ARTICLE
6 November 2018

New Breach Notification Requirements In Force

CC
Clyde & Co

Contributor

Clyde & Co  logo
Clyde & Co is a leading, sector-focused global law firm with 415 partners, 2200 legal professionals and 3800 staff in over 50 offices and associated offices on six continents. The firm specialises in the sectors that move, build and power our connected world and the insurance that underpins it, namely: transport, infrastructure, energy, trade & commodities and insurance. With a strong focus on developed and emerging markets, the firm is one of the fastest growing law firms in the world with ambitious plans for further growth.
Organizations are now required by law to report a data breach to the OPC, where it is reasonable to believe that it presents a real risk of significant harm to a person.
Canada Privacy
To print this article, all you need is to be registered or login on Mondaq.com.

Organizations are now required by law to report a data breach to the Office of the Privacy Commissioner of Canada (OPC), where it is reasonable to believe that it presents a real risk of significant harm to a person. In such cases, they will also have to notify affected individuals. This must be done "as soon as feasible", and according to the OPC, even if not all the information surrounding the cause or any planned mitigation measures, is known or confirmed. Information can be corrected and updated as it becomes available.

What's more, organizations in Canada have to keep a record of all breaches of security safeguards, involving personal information under their control, that come to their attention, whether there is a real risk of significant harm or not.

As the OPC says, to put it simply, there must be a record of every breach of security safeguards.

The new mandatory breach notification and record keeping requirements, introduced as amendments to the Personal Information Protection and Electronic Documents Act (PIPEDA), came into force on November 1, 2018.

In assessing risk stemming from a breach, organizations will have to develop a reliable response plan that takes into account the sensitivity of the information, and the likelihood it would be misused. As the OPC states in its guidance document, some information, on its face, will clearly be considered sensitive. But there also may be circumstances at play that "may make the information more or less sensitive."

As for determining the probability of misuse, organizations targeted by a breach should ask themselves a number of questions. These include how likely is it that someone would be harmed as a result of the breach; who might have accessed the information; how long the information has been exposed; and whether there is any evidence of malicious intent (e.g. theft, etc). Also, has disclosure of the information been limited to known people or entities who have committed to destroy and not disclose the data? Or, in the case of an accidental disclosure to unintended recipients, is it unlikely they will share the information in a way that would cause harm?

For further details on reporting and notification requirements, please consult our earlier post on the issue.

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

See More Popular Content From

Mondaq uses cookies on this website. By using our website you agree to our use of cookies as set out in our Privacy Policy.

Learn More