A Report of Research on Privacy for Electronic Government
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Automated Vehicles Tactical Plan
Attachment 1: Automated Vehicles Tactical Plan IE8.7 - Attachment 1 AUTOMATED VEHICLES TACTICAL PLANDRAFT INTENTIONALLY LEFT BLANK DRAFT ACKNOWLEDGMENTS This document is the result of guidance, feedback and support from a number of individuals and organizations. In the development of this Automated Vehicles Tactical Plan, the City of Toronto hosted many stakeholder workshops and one-on-one meetings, consulted panels, and provided an open call for feedback via surveys and public posting. Responses were provided by academic institutions, industry representatives, community associations, City staff, advocacy groups, neighbouring municipalities, members of the public and international experts – among other stakeholders. A special thank you to the 2018 Toronto Planning Review Panel, the 2019 Accessibility Advisory Committee, and the 2019 Expert Review Panel hosted by the Ontario Centres of Excellence for their detailed feedback on the AV Tactical Plan. Expert Review Panel Members Emiko Atherton Anthony Townsend Director National Complete Streets Principal Consultant and Author, Bits Coalition, Smart Growth America and Atoms LLC (New York City, NY) (Washington, DC) Dr. Tom Vöge Ann Cavoukian Policy Analyst Intelligent Transport Distinguished Expert-in-Residence, Systems, Organization for Economic Privacy by Design Centre of Cooperation and Development – Excellence, Ryerson University International Transport Forum (Paris, (Toronto, ON) France) Rita Excell Bryant Walker Smith Executive Director, Australia and New Assistant Professor School of -
Canadian Privacy Law: the Personal Information Protection and Electronic Documents Act (PIPEDA)
International In-house Counsel Journal Vol. 2, No. 7, Spring 2009, 1135–1146 Canadian Privacy Law: The Personal Information Protection and Electronic Documents Act (PIPEDA) DOMINIC JAAR PATRICK E. ZELLER Legal Counsel Vice President & Deputy General Counsel Ledjit Consulting, Inc. Guidance Software, Inc. Canada United States This white paper provides a general overview of the Personal Information Protection and Electronic Documents Act (“PIPEDA”), and discusses both the privacy requirements imposed by that Act as well as the rules governing the use of electronic documents that it sets out. Overview Introduction to PIPEDA PIPEDA is the federal legislative response to growing concerns over the protection and use of personal information that is accumulated by both public and private organizations in the course of their day-to-day operations.1 The Act sets out rules governing how such information should be handled by the organizations that collect it, and under what circumstances it may be disclosed, either to third parties or to the individual who is the subject of the information. The Act contains two main parts. The first part sets out the rules governing the collection, retention and disclosure of personal information, as well as the remedies available in the event of a suspected breach. In essence, this part of the Act establishes a framework which attempts to balance the privacy rights of individuals with the needs of organizations to collect, use, and disclose personal information in the course of commercial activities. This part of the Act is discussed in sections I and II of this document. The second part of the Act describes the circumstances in which electronic alternatives may be used to fulfill legal obligations, which, under federal laws, require the use of paper documents to record or communicate information or transactions. -
Off the Grid: Pinpointing Location-Based Technologies and the Law
Off the Grid: Pinpointing Location-based Technologies and the Law Written By: Geoffrey White, Barrister & Solicitor External Counsel The Public Interest Advocacy Centre 1204 - ONE Nicholas St. Ottawa, Ontario K1N 7B7 June 2015 Copyright 2015 PIAC Contents may not be commercially reproduced. Any other reproduction with acknowledgment is encouraged. The Public Interest Advocacy Centre (PIAC) Suite 1204 ONE Nicholas Street Ottawa, ON K1N 7B7 Tel: (613) 562-4002 Fax: (613) 562-0007 E-mail: [email protected] Website: www.piac.ca Canadian Cataloguing and Publication Data ISBN 978-1-927707-03-6 Off the Grid? Pinpointing Location-Based Technologies and the Law Off the Grid? Pinpointing Location-Based Technologies and the Law Page 2 of 109 Acknowledgement Financial support from Industry Canada to conduct the research on which this report is based is gratefully acknowledged. The views expressed in this report are not necessarily those of Industry Canada or of the Government of Canada. The author would also like to thank Kent Sebastian, PIAC Student-at-Law 2014-15, Sarah Mavula, PIAC Summer Student 2014, and Jonathan Bishop, PIAC’s Research & Parliamentary Affairs Analyst, for their research and contributions. Any mistakes are solely the author’s. Off the Grid? Pinpointing Location-Based Technologies and the Law Page 3 of 109 Executive Summary Knowledge of the whereabouts of a person, and of a person’s movement patterns, can be very valuable, from a marketing perspective. Indeed, the scale and scope of the business opportunities associated with so-called location-based behavioural marketing and location- based services (collectively, location-based technologies) have been well-documented in the business literature. -
Urbanism Under Google: Lessons from Sidewalk Toronto
Fordham Law Review Volume 88 Issue 2 Article 4 2019 Urbanism Under Google: Lessons from Sidewalk Toronto Ellen P. Goodman Rutgers Law School Julia Powles University of Western Australia Follow this and additional works at: https://ir.lawnet.fordham.edu/flr Part of the Law and Society Commons, and the Science and Technology Law Commons Recommended Citation Ellen P. Goodman and Julia Powles, Urbanism Under Google: Lessons from Sidewalk Toronto, 88 Fordham L. Rev. 457 (2019). Available at: https://ir.lawnet.fordham.edu/flr/vol88/iss2/4 This Symposium is brought to you for free and open access by FLASH: The Fordham Law Archive of Scholarship and History. It has been accepted for inclusion in Fordham Law Review by an authorized editor of FLASH: The Fordham Law Archive of Scholarship and History. For more information, please contact [email protected]. URBANISM UNDER GOOGLE: LESSONS FROM SIDEWALK TORONTO Ellen P. Goodman* & Julia Powles** Cities around the world are rapidly adopting digital technologies, data analytics, and the trappings of “smart” infrastructure. These innovations are touted as solutions to help rationalize services and address rising urban challenges, whether in housing, transit, energy, law enforcement, health care, waste management, or population flow. Promises of urban innovation unite cities’ need for help with technology firms’ need for markets and are rarely subject to evidentiary burdens about projected benefits (let alone costs). For the city, being smart is about functioning better and attracting tech plaudits. For the technology company, the smart city is a way to capture the value of data flows—either by directly monetizing behavioral insights or by using those insights to design or acquire services—and then realizing the network effects and monopoly rents that have characterized information technology platforms. -
Bibliography
Bibliography [1] M Aamir Ali, B Arief, M Emms, A van Moorsel, “Does the Online Card Payment Landscape Unwittingly Facilitate Fraud?” IEEE Security & Pri- vacy Magazine (2017) [2] M Abadi, RM Needham, “Prudent Engineering Practice for Cryptographic Protocols”, IEEE Transactions on Software Engineering v 22 no 1 (Jan 96) pp 6–15; also as DEC SRC Research Report no 125 (June 1 1994) [3] A Abbasi, HC Chen, “Visualizing Authorship for Identification”, in ISI 2006, LNCS 3975 pp 60–71 [4] H Abelson, RJ Anderson, SM Bellovin, J Benaloh, M Blaze, W Diffie, J Gilmore, PG Neumann, RL Rivest, JI Schiller, B Schneier, “The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption”, in World Wide Web Journal v 2 no 3 (Summer 1997) pp 241–257 [5] H Abelson, RJ Anderson, SM Bellovin, J Benaloh, M Blaze, W Diffie, J Gilmore, M Green, PG Neumann, RL Rivest, JI Schiller, B Schneier, M Specter, D Weizmann, “Keys Under Doormats: Mandating insecurity by requiring government access to all data and communications”, MIT CSAIL Tech Report 2015-026 (July 6, 2015); abridged version in Communications of the ACM v 58 no 10 (Oct 2015) [6] M Abrahms, “What Terrorists Really Want”,International Security v 32 no 4 (2008) pp 78–105 [7] M Abrahms, J Weiss, “Malicious Control System Cyber Security Attack Case Study – Maroochy Water Services, Australia”, ACSAC 2008 [8] A Abulafia, S Brown, S Abramovich-Bar, “A Fraudulent Case Involving Novel Ink Eradication Methods”, in Journal of Forensic Sciences v41(1996) pp 300-302 [9] DG Abraham, GM Dolan, GP Double, JV Stevens, -
Report of Findings: Joint Investigation of Clearview AI, Inc
REPORT OF FINDINGS Joint investigation of Clearview AI, Inc. by the Office of the Privacy Commissioner of Canada, the Commission d’accès à l’information du Québec, the Information and Privacy Commissioner for British Columbia, and the Information Privacy Commissioner of Alberta OPC PIPEDA-039525/CAI QC-1023158/OIPC BC P20- 81997/OIPC AB-015017 Joint Investigation by the Privacy Commissioner of Canada (OPC), the Commission d’accès à l’information du Québec (CAI), the Information and Privacy Commissioner for British Columbia (OIPC BC), and the Information and Privacy Commissioner of Alberta (OIPC AB) into Clearview AI, Inc.’s compliance with the Personal Information Protection and Electronic Documents Act (PIPEDA), the Act Respecting the Protection of Personal Information in the Private Sector, the Act to Establish a Legal Framework for Information Technology (LCCJTI), the Personal Information Protection Act (PIPA BC), and the Personal Information Protection Act (PIPA AB) Page 1 / 29 Contents Overview ..................................................................................................................................................... 3 Background ............................................................................................................................................... 5 Issues .......................................................................................................................................................... 6 Methodology ............................................................................................................................................. -
BOARD of GOVERNORS Thursday, June 29, 2017 Jorgenson Hall – JOR 1410 380 Victoria Street 4:00 P.M
BOARD OF GOVERNORS Thursday, June 29, 2017 Jorgenson Hall – JOR 1410 380 Victoria Street 4:00 p.m. to 6:00 p.m. Time Item Presenter/s Action 4:00 1. IN-CAMERA DISCUSSION (Board Members Only) 4:15 2. IN-CAMERA DISCUSSION (Executive Group Invited) END OF IN-CAMERA DISCUSSION 3. INTRODUCTION 4:40 3.1 Chair’s Remarks Janice Fukakusa Information 3.2 Approval of the June 29, 2017 Agenda Janice Fukakusa Approval 4:45 4. REPORT FROM THE PRESIDENT Mohamed Lachemi Information 4.1 Congress of the Humanities and Social Sciences 2017 Pam Sugiman Information Highlights 5:00 5. REPORT FROM THE SECRETARY Julia Shin Doi Information 5.1 Board of Governors Student Leadership Award and Julia Shin Doi Information Medal 5.2 Annual Board Assessments Julia Shin Doi Information 5:05 6. REPORT FROM THE INTERIM PROVOST AND VICE Chris Evans Information PRESIDENT ACADEMIC 6.1 Policy and Procedures Relating to Search Committees Mohamed Lachemi Approval and Appointments in the Academic Administration and Christopher Evans to the Development and Evaluation of the Performance Saeed Zolfaghari of Academic Administrators (“AAA Policy”) 7. DISCUSSION 5:25 7.1 REPORT FROM THE INTERIM VICE PRESIDENT Rivi Frankle Information UNIVERSITY ADVANCEMENT 5:30 7.2 REPORT FROM THE CHAIR OF THE AUDIT COMMITTEE Jack Cockwell Information 7.2.1 Draft Audited Financial Statements -Year Ended April 30, Joanne McKee Approval 2017 7.2.2 Safe Disclosure Policy Janice Winton Approval Scott Clarke 5:40 7.3 REPORT FROM THE CHAIR OF THE EMPLOYEE RELATIONS Mitch Frazer AND PENSION COMMITTEE 7.3.1 Audited Financial Statements of the Ryerson Retirement Christina Sass-Kortsak Approval Pension Plan (RRPP) January 1, 2017 and Audit Findings for the year ending December 31, 2016 7.3.2 Preliminary Valuation of the Ryerson Retirement Mitch Frazer Approval Pension Plan (RRPP) January 1, 2017 Christina Sass-Kortsak 7.3.3 Amendments to the Ryerson Retirement Pension Plan Christina Sass-Kortsak Approval Statement of Investment Policies & Procedures 8. -
Freedom Liberty
2013 ACCESS AND PRIVACY Office of the Information and Privacy Commissioner Ontario, Canada FREEDOM & LIBERTY As Commissioner, I feel that one of the most important parts of my mandate is to engage citizens so that the message of “respect our privacy, respect our freedoms,” can be heard loud and clear. COMMISSIONER’S MESSAGE WHEN I BEGAN MY FIRST TERM AS ONTARIO’S INFORMATION AND PRI- 2009 VACY COMMISSIONER IN 1997, I COULD In 2009, I continued to advance Privacy by NOT HAVE IMAGINED HOW MUCH THE Design on the world stage by launching The 7 WORLD WOULD BE CHANGING! Com- Foundational Principles of Privacy by Design, puters and the Internet were still largely limited which I am proud to say have now been trans- to desktops in homes and offices. Laptops were lated into 35 languages, with more to come. still unwieldy devices, and cellphones were still To ensure that Privacy by Design continued to a long way from becoming “smart.” gain strong global momentum, I also launched Today, information technology is compact, www.privacybydesign.ca as a repository of mobile, and everywhere. You cannot walk down news, information and research. the street without seeing someone using some In an entirely different area, following an exten- sort of mobile device that has more computing sive investigation, I issued a special report en- power than an office floor full of computers, just a generation ago. There is almost no aspect of titled, Excessive Background Checks Conducted our lives left that remains untouched by infor- on Prospective Jurors: A Special Investigation Re- mation and communications technology. -
20777807 Lprob 1.Pdf
Inman Harvey · Ann Cavoukian George Tomko · Don Borrett Hon Kwan · Dimitrios Hatzinakos Editors SmartData Privacy Meets Evolutionary Robotics SmartData Inman Harvey • Ann Cavoukian George Tomko • Don Borrett Hon Kwan • Dimitrios Hatzinakos Editors SmartData Privacy Meets Evolutionary Robotics Editors Inman Harvey Ann Cavoukian School of Informatics Office of the Information University of Sussex and Privacy Commissioner of Ontario Brighton, UK Toronto, ON, Canada George Tomko Don Borrett Identity, Privacy and Security Initiative Department of Medicine University of Toronto University of Toronto Toronto, ON, Canada Toronto, ON, Canada Hon Kwan Dimitrios Hatzinakos Department of Neurophysiology Electrical and Computer Engineering University of Toronto University of Toronto Toronto, ON, Canada Toronto, ON, Canada ISBN 978-1-4614-6408-2 ISBN 978-1-4614-6409-9 (eBook) DOI 10.1007/978-1-4614-6409-9 Springer New York Heidelberg Dordrecht London Library of Congress Control Number: 2013932866 # Springer Science+Business Media New York 2013 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. Exempted from this legal reservation are brief excerpts in connection with reviews or scholarly analysis or material supplied specifically for the purpose of being entered and executed on a computer system, for exclusive use by the purchaser of the work. Duplication of this publication or parts thereof is permitted only under the provisions of the Copyright Law of the Publisher’s location, in its current version, and permission for use must always be obtained from Springer. -
Privacy and the Open Networked Enterprise Privacy June, 2005 and the IT& Open Networked Enterprise CA Big Idea
Information Technology & Competitive Advantage Privacy and the Open Networked Enterprise Privacy June, 2005 June, and the IT& Open Networked Enterprise CA Big Idea by Dr. Ann Cavoukian New Paradigm October 17, 2006 Privacy and the Enterprise 2.0 by Dr. Ann Cavoukian and Don Tapscott The Story in Brief Based on the new Web—known as the Web 2.0—a new model of the corporation is emerging—call it the Enterprise 2.0. The new enterprise is highly networked and open, with high transparency, and effective use of IT to link with various stakeholders—all on a global basis. By necessity, within the Enterprise 2.0, corporate boundaries blur: in order to facilitate effective collaboration, the new enterprise compiles highly granular data from disparate sources (i.e., multiple stakeholders) to create a more holistic business intelligence. Smart firms will build appropriate and effective privacy policies and practices into their systems. In doing so, these firms can avoid potential disasters and create the conditions for trust, loyalty, long-term relationships, and economic advantage. Privacy is no longer a compliance issue; it is a business issue. It must be a business imperative. Table of Contents 1 The Context: Privacy and Technology 12 Relationships Context 4 The Web 2.0 Privacy concerns: consumer trust 5 New Boundaries, New Business Processes Possible Solutions Context 15 Information Liquidity Privacy concerns: outsourcing and offshoring Context Recommendations Privacy concerns: bad data, bad decisions 9 Modus Operandi Possible solutions Context -
The Virtual Faraday Cage
University of Calgary PRISM: University of Calgary's Digital Repository Graduate Studies The Vault: Electronic Theses and Dissertations 2013-08-09 The Virtual Faraday Cage King, James King, J. (2013). The Virtual Faraday Cage (Unpublished master's thesis). University of Calgary, Calgary, AB. doi:10.11575/PRISM/28416 http://hdl.handle.net/11023/867 master thesis University of Calgary graduate students retain copyright ownership and moral rights for their thesis. You may use this material in any way that is permitted by the Copyright Act or through licensing that has been assigned to the document. For uses that are not allowable under copyright legislation or licensing, you are required to seek permission. Downloaded from PRISM: https://prism.ucalgary.ca UNIVERSITY OF CALGARY The Virtual Faraday Cage by James King A THESIS SUBMITTED TO THE FACULTY OF GRADUATE STUDIES IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF A MASTERS OF SCIENCE DEPARTMENT OF COMPUTER SCIENCE CALGARY, ALBERTA AUGUST, 2013 c James King 2013 Abstract This thesis' primary contribution is that of a new architecture for web application plat- forms and their extensions, entitled \The Virtual Faraday Cage". This new architecture addresses some of the privacy and security related problems associated with third-party extensions running within web application platforms. A proof-of-concept showing how the Virtual Faraday Cage could be implemented is described. This new architecture aims to help solve some of the key security and privacy con- cerns for end-users in web applications by creating a mechanism by which a third-party could create an extension that works with end-user data, but which could never leak such information back to the third-party. -
Data Governance in the Digital Age a Cigi Essay Series
DATA GOVERNANCE IN THE DIGITAL AGE A CIGI ESSAY SERIES I CONTENTS Introduction Data Governance in the Digital Age . 2 Rohinton P. Medhora Rationale of a Data Strategy Considerations for Canada’s National Data Strategy . 6 Teresa Scassa The Economics of Data: Implications for the Data-driven Economy . 14 Dan Ciuriak The Government’s Role in Constructing the Data-driven Economy . 20 Blayne Haggart Canadian Network Sovereignty: A Strategy for Twenty-First-Century National Infrastructure Building . 26 Andrew Clement The Role of a Data Strategy for Canadian Industries Treasure of the Commons: Global Leadership through Health Data . 34 Sachin Aggarwal Monetizing Smart Cities: Framing the Debate . 43 Kurtis McBride Big Data: The Canadian Opportunity . 47 Ian MacGregor Balancing Privacy and Commercial Values Preventing Big Data Discrimination in Canada: Addressing Design, Consent and Sovereignty Challenges . 54 Jonathan Obar and Brenda McPhail Data and the Future of Growth: The Need for Strategic Data Policy . 63 Dan Breznitz Domestic Policy for Data Governance Ungoverned Space: How Surveillance Capitalism and AI Undermine Democracy . 70 Taylor Owen Screen Time, the Brain, Privacy and Mental Health . 75 Norman Doidge Governance Vacuums and How Code Is Becoming Law . 81 Bianca Wylie Measuring the Economy in an Increasingly Digitalized World: Are Statistics Up to the Task? . 86 André Loranger, Amanda Sinclair and James Tebrake International Policy Considerations Data Libera? Canada’s Data Strategy and the Law of the Sea . 92 Ariel Katz Data Rules in Modern Trade Agreements: Toward Reconciling an Open Internet with Privacy and Security Safeguards . 99 Michael Geist Data Minefield? How AI Is Prodding Governments to Rethink Trade in Data .