Privacy Guide for Businesses

Total Page:16

File Type:pdf, Size:1020Kb

Privacy Guide for Businesses Privacy Guide for Businesses What Canadian businesses need to know to comply with federal privacy law For more information, contact: Office of the Privacy Commissioner of Canada 30 Victoria Street, 8th floor Gatineau, QC K1A 1H3 Telephone: (819) 994-5444 Toll-free: 1-800-282-1376 TTY: (819) 994-6591 For more information visit: priv.gc.ca/business Follow us on Twitter: @privacyprivee While prepared with care to ensure accuracy and completeness, this guide has no legal status. For the official text of the law, visit our website at priv.gc.ca/business or call the Office of the Privacy Commissioner of Canada. Cat. No. IP54-94/2019E ISBN 978-0-660-32104-2 Updated September 2020 This guide deals only with Part 1 of the Act. All references to the Act in this document refer only to Part 1. Parts 2 to 5 of the Act concern the use of electronic documents and signatures as legal alternatives to original documents and signatures. For information on these, please contact the Department of Justice. Table of contents Overview .................................................................................... .2 Role of the Office of the Privacy Commissioner of Canada .......................................... 3 PIPEDA in brief ..................................................................................... 3 How the act applies ................................................................................ 4 What is personal information? ...................................................................... 5 What is not covered by PIPEDA? .................................................................... 5 Your responsibilities under PIPEDA ................................................................. 5 Fair information principles ................................................................... 6 1 Be accountable. 7 2 Identify the purpose ........................................................................... 10 3 Obtain valid, informed consent ................................................................. 12 4 Limit collection ................................................................................ 15 5 Limit use, disclosure and retention ............................................................. 16 6 Be accurate .................................................................................... 18 7 Use appropriate safeguards .................................................................... 19 8 Be open ........................................................................................ 21 9 Give individuals access ........................................................................ 23 10 Challenging compliance ....................................................................... 25 Dealing with a breach ....................................................................... 26 Real risk of significant harm ....................................................................... 27 What your breach report to the OPC should contain ............................................... 27 What your notification to affected individuals needs to contain .................................... 27 What you need to include in your own breach records ............................................ 28 Complaints to the Privacy Commissioner of Canada ........................................ 29 Complaint process ............................................................................... .30 Audits ............................................................................................ 34 Applying for a hearing to the Federal Court ................................................. 35 Canada’s anti-spam legislation and PIPEDA ................................................. 37 Advisory services for businesses ........................................................... 39 1 Overview 2 Canadians are increasingly concerned about their privacy. More and more, they are choosing to do business with organizations that are sensitive to those concerns and can demonstrate they will handle personal information with care. The Personal Information Protection and Electronic The OPC also seeks to ensure that organizations comply Documents Act (PIPEDA) is Canada’s federal private- with their privacy obligations by providing them with sector privacy law. It sets out the ground rules for how information and guidance. The Office also undertakes businesses must handle personal information in the engagement activities, which include outreach and course of commercial activities. advisory services. The Office of the Privacy Commissioner of Canada PIPEDA in brief (OPC) has prepared this guide to help organizations understand and meet their obligations under PIPEDA. There are a number of requirements to comply with the law. Organizations covered by PIPEDA must generally Role of the Office of the Privacy obtain an individual’s consent when they collect, use or Commissioner of Canada disclose that individual’s personal information. People have the right to access their personal information The OPC’s mission is to protect and promote held by an organization. They also have the right to privacy rights. As an Agent of Parliament, the challenge its accuracy. Privacy Commissioner reports directly to the House of Commons and the Senate of Canada. This Personal information can only be used for the purposes independence helps ensure the Commissioner is for which it was collected. If an organization is going to impartial in exercising the role of ombudsman for use it for another purpose, it must obtain consent again. privacy issues. Personal information must be protected by appropriate safeguards. The OPC oversees compliance with PIPEDA by conducting independent and impartial investigations and/or audits into the personal information handling practices of businesses. 3 Information that crosses borders All businesses that operate in Canada and handle personal information that crosses provincial or national borders in the course of commercial activities are subject to PIPEDA, regardless of the province or territory in which they are based (including provinces with substantially similar legislation). How the act applies Federally regulated organizations PIPEDA applies to private-sector organizations Federally regulated organizations that conduct business across Canada that collect, use or disclose personal in Canada are always subject to PIPEDA. The Act also information in the course of a commercial activity. applies to their employees’ personal information. The law defines a commercial activity as any particular These organizations include: transaction, act, or conduct, or any regular course of conduct that is of a commercial character, including the ■ airports, aircraft and airlines; selling, bartering or leasing of donor, membership or ■ banks and authorized foreign banks; other fundraising lists. ■ inter-provincial or international transportation companies; Provincial privacy laws ■ telecommunications companies; ■ offshore drilling operations; and Alberta, British Columbia and Quebec have their own ■ radio and television broadcasters. private-sector privacy laws that have been deemed substantially similar to PIPEDA. Organizations subject Note: Organizations in the Northwest Territories, to a substantially similar provincial privacy law are Yukon and Nunavut are considered federally regulated, generally exempt from PIPEDA with respect to the and are therefore also covered by PIPEDA. collection, use or disclosure of personal information that occurs within that province. Ontario, New Brunswick, Nova Scotia and Newfoundland and Labrador have also adopted substantially similar legislation regarding the collection, use and disclosure of personal health information. 4 What is personal information? Unless they are engaging in commercial activities that are not central to their mandate and involve personal Under PIPEDA, personal information includes information, PIPEDA does not generally apply to: any factual or subjective information, recorded or not, about an identifiable individual. This includes ■ not-for-profit and charity groups; or information in any form, such as: ■ political parties and associations. ■ age, name, ID numbers, income, ethnic origin, or Municipalities, universities, schools, and hospitals are blood type; generally covered by provincial laws. PIPEDA may ■ opinions, evaluations, comments, social status, or apply in certain situations. disciplinary actions; and ■ employee files, credit records, loan records, medical Your responsibilities records, existence of a dispute between a consumer under PIPEDA and a merchant, intentions (for example, to acquire goods or services, or change jobs). Businesses must follow the 10 fair information principles to protect personal information, which are What is not covered by PIPEDA? set out in Schedule 1 of PIPEDA. There are some instances where PIPEDA does not By following these principles, you will contribute apply. Some examples include: to building trust in your business and in the digital economy. ■ personal information handled by federal government organizations listed under the Privacy Act; The principles are: ■ provincial or territorial governments and their agents; ■ business contact information such as an employee’s 1. Accountability name, title, business address, telephone number or 2. Identifying purposes email address that is collected, used or disclosed 3. Consent solely for the purpose of communicating with that 4. Limiting collection person in relation to their employment or
Recommended publications
  • Statement of Agency Organization and Operation to Any Person Upon Request
    STATEMENT OF AGENCY’S ORGANIZATION AND OPERATION Mission Statement The mission of the Florida Department of Agriculture and Consumer Services is to safeguard the public and support Florida's agricultural economy by: • Ensuring the safety and wholesomeness of food and other consumer products through inspection and testing programs; • Protecting consumers from unfair and deceptive business practices and providing consumer information; • Assisting Florida's farmers and agricultural industries with the production and promotion of agricultural products; and • Conserving and protecting the state's agricultural and natural resources by reducing wildfires, promoting environmentally safe agricultural practices, and managing public lands. Commissioner of Agriculture The head of the department carries the title of Commissioner of Agriculture. This is a statewide elected office with a term of four years. The duties and responsibilities of the Commissioner as department head are provided in Chapter 570, Florida Statutes. The Commissioner may delegate the exercise or discharge of any power, duty, or function as provided therein, such authority for delegation being broad in scope. The Commissioner also serves Florida as a member of the state Cabinet. The duties and responsibilities of the Commissioner as Cabinet officer are provided in Chapter 19 of the Florida Statutes, and as department head in Chapter 570, Florida Statutes. Assistant Commissioner of Agriculture/Chief of Staff The Assistant Commissioner of Agriculture/Chief of Staff directs the overall daily operation of the department. This office is responsible for setting major legislative and administrative policy direction, overseeing development of agency strategic priorities and appropriate goals and objectives, and providing direction within all administrative guidelines for operating divisions are prepared and enforced.
    [Show full text]
  • Protecting Privacy Under the Fourth Amendment
    Protecting Privacy Under the Fourth Amendment The Fourth Amendment' has explicitly been held to protect personal privacy2 since at least the mid-nineteenth century.3 Experts in many fields, including law, psychology, philosophy and sociology, believe that privacy is vitally important to all human beings,' and the Supreme Court has 1. The Fourth Amendment provides that: The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized. U.S. CONST. amend. IV. Under the Fourteenth Amendment, the states must comply with the provisions of the Fourth Amendment. Mapp v. Ohio, 367 U.S. 643, 655 (1961). 2. As a constitutional concept, privacy is an elusive yet fundamental value. Although the word "privacy" does not appear in the Constitution, the Supreme Court has recognized a constitutional right to privacy based upon provisions of the First, Third, Fourth, Fifth, and Ninth Amendments and their respective "penumbras." Griswold v. Connecticut, 381 U.S. 479, 484-85 (1965); cf Beaney, The ConstitutionalRight to Privacy in the Supreme Court, 1962 SUP. CT. REV. 212, 215 ("The nearest thing to an explicit recognition of a right to privacy in the Constitution is contained in the Fourth Amendment".) This right to privacy is a "fundamental personal right, emanting 'from the totality of the constitutional scheme.' " Griswold v. Connecticut, 381 U.S. 479, 494 (1965) (Goldberg, J., con- curring) (quoting Poe v.
    [Show full text]
  • The Governor Genera. and the Head of State Functions
    The Governor Genera. and the Head of State Functions THOMAS FRANCK* Lincoln, Nebraska In most, though by no means all democratic states,' the "Head o£ State" is a convenient legal and political fiction the purpose of which is to personify the complex political functions of govern- ment. What distinguishes the operations of this fiction in Canada is the fact that the functions of head of state are not discharged by any one person. Some, by legislative enactment, are vested in the Governor General. Others are delegated to the Governor General by the Crown. Still others are exercised by the Queen in person. A survey of these functions will reveal, however, that many more of the duties of the Canadian head of state are to-day dis- charged by the Governor General than are performed by the Queen. Indeed, it will reveal that some of the functions cannot be dis- charged by anyone else. It is essential that we become aware of this development in Canadian constitutional practice and take legal cognizance of the consequently increasing stature and importance of the Queen's representative in Canada. Formal Vesting of Head of State Functions in Constitutional Governments ofthe Commonnealth Reahns In most of the realms of the Commonwealth, the basic constitut- ional documents formally vest executive power in the Queen. Section 9 of the British North America Act, 1867,2 states: "The Executive Government and authority of and over Canada is hereby declared to continue and be vested in the Queen", while section 17 establishes that "There shall be one Parliament for Canada, consist- ing of the Queen, an Upper House, styled the Senate, and the *Thomas Franck, B.A., LL.B.
    [Show full text]
  • The Commonwealth of Nations Today: Historical Anachronism Or Focus for Universal Values?
    2462 THE COMMONWEALTH OF NATIONS TODAY: HISTORICAL ANACHRONISM OR FOCUS FOR UNIVERSAL VALUES? Doughty Street Lecture 2010. Doughty Street Chambers, London The Royal Commonwealth Society, London 1 June 2010 The Hon. Michael Kirby AC CMG DOUGHTY STREET CHAMBERS, LONDON DOUGHTY STREET LECTURE 2010 THE ROYAL COMMONWEALTH SOCIETY LONDON, 1 JUNE 2010 THE COMMONWEALTH OF NATIONS TODAY: HISTORICAL ANACHRONISM OR FOCUS FOR UNIVERSAL VALUES? The Hon. Michael Kirby AC CMG INTRODUCTION The British Empire, precursor to the Commonwealth of Nations, grew out of decisions, most of them made in London. It is a city that never ceases to surprise the visitor. Walking yesterday through Leicester Square, I came upon a landmark that I had never previously noticed. In the centre of that public space, circling a statue, is a series of indicators, pointing in the directions of the countries of the Commonwealth. The pointers occupy every segment of the circle, indicating that members of this unique family of nations, and their people, can be found in every corner of our world. I am a member of the last generation that grew up in the era of the British Empire. In my school days in Australia, every 24 May was celebrated as Empire Day. In 1954, at my high school in Sydney, I Justice of the High Court of Australia (1996-2009); President of the Court of Appeal of Solomon Islands (1995-6); Independent Co-chairman of the Malawi Constitutional Conference (1994); member of the ILO Mission to South Africa (1991-2). After this lecture was given, it was announced that Michael Kirby was appointed to the Eminent Persons Group on the future organisation of the Commonwealth of Nations.
    [Show full text]
  • Privacy in the Employment Relationship, Practical Law Practice Note 6-517-3422 (2017)
    Privacy in the Employment Relationship, Practical Law Practice Note 6-517-3422 (2017) Privacy in the Employment Relationship by Thomas H. Wilson, Vinson & Elkins LLP and Corey Devine with Practical Law Labor & Employment Maintained • USA (National/Federal) This Practice Note provides an overview of privacy issues in employment, which may arise in various contexts, such as background checks, drug testing, email and other electronic surveillance and tracking by GPS. Invasion of privacy claims are highly fact-intensive and largely dependent on state law. This Note contains information that is general and not jurisdiction-specific. Contents Overview of Privacy Laws Background Checks Background Checks Conducted Internally by the Employer Background Checks Conducted Externally by a Third Party Employment Testing of Applicants or Employees Drug Testing Polygraph Tests HIV or AIDS Tests Medical and Physical Examinations Other Types of Testing Employee Personnel Records Employee Medical Records Sensitive Personally Identifiable Information Employee Electronic Communications Monitoring of Emails and Internet Usage Requiring Disclosure of Electronic Account Access Information Monitoring of Telephone Calls Video Surveillance of Employee Behavior on the Job Searching Employee Surroundings on the Job No Expectation of Privacy in Common Areas Employer Limits © 2017 Thomson Reuters. No claim to original U.S. Government Works. 1 Privacy in the Employment Relationship, Practical Law Practice Note 6-517-3422 (2017) Employees' Lawful, Off-Duty Activities Tracking Employee Movements by GPS Privacy Concerns Consent and Notice Other Considerations Monitoring and Employee Rights Under the National Labor Relations Act Information about Employees Relevant to Health and Safety This Note provides a general overview of the key legal principles involved in employee privacy in the private employment context.
    [Show full text]
  • INTRUSIVE MONITORING: EMPLOYEE PRIVACY EXPECTATIONS ARE REASONABLE in EUROPE, DESTROYED in the UNITED STATES Lothar Determannt & Robert Spragueu
    INTRUSIVE MONITORING: EMPLOYEE PRIVACY EXPECTATIONS ARE REASONABLE IN EUROPE, DESTROYED IN THE UNITED STATES Lothar Determannt & Robert SpragueU TABLE OF CONTENTS I. INTRODUCTION ................. ...................... 980 II. EMPLOYER MONITORING AND EMPLOYEE PRIVACY-U.S. PERSPECTIVE ............................ 981 A. WORK-RELATED EMPLOYER MONITORING........................................981 B. WORK-RELATED EMPLOYEE PRIVACY ................ ....... 986 1. Work-Related Rights to Privag Under the Constitution.....................986 2. Work-Related Rights to Privag Under the Common Law..................990 3. Statutog Rjghts to Privag................................. 993 a) The Electronic Communications Privacy Act ............... 995 C. INTRUSIVE WORKPLACE MONITORING AND EMPLOYEE PRIVACY................................................ 1001 1. Employer Access to PersonalWeb-Based Applications..................... 1007 2. Webcams ...................................... 1009 3. GPS ..................................... 1012 D. WORKPLACE PRIVACY TRENDS IN THE UNITED STATES............... 1016 III. EMPLOYER MONITORING AND EMPLOYEE PRIVACY-EUROPEAN PERSPECTIVE .. ................... 1018 A. LAWS IN EUROPE-OVERVIEW ................ ............. 1019 B. CIVIL RIGHTS PROTECTIONS FOR PRIVACY AT THE EUROPEAN LEVEL............................. .......... 1019 ( 2011 Lothar Determann & Robert Sprague. t Dr. iur habil, Privatdozent, Freie Universitat Berlin; Adjunct Professor, University of California, Berkeley School of Law and Hastings College
    [Show full text]
  • Mr. Bruno Gencarelli Head of Unit for International Data Flows and Protection European Commission [email protected]
    Mr. Bruno Gencarelli Head of Unit for International Data Flows and Protection European Commission [email protected] 26 July 2019 Re: Access Now Responds to Privacy Shield Review Questionnaire - Third review Dear Mr. Gencarelli, Thank you for your invitation to provide information and observations on the European Commission’s third annual review of the EU-U.S. Privacy Shield arrangement, the mechanism to facilitate the transfer and processing of the personal data of individuals from the European Union to and within the United States. Access Now is an international organisation that defends and extends the digital rights of users at risk around the world.1 By combining innovative policy, user engagement, and direct technical support, we fight for open and secure communications for all. Access Now maintains a presence in 13 locations around the world, including in the policy centers of Washington, DC and Brussels.2 Access Now regularly analyzes data transfer arrangements under EU law, including the Safe Harbor arrangement that was invalidated by the Court of Justice of the European Union in 2015, and the Privacy Shield which replaced it.3 Users benefit from a free, open, and secure internet that is enabled by legal certainty for stakeholders to operate. Robust data transfer frameworks which ensure a high level of data protection in the free flow of data are key to deliver these benefits for all actors. The Privacy Shield continues to be inadequate to protect fundamental rights. Since negotiations began in 2016, Access Now has provided detailed analysis and recommendations to the EU Commission on how to improve the Privacy Shield.
    [Show full text]
  • Reasonable Expectations of Privacy and Novel Search Technologies: an Economic Approach Steven Penney
    Journal of Criminal Law and Criminology Volume 97 Article 3 Issue 2 Winter Winter 2007 Reasonable Expectations of Privacy and Novel Search Technologies: An Economic Approach Steven Penney Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc Part of the Criminal Law Commons, Criminology Commons, and the Criminology and Criminal Justice Commons Recommended Citation Steven Penney, Reasonable Expectations of Privacy and Novel Search Technologies: An Economic Approach, 97 J. Crim. L. & Criminology 477 (2006-2007) This Symposium is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Journal of Criminal Law and Criminology by an authorized editor of Northwestern University School of Law Scholarly Commons. 0091-4169/07/9702-0477 THEJOURNAL OF CRIMINAL LAW & CRIMINOLOGY Vol. 97, No. 2 Copyright © 2007 by NorthwesternUniversity, Schoolof Law Printed in U.S.A. REASONABLE EXPECTATIONS OF PRIVACY AND NOVEL SEARCH TECHNOLOGIES: AN ECONOMIC APPROACH STEVEN PENNEY* The "reasonable expectation of privacy" test, which defines the scope of constitutionalprotection from governmental privacy intrusions in both the United States and Canada, is notoriously indeterminate. This indeterminacy stems in large measure from the tendency ofjudges to think ofprivacy in non-instrumentalistterms. This "moral" approach to privacy is normatively questionable, and it does a poor job of identifying the circumstances in which privacy should prevail over countervailing interests, such as the deterrence of crime. In this Article, I develop an alternative,economically-informed approach to the reasonable expectation of privacy test. In contrast to the moral approach, which treatsprivacy as a fundamental right, the economic approach views it as an (normatively neutral) aspect of self-interest: the desire to conceal and control potentially damagingpersonal information.
    [Show full text]
  • The Value of Privacy Federalism by Paul M
    09/24/14 (consolidated 3) The Value of Privacy Federalism By Paul M. Schwartz I. Introduction The United States features a dual system of federal and state sectoral law. In the absence of an omnibus privacy statute, the key question is how these laws interact with each other. When Congress enacts privacy law, it generally allows the states space for further action. The federal lawmaker typically does so through laws that set only a floor, that is, a minimum of safeguards, but that allow the states to exceed their privacy protections. This model has involved a wide range of institutional actors in the regulation of privacy. State legislatures and courts interpret state laws. Congress acts to preempt state law in enacting sectoral legislation, as needed, and federal judges interpret state legislation, including subsequent amendments to existing state law or new laws, to decide if they conflict with federal law. This existing U.S model is under pressure, however, because the federal government is largely inactive. The risk is that a new generation of state privacy legislation, such as breach notification laws, will not be consolidated and improved through the federal legislative process. Gridlock in Washington, D.C. has suspended the normal process of privacy federalism. In the European Union, the situation is different. At present, the Data Protection Directive requires Member States to enact legislation that is “harmonized” around its rules for information privacy. In the resulting legal system, the focus remains on the Member States, which are left with a “margin for maneuver” that permits national differences in the resulting statutes.
    [Show full text]
  • Right of Privacy and Rights of the Personality
    AGTA Instituti Upsaliensis Iurisprudentiae Gomparativae VIII RIGHT OF PRIVACY AND RIGHTS OF THE PERSONALITY A COMPARATIVE SURVEY Working paper prepared for the Nordic Conferen.ee on privacy organized by the International Commission of Jurists, Stockholm M ay 1967 BY STIG STRÜMHOLM STOCKHOLM P. A. NORSTEDT & SÜNERS FÜRLAG ACTA Institut! Upsaliensis Iurisprudentiae Oomparativae AGTA Instituti Upsaliensis Iurisprudentiae Comjmrativae Edidit ÂKE MALMSTROM VIII RIGHT OF PRIVACY AND RIGHTS OF THE PERSONALITY A COMPARATIVE SURVEY (Working Paper prepared for the Nordic Conférence on Privacy organized by the International Commission of Jurists, Stockholm May 1967) By STIG STRÜMHOLM S T O C K H O L M P. A. N O RSTEDT & S ONE R S FÜRLAG © P. A. Norstedt & Sôners fôrlag 1967 Boktryckeri AB Thule, Stockholm 1967 PREFACE One of the author’s most eminent teachers in private law in the Uppsala Faculty of Law once claimed that an action in tort ought to lie against those légal writers who take up a subject to treat it broadly enough to deter others from writing about it but not deeply enough to give any final answers to the questions discussed. Were the law so severe, the present author would undoubtedly have to face a lawsuit for venturing to publish this short study on a topic which demands lengthy and careful considération on almost every point and which has already given rise to an extensive body of case law and of légal writing. This préfacé can be considered as the au­ thor’s plaidoyer in that action, fortunately imaginary. The present study was prepared at the request, and with the most active personal and material support, of the International Commis­ sion of Jurists as a working paper for the Nordic Conférence of Jurists, organized by the Commission in Stockholm in May, 1967.
    [Show full text]
  • The Privacy, Data Protection and Cybersecurity Law Review
    The Privacy, Data Protection and Cybersecurity Law Review Editor Alan Charles Raul Law Business Research The Privacy, Data Protection and Cybersecurity Law Review The Privacy, Data Protection and Cybersecurity Law Review Reproduced with permission from Law Business Research Ltd. This article was first published in The Privacy, Data Protection and Cybersecurity Law Review - Edition 1 (published in November 2014 – editor Alan Charles Raul). For further information please email [email protected] The Privacy, Data Protection and Cybersecurity Law Review Editor Alan Charles Raul Law Business Research Ltd THE LAW REVIEWS THE MERGERS AND ACQUISITIONS REVIEW THE RESTRUCTURING REVIEW THE PRIVATE COMPETITION ENFORCEMENT REVIEW THE DISPUTE RESOLUTION REVIEW THE EMPLOYMENT LAW REVIEW THE PUBLIC COMPETITION ENFORCEMENT REVIEW THE BANKING REGULATION REVIEW THE INTERNATIONAL ARBITRATION REVIEW THE MERGER CONTROL REVIEW THE TECHNOLOGY, MEDIA AND TELECOMMUNICATIONS REVIEW THE INWARD INVESTMENT AND INTERNATIONAL TAXATION REVIEW THE CORPORATE GOVERNANCE REVIEW THE CORPORATE IMMIGRATION REVIEW THE INTERNATIONAL INVESTIGATIONS REVIEW THE PROJECTS AND CONSTRUCTION REVIEW THE INTERNATIONAL CAPITAL MARKETS REVIEW THE REAL ESTATE LAW REVIEW THE PRIVATE EQUITY REVIEW THE ENERGY REGULATION AND MARKETS REVIEW THE INTELLECTUAL PROPERTY REVIEW THE ASSET MANAGEMENT REVIEW THE PRIVATE WEALTH AND PRIVATE CLIENT REVIEW THE MINING LAW REVIEW THE EXECUTIVE REMUNERATION REVIEW THE ANTI-BRIBERY AND ANTI-CORRUPTION REVIEW THE CARTELS AND LENIENCY REVIEW THE TAX DISPUTES
    [Show full text]
  • 2015 International Compendium of Data Privacy Laws COUNTRY by REGION Australia Australia
    2015 International Compendium of Data Privacy Laws COUNTRY BY REGION Australia Australia................................................................................................................................. 6 Central Asia China (People’s Republic) .................................................................................................. 37 Hong Kong........................................................................................................................... 78 India..................................................................................................................................... 88 Japan................................................................................................................................. 106 South Korea....................................................................................................................... 149 Taiwan............................................................................................................................... 157 Central America Bahamas ............................................................................................................................. 16 Costa Rica........................................................................................................................... 43 Trinidad and Tobago.......................................................................................................... 160 Europe Austria ................................................................................................................................
    [Show full text]