Privacy Legislation and Standards in Canada The Demand for Privacy Alec Campbell, Principal Excela Associates Inc. Distinguished Associate, Bell PCE

Slides:



Advertisements
Similar presentations
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
Advertisements

Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Red Flag Rules: What they are? & What you need to do
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
HIPAA Regulations What do you need to know?.
Sept Topics of interest & risk in our industry today Christine Scaini Compliance Consultant Market Conduct Compliance.
The Financial Modernization Act of 1999, also known as the Gramm-Leach-Bliley Act (GLBA) UNDERSTANDING AND DEVELOPING A STRATEGIC PLAN TO BECOME COMPLIANT.
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
IDENTITY THEFT & THE RED FLAGS RULE Presented by Brady Keith, Assistant General Counsel CREDIT MANAGEMENT SERVICES, INC.
Data Incident Notification Policies and Procedures Tracy Mitrano Steve Schuster.
Mark S. Hayes – Blake, Cassels & Graydon LLP Privacy and Security – Some Observations Mark S. Hayes, Blake, Cassels & Graydon LLP 7th CACR Privacy and.
Data Classification & Privacy Inventory Workshop
Environmental Management Systems An Overview With Practical Applications.
Information Security Policies Larry Conrad September 29, 2009.
Security Controls – What Works
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
The Australian/New Zealand Standard on Risk Management
IT Security Challenges In Higher Education Steve Schuster Cornell University.
Session 3 – Information Security Policies
Information Commissioner’s Office: data protection Judith Jones Senior Policy Officer Strategic Liaison – public security 16 November 2011.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Ferst Center Incident Incident Identification – Border Intrusion Detection System Incident Response – Campus Executive Incident Response Team Incident.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Obtaining, Storing and Using Confidential Data October 2, 2014 Georgia Department of Audits and Accounts.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
1 Privacy Impact Assessment ARMA Workshop April 5, 2006 Alec Campbell.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Evolving IT Framework Standards (Compliance and IT)
Ship Recycling Facility Management System IMO Guideline A.962
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
HIPAA PRIVACY AND SECURITY AWARENESS.
Understanding the Fair and Accurate Credit Transaction Act, the “Red Flag” Regulations, and their impact on Health Care Providers Raising a “Red Flag”
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Track II: Introduction and Overview of Financial Services and Information Technology Privacy Policy: Synthesizing Financial Services Industry Privacy David.
FTC RED FLAG RULE As many as nine million Americans have their identities stolen each year. Identity thieves may drain their accounts, damage their credit,
Confidentiality and Security Issues in ART & MTCT Clinical Monitoring Systems Meade Morgan and Xen Santas Informatics Team Surveillance and Infrastructure.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
Privacy and Security Risks to Rural Hospitals John Hoyt, Partner December 6, 2013.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
UNEP Training Resource ManualTopic 2 Slide 1 The EIA process The EIA process comprises:  screening - to decide if and at what level EIA should be applied.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Policies for Information Sharing April 10, 2006 Mark Frisse, MD, MBA, MSc Marcy Wilder, JD Janlori Goldman, JD Joseph Heyman, MD.
Working with HIT Systems
FIRMA April 2010 DATA BREACHES & PRIVACY Christine M. Farquhar Managing Director, Compliance J.P. Morgan U.S. Private Banking.
Public Works and Government Services Canada Travaux publics et Services gouvernementaux Canada Brenda Watkins Director Policy and Business Strategies Information.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
Fred Carter Senior Policy & Technology Advisor Information and Privacy Commissioner Ontario, Canada MISA Ontario Cloud Computing Transformation Workshop.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Prevention of Identity Theft. Why now, Why us? Federal Trade Commission (FTC) regulations for Identity Theft which may not apply, but it is good business.
Organizing a Privacy Program: Administrative Infrastructure and Reporting Relationships Presented by: Samuel P. Jenkins, Director Defense Privacy Office.
1 Information Governance (For Dental Practices) Norman Pottinger Information Governance Manager NHS Suffolk.
Privacy and Personal Information. WHAT YOU WILL LEARN: What personal information is. General guidelines for the collection of personal information. Your.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
HHS Security and Improvement Recommendations Insert Name CSIA 412 Final Project Final Project.
Incorporating Privacy Into Systems Development Methodology Phil Moleski Director Corporate Information Technology Branch Saskatchewan Health
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
Security Standard: “reasonable security”
Tax Identity Theft Presenter Date
Red Flags Rule An Introduction County College of Morris
DATA BREACHES & PRIVACY Christine M
Mandatory Breach Reporting (isn’t *that* bad)
HIPAA Security Standards Final Rule
THE 13TH NATIONAL HIPAA SUMMIT HEALTH INFORMATION PRIVACY & SECURITY IN SHARED HEALTH RECORD SYSTEMS SEPTEMBER 26, 2006 Paul T. Smith, Esq. Partner,
Introduction to the PACS Security
Getting the Green Light on the Red Flags Rule
Presentation transcript:

Privacy Legislation and Standards in Canada The Demand for Privacy Alec Campbell, Principal Excela Associates Inc. Distinguished Associate, Bell PCE

Compliance Requirements 24 privacy laws in Canada today  15 provincial/territorial public sector laws (incl 2 municipal in SK & ON)  1 federal public sector law (Privacy Act)  1 federal private sector law (PIPEDA)  3 provincial private sector laws (BC, AB, QC)  4 provincial healthcare sector laws (AB, SK, MB, ON)

Trust requirements Epidemic of breaches  SK - ISM data tapes with insurance data  GoC - CRA laptops with taxation data  GoC - HRDC data matching with almost everything  BC - surplus sales with social services data  AB – employee security clearances with personal financial info  ON & AB – various personal health information  ON – federal PC’s personal phone records  Massive US breaches – credit card information, travel details, correspondence, aggregated PI, others

Trust requirements Epidemic of breaches – Just the first trimester of 2006  Jan 1: “Car thief walked away with the medical records of 365,000 patients across Oregon and Washington.”  Jan 27: “ChoicePoint Hit With Record $15 Million FTC Penalty”  Jan 27: “Medical records stolen from courier in Langley BC”  Mar 8: “BC Minister offers plan to address health-data ‘screw-up’”  Mar 9: “Edmonton police rapped for improper CPIC use”  Mar 9: “Hacker hits B.C. government computers”  Mar 13: “Another mess for CIBC: Confidential papers sent to wrong firm”  Mar 27: “4,000 BC Hydro employees info at risk after B&E”  Apr 10: “Tax agency mailed personal data to wrong addresses”  Apr 10: “Personal data stolen from Bank of Canada CSB accounts” Winners/HomeSense: 47.5 million credit card numbers stolen in database breach.

Trust requirements E-services initiatives threatened by privacy and security concerns Identity theft a major issue  According to the FTC, ID theft cost American consumers $5bn and businesses $48bn in 2005 Identification and authentication are critical  Biometrics  Electronic signature standards Post-911  Communications monitoring  Surveillance

Risk Management Requirements Identify the risks associated with privacy breaches and failures  Legal liability, loss of stakeholder trust, loss of political credibility, financial costs  Privacy impact assessments Mitigate the risks identified  Minimize the likelihood of occurrence  Minimize the severity of the impacts  Maximize learning from occurrences

Management Issues Security  Privacy ≠ Security, Security > Privacy  Some security measures are not compatible with privacy  Security and privacy should be addressed in tandem, especially as they relate to information management  Like privacy, security is a risk management issue – you can reduce security risks but you cannot eliminate them  Security requires regular reviews and audits

Management Issues Information technology  ‘Privacy by design’: privacy is a design consideration, not an obstacle Privacy architecture and technical standards  Privacy must be built in at the start Retrofitting privacy measures to existing IT applications can be very expensive Often need a PIA to identify privacy issues and approaches  Must have adequate security to support privacy, but security ≠ privacy  Privacy enhancing technology

Management Issues Incident Response  A weakness in most organizations  Poor incident response increases severity of incident & consequences  Must ensure that decisions are made quickly, by the right people  Slow incident response & notification can be a problem with contractors and outsourcers  When and how do you notify victims of breaches?

Selected Strategic Issues E-services  Policy, standards to generate & maintain trust in electronic services involving personal information PIA policy  Should have clear, explicit requirements for PIAs  PIA is heart of the privacy risk assessment process Privacy architecture and technical standards  Critical element of IT privacy strategy, but often overlooked  Link security and privacy standards

Selected Strategic Issues Privacy enhancing technologies  In their infancy, but show great potential Search encrypted database without decryption Automatically anonymize a dataset to the minimum extent necessary Locally authenticate biometric identifiers Incident response procedures  Most organizations have poor privacy incident response, which exacerbates the severity of the incident  Learn from the security field Incident notice requirements  Increasing pressure to notify victims of privacy breaches  Over 30 state laws proposed in US

Elements of a Strategic Framework Legislation  Comprehensive, up to date, practical Policy  Rules should be mandatory but general  Commitment to legislative requirements should be explicit  Specifies accountability Standards  Mandatory specifications for technical issues, like database design, user authentication, security, file management, QA procedures, etc.  Use national or international standards where possible

Elements of a Strategic Framework Guidelines  Non-mandatory best practices  Should be as detailed as necessary  Allow flexibility to accommodate circumstances  Best at the procedural level Training and Awareness  Awareness programs critical for everyone, but especially for senior management and front-line workers  Specialized training for privacy coordinators and managers of sensitive programs

Selected Strategic Issues 1/2 E-services  Policy, standards to generate & maintain trust in electronic services involving personal information PIA policy  Should have clear, explicit requirements for PIAs  PIA is heart of the privacy risk assessment process Privacy architecture and technical standards  Critical element of IT privacy strategy, but often overlooked  Link security and privacy standards

Selected Strategic Issues 2/2 Privacy enhancing technologies  In their infancy, but show great potential Search encrypted database without decryption Automatically anonymize a dataset to the minimum extent necessary Locally authenticate biometric identifiers Incident response procedures  Most organizations have poor privacy incident response, which exacerbates the severity of the incident  Learn from the security field Incident notice requirements  Increasing pressure to notify victims of privacy breaches  Over 30 state laws proposed in US

Summary Compliance and trust requirements have made privacy a major public policy issue today Privacy by risk management:  assessment and mitigation Elements of privacy strategy:  Legislation  Policy  Standards  Guidelines  Training and awareness Selected strategic issues:  E-services  PIA policy  Privacy architecture & stds  Privacy enhancing technologies  Incident response procedures  Incident notice requirements

17 Privacy Impact Assessments What is a PIA?  A formal assessment of the privacy implications associated with a given project, initiative, or collection of records, usually in reference to applicable legislation or policy.

18 Privacy Impact Assessments PIAs have become a critical tool in privacy management  PIAs are proactive, not reactive  Well-suited to risk management  Provide evidence of due diligence Inspired by the environmental impact assessment Formal PIA processes have taken some time to develop, and there is still no widespread standard

19 Issues in PIA Planning and Preparation Why do it?  Due diligence If you have a privacy complaint later, having done a PIA will demonstrate efforts to protect privacy  Risk management PIA will identify potential privacy risks before they materialize, allowing you to take measures to prevent problems Risks: IPC inquiry costs, loss of stakeholder trust, bad publicity, cost of retroactive privacy measures, legal costs, etc.  Cost containment A PIA will often cost less than a privacy breach resulting from a failure to do the PIA.

20 Issues in PIA Planning and Preparation Who should do it?  Those who will be responsible for the project or initiative after it is up and running – they have to know the privacy issues  Involve all responsible business areas - actively  If it’s an IT project, make sure both IT and the business area are involved – not just the development team  If project is complex or it’s your first PIA, bring in a consultant – but you should not need a consultant for every PIA.  PIA findings should be approved by the senior manager responsible for the project

21 Issues in PIA Planning and Preparation When to do it?  As early in project planning as possible Need to know PI data elements and flows to complete  For IT projects, make it part of the system design phase  For administrative and management projects, do PIA after process design but before implementation  Need for PIA, or lack thereof, should be part of the project proposal or business case.