Date: Jan 30 2018 Type: Resource Access: BothDownload
This guidance document outlines the key obligations of police under privacy legislation in their use of ALPR systems and provides guidance, including best practices, on using these systems in a privacy-protective manner. It addresses the use of ALPR systems for public safety purposes, in parti...
Date: Jul 04 2017 Type: Resource Access: BothDownload
This guidance document provides institutions with an overview of important factors to consider when implementing Open Government including the need for institutional leadership, commitment, governance and resources to support culture change and sustain the program over time, learning from others...
Date: Sep 06 2016 Type: Resource Access: BothDownload
This guidance paper is intended as a starting point for institutions considering Open Government and highlights two critical goals: enhancing access to government-held information and public participation. It includes a discussion about making government-held information open by default and at...
Date: Sep 05 2016 Type: Resource Access: BothDownload
Bill 8, the Public Sector and MPP Accountability and Transparency Act, 2014, will come into effect on January 1, 2016. This Bill amends the Freedom of Information and Protection of Privacy Act (FIPPA) and the Municipal Freedom of Information and Protection of Privacy Act (MFIPPA) to include requi...
Date: Dec 22 2015 Type: Resource Access: BothDownload
Proactive disclosure of procurement records strengthens clarity and accountability around government spending. It can also provide tangible benefits to institutions by reducing the number of procurement-related freedom of information requests, appeals and associated costs. This resource details t...
Date: Sep 21 2015 Type: Resource Access: BothDownload
Municipalities are turning to the Internet as a means of making information public in an effort to improve accessibility, transparency and accountability. This may include publishing records directly to their website or including records in searchable databases that can be accessed online. Publis...
Date: Aug 04 2015 Type: Resource Access: BothDownload
As governments and public sector organizations strive to become more efficient, accountable and customer focused, they frequently seek input from the public about their programs and services. One of the most cost-effective ways to accomplish this is through surveys. While surveys can be an...
Date: Apr 07 2015 Type: Resource Access: BothDownload
This guidance document aims to identify some of the privacy considerations law enforcement authorities should take into account when deciding whether to outfit law enforcement officers with body-worn cameras. Published by the federal Privacy Commissioner and privacy and personal information prote...
Date: Feb 18 2015 Type: Resource Access: BothDownload
Unauthorized access continues to be a growing problem in the health sector in Ontario. The province’s Personal Health Information Protection Act, (PHIPA), permits health information custodians (HIC) to collect, use and disclose personal health information for the purposes of providing or assist...
Date: Jan 28 2015 Type: Resource Access: BothDownload
In this paper, we apply a Privacy by Design approach to exploring new ideas and solutions that can lead to deployment of privacy-protective and secure biometric one-to-many systems. We showed that new advances in Biometric Encryption (BE) can be complemented with other innovative solutions, such ...
Date: Jun 20 2014 Type: Resource Access: BothDownload
Properly applied de-identification is an effective tool to protect privacy, but recent criticisms have suggested the opposite. The perpetuation of this myth has the potential to adversely impact health research, innovation and Big Data insights. In order to address the misconceptions surrounding ...
Date: Jun 16 2014 Type: Resource Access: BothDownload
More than 27 million Canadians use mobile computing devices such as laptops, smartphones and tablets and that number continues to grow. Consequently, Canadian employers are confronted with the workplace challenge of Bring Your Own Device (BYOD). This phenomenon poses new challenges to data securi...
Date: Dec 11 2013 Type: Resource Access: BothDownload
This paper provides an update on recent de-identification developments and looks ahead to new, up-and-coming, issues related to the topic of de-identification. Our objective is to encourage innovative de-identification techniques and to promote knowledge sharing and de-identification best practic...
Date: May 07 2013 Type: Resource Access: BothDownload
As portable storage devices become increasingly prevalent in the health care sector, concerns also arise regarding the privacy and security of personal health information (PHI). Medical professionals in high-availability data environments, from family doctors to large hospitals, need to ensure da...
Date: Dec 14 2012 Type: Resource Access: BothDownload
There are many myths surrounding how information may be collected, used and disclosed under the Personal Health Information Protection Act. Working with our partners in the health care community, we have created this one-page document to dispel some of the more common myths.
Date: Sep 28 2012 Type: Resource Access: BothDownload
Personal health information comprises some of the most sensitive and intimate details of one’s life, such as those relating to one’s physical or mental health and the health history of one’s family. As such, it requires strong protections to ensure the privacy of the individual to whom it r...
Date: Mar 02 2012 Type: Resource Access: BothDownload
Recently, the value of de-identification of personal information as a tool to protect privacy has come into question. Repeated claims have been made regarding the ease of re-identification. We consider this to be most unfortunate because it leaves the mistaken impression that there is no point in...
Date: Jun 16 2011 Type: Resource Access: BothDownload
Tracking individuals online for marketing and other purposes has become a contentious public policy issue for consumers, regulators and advertisers. The stakes are high, and the technologies complex, but by applying Privacy by Design principles early and systematically, privacy, consumer trust, ...
Date: Apr 30 2011 Type: Resource Access: BothDownload
A Research Report on the use of Biometric Encryption to Limit “Self-Excluded” Problem Gambler Access to Gaming Venue.
Date: Nov 12 2010 Type: Resource Access: BothDownload
Calls for greater openness and transparency are exerting increasing pressure on governments to transform their traditional, reactive information dissemination methods into a mode that facilitates proactive disclosure. Furthermore, governments around the world are recognizing the value of sharing ...
Date: Sep 01 2010 Type: Resource Access: BothDownload
Access by Design: The 7 Fundamental Principles
Date: May 10 2010 Type: Resource Access: BothDownload
The idea that privacy – an individual’s right to control the collection, use and disclosure of information about him or herself – may present risk, seems to be a new one to many. That it should be a novel concept to those responsible for managing risk, however, needs to be addressed. Person...
Date: Apr 28 2010 Type: Resource Access: BothDownload
Health information custodians frequently rely on de-identification when using or disclosing health information – a measure that can protect individual privacy, but often at the expense of data quality (zero-sum paradigm). Dr. Khaled El Emam, a senior investigator at the Children’s Hospital of...
Date: Mar 30 2010 Type: Resource Access: BothDownload
The following is a chapter on Biometric Encryption excerpted from the Springer Encyclopedia of Biometrics.
Date: Dec 24 2009 Type: Resource Access: BothDownload
This is joint publication between Commissioner, Dr. Ann Cavoukian and Robert Johnson, Executive Director of the National Association for Information Destruction (NAID). This publication was borne out of a particular Health Order (HO-006) which Commissioner Cavoukian issued this past summer re...
Date: Oct 29 2009 Type: Resource Access: BothDownload
This useful sheet outlines The 7 Foundational Principles of Privacy by Design – a concept that Commissioner Cavoukian developed back in the 90’s, to address the ever-growing and systemic effects of Information and Communication Technologies, and of large-scale networked data systems. Priv...
Date: Aug 20 2009 Type: Resource Access: BothDownload
The toolkit was prepared by the IPC and Dr. Peter Rossos (UHN) to help physicians minimize the risk of privacy and security breaches, before, during and after making the transition to electronic records of personal health information.
Date: May 21 2009 Type: Resource Access: BothDownload
Profound technological and social forces are reshaping the public sector, its governance structures, and constituent relationships. Government adoption of Web 2.0 “social” technologies will empower citizens on an unprecedented mass scale. What does this mean to privacy and personal data prote...
Date: May 01 2009 Type: Resource Access: BothDownload
This paper is a chronicle describing the IPC’s work to enhance awareness about the privacy challenges youth face on the Internet.
Date: Mar 25 2009 Type: Resource Access: BothDownload
Abstract – How to Preserve Freedom and Liberty: Design Intelligent Agents to be Smart and Respectful of Privacy George Tomko, Ph.D. IPSI Seminar, October 6, 2008, University of Toronto
Date: Aug 11 2008 Type: Resource Access: BothDownload
RFID and Privacy: Guidance for Health-Care Providers. RFID technology can help save lives – and preserve privacy.
Date: Jan 23 2008 Type: Resource Access: BothDownload
The Information and Privacy Commissioner of Ontario, Ann Cavoukian, Ph.D., and Biometrics Scientist, Alex Stoianov, Ph.D., jointly released a white paper entitled Biometric Encryption: A Positive Sum Technology that Achieves Strong Authentication, Security AND Privacy. The authors wish to appe...
Date: Mar 14 2007 Type: Resource Access: BothDownload
This document assists organizations in making key decisions about notifying individuals after a privacy breach occurs by presenting checklists covering factors affecting whether to notify, when and how to notify, what to include in a notification and other organizations that should be contacted. ...
Date: Dec 11 2006 Type: Resource Access: BothDownload
This document is intended to serve as privacy “best practices” guidance for organizations when designing and operating Radio-Frequency Identification (RFID) information technologies and systems
Date: Jun 19 2006 Type: Resource Access: BothDownload
The Personal Health Information Protection Act, sets out the rules that persons or organizations defined as “health information custodians” must follow when collecting, using, disclosing, retaining and disposing of personal health information. Revised: March, 2012.
Date: Jun 03 2006 Type: Resource Access: BothDownload
This guide is a tool to help health information custodians understand their rights and obligations under the Personal Health Information Protection Act, (PHIPA).
Date: Dec 01 2004 Type: Resource Access: BothDownload
A Joint Project of the Office of the Information and Privacy Commissioner of Ontario and the Ministry of the Attorney General.
Date: Mar 01 2004 Type: Resource Access: BothDownload
Provides students, parents and school board staff with a basic understanding of how the Municipal Freedom of Information and Protection of Privacy Act interacts with the Education Act to protect privacy and provide access to the personal information of students Revised: June, 2011.
Date: Jul 01 2003 Type: Resource Access: BothDownload
A joint project of the Office of the Information and Privacy Commissioner/Ontario and the Ministry of Health and Long-Term Care, Freedom of Information and Protection of Privacy Office.
Date: Apr 01 2003 Type: Resource Access: BothDownload
A joint project of the Information and Privacy Commissioner of Ontario, the Upper Grand District School Board and the Peterborough, Victoria, Northumberland and Clarington Catholic District School Board. These best practices focus on issues frequently dealt with by schools and school boards and o...
Date: Mar 01 2003 Type: Resource Access: BothDownload
Each provincial and municipal government organization has a Co-ordinator. This backgrounder looks at ways Co-ordinators can help staff integrate an awareness and understanding of access and privacy into their daily work.
Date: Dec 01 2001 Type: Resource Access: BothDownload
Symposium on the Protection of Information in Local Governments. The Administration and Use of Personally Identifiable Information in a Global Society. Tokyo, October 2000.
Date: Oct 01 2000 Type: Resource Access: BothDownload
Examines the privacy implications of using biometric technologies and includes a call to action to the data protection community to ensure that these technologies are used in a way that conforms to the expectations of a privacy-minded society.
Date: Sep 01 1999 Type: Resource Access: BothDownload
Each provincial and municipal government organization has a Co-ordinator. This Backgrounder looks at the critically important role that Co-ordinators play.
Date: Sep 01 1999 Type: Resource Access: BothDownload