. Robust data transfer frameworks which ensure a high level of data protection in the free flow of data are key to deliver these benefits for all actors. The Privacy Shield continues to be inadequate to protect fundamental rights. Since negotiations began in 2016, Access Now has provided detailed analysis and recommendations to the EU Commission on how to improve the Privacy Shield.
    [Show full text]
  • Reasonable Expectations of Privacy and Novel Search Technologies: an Economic Approach Steven Penney
    Journal of Criminal Law and Criminology Volume 97 Article 3 Issue 2 Winter Winter 2007 Reasonable Expectations of Privacy and Novel Search Technologies: An Economic Approach Steven Penney Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc Part of the Criminal Law Commons, Criminology Commons, and the Criminology and Criminal Justice Commons Recommended Citation Steven Penney, Reasonable Expectations of Privacy and Novel Search Technologies: An Economic Approach, 97 J. Crim. L. & Criminology 477 (2006-2007) This Symposium is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Journal of Criminal Law and Criminology by an authorized editor of Northwestern University School of Law Scholarly Commons. 0091-4169/07/9702-0477 THEJOURNAL OF CRIMINAL LAW & CRIMINOLOGY Vol. 97, No. 2 Copyright © 2007 by NorthwesternUniversity, Schoolof Law Printed in U.S.A. REASONABLE EXPECTATIONS OF PRIVACY AND NOVEL SEARCH TECHNOLOGIES: AN ECONOMIC APPROACH STEVEN PENNEY* The "reasonable expectation of privacy" test, which defines the scope of constitutionalprotection from governmental privacy intrusions in both the United States and Canada, is notoriously indeterminate. This indeterminacy stems in large measure from the tendency ofjudges to think ofprivacy in non-instrumentalistterms. This "moral" approach to privacy is normatively questionable, and it does a poor job of identifying the circumstances in which privacy should prevail over countervailing interests, such as the deterrence of crime. In this Article, I develop an alternative,economically-informed approach to the reasonable expectation of privacy test. In contrast to the moral approach, which treatsprivacy as a fundamental right, the economic approach views it as an (normatively neutral) aspect of self-interest: the desire to conceal and control potentially damagingpersonal information.
    [Show full text]
  • The Value of Privacy Federalism by Paul M
    09/24/14 (consolidated 3) The Value of Privacy Federalism By Paul M. Schwartz I. Introduction The United States features a dual system of federal and state sectoral law. In the absence of an omnibus privacy statute, the key question is how these laws interact with each other. When Congress enacts privacy law, it generally allows the states space for further action. The federal lawmaker typically does so through laws that set only a floor, that is, a minimum of safeguards, but that allow the states to exceed their privacy protections. This model has involved a wide range of institutional actors in the regulation of privacy. State legislatures and courts interpret state laws. Congress acts to preempt state law in enacting sectoral legislation, as needed, and federal judges interpret state legislation, including subsequent amendments to existing state law or new laws, to decide if they conflict with federal law. This existing U.S model is under pressure, however, because the federal government is largely inactive. The risk is that a new generation of state privacy legislation, such as breach notification laws, will not be consolidated and improved through the federal legislative process. Gridlock in Washington, D.C. has suspended the normal process of privacy federalism. In the European Union, the situation is different. At present, the Data Protection Directive requires Member States to enact legislation that is “harmonized” around its rules for information privacy. In the resulting legal system, the focus remains on the Member States, which are left with a “margin for maneuver” that permits national differences in the resulting statutes.
    [Show full text]
  • Right of Privacy and Rights of the Personality
    AGTA Instituti Upsaliensis Iurisprudentiae Gomparativae VIII RIGHT OF PRIVACY AND RIGHTS OF THE PERSONALITY A COMPARATIVE SURVEY Working paper prepared for the Nordic Conferen.ee on privacy organized by the International Commission of Jurists, Stockholm M ay 1967 BY STIG STRÜMHOLM STOCKHOLM P. A. NORSTEDT & SÜNERS FÜRLAG ACTA Institut! Upsaliensis Iurisprudentiae Oomparativae AGTA Instituti Upsaliensis Iurisprudentiae Comjmrativae Edidit ÂKE MALMSTROM VIII RIGHT OF PRIVACY AND RIGHTS OF THE PERSONALITY A COMPARATIVE SURVEY (Working Paper prepared for the Nordic Conférence on Privacy organized by the International Commission of Jurists, Stockholm May 1967) By STIG STRÜMHOLM S T O C K H O L M P. A. N O RSTEDT & S ONE R S FÜRLAG © P. A. Norstedt & Sôners fôrlag 1967 Boktryckeri AB Thule, Stockholm 1967 PREFACE One of the author’s most eminent teachers in private law in the Uppsala Faculty of Law once claimed that an action in tort ought to lie against those légal writers who take up a subject to treat it broadly enough to deter others from writing about it but not deeply enough to give any final answers to the questions discussed. Were the law so severe, the present author would undoubtedly have to face a lawsuit for venturing to publish this short study on a topic which demands lengthy and careful considération on almost every point and which has already given rise to an extensive body of case law and of légal writing. This préfacé can be considered as the au­ thor’s plaidoyer in that action, fortunately imaginary. The present study was prepared at the request, and with the most active personal and material support, of the International Commis­ sion of Jurists as a working paper for the Nordic Conférence of Jurists, organized by the Commission in Stockholm in May, 1967.
    [Show full text]
  • The Privacy, Data Protection and Cybersecurity Law Review
    The Privacy, Data Protection and Cybersecurity Law Review Editor Alan Charles Raul Law Business Research The Privacy, Data Protection and Cybersecurity Law Review The Privacy, Data Protection and Cybersecurity Law Review Reproduced with permission from Law Business Research Ltd. This article was first published in The Privacy, Data Protection and Cybersecurity Law Review - Edition 1 (published in November 2014 – editor Alan Charles Raul). For further information please email [email protected] The Privacy, Data Protection and Cybersecurity Law Review Editor Alan Charles Raul Law Business Research Ltd THE LAW REVIEWS THE MERGERS AND ACQUISITIONS REVIEW THE RESTRUCTURING REVIEW THE PRIVATE COMPETITION ENFORCEMENT REVIEW THE DISPUTE RESOLUTION REVIEW THE EMPLOYMENT LAW REVIEW THE PUBLIC COMPETITION ENFORCEMENT REVIEW THE BANKING REGULATION REVIEW THE INTERNATIONAL ARBITRATION REVIEW THE MERGER CONTROL REVIEW THE TECHNOLOGY, MEDIA AND TELECOMMUNICATIONS REVIEW THE INWARD INVESTMENT AND INTERNATIONAL TAXATION REVIEW THE CORPORATE GOVERNANCE REVIEW THE CORPORATE IMMIGRATION REVIEW THE INTERNATIONAL INVESTIGATIONS REVIEW THE PROJECTS AND CONSTRUCTION REVIEW THE INTERNATIONAL CAPITAL MARKETS REVIEW THE REAL ESTATE LAW REVIEW THE PRIVATE EQUITY REVIEW THE ENERGY REGULATION AND MARKETS REVIEW THE INTELLECTUAL PROPERTY REVIEW THE ASSET MANAGEMENT REVIEW THE PRIVATE WEALTH AND PRIVATE CLIENT REVIEW THE MINING LAW REVIEW THE EXECUTIVE REMUNERATION REVIEW THE ANTI-BRIBERY AND ANTI-CORRUPTION REVIEW THE CARTELS AND LENIENCY REVIEW THE TAX DISPUTES
    [Show full text]
  • 2015 International Compendium of Data Privacy Laws COUNTRY by REGION Australia Australia
    2015 International Compendium of Data Privacy Laws COUNTRY BY REGION Australia Australia................................................................................................................................. 6 Central Asia China (People’s Republic) .................................................................................................. 37 Hong Kong........................................................................................................................... 78 India..................................................................................................................................... 88 Japan................................................................................................................................. 106 South Korea....................................................................................................................... 149 Taiwan............................................................................................................................... 157 Central America Bahamas ............................................................................................................................. 16 Costa Rica........................................................................................................................... 43 Trinidad and Tobago.......................................................................................................... 160 Europe Austria ................................................................................................................................
    [Show full text]
  • Privacy Insights 2020 2
    AN OFFERING FROM BDO’S GOVERNANCE, RISK & COMPLIANCE PRACTICE PRIVACY INSIGHTS 2020 2 FOREWORD This whitepaper is focussed on global data privacy regulatory insights. The other megatrend is the mass move globally to working from home. However, given the current global COVID-19 pandemic situation it would This brings internal and external challenges. Internal considerations include be injudicious to not mention some of the considerations for data privacy the rapid shift to remote working with increased use of personal devices during these unprecedented times. There are two global megatrends to and dependence on key individuals as well as the need to understand more monitor developments of. about the personal health situation of not only employees but those they are co-habiting with. Additionally, timelines for responding to Data Subject The first is the global race to develop contact tracing applications. These are Access Requests can be strained. External challenges include the emergence being designed and developed by large corporations, national governments of increased opportunities for fraudsters and criminals to illegally obtain and private companies. Significant work is underway by Data Protection personal data as well as the potential impact of an impaired service from Authorities, lawyers, politicians and privacy advocates to balance citizens external providers which may result in increased data breaches. privacy rights with the urgent need to manage the pandemic. There is also significant concern that even if privacy rights can be balanced for this specific use, governments and companies may retain too much control over citizens data post the pandemic as a result. Karen A. Schuler, Principal and National Governance, Risk & Compliance Leader, BDO USA Koen Claessens, Partner Risk Advisory, BDO Belgium 3 INTRODUCTION BDO’s clients operate in multiple jurisdictions around the world.
    [Show full text]
  • Protecting the Privacy of Canadians: Review of the Privacy Act
    PROTECTING THE PRIVACY OF CANADIANS: REVIEW OF THE PRIVACY ACT Report of the Standing Committee on Access to Information, Privacy and Ethics Blaine Calkins Chair DECEMBER 2016 42nd PARLIAMENT, 1st SESSION Published under the authority of the Speaker of the House of Commons SPEAKER’S PERMISSION Reproduction of the proceedings of the House of Commons and its Committees, in whole or in part and in any medium, is hereby permitted provided that the reproduction is accurate and is not presented as official. This permission does not extend to reproduction, distribution or use for commercial purpose of financial gain. Reproduction or use outside this permission or without authorization may be treated as copyright infringement in accordance with the Copyright Act. Authorization may be obtained on written application to the Office of the Speaker of the House of Commons. Reproduction in accordance with this permission does not constitute publication under the authority of the House of Commons. The absolute privilege that applies to the proceedings of the House of Commons does not extend to these permitted reproductions. Where a reproduction includes briefs to a Standing Committee of the House of Commons, authorization for reproduction may be required from the authors in accordance with the Copyright Act. Nothing in this permission abrogates or derogates from the privileges, powers, immunities and rights of the House of Commons and its Committees. For greater certainty, this permission does not affect the prohibition against impeaching or questioning the proceedings of the House of Commons in courts or otherwise. The House of Commons retains the right and privilege to find users in contempt of Parliament if a reproduction or use is not in accordance with this permission.
    [Show full text]
  • Finding Laws to Charge Perpetrator Who Misuse Technology
    Finding Laws To Charge Perpetrators Who Misuse Technology When a perpetrator, abuser or stalker misuses technology to target and harm a victim, there are various criminal and civil charges that might be applied to ensure accountability and promote victim safety. There are a number of U.S. federal and state/territory/tribal laws that might apply. To support the safety and privacy of victims, it is important to take technology‐facilitated abuse and stalking seriously. This includes assessing all ways that technology is being misused to perpetrate harm, and, considering all charges that could or should be applied. Identify laws that address violence and abuse. Identify where they explicitly or implicitly include the use of technology and electronic communications: Stalking and cyberstalking (felony menacing by, via electronic surveillance, etc.) Harassment, threats, assault Domestic violence, dating violence, sexual violence, sexual exploitation Sexting and child pornography: electronic transmission of harmful information to minors, providing obscene material to a minor, inappropriate images of minors, lascivious intent Bullying and cyberbullying Child abuse Identify possible charges related to technology, communications, privacy and confidentiality: Unauthorized access, unauthorized recording/taping, Illegal interception of electronic communications, illegal monitoring of communications, surveillance, eavesdropping, wiretapping, unlawful party to call Computer and Internet crimes: fraud, network intrusion Identity theft, impersonation,
    [Show full text]