SlideShare a Scribd company logo
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam Compliance
March 29, 2017
Dan Michaluk
Privacy, Data Security and Anti-Spam Compliance
Dan Michaluk I daniel-michaluk@hicksmorley.com
Privacy, Data Security and Anti-Spam Compliance
Overview
• Privacy compliance
• Data security
• Anti-spam
Privacy, Data Security and Anti-Spam Compliance
Privacy Compliance
Privacy, Data Security and Anti-Spam Compliance
Commercial sector privacy legislation
• PIPEDA (federal)
• BC PIPA
• Alberta PIPA
• Manitoba PIPA
• Quebec Act
Privacy, Data Security and Anti-Spam Compliance
Privacy legislation in four bullet points
• Regulates flows of personal information – collection, use and
disclosure
• Flows must be authorized, for reasonable purpose and
necessary
• Accountability – structural, mandated openness, via access
• Reasonable data security – accuracy/integrity + protection
6
Privacy, Data Security and Anti-Spam Compliance
What’s new – PIPEDA now applies to applicants
• S-4 amendment changed the application provision of
PIPEDA – 4(1)(b)
• Now applies to “an applicant for employment”
• Creates new constraint on Bank screening processes
• OPC can judge if a collection and use is reasonable
• Beware of Mark’s Work Wearhouse in Alberta regarding
the use of credit profile information (P2010 IR 001)
7
Privacy, Data Security and Anti-Spam Compliance
What’s new – Guidance on investigations
• Can now share PI to investigate and to prevent breaches of law
• OPC issued warning in March 2017
• Carry out due diligence and exercise good judgement when
availing themselves of these exceptions
• Carefully consider each of the requirements explicitly outlined
in the provisions
• Take care to ensure the limits set out in these provisions are
respected
8
Privacy, Data Security and Anti-Spam Compliance
Data Security
Privacy, Data Security and Anti-Spam Compliance
The context
10
Applying paragraphs 7(3)(d.1)
and 7(3)(d.2) of PIPEDA
Privacy, Data Security and Anti-Spam Compliance
The regulatory framework
• Privacy legislation
• Reasonable security
• Breach notification in Alberta and soon under
PIPEDA
• Bank Act and OSFI
• Securities and market participant regulation
11
Privacy, Data Security and Anti-Spam Compliance
The standard – Ashley Madison report
• Having documented security policies and procedures is
a basic organizational security safeguard
• Conducting regular and documented risk assessments
is an important organizational safeguard in and of itself
• Use multi-factor authentication for remote administrative
access
12
Privacy, Data Security and Anti-Spam Compliance
The standard – OSFI self-assessment guide
“Desirable properties
and characteristics of
cybersecurity practices”
in six areas
• Organization and resources
• Cyber risk and control assessment
• Situational awareness
• Threat and vulnerability risk
management
• Cybersecurity incident
management
• Cybersecurity governance
13
Privacy, Data Security and Anti-Spam Compliance
The standard – OSFI Guideline B-10 (Outsourcing)
• FRFIs are to
• Evaluate the risks associated with all existing and proposed outsourcing
arrangements;
• Develop a process for determining the materiality of arrangements;
• Implement a program for managing and monitoring risks, commensurate with
the materiality of the arrangements;
• Ensure that the board of directors, chief agent or principal officer receives
information sufficient to enable them to discharge their duties under this
Guideline; and
• Refrain from outsourcing certain business activities to the external auditor
14
Privacy, Data Security and Anti-Spam Compliance
The Standard – CSA Staff Notice 11-332
• CSA says, “Hey! This is important!”
• Refers to 13 documents as “useful”
• No one size fits all, but here are 11 very general
prescriptions – including on employee awareness,
incident response, vendor management
15
Privacy, Data Security and Anti-Spam Compliance
Notification – Under PIPEDA (Pending)
• Reasonable to believe a real risk of significant harm
• To individuals and to OPC as soon as feasible
• To other organizations and government if could reduce
risks or mitigate harm
• Record of all breaches of security safeguard to be kept
and provided to OPC on request
16
Privacy, Data Security and Anti-Spam Compliance
Notification – CSA Staff Notice 51-347
In considering whether and when to disclose a cyber security
incident, the issuer must determine whether it is a material
fact or material change that requires disclosure in
accordance with securities legislation… Materiality depends
on the contextual analysis of the cyber security incident.
While an isolated cyber attack may not be material, a series
of or frequent minor incidents may become material in light
of the level and type of disruption caused.
17
Privacy, Data Security and Anti-Spam Compliance
CASL
Privacy, Data Security and Anti-Spam Compliance
How CASL spam regulation works
• Everything’s a CEM – a commercial electronic message
– unless it isn’t
• Default – express consent to send a CEM
• Implied consent deemed in some circumstances
• Convey certain information in a CEM
• Provide and administer an opt out
19
Privacy, Data Security and Anti-Spam Compliance
CASL enforcement activity to date
• Compufinder (2015 notice of violation) - $1.1 mill
• Porter (2015 undertaking) - $150,000
• Plentyoffish (2015 undertaking) - $200,000
• Rogers (2015 undertaking) - $48,000
• Blackstone Learning Corp (CRTC 2016-428) - $50,000
• William Rapanos (CRTC 2017-65) - $15,000
20
Privacy, Data Security and Anti-Spam Compliance
What’s new – Pending private right of action
• Implements (essentially) a private prosecution regime
• Three year limitation period
• Barred by pre-emptive regulator enforcement
• Order may be made
• Compensation for special damage (if any)
• Defined amounts per contravention
• Orders guided by factors
21
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam Compliance
March 29, 2017
Dan Michaluk

More Related Content

PPTX
Cybersecurity and data loss - It's not just about lost USB keys today
PPTX
Cas cyber prez
PPTX
Canadian Association of University Solicitors - Privacy Update 2016
PPTX
One hour cyber july 2013
PPTX
Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...
PPTX
David doughty presentation 181119
PPTX
Cyber legal update oct 7 2015
PPTX
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Cybersecurity and data loss - It's not just about lost USB keys today
Cas cyber prez
Canadian Association of University Solicitors - Privacy Update 2016
One hour cyber july 2013
Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...
David doughty presentation 181119
Cyber legal update oct 7 2015
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016

What's hot (19)

PPTX
How to manage a data breach
PPTX
Justin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
PPTX
CyberSecurity: Protecting Law Firms - Vanderburg - JurInnov
PDF
Cybersecurity for Your Law Firm: Data Security and Data Encryption
PPTX
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...
PDF
What's Next in Cybersecurity Policy
PDF
Real World Cybersecurity Tips You Can Use to Protect Your Clients, Your Firm,...
PDF
Do I really need cyber liability insurance?
PPTX
Cyber, secrecy and the public body
PDF
Cyber Liability Insurance And Protecting SMEs
PPTX
Siskinds | Incident Response Plan
PPTX
What is Information Security and why you should care ...
PPSX
Gdpr demystified - making sense of the regulation
PPTX
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
PDF
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
PPTX
Privacy, Data Security and Anti-Spam Compliance
PDF
Cyber Security for Your Clients: Business Lawyers Advising Business Clients
PPTX
Privacy by Design: White Papaer
PPTX
GDPR Part 1: Quick Facts
How to manage a data breach
Justin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
CyberSecurity: Protecting Law Firms - Vanderburg - JurInnov
Cybersecurity for Your Law Firm: Data Security and Data Encryption
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...
What's Next in Cybersecurity Policy
Real World Cybersecurity Tips You Can Use to Protect Your Clients, Your Firm,...
Do I really need cyber liability insurance?
Cyber, secrecy and the public body
Cyber Liability Insurance And Protecting SMEs
Siskinds | Incident Response Plan
What is Information Security and why you should care ...
Gdpr demystified - making sense of the regulation
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Privacy, Data Security and Anti-Spam Compliance
Cyber Security for Your Clients: Business Lawyers Advising Business Clients
Privacy by Design: White Papaer
GDPR Part 1: Quick Facts
Ad

Similar to Privacy, Data Security and Anti-Spam Compliance (20)

PPTX
Emerging Privacy Themes That Will Impact Your Company
PPTX
Certified Banking Data Privacy Law and Regulation - Module 9.pptx
PPTX
2018 01-25 Introduction to PCI and HIPAA Compliance
PPTX
Data Privacy and Canadian Anti-Spam Law
PDF
2018-11-15 IT Assessment
PDF
A Cybersecurity Planning Guide for CFOs
PPT
Data Risks In A Digital Age
PDF
2016 02-23 Is it time for a Security and Compliance Assessment?
PDF
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
PPTX
2017-01-24 Introduction of PCI and HIPAA Compliance
PPTX
Digital marketing presentation - security risks for websites
PDF
digitalmarketingfinal-151111124851-lva1-app6891.pdf
PPTX
COCPA Central Ontario Crime Prevention Association presentation by Steve Falk
PPT
Data protection For CYP Organisations
PPTX
UK Legal Framework (2003)
PPTX
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...
PDF
Don't let them take a byte
PDF
Achieving PCI Compliance Long And Short Term Strategies 2009
PDF
Lumension LCRM - DSS @Vilnius 2010
PPT
New Data Breach Regime, Privacy & Confidentiality
Emerging Privacy Themes That Will Impact Your Company
Certified Banking Data Privacy Law and Regulation - Module 9.pptx
2018 01-25 Introduction to PCI and HIPAA Compliance
Data Privacy and Canadian Anti-Spam Law
2018-11-15 IT Assessment
A Cybersecurity Planning Guide for CFOs
Data Risks In A Digital Age
2016 02-23 Is it time for a Security and Compliance Assessment?
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
2017-01-24 Introduction of PCI and HIPAA Compliance
Digital marketing presentation - security risks for websites
digitalmarketingfinal-151111124851-lva1-app6891.pdf
COCPA Central Ontario Crime Prevention Association presentation by Steve Falk
Data protection For CYP Organisations
UK Legal Framework (2003)
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...
Don't let them take a byte
Achieving PCI Compliance Long And Short Term Strategies 2009
Lumension LCRM - DSS @Vilnius 2010
New Data Breach Regime, Privacy & Confidentiality
Ad

More from Dan Michaluk (20)

PPTX
Ecno cyber - 23 June 2023 - djm(137852631.1).pptx
PPTX
Critical Issues in School Board Cyber Security
PPTX
Introduction to FOI law (the law of information)
PPTX
Higher Education Sexual Violence Presentation
PPTX
Cyber class action claims at an inflection point
PPTX
The pandemic and privacy
PPTX
Union access to information
PPTX
Cybersecurity Risk Governance
PPTX
Cyber Incident Response - When it happens, will you be ready?
PPTX
The Current State of FOI
PPTX
The privacy and security implications of AI, big data and predictive analytics
PPTX
Advocates' Society Tricks of the Trade 2019 - A Privacy Update
PPTX
Cyber Insurance and Incident Response Practice
PPTX
Role of a breach coach
PPTX
PHIPA for school boards
PPTX
Finding internet evidence
PPTX
Sexual Assault in Higher Education - Law Policy and Practice
PPTX
Student Conduct Investigations - Examining Evidence and Determining Credibiliity
PPTX
Privacy and breaches in health care - a legal update
PPTX
Cacuss 2015 sexual violence
Ecno cyber - 23 June 2023 - djm(137852631.1).pptx
Critical Issues in School Board Cyber Security
Introduction to FOI law (the law of information)
Higher Education Sexual Violence Presentation
Cyber class action claims at an inflection point
The pandemic and privacy
Union access to information
Cybersecurity Risk Governance
Cyber Incident Response - When it happens, will you be ready?
The Current State of FOI
The privacy and security implications of AI, big data and predictive analytics
Advocates' Society Tricks of the Trade 2019 - A Privacy Update
Cyber Insurance and Incident Response Practice
Role of a breach coach
PHIPA for school boards
Finding internet evidence
Sexual Assault in Higher Education - Law Policy and Practice
Student Conduct Investigations - Examining Evidence and Determining Credibiliity
Privacy and breaches in health care - a legal update
Cacuss 2015 sexual violence

Recently uploaded (20)

PPTX
Cyber Bullying & harassment on social media.pptx
PPTX
Punjab Fertilizers Control Act 2025.pptx
PPT
Gender sensitivity and fair language implementation
PPTX
CRPC NOTES AND DETAIL PREVAILING TO CRPC
PPTX
PA2014 for Employer and employee at workplace
PPTX
BL - Chapter 1 - Law and Legal Reasoning
PPT
LAW OF TORT IN VICARIOUS LIABILITY COMPLETE
PDF
2022CH12581 - Civil Rights vs Morzak, Harrison, Chrisman et al. (Cook County,...
PPTX
Indian Medical Device Rules or Institute of Management Development and Research
PPTX
Legal drafting is the most important instrument of legal communication. The s...
PPTX
BL 2 - Courts and Alternative Dispute Resolution.pptx
PPT
SDEAC-2020-Leaves-of-Absence-Presentation-Daniel-De-La-Cruz.ppt
PPTX
Financial Rehabilitation and Insolvency Act
PPTX
Behavioural_Approach_Public_Administration_Zambia_USA.pptx
PDF
Black And Deep Peach Geometric Legal Advisor Firm Presentation.pdf
PDF
Brown and Beige Vintage Classic Illustration Paper Project History Presenta_2...
PPTX
white collar crime .pptx power function and punishment
PDF
AI in Modern Warfare and Business Ethics Ortynska Law Ventures Cafe.pdf
PDF
The family of Tagin tribe of Arunachal Pradesh -- by B_B_ Pandey -- First edi...
Cyber Bullying & harassment on social media.pptx
Punjab Fertilizers Control Act 2025.pptx
Gender sensitivity and fair language implementation
CRPC NOTES AND DETAIL PREVAILING TO CRPC
PA2014 for Employer and employee at workplace
BL - Chapter 1 - Law and Legal Reasoning
LAW OF TORT IN VICARIOUS LIABILITY COMPLETE
2022CH12581 - Civil Rights vs Morzak, Harrison, Chrisman et al. (Cook County,...
Indian Medical Device Rules or Institute of Management Development and Research
Legal drafting is the most important instrument of legal communication. The s...
BL 2 - Courts and Alternative Dispute Resolution.pptx
SDEAC-2020-Leaves-of-Absence-Presentation-Daniel-De-La-Cruz.ppt
Financial Rehabilitation and Insolvency Act
Behavioural_Approach_Public_Administration_Zambia_USA.pptx
Black And Deep Peach Geometric Legal Advisor Firm Presentation.pdf
Brown and Beige Vintage Classic Illustration Paper Project History Presenta_2...
white collar crime .pptx power function and punishment
AI in Modern Warfare and Business Ethics Ortynska Law Ventures Cafe.pdf
The family of Tagin tribe of Arunachal Pradesh -- by B_B_ Pandey -- First edi...

Privacy, Data Security and Anti-Spam Compliance

  • 1. Privacy, Data Security and Anti-Spam Compliance Privacy, Data Security and Anti-Spam Compliance March 29, 2017 Dan Michaluk
  • 2. Privacy, Data Security and Anti-Spam Compliance Dan Michaluk I daniel-michaluk@hicksmorley.com
  • 3. Privacy, Data Security and Anti-Spam Compliance Overview • Privacy compliance • Data security • Anti-spam
  • 4. Privacy, Data Security and Anti-Spam Compliance Privacy Compliance
  • 5. Privacy, Data Security and Anti-Spam Compliance Commercial sector privacy legislation • PIPEDA (federal) • BC PIPA • Alberta PIPA • Manitoba PIPA • Quebec Act
  • 6. Privacy, Data Security and Anti-Spam Compliance Privacy legislation in four bullet points • Regulates flows of personal information – collection, use and disclosure • Flows must be authorized, for reasonable purpose and necessary • Accountability – structural, mandated openness, via access • Reasonable data security – accuracy/integrity + protection 6
  • 7. Privacy, Data Security and Anti-Spam Compliance What’s new – PIPEDA now applies to applicants • S-4 amendment changed the application provision of PIPEDA – 4(1)(b) • Now applies to “an applicant for employment” • Creates new constraint on Bank screening processes • OPC can judge if a collection and use is reasonable • Beware of Mark’s Work Wearhouse in Alberta regarding the use of credit profile information (P2010 IR 001) 7
  • 8. Privacy, Data Security and Anti-Spam Compliance What’s new – Guidance on investigations • Can now share PI to investigate and to prevent breaches of law • OPC issued warning in March 2017 • Carry out due diligence and exercise good judgement when availing themselves of these exceptions • Carefully consider each of the requirements explicitly outlined in the provisions • Take care to ensure the limits set out in these provisions are respected 8
  • 9. Privacy, Data Security and Anti-Spam Compliance Data Security
  • 10. Privacy, Data Security and Anti-Spam Compliance The context 10 Applying paragraphs 7(3)(d.1) and 7(3)(d.2) of PIPEDA
  • 11. Privacy, Data Security and Anti-Spam Compliance The regulatory framework • Privacy legislation • Reasonable security • Breach notification in Alberta and soon under PIPEDA • Bank Act and OSFI • Securities and market participant regulation 11
  • 12. Privacy, Data Security and Anti-Spam Compliance The standard – Ashley Madison report • Having documented security policies and procedures is a basic organizational security safeguard • Conducting regular and documented risk assessments is an important organizational safeguard in and of itself • Use multi-factor authentication for remote administrative access 12
  • 13. Privacy, Data Security and Anti-Spam Compliance The standard – OSFI self-assessment guide “Desirable properties and characteristics of cybersecurity practices” in six areas • Organization and resources • Cyber risk and control assessment • Situational awareness • Threat and vulnerability risk management • Cybersecurity incident management • Cybersecurity governance 13
  • 14. Privacy, Data Security and Anti-Spam Compliance The standard – OSFI Guideline B-10 (Outsourcing) • FRFIs are to • Evaluate the risks associated with all existing and proposed outsourcing arrangements; • Develop a process for determining the materiality of arrangements; • Implement a program for managing and monitoring risks, commensurate with the materiality of the arrangements; • Ensure that the board of directors, chief agent or principal officer receives information sufficient to enable them to discharge their duties under this Guideline; and • Refrain from outsourcing certain business activities to the external auditor 14
  • 15. Privacy, Data Security and Anti-Spam Compliance The Standard – CSA Staff Notice 11-332 • CSA says, “Hey! This is important!” • Refers to 13 documents as “useful” • No one size fits all, but here are 11 very general prescriptions – including on employee awareness, incident response, vendor management 15
  • 16. Privacy, Data Security and Anti-Spam Compliance Notification – Under PIPEDA (Pending) • Reasonable to believe a real risk of significant harm • To individuals and to OPC as soon as feasible • To other organizations and government if could reduce risks or mitigate harm • Record of all breaches of security safeguard to be kept and provided to OPC on request 16
  • 17. Privacy, Data Security and Anti-Spam Compliance Notification – CSA Staff Notice 51-347 In considering whether and when to disclose a cyber security incident, the issuer must determine whether it is a material fact or material change that requires disclosure in accordance with securities legislation… Materiality depends on the contextual analysis of the cyber security incident. While an isolated cyber attack may not be material, a series of or frequent minor incidents may become material in light of the level and type of disruption caused. 17
  • 18. Privacy, Data Security and Anti-Spam Compliance CASL
  • 19. Privacy, Data Security and Anti-Spam Compliance How CASL spam regulation works • Everything’s a CEM – a commercial electronic message – unless it isn’t • Default – express consent to send a CEM • Implied consent deemed in some circumstances • Convey certain information in a CEM • Provide and administer an opt out 19
  • 20. Privacy, Data Security and Anti-Spam Compliance CASL enforcement activity to date • Compufinder (2015 notice of violation) - $1.1 mill • Porter (2015 undertaking) - $150,000 • Plentyoffish (2015 undertaking) - $200,000 • Rogers (2015 undertaking) - $48,000 • Blackstone Learning Corp (CRTC 2016-428) - $50,000 • William Rapanos (CRTC 2017-65) - $15,000 20
  • 21. Privacy, Data Security and Anti-Spam Compliance What’s new – Pending private right of action • Implements (essentially) a private prosecution regime • Three year limitation period • Barred by pre-emptive regulator enforcement • Order may be made • Compensation for special damage (if any) • Defined amounts per contravention • Orders guided by factors 21
  • 22. Privacy, Data Security and Anti-Spam Compliance Privacy, Data Security and Anti-Spam Compliance March 29, 2017 Dan Michaluk

Editor's Notes