-
Best-Practice Data Transfers for Canadian Companies – III – Vendor Contracts
PREPARING FOR DATA TRANSFER – CLAUSES FOR VENDOR CONTRACTS A three-part series from KI Design: Part I: Data Outsourcing Part II: Cross-border Data Transfers The following guidelines are best-practice recommendations for ensuring that transferred data is processed in compliance with standard regulatory privacy laws. While a contract creates legal obligations for a Vendor, your company must still […]
-
Best-Practice Data Transfers for Canadian Companies – Part II
CROSS-BORDER DATA TRANSFERS A three-part series from KI Design: Part I: Data Outsourcing , Part III: Preparing for Data Transfer – Clauses for Vendor Contracts When personal information (PI) is moved across federal or provincial boundaries in the course of commercial activity, it’s considered a cross-border data transfer. Transferring data brings risk. As well as increasing […]
-
Best-Practice Data Transfers for Canadian Companies – I – Outsourcing
DATA OUTSOURCING In our digitally interconnected world, most organizations that handle personal information will transfer it to a third party at some stage of the data life cycle. Your company may send personal information (PI) to an external service provider such as PayPal to process customer payments – that’s a data transfer. Perhaps you hired […]
-
Parliament Responds to the Standing Committee’s Report on Access to Information, Privacy and Ethics
The Honourable Navdeep Bains, P.C., M.P. extends his gratitude for report of the Standing Committee on Access to Information, Privacy and Ethics titled, Privacy by Design: Review of the Personal Information Protection and Electronic Documents Act. His response encompasses the following summary. He shows his appreciation for the OPC and other witnesses that supported this study and […]
-
Social Media Analytics Drivers
By Aydin Farrokhi and Dr. Wael Hassan Today, the public has remarkable power and reach by which they can share their news, and express their opinion, about any product or services or even react to an existing state of affairs, especially regarding social or political issues. For example, in marketing, consumer voices can have an enormous […]
-
The Necessity of Multi-Scanning
Last Friday, the WannaCry cyberattack effected more than 300,000 computers, impacting thousands of businesses, hospitals and enterprises, across 153 countries by taking advantage of outdated versions of Windows that never had updated Microsoft’s crucial security upgrades. With the increasing amounts of advance threats by attackers and the overall skyrocketing growth of malware, relying on […]
-
Political Cyber Security
The daily life and economics of the global citizen depend each time more on a stable, secure, and resilient cyberspace. Even before was elected president, Donald Trump promised to make cyber security “an immediate and top priority for [his] administration.” Yet, months into his presidency, Trump and global leaders worldwide have struggled to deal with […]
-
Inappropriate Access detection using Machine Learning
Detecting Inappropriate Access to Personal Health Information “While PHIPA has served Ontarians well over the last decade, rapid changes in technology and communications are demanding that we keep pace. With the growing use of electronic health records, the province needs a legislative framework that addresses the rights of individuals and the duties and obligations of […]
-
Legal Obligations for Energy Boards
In this guide you will explore: Obligations of Energy Boards FTC and Fair Information principle requirements Smart Grid Data Protection Requirements Employee Privacy in the Energy Space Federal and state law requirements In recent years, news of massive data breaches has become almost commonplace. We are witnessing an unprecedented increase in cyberattacks, with energy utilities […]
-
Data Protection in Design
Time for a New Vision Up until now, we have viewed privacy and security on the same sliding scale, through which it appears to be impossible to have one without hurting the other. Envisioning a country where privacy is prioritized over security and surveillance seems absurd. However, it is time that we disrupt this traditional […]