Court Information Management: Policy

Total Page:16

File Type:pdf, Size:1020Kb

Court Information Management: Policy COURT INFORMATION MANAGEMENT POLICY FRAMEWORK to ACCOMMODATE THE DIGITAL ENVIRONMENT Discussion Paper Prepared by Jo Sherman For the Canadian Judicial Council © Canadian Judicial Council Catalogue Number JU14-23/2013E-PDF ISBN 978-1-100-21993-6 Available from: Canadian Judicial Council Ottawa, Ontario K1A 0W8 (613) 288-1566 (613) 288-1575 (facsimile) and at: www.cjc-ccm.gc.ca FOREWORD | iii Foreword Traditionally, courts have relied on the availability of filed documents – both paper based or electronic – as a means to move the work of the Court forward. Recent technological advancements have dramatically improved the way documents are captured, stored, shared and retrieved electronically. Managing this information and making full use of digital technology has been a challenge for all institutions, including the courts. The possibility of having instant access to digitized documents from virtually anywhere presents enormous benefits; however, there are also risks in allowing unfettered access to court documents. Some information is sensitive and the impact of its release needs to be carefully weighed in the context of ensuring a fair trial and protecting vulnerable individuals. Courts also have a duty to protect the integrity of all information that are part of legal proceedings. As expectations grow that courts will foster ongoing transparency through the use of modern information technology, courts must seize the opportunities to streamline their policies and governance in this regard. By setting definitions, architectural principles and information management policies, courts may approach this evolving issue with confidence. This discussion paper proposes a framework for individual courts to consider when moving towards the development of their respective Information Management policies. The discussion paper has been prepared by the Canadian Judicial Council’s technology committee. While it should not be considered as a policy of the Council, it provides an excellent starting point for courts to reflect on the challenges and opportunities offered by modern information technology in framing their own policies. TABLE OF CONTENTS | v Table of Contents 1 EXECUTIVE SUMMARY . 1 2 INTRODUCTION ..........................................................................3 2.1 Terms of Reference .......................................................................3 2.2 Our Networked Society ..................................................................3 2.3 The Challenge for Courts : New Policy Formulation ........................................4 2.4 Purpose of this Document ................................................................4 3 ELECTRONIC COURT INFORMATION ......................................................5 3.1 Documents versus Information ...........................................................5 3.2 Practical Obscurity .......................................................................6 3.3 Possession and Control ..................................................................6 3.4 Custodianship ...........................................................................7 3.5 Architecture requires Information Management Policy . .7 4 NEW RISKS IN OUR DIGITIZED SOCIETY ...................................................9 4.1 It is impossible to control information once it’s released on the Internet. ...................9 4.2 It is easy for a court to lose control over the quality of its information ......................9 4.3 Data mining may facilitate unauthorised bulk-access to court information .................9 4.4 Risks to vulnerable people ..............................................................10 4.5 Personal privacy may be invaded by persons with ‘no right to know’ ......................10 4.6 Increased risk of identity theft, harassment, fraud ........................................11 4.7 Access to disturbing material may cause distress or harm ................................11 4.8 Fair trials are easily compromised ........................................................12 4.9 It’s easier to leak sensitive court information and its impact is more damaging ............14 4.10 Outsourcing eLodgment to commercial providers can lead to loss of control ..............14 4.11 Outsourcing or ‘cloud’ arrangements can mean loss of control ............................14 4.12 Commercial litigation may go elsewhere ................................................14 4.13 Technology can sometimes drive Policy (when it should be vice versa) ....................15 5 INFORMATION MANAGEMENT POLICIES IN CONTEXT ....................................16 5.1 Inter-Relationships between Values, Policies and Architecture ............................16 5.2 Core Values for Courts ...................................................................17 5.3 Balancing Core Values ...................................................................18 5.4 Independence : A Unique, Cornerstone Value within Courts. 19 vi | TABLE OF CONTENTS 6 WHAT IS ARCHITECTURE? ...............................................................21 Information Architecture . 22 Technology Architecture . 22 Business Architecture . 22 Governance & Methodology . 22 6.1 Why do we need Architecture? ..........................................................23 6.2 What is the risk of proceeding without it? ................................................23 6.3 Emerging Trends : Service Oriented Architecture .........................................24 Benefits of Service Oriented Architecture . 25 Migration from legacy applications into new technologies . 25 Service Oriented Architecture in Practice . 26 Resources and Capability . 28 7 DEFINING COURT INFORMATION – A GRANULAR PERSPECTIVE ...........................29 7.1 Why do we need definitions? ............................................................29 7.2 Categories of Court Information .........................................................31 Judicial Information . 32 Case File . 34 Court Record . 34 Docket . 35 7.3 Court Users and Participant Categories ..................................................36 7.4 Case Type Categories ...................................................................37 7.5 Personal Information ....................................................................37 8 COURT INFORMATION MANAGEMENT POLICIES ..........................................38 8.1 Policy Formulation ......................................................................38 8.2 Foundational Policies ...................................................................39 8.3 Access Policies ..........................................................................44 8.4 The Bellis Proposals : a Modern Framework of Public Access to Court Records .............46 8.5 Possible Use of Creative Commons Licence ..............................................47 8.6 Proposed Access Policies ................................................................47 8.7 Privacy Policies .........................................................................50 8.8 Security Policies ........................................................................54 8.9 Preservation Policies ....................................................................56 8.10 Performance Measurement Policies .....................................................58 APPENDIX 1: REFERENCES ...................................................................59 APPENDIX 2A: ALLOCATION TABLE FOR THE COURT RECORD AND CASE FILE ..................61 APPENDIX 2B: USAGE OF COURT INFORMATION MATRIX .....................................64 APPENDIX 3: RECOMMENDED KEY DEFINITIONS .............................................65 SECTION 1 – EXECUTIVE SUMMARY | 1 1 Executive Summary This paper proposes a framework and methodology for information management policy formulation within courts. It is designed to enable court policy makers to embrace the opportunities presented by our networked society while also accommodating the emerging risks. The approach recommended in this paper also provides those responsible for the architecture design and implementation of court information systems with a policy foundation to underpin and guide their work. The policy framework addresses the following areas: • Foundational Policies • Access Policies • Privacy Policies • Security Policies • Preservation Policies • Performance Measurement Policies It also proposes definitions for the following key terms: • Judicial Information • Private Judicial Information • Court Judicial Information • Case File (Restricted Access Information) • Court Record (Open Access Information) • Court Docket • Personal Information The recommended methodology within each jurisdiction is to: 1. Confirm recommended key definitions (Appendix 3) 2. Complete an Allocation Table for the Court Record and Case File (Appendix 2) 2 | SECTION 1 – EXECUTIVE SUMMARY 3. Develop an Access to Court Information Table to define who should have access to what information for each Case Type (Appendix 2) 4. Review the recommended policies (Section 8) in terms of suitability for local application taking into account any unique characteristics or requirements within the jurisdiction and adjusting them as required to accommodate any pre-existing legislative or similar constraints. Once these steps have been performed the emerging information management policies will provide a set of Architectural Principles to guide those responsible for court computer system design. Modern approaches to computer system design, such
Recommended publications
  • Automated Vehicles Tactical Plan
    Attachment 1: Automated Vehicles Tactical Plan IE8.7 - Attachment 1 AUTOMATED VEHICLES TACTICAL PLANDRAFT INTENTIONALLY LEFT BLANK DRAFT ACKNOWLEDGMENTS This document is the result of guidance, feedback and support from a number of individuals and organizations. In the development of this Automated Vehicles Tactical Plan, the City of Toronto hosted many stakeholder workshops and one-on-one meetings, consulted panels, and provided an open call for feedback via surveys and public posting. Responses were provided by academic institutions, industry representatives, community associations, City staff, advocacy groups, neighbouring municipalities, members of the public and international experts – among other stakeholders. A special thank you to the 2018 Toronto Planning Review Panel, the 2019 Accessibility Advisory Committee, and the 2019 Expert Review Panel hosted by the Ontario Centres of Excellence for their detailed feedback on the AV Tactical Plan. Expert Review Panel Members Emiko Atherton Anthony Townsend Director National Complete Streets Principal Consultant and Author, Bits Coalition, Smart Growth America and Atoms LLC (New York City, NY) (Washington, DC) Dr. Tom Vöge Ann Cavoukian Policy Analyst Intelligent Transport Distinguished Expert-in-Residence, Systems, Organization for Economic Privacy by Design Centre of Cooperation and Development – Excellence, Ryerson University International Transport Forum (Paris, (Toronto, ON) France) Rita Excell Bryant Walker Smith Executive Director, Australia and New Assistant Professor School of
    [Show full text]
  • Urbanism Under Google: Lessons from Sidewalk Toronto
    Fordham Law Review Volume 88 Issue 2 Article 4 2019 Urbanism Under Google: Lessons from Sidewalk Toronto Ellen P. Goodman Rutgers Law School Julia Powles University of Western Australia Follow this and additional works at: https://ir.lawnet.fordham.edu/flr Part of the Law and Society Commons, and the Science and Technology Law Commons Recommended Citation Ellen P. Goodman and Julia Powles, Urbanism Under Google: Lessons from Sidewalk Toronto, 88 Fordham L. Rev. 457 (2019). Available at: https://ir.lawnet.fordham.edu/flr/vol88/iss2/4 This Symposium is brought to you for free and open access by FLASH: The Fordham Law Archive of Scholarship and History. It has been accepted for inclusion in Fordham Law Review by an authorized editor of FLASH: The Fordham Law Archive of Scholarship and History. For more information, please contact [email protected]. URBANISM UNDER GOOGLE: LESSONS FROM SIDEWALK TORONTO Ellen P. Goodman* & Julia Powles** Cities around the world are rapidly adopting digital technologies, data analytics, and the trappings of “smart” infrastructure. These innovations are touted as solutions to help rationalize services and address rising urban challenges, whether in housing, transit, energy, law enforcement, health care, waste management, or population flow. Promises of urban innovation unite cities’ need for help with technology firms’ need for markets and are rarely subject to evidentiary burdens about projected benefits (let alone costs). For the city, being smart is about functioning better and attracting tech plaudits. For the technology company, the smart city is a way to capture the value of data flows—either by directly monetizing behavioral insights or by using those insights to design or acquire services—and then realizing the network effects and monopoly rents that have characterized information technology platforms.
    [Show full text]
  • BOARD of GOVERNORS Thursday, June 29, 2017 Jorgenson Hall – JOR 1410 380 Victoria Street 4:00 P.M
    BOARD OF GOVERNORS Thursday, June 29, 2017 Jorgenson Hall – JOR 1410 380 Victoria Street 4:00 p.m. to 6:00 p.m. Time Item Presenter/s Action 4:00 1. IN-CAMERA DISCUSSION (Board Members Only) 4:15 2. IN-CAMERA DISCUSSION (Executive Group Invited) END OF IN-CAMERA DISCUSSION 3. INTRODUCTION 4:40 3.1 Chair’s Remarks Janice Fukakusa Information 3.2 Approval of the June 29, 2017 Agenda Janice Fukakusa Approval 4:45 4. REPORT FROM THE PRESIDENT Mohamed Lachemi Information 4.1 Congress of the Humanities and Social Sciences 2017 Pam Sugiman Information Highlights 5:00 5. REPORT FROM THE SECRETARY Julia Shin Doi Information 5.1 Board of Governors Student Leadership Award and Julia Shin Doi Information Medal 5.2 Annual Board Assessments Julia Shin Doi Information 5:05 6. REPORT FROM THE INTERIM PROVOST AND VICE Chris Evans Information PRESIDENT ACADEMIC 6.1 Policy and Procedures Relating to Search Committees Mohamed Lachemi Approval and Appointments in the Academic Administration and Christopher Evans to the Development and Evaluation of the Performance Saeed Zolfaghari of Academic Administrators (“AAA Policy”) 7. DISCUSSION 5:25 7.1 REPORT FROM THE INTERIM VICE PRESIDENT Rivi Frankle Information UNIVERSITY ADVANCEMENT 5:30 7.2 REPORT FROM THE CHAIR OF THE AUDIT COMMITTEE Jack Cockwell Information 7.2.1 Draft Audited Financial Statements -Year Ended April 30, Joanne McKee Approval 2017 7.2.2 Safe Disclosure Policy Janice Winton Approval Scott Clarke 5:40 7.3 REPORT FROM THE CHAIR OF THE EMPLOYEE RELATIONS Mitch Frazer AND PENSION COMMITTEE 7.3.1 Audited Financial Statements of the Ryerson Retirement Christina Sass-Kortsak Approval Pension Plan (RRPP) January 1, 2017 and Audit Findings for the year ending December 31, 2016 7.3.2 Preliminary Valuation of the Ryerson Retirement Mitch Frazer Approval Pension Plan (RRPP) January 1, 2017 Christina Sass-Kortsak 7.3.3 Amendments to the Ryerson Retirement Pension Plan Christina Sass-Kortsak Approval Statement of Investment Policies & Procedures 8.
    [Show full text]
  • Freedom Liberty
    2013 ACCESS AND PRIVACY Office of the Information and Privacy Commissioner Ontario, Canada FREEDOM & LIBERTY As Commissioner, I feel that one of the most important parts of my mandate is to engage citizens so that the message of “respect our privacy, respect our freedoms,” can be heard loud and clear. COMMISSIONER’S MESSAGE WHEN I BEGAN MY FIRST TERM AS ONTARIO’S INFORMATION AND PRI- 2009 VACY COMMISSIONER IN 1997, I COULD In 2009, I continued to advance Privacy by NOT HAVE IMAGINED HOW MUCH THE Design on the world stage by launching The 7 WORLD WOULD BE CHANGING! Com- Foundational Principles of Privacy by Design, puters and the Internet were still largely limited which I am proud to say have now been trans- to desktops in homes and offices. Laptops were lated into 35 languages, with more to come. still unwieldy devices, and cellphones were still To ensure that Privacy by Design continued to a long way from becoming “smart.” gain strong global momentum, I also launched Today, information technology is compact, www.privacybydesign.ca as a repository of mobile, and everywhere. You cannot walk down news, information and research. the street without seeing someone using some In an entirely different area, following an exten- sort of mobile device that has more computing sive investigation, I issued a special report en- power than an office floor full of computers, just a generation ago. There is almost no aspect of titled, Excessive Background Checks Conducted our lives left that remains untouched by infor- on Prospective Jurors: A Special Investigation Re- mation and communications technology.
    [Show full text]
  • 20777807 Lprob 1.Pdf
    Inman Harvey · Ann Cavoukian George Tomko · Don Borrett Hon Kwan · Dimitrios Hatzinakos Editors SmartData Privacy Meets Evolutionary Robotics SmartData Inman Harvey • Ann Cavoukian George Tomko • Don Borrett Hon Kwan • Dimitrios Hatzinakos Editors SmartData Privacy Meets Evolutionary Robotics Editors Inman Harvey Ann Cavoukian School of Informatics Office of the Information University of Sussex and Privacy Commissioner of Ontario Brighton, UK Toronto, ON, Canada George Tomko Don Borrett Identity, Privacy and Security Initiative Department of Medicine University of Toronto University of Toronto Toronto, ON, Canada Toronto, ON, Canada Hon Kwan Dimitrios Hatzinakos Department of Neurophysiology Electrical and Computer Engineering University of Toronto University of Toronto Toronto, ON, Canada Toronto, ON, Canada ISBN 978-1-4614-6408-2 ISBN 978-1-4614-6409-9 (eBook) DOI 10.1007/978-1-4614-6409-9 Springer New York Heidelberg Dordrecht London Library of Congress Control Number: 2013932866 # Springer Science+Business Media New York 2013 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. Exempted from this legal reservation are brief excerpts in connection with reviews or scholarly analysis or material supplied specifically for the purpose of being entered and executed on a computer system, for exclusive use by the purchaser of the work. Duplication of this publication or parts thereof is permitted only under the provisions of the Copyright Law of the Publisher’s location, in its current version, and permission for use must always be obtained from Springer.
    [Show full text]
  • Privacy and the Open Networked Enterprise Privacy June, 2005 and the IT& Open Networked Enterprise CA Big Idea
    Information Technology & Competitive Advantage Privacy and the Open Networked Enterprise Privacy June, 2005 June, and the IT& Open Networked Enterprise CA Big Idea by Dr. Ann Cavoukian New Paradigm October 17, 2006 Privacy and the Enterprise 2.0 by Dr. Ann Cavoukian and Don Tapscott The Story in Brief Based on the new Web—known as the Web 2.0—a new model of the corporation is emerging—call it the Enterprise 2.0. The new enterprise is highly networked and open, with high transparency, and effective use of IT to link with various stakeholders—all on a global basis. By necessity, within the Enterprise 2.0, corporate boundaries blur: in order to facilitate effective collaboration, the new enterprise compiles highly granular data from disparate sources (i.e., multiple stakeholders) to create a more holistic business intelligence. Smart firms will build appropriate and effective privacy policies and practices into their systems. In doing so, these firms can avoid potential disasters and create the conditions for trust, loyalty, long-term relationships, and economic advantage. Privacy is no longer a compliance issue; it is a business issue. It must be a business imperative. Table of Contents 1 The Context: Privacy and Technology 12 Relationships Context 4 The Web 2.0 Privacy concerns: consumer trust 5 New Boundaries, New Business Processes Possible Solutions Context 15 Information Liquidity Privacy concerns: outsourcing and offshoring Context Recommendations Privacy concerns: bad data, bad decisions 9 Modus Operandi Possible solutions Context
    [Show full text]
  • GS1 Healthcare Conference
    GS1 Healthcare Conference 17-19 June 2008 Le Méridien King Edward Hotel Toronto, Ontario, Canada Supported by: GS1 Healthcare Conference Toronto, Canada, 17-19 June 2008 GS1 Healthcare – Improving patient safety worldwide 2 GS1 Healthcare Conference Toronto, Canada, 17-19 June 2008 Dear Participant, Welcome to the GS1 Healthcare Conference in Toronto! Global standards in the Healthcare supply chain: are we there yet? We have already gone a long way, but there is still a long journey ahead. The coming 18 months will be important to continue to lay the foundation for the adoption of global supply chain standards in Healthcare : continue the development of global standards to meet Healthcare specific needs, intensify our efforts advocating global harmonisation, and leverage the network of GS1 Member Organisations to educate local Healthcare communities about GS1 Standards. Also beyond 2009, we anticipate a lengthy adoption process, different from one country to another country and from one stakeholder to another stakeholder, but the benefits in terms of patient safety and efficiency will be substantial from day one for those adopting the standards. To achieve all of this, we need a broad representation from all Healthcare supply chain stakeholders. Many leading manufacturers have joined the recently formed GS1 Healthcare, the global Healthcare user group merging the former GS1 HUG and EPCglobal HLS. We are also happy that a number of Healthcare providers and GPO’s have become a voting member of GS1 Healthcare, including the Hong Kong Hospital Authority, 17 French university hospitals, Vinzenz Gruppe (Vienna, Austria), Erasmus MC and UMC Groningen (the Netherlands), Comparatio University Hospital Group (Germany), Premier (USA), and University of Kentucky Healthcare (USA).
    [Show full text]
  • Candid Camera Talk
    SERVING PICKERING SINCE 1965 News Advertiser PRESSRUN 46,600 ✦ 24 PAGES ✦ SATURDAY, DECEMBER 27, 2003 ✦ durhamregion.com ✦ OPTIONAL DELIVERY $6/$1 NEWSSTAND PACKED TO GO BAKER’S DOZEN Durham man waits for transplant Martin’s hands are full News, 7 Entertainment, 18 Candid camera talk Public board looks sive a manner as possible.” In the guidelines, she says at surveillance rules boards should have a formal policy governing the use of By Mike Ruta video surveillance; should only Staff Writer use cameras as a detection or DURHAM – Durham’s public deterrent tool in identified school board is creating a poli- areas of a school, and should cy around the use of video sur- not monitor students and staff veillance cameras at schools. where they would expect to Ann Cavoukian, Ontario In- have some privacy. formation and Privacy Com- Al Monks, Pickering High missioner, recently issued rules School’s principal, says school for the use of school security administration considered cameras. some of the issues addressed “The guidelines were created by Ms. Cavoukian in setting up A.J. Groen/ News Advertiser photo to ensure that privacy is not an its security cameras. afterthought,” she stated. “If a “We made decisions around school board is convinced, after some of that stuff already,” he consulting with students, par- says, noting areas such as Turning his world upside down ents, staff and the broader washrooms were considered off school community that a video limits for surveillance. “We’ve PICKERING –– Danny Burns enjoyed a unique look at the world recently while at Dagmar Ski Resort.
    [Show full text]
  • Senate Meeting Agenda
    SENATE MEETING AGENDA Tuesday, March 7, 2017 SENATE MEETING AGENDA Tuesday, March 7, 2017 THE COMMONS - POD 250 4:30 p.m. Light dinner is available 5:00 p.m. Committee of the Whole discussion: The Strategic Mandate Agreement (SMA) Process. P. Stenton will provide a brief update on the SMA process, after which comments and questions are welcome. Note that all Ryerson faculty members are invited to attend this portion of the Senate meeting, in order to provide another opportunity to hear about and discuss the SMA process. 6:00 p.m. Senate Meeting starts 1. Call to Order/Establishment of Quorum 2. Approval of Agenda Motion: That Senate approve the agenda for the March 7, 2017 meeting 3. Announcements Pages 1-6 4. Minutes of Previous Meeting Motion: That Senate approve the minutes of the January 31, 2017 meeting 5. Matters Arising from the Minutes 6. Correspondence 7. Reports Pages 7-16 7.1 Report of the President 7.1.1 President’s Update Pages 17-23 7.2 Achievement Report 7.3 Report of the Secretary 7.3.1 Senate elections update 7.4 Committee Reports Page 24 7.4.1 Report #W2017-2 from the Academic Governance and Policy Committee (AGPC): C. Evans 7.4.1.1 The Academic Standards Committee - offer to respond to Recommendation #2 – Ombudsperson’s 2015-2016 Report 7.4.1.2 The Registrar’s Office – offer to work on University’s response to Recommendation #3 in the Ombudsperson’s 2015- 2016 Report 7.4.1.3 AGPC - to work on “policy about policies” Page 25-34 7.5 Report #W2017-2 from the Yeates School of Graduate Studies (YSGS): J.
    [Show full text]
  • Embed Privacy and Security, by Design to Ensure Regulatory Compliance
    Embed Privacy and Security, by Design to ensure Regulatory Compliance Ann Cavoukian, Ph.D. Executive Director Privacy and Big Data Institute Ryerson University Privacy & Data Security Compliance Conference Toronto, Ontario February 1, 2017 Let’s Dispel Some Myths Privacy ≠ Secrecy Privacy is not about having something to hide Privacy = Control Privacy = Personal Control • User control is critical • Freedom of choice • Informational self-determination Context is key! Privacy is Essential to Freedom: A Necessary Condition for Societal Prosperity and Well-Being • Innovation, creativity, and the resultant prosperity of a society requires freedom; • Privacy is the essence of freedom: Without privacy, individual human rights, property rights and civil liberties – the conceptual engines of innovation and creativity, could not exist in a meaningful manner; • Surveillance is the antithesis of privacy: A negative consequence of surveillance is the usurpation of a person’s limited cognitive bandwidth, away from innovation and creativity. The Decade of Privacy by Design Adoption of “Privacy by Design” as an International Standard Landmark Resolution Passed to Preserve the Future of Privacy By Anna Ohlden – October 29th 2010 - http://www.science20.com/newswire/landmark_resolution_passed_preserve_future_privacy JERUSALEM, October 29, 2010 – A landmark Resolution by Ontario's Information and Privacy Commissioner, Dr. Ann Cavoukian, was approved by international Data Protection and Privacy Commissioners in Jerusalem today at their annual conference. The
    [Show full text]
  • Smart Cities Technologies Summit: a Collaborative Discussion Between Government and the ICT Sector
    ITAC Industry Insider Newsletter January 31, 2019 Smart Cities Technologies Summit: a collaborative discussion between government and the ICT sector. Register today! On February 26, 2019, the Information Technology Association of Canada (ITAC), together with the City of Brampton, will host a full-day event looking at technology for smart cities and will explore ICT applications to help cities and municipalities develop their own innovative applications to best serve their citizens’ needs. Over the last half century, two trends have re-shaped Canada’s development. First, there has been an accelerating move of Canadians to big cities. The second has been the expansion of connected technologies into virtually every area of our lives. We now use connected devices to work, shop, date, stay connected with family and engage in our communities. The Smart Cities Technologies Summit will be a collaborative discussion to engage government at all levels with a broad section of the technology sector. In addition to our keynote speakers, we will host four engaging panel discussions on the following: 1. Human Mobility 2. Data Privacy & Security 3. Connectivity (5G) 4. Modernizing City Based Services & Civic Innovation DATE: Tuesday, February 26, 2019 TIME: 8:30 a.m. – 4:30 p.m. LOCATION: Rose Theatre, 1 Theatre Lane, Brampton PANELISTS Opening Keynote: Mayor Patrick Brown, City of Brampton 1 Human Mobility Panel • Annalise Czerny, EVP Presto, Metrolinx • Tracey DeLeeuw, Commercial Technology Products Leader, Global Markets, EY • Laurens Lapré, CGI’s intelligent transport systems and mobility services, Netherlands Data Privacy & Security • Ann Cavoukian - Three-term Information and Privacy Commissioner of Ontario, Distinguished Expert-in- Residence, Privacy by Design Centre of Excellence, Ryerson University • J.
    [Show full text]
  • Ann Cavoukian
    Ann Cavoukian Dr. Ann Cavoukian is recognized as one of the world's leading privacy experts. She oversees the operations of the freedom of information and privacy laws in Ontario, Canada, in her role as Information and Privacy Commissioner UPCl. Dr. Cavoukian joined the Office of the IPe as its first Director of Compliance in 1987. Prior to joining the IPC, she headed the Research Services Branch for the provincial Attorney General. She received her M.A. and Ph.D. in Psychology from the University of Toronto, where she specialized in criminology and law, and lectured on psychology and the criminal justice system. Her published works include J!V11O Knows: Safeguarding Your Privacy in a Networked World, with Don Tapscott (McGraw-Hili, 1997), and TIIf Privacy Payoff: Ilow Successful Businesses Build Consumer Trust, with Tyler Hamilton (McGraw-Hill Ryerson, 2002). What is inJonnation privacy? Information privacy essentially revolves around personal control-an individual's right to control the collection, use, and disclosure of his or her personal information. Freedom of choice is vital. Personal information is information that relates to an "identifiable individual." Organizations that collect, use, and disclose personal information can protect an individual's right to privacy by implementing what are commonly referred to as "fair information practices." Fair information practices are a set of common standards that balance an individual's right to privacy with the organization's legitimate need to collect, use, and disclose personal information. In Canada, fair information practices are set out in the Canadian Standards Association Model Codefor the Protection of Personal Information (the CSA Code).
    [Show full text]