Tag: Technology And Security

Found 38 results


Reference Check: Is Your Boss Watching? The New World of Social Media: Privacy and Your Facebook Profile

Social networking websites such as Facebook are now so popular that they are being used by employers to screen prospects. Information you post on your profile for the amusement of you and your friends may, therefore, be viewed in a different light. This short paper cautions users of these sites a...

Date: Oct 24 2007   Type: Resource   Access: Both

Download

Guidance on the Use of Automated Licence Plate Recognition Systems by Police Services

This guidance document outlines the key obligations of police under privacy legislation in their use of ALPR systems and provides guidance, including best practices, on using these systems in a privacy-protective manner.  It addresses the use of ALPR systems for public safety purposes, in parti...

Date: Jul 04 2017   Type: Resource   Access: Both

Download

The Relevance of Untraceable Biometrics and Biometric Encryption: A Discussion of Biometrics for Authentication Purposes

Commissioner Cavoukian and Max Snijder, CEO, European Biometrics Forum co-authored this vision paper that discusses the need for secure storage and privacy protection for biometric reference data. Their discussion is meant to touch on the distinguishing features of the algorithmic process defined...

Date: Jul 15 2009   Type: Resource   Access: Both

Download

IPC letter to FTC regarding proposed self-regulatory principles for online behavioural advertising

The Commissioner was asked to provide feedback on the U.S. Federal Trade Commission’s proposed self-regulatory principles for online behavioural advertising.

Date: Feb 15 2008   Type: Resource   Access: Both

Download

Biometric Encryption Chapter from the Encyclopedia of Biometrics

The following is a chapter on Biometric Encryption excerpted from the Springer Encyclopedia of Biometrics.

Date: Dec 24 2009   Type: Resource   Access: Both

Download

Privacy Risk Management: Building privacy protection into a Risk Management Framework to ensure that privacy risks are managed, by default

The idea that privacy – an individual’s right to control the collection, use and disclosure of information about him or herself – may present risk, seems to be a new one to many. That it should be a novel concept to those responsible for managing risk, however, needs to be addressed. Person...

Date: Apr 28 2010   Type: Resource   Access: Both

Download

Technology Fact Sheet – Protecting Against Ransomware

This Fact Sheet from the IPC discusses how ransomware has become an increasingly dangerous threat to the security of electronic records and provides guidance on how public institutions and healthcare organizations can protect themselves against it.

Date: Jul 15 2016   Type: Resource   Access: Both

Download

Fact Sheet #16 – Health-Care Requirement for Strong Encryption

The Office of the Information and Privacy Commissioner, in Order HO-004 and Order HO-007, required that health information be safeguarded at all times, specifically by ensuring that any personal health information stored on any mobile devices (e.g., laptops, memory sticks, PDAs) be strongly encry...

Date: Jul 16 2010   Type: Resource   Access: Both

Download

Letter to RIM regarding BlackBerry users’ encrypted data

Date: Aug 18 2010   Type: Resource   Access: Both

Download

Privacy-Protective Facial Recognition: Biometric Encryption Proof of Concept

A Research Report on the use of Biometric Encryption to Limit “Self-Excluded” Problem Gambler Access to Gaming Venue.

Date: Nov 12 2010   Type: Resource   Access: Both

Download

Submission of the Information & Privacy Commissioner, Ontario, Canada – Response to the FTC Framework for Protecting Consumer Privacy in an Era of Rapid Change

Submission in response to the Federal Trade Commission’s December 2010 preliminary staff report Framework for Protecting Consumer Privacy in an Era of Rapid Change.

Date: Jan 21 2011   Type: Resource   Access: Both

Download

Disposing of Your Electronic Media

This fact sheet provides guidance on how Ontario public institutions and health information custodians can securely destroy personal information when disposing of electronic media.

Date: Mar 06 2018   Type: Resource   Access: Both

Download

White Paper: Anonymous Video Analytics (AVA) technology and privacy

Tracking individuals online for marketing and other purposes has become a contentious public policy issue for consumers, regulators and advertisers. The stakes are high, and the technologies complex, but by applying Privacy by Design principles early and systematically, privacy, consumer trust, ...

Date: Apr 30 2011   Type: Resource   Access: Both

Download

Dispelling the Myths Surrounding De-identification: Anonymization Remains a Strong Tool for Protecting Privacy

Recently, the value of de-identification of personal information as a tool to protect privacy has come into question. Repeated claims have been made regarding the ease of re-identification. We consider this to be most unfortunate because it leaves the mistaken impression that there is no point in...

Date: Jun 16 2011   Type: Resource   Access: Both

Download

Fact Sheet #18 – Secure Transfer of Personal Health Information

In Order HO-011, the Information and Privacy Commissioner of Ontario (IPC) ordered Cancer Care Ontario to discontinue its practice of transferring records of personal health information relating to its colon cancer screening program in paper format, after several courier packages containing the p...

Date: Aug 01 2012   Type: Resource   Access: Both

Download

Identity Theft: A Crime of Opportunity

Practical information about identity theft, how to avoid it, and what to do if you find you are a victim.

Date: Jul 17 2012   Type: Resource   Access: Both

Download

Looking Forward: De-identification Developments – New Tools, New Challenges

This paper provides an update on recent de-identification developments and looks ahead to new, up-and-coming, issues related to the topic of de-identification. Our objective is to encourage innovative de-identification techniques and to promote knowledge sharing and de-identification best practic...

Date: May 07 2013   Type: Resource   Access: Both

Download

Bring Your Own Device: Is Your Organization Ready?

More than 27 million Canadians use mobile computing devices such as laptops, smartphones and tablets and that number continues to grow. Consequently, Canadian employers are confronted with the workplace challenge of Bring Your Own Device (BYOD). This phenomenon poses new challenges to data securi...

Date: Dec 11 2013   Type: Resource   Access: Both

Download

Big Data and Innovation – Setting the Record Straight: De-Identification Does Work

Properly applied de-identification is an effective tool to protect privacy, but recent criticisms have suggested the opposite. The perpetuation of this myth has the potential to adversely impact health research, innovation and Big Data insights. In order to address the misconceptions surrounding ...

Date: Jun 16 2014   Type: Resource   Access: Both

Download

Privacy by Design Solutions for Biometric One-to-Many Identification Systems

In this paper, we apply a Privacy by Design approach to exploring new ideas and solutions that can lead to deployment of privacy-protective and secure biometric one-to-many systems. We showed that new advances in Biometric Encryption (BE) can be complemented with other innovative solutions, such ...

Date: Jun 20 2014   Type: Resource   Access: Both

Download



Privacy and Biometrics

Examines the privacy implications of using biometric technologies and includes a call to action to the data protection community to ensure that these technologies are used in a way that conforms to the expectations of a privacy-minded society.

Date: Sep 01 1999   Type: Resource   Access: Both

Download

Fact Sheet: Video Surveillance

This fact sheet highlights the important factors an institution must consider before implementing a video surveillance system.

Date: Nov 09 2016   Type: Resource   Access: Both

Download

Thinking About Clouds? Privacy, security and compliance considerations for Ontario public sector institutions

The IPC has prepared this new guidance document, Thinking About Clouds? Privacy, security and compliance considerations for Ontario public sector institutions, to help institutions evaluate whether cloud computing services are suitable for their information management needs. In particular, it see...

Date: Feb 20 2016   Type: Resource   Access: Both

Download

Planning for Success: Privacy Impact Assessment Guide

Ontario public sector institutions must meet high standards of care and trust whenever collecting, using and disclosing personal and other sensitive information. Any public institution considering new information technologies, systems, and program services that may affect privacy are strongly en...

Date: May 19 2015   Type: Resource   Access: Both

Download

Posting Information on Websites: Best Practices for Schools and School Boards

A joint project of the Information and Privacy Commissioner of Ontario, the Upper Grand District School Board and the Peterborough, Victoria, Northumberland and Clarington Catholic District School Board. These best practices focus on issues frequently dealt with by schools and school boards and o...

Date: Mar 01 2003   Type: Resource   Access: Both

Download




Transparency, Privacy and the Internet: Municipal Balancing Acts

Municipalities are turning to the Internet as a means of making information public in an effort to improve accessibility, transparency and accountability. This may include publishing records directly to their website or including records in searchable databases that can be accessed online. Publis...

Date: Aug 04 2015   Type: Resource   Access: Both

Download


Fact Sheet: Communicating Personal Health Information by Email

This fact sheet describes the risks of using email and custodians’ obligations under the Personal Health Information Protection Act. It outlines some of the technical, physical and administrative safeguards needed to protect personal health information when communicating by email and the polic...

Date: Sep 15 2016   Type: Resource   Access: Both

Download

Best Practices for Online Privacy Protection

An educative tool designed to help companies identify and implement appropriate practices for protecting the privacy of their online customers.

Date: Jun 01 2001   Type: Resource   Access: Both

Download

Smart Cities and Your Privacy Rights

Date: Apr 27 2018   Type: Resource   Access: Both

Download


Fact Sheet #13 – Wireless Communications Technologies: Video Surveillance Systems

Fact Sheet about the use of wireless CCTV cameras.  

Date: Jun 07 2007   Type: Resource   Access: Both

Download

Safeguarding Privacy on Mobile Devices

A brochure outlining suggested best practices for securing mobile devices (PDAs, laptops, etc.) and protecting the information carried out of the workplace on them. Steps are organized into sections: Before you Walk out of the Workplace, While you are Out and When You have Completed Your Work. In...

Date: Jun 14 2007   Type: Resource   Access: Both

Download