SlideShare une entreprise Scribd logo
1  sur  17
Workplace Privacy Here and Now Dan Michaluk February 3, 2011 OBA Institute - Fulfilling Your Privacy Obligations
Outline The four hot button issues relate to The boundary between work and private life The right of access to stored communications PIPEDA application to employment in the province HO-010 – Managing the risk of employee malfeasance
Work Life Versus Private Life Bob and Sue had a long day. They go to the Dirty Dog Pub after work and, over the course of four hours, take jabs at their supervisor, Phil.
Work Life Versus Private Life Jack had a long day. He goes home, cracks open a beer, and boots up his home computer. Using a picture of his supervisor taken from the company intranet and some internet based software, he alters the picture so the manager looks ridiculous. Jack posts it to his Facebook page. He feels good.
Work Life Versus Private Life Duty of fidelity applies when employee expression is likely to significantly affect a legitimate employer interest All other activity is “private” The kind of social interaction we engage in today is more likely to conflict with employer interests
Work Life Versus Private Life Employee speech can negatively… …affect an employer’s duty to other employees …affect an employee’s ability to do his/her job …affect public perception of employee performance …affect an employer’s reputation
Work Life Versus Private Life Cape Breton-Victoria Regional School Board From NSCA on January 25th Recognizes potential harm to reputation, but no jurisdiction to impose penalty in circumstances Likely means that potential harm to reputation can only be acted upon if “substantial and warranted” If that’s balancing at the threshold, okay
Access to “Personal” Communications Employers need access to their systems Text messages can be incredibly useful in an investigation Three rights Routine monitoring (limited and needs based) Periodic audit (standard) Investigation on reasonable suspicion (standard)
Access to “Personal” Communications Unfettered right or access is dying a slow death Lethbridge College – Arbitrator Ponak, 2007 Johnson v. Bell Canada – Fed Ct., 2008 Cole – Ont. S.C.J., 2009 Tfaily – Ont. C.A., 2010 City of Ottawa – Ont. S.C.J., 2010 (subtext)
Access to “Personal” Communications What does balancing look like? The College recognizes the value of being able to work and study without concern of being under constant surveillance and therefore does not routinely monitor the activities of individuals.
Access to “Personal” Communications What does balancing look like? However, the College does perform periodic random audits to ensure acceptable network use and will investigate situations based on a reasonable suspicion of breach. As such, users should have no expectation of privacy when using the College’s network. If you wish to send personal communications that are private you should not use the College network.
PIPEDA Application Pre State Farm – Are we PIPEDA regulated? We use service providers as processing agents They have no independent interest in the information They handle personal information in our stead But we pay them
PIPEDA Application State Farm - Landmark Insurer conducts surveillance for insured defendant (through its counsel, as agent) Insurer does have an independent interest in collection… insurer does get paid But no a collection in course of commercial activity… this is about defending a civil claim Ratio – construe the essence of the activity More flexible than agency… more ambiguous
HO-010 – Managing Employee Malfeasance Unauthorized access by diagnostic imaging tech. Second similar breach at hospital (see HO-002) Limited role-based access restrictions on health care providers (access to systems and not within systems controlled) All systems not audited
HO-010 – Managing Employee Malfeasance Findings on duty to manage malfeasance Unreasonable to continue access without a written undertaking to abide by rules (ordered) Hospitals must report to regulatory college (ordered) Complainant has right to know what discipline was imposed Post-breach communiqué to employees called for (ordered)
HO-010 – Managing Employee Malfeasance Suggestion that identity of wrongdoer and penalty imposed should be published A suggestion at best… not backed by order or reasoning in text of order Not normative in employee and labour relations Seems mean-spirited Raises defamation issues
Workplace Privacy Here and Now Dan Michaluk February 3, 2011 OBA Institute - Fulfilling Your Privacy Obligations

Contenu connexe

Tendances

Jeremy and jeannette case
Jeremy and jeannette caseJeremy and jeannette case
Jeremy and jeannette caseMichael Perez
 
Confidentiality, Conflicts of interest & occupational Crime
Confidentiality, Conflicts of interest & occupational CrimeConfidentiality, Conflicts of interest & occupational Crime
Confidentiality, Conflicts of interest & occupational Crimesrirenga
 
Understanding employee privacy
Understanding employee privacyUnderstanding employee privacy
Understanding employee privacyG&A Partners
 
Introduction to Employment Law 101
Introduction to Employment Law 101Introduction to Employment Law 101
Introduction to Employment Law 101DeirdreJ6972
 
Employment Law Basics For Recruiters
Employment Law Basics For RecruitersEmployment Law Basics For Recruiters
Employment Law Basics For RecruitersGeorge Lenard
 
Employee Misuse of Internet and Blogosphere
Employee Misuse of Internet and BlogosphereEmployee Misuse of Internet and Blogosphere
Employee Misuse of Internet and BlogosphereKelly Savage
 
Pli workplace privacy in the year 2013 2013-6-13
Pli workplace privacy in the year 2013   2013-6-13Pli workplace privacy in the year 2013   2013-6-13
Pli workplace privacy in the year 2013 2013-6-13mkeane
 
Workplace Monitoring After Stengart v. Loving Care Agency, April 14, 2010
Workplace Monitoring After Stengart v. Loving Care Agency, April 14, 2010Workplace Monitoring After Stengart v. Loving Care Agency, April 14, 2010
Workplace Monitoring After Stengart v. Loving Care Agency, April 14, 2010Employers Association of New Jersey
 
Workplace Privacy Presentation
Workplace Privacy PresentationWorkplace Privacy Presentation
Workplace Privacy PresentationSarah Forbes
 
Stacy Robin - The Degania Group - Technology and the Law
Stacy Robin - The Degania Group - Technology and the LawStacy Robin - The Degania Group - Technology and the Law
Stacy Robin - The Degania Group - Technology and the LawRamon Ray
 
Labor and Employment Law 2015
Labor and Employment Law 2015Labor and Employment Law 2015
Labor and Employment Law 2015G&A Partners
 
Maurer - It's time for the talk How do I avoid misclassifying personnel as in...
Maurer - It's time for the talk How do I avoid misclassifying personnel as in...Maurer - It's time for the talk How do I avoid misclassifying personnel as in...
Maurer - It's time for the talk How do I avoid misclassifying personnel as in...HR Florida State Council, Inc.
 
Tiara Ramadhani - Program Studi S1 Sistem Informasi - Fakultas Sains dan Tekn...
Tiara Ramadhani - Program Studi S1 Sistem Informasi - Fakultas Sains dan Tekn...Tiara Ramadhani - Program Studi S1 Sistem Informasi - Fakultas Sains dan Tekn...
Tiara Ramadhani - Program Studi S1 Sistem Informasi - Fakultas Sains dan Tekn...Tiara Ramadhani
 
AoIR #15 Conference Sth Korea 2014
AoIR #15 Conference Sth Korea 2014AoIR #15 Conference Sth Korea 2014
AoIR #15 Conference Sth Korea 2014Jacinta Buchbach
 
Hit Conference Flyer 2012
Hit Conference Flyer 2012Hit Conference Flyer 2012
Hit Conference Flyer 2012kcheaney
 
Employees Privacy Issues And Legal Rights
Employees Privacy Issues And Legal RightsEmployees Privacy Issues And Legal Rights
Employees Privacy Issues And Legal RightsSaad Mazhar
 
How to be evil - And stay legal
How to be evil - And stay legalHow to be evil - And stay legal
How to be evil - And stay legalAxon Partners
 

Tendances (20)

Jeremy and jeannette case
Jeremy and jeannette caseJeremy and jeannette case
Jeremy and jeannette case
 
Confidentiality, Conflicts of interest & occupational Crime
Confidentiality, Conflicts of interest & occupational CrimeConfidentiality, Conflicts of interest & occupational Crime
Confidentiality, Conflicts of interest & occupational Crime
 
Understanding employee privacy
Understanding employee privacyUnderstanding employee privacy
Understanding employee privacy
 
Introduction to Employment Law 101
Introduction to Employment Law 101Introduction to Employment Law 101
Introduction to Employment Law 101
 
Workplace Privacy
Workplace PrivacyWorkplace Privacy
Workplace Privacy
 
Internet Misuse inside the Company
Internet Misuse inside the CompanyInternet Misuse inside the Company
Internet Misuse inside the Company
 
Employment Law Basics For Recruiters
Employment Law Basics For RecruitersEmployment Law Basics For Recruiters
Employment Law Basics For Recruiters
 
Employee Misuse of Internet and Blogosphere
Employee Misuse of Internet and BlogosphereEmployee Misuse of Internet and Blogosphere
Employee Misuse of Internet and Blogosphere
 
Pli workplace privacy in the year 2013 2013-6-13
Pli workplace privacy in the year 2013   2013-6-13Pli workplace privacy in the year 2013   2013-6-13
Pli workplace privacy in the year 2013 2013-6-13
 
Workplace Monitoring After Stengart v. Loving Care Agency, April 14, 2010
Workplace Monitoring After Stengart v. Loving Care Agency, April 14, 2010Workplace Monitoring After Stengart v. Loving Care Agency, April 14, 2010
Workplace Monitoring After Stengart v. Loving Care Agency, April 14, 2010
 
Human Rights at Work slides Slideshare version
Human Rights at Work slides Slideshare versionHuman Rights at Work slides Slideshare version
Human Rights at Work slides Slideshare version
 
Workplace Privacy Presentation
Workplace Privacy PresentationWorkplace Privacy Presentation
Workplace Privacy Presentation
 
Stacy Robin - The Degania Group - Technology and the Law
Stacy Robin - The Degania Group - Technology and the LawStacy Robin - The Degania Group - Technology and the Law
Stacy Robin - The Degania Group - Technology and the Law
 
Labor and Employment Law 2015
Labor and Employment Law 2015Labor and Employment Law 2015
Labor and Employment Law 2015
 
Maurer - It's time for the talk How do I avoid misclassifying personnel as in...
Maurer - It's time for the talk How do I avoid misclassifying personnel as in...Maurer - It's time for the talk How do I avoid misclassifying personnel as in...
Maurer - It's time for the talk How do I avoid misclassifying personnel as in...
 
Tiara Ramadhani - Program Studi S1 Sistem Informasi - Fakultas Sains dan Tekn...
Tiara Ramadhani - Program Studi S1 Sistem Informasi - Fakultas Sains dan Tekn...Tiara Ramadhani - Program Studi S1 Sistem Informasi - Fakultas Sains dan Tekn...
Tiara Ramadhani - Program Studi S1 Sistem Informasi - Fakultas Sains dan Tekn...
 
AoIR #15 Conference Sth Korea 2014
AoIR #15 Conference Sth Korea 2014AoIR #15 Conference Sth Korea 2014
AoIR #15 Conference Sth Korea 2014
 
Hit Conference Flyer 2012
Hit Conference Flyer 2012Hit Conference Flyer 2012
Hit Conference Flyer 2012
 
Employees Privacy Issues And Legal Rights
Employees Privacy Issues And Legal RightsEmployees Privacy Issues And Legal Rights
Employees Privacy Issues And Legal Rights
 
How to be evil - And stay legal
How to be evil - And stay legalHow to be evil - And stay legal
How to be evil - And stay legal
 

Similaire à Workplace privacy here and now

Managing Social Media Risks for Municpalities
Managing Social Media Risks for MunicpalitiesManaging Social Media Risks for Municpalities
Managing Social Media Risks for MunicpalitiesDan Michaluk
 
Mfoa social media presentation 2
Mfoa social media presentation 2Mfoa social media presentation 2
Mfoa social media presentation 2Dan Michaluk
 
Key Issues In Workplace Privacy
Key Issues In Workplace PrivacyKey Issues In Workplace Privacy
Key Issues In Workplace PrivacyDan Michaluk
 
Mfoa social media presentation
Mfoa social media presentationMfoa social media presentation
Mfoa social media presentationDan Michaluk
 
Mfoa social media presentation
Mfoa social media presentationMfoa social media presentation
Mfoa social media presentationDan Michaluk
 
Energy Audit Retrofit Contract Legalities Pittfalls
Energy Audit Retrofit Contract Legalities PittfallsEnergy Audit Retrofit Contract Legalities Pittfalls
Energy Audit Retrofit Contract Legalities PittfallsAmy Shriner
 
The Future of Employment Law
The Future of Employment LawThe Future of Employment Law
The Future of Employment LawDan Michaluk
 
Employers and Social Media: You Love to Love It & Love to Hate It
Employers and Social Media:  You Love to Love It & Love to Hate ItEmployers and Social Media:  You Love to Love It & Love to Hate It
Employers and Social Media: You Love to Love It & Love to Hate ItJanine Anthony Bowen, Esq.
 
SM Impact and Ethics in Workplace_Atansuyi, Kostak and Manhanga_073012_FINAL
SM Impact and Ethics in Workplace_Atansuyi, Kostak and Manhanga_073012_FINALSM Impact and Ethics in Workplace_Atansuyi, Kostak and Manhanga_073012_FINAL
SM Impact and Ethics in Workplace_Atansuyi, Kostak and Manhanga_073012_FINALJohn Kostak
 
2013_Expanded_Employment_Law_Update_New_Developments_and_Trends
2013_Expanded_Employment_Law_Update_New_Developments_and_Trends2013_Expanded_Employment_Law_Update_New_Developments_and_Trends
2013_Expanded_Employment_Law_Update_New_Developments_and_TrendsParsons Behle & Latimer
 
Hbo chapter 10 issues between organizations and individuals
Hbo chapter 10 issues between organizations and individualsHbo chapter 10 issues between organizations and individuals
Hbo chapter 10 issues between organizations and individualsLeslielibantosaligumba
 
Chapter 14 The Employee’s Right to Privacy and Management of.docx
Chapter 14 The Employee’s Right to Privacy and Management of.docxChapter 14 The Employee’s Right to Privacy and Management of.docx
Chapter 14 The Employee’s Right to Privacy and Management of.docxketurahhazelhurst
 
Chapter 14 The Employee’s Right to Privacy and Management of.docx
Chapter 14 The Employee’s Right to Privacy and Management of.docxChapter 14 The Employee’s Right to Privacy and Management of.docx
Chapter 14 The Employee’s Right to Privacy and Management of.docxbartholomeocoombs
 
Social Media: Employment & HR Implications
Social Media: Employment & HR ImplicationsSocial Media: Employment & HR Implications
Social Media: Employment & HR ImplicationsCEL Public Relations
 
Social Media in the Workplace and Beyond
Social Media in the Workplace and BeyondSocial Media in the Workplace and Beyond
Social Media in the Workplace and BeyondAlexNemiroff
 
Please answer all the questions QUESTION 1 How has the .pdf
Please answer all the questions  QUESTION 1 How has the .pdfPlease answer all the questions  QUESTION 1 How has the .pdf
Please answer all the questions QUESTION 1 How has the .pdfabdulauto
 
Chapter 14Ethical Risks and Responsibilities of IT Innovations.docx
Chapter 14Ethical Risks and Responsibilities of IT Innovations.docxChapter 14Ethical Risks and Responsibilities of IT Innovations.docx
Chapter 14Ethical Risks and Responsibilities of IT Innovations.docxbartholomeocoombs
 
Project Plan CreationInclude the following components in an M.docx
Project Plan CreationInclude the following components in an M.docxProject Plan CreationInclude the following components in an M.docx
Project Plan CreationInclude the following components in an M.docxbriancrawford30935
 
Top 11 Tools For Writing An Effective Research Paper -
Top 11 Tools For Writing An Effective Research Paper -Top 11 Tools For Writing An Effective Research Paper -
Top 11 Tools For Writing An Effective Research Paper -Susan Tullis
 

Similaire à Workplace privacy here and now (20)

Managing Social Media Risks for Municpalities
Managing Social Media Risks for MunicpalitiesManaging Social Media Risks for Municpalities
Managing Social Media Risks for Municpalities
 
Mfoa social media presentation 2
Mfoa social media presentation 2Mfoa social media presentation 2
Mfoa social media presentation 2
 
Key Issues In Workplace Privacy
Key Issues In Workplace PrivacyKey Issues In Workplace Privacy
Key Issues In Workplace Privacy
 
Mfoa social media presentation
Mfoa social media presentationMfoa social media presentation
Mfoa social media presentation
 
Mfoa social media presentation
Mfoa social media presentationMfoa social media presentation
Mfoa social media presentation
 
Energy Audit Retrofit Contract Legalities Pittfalls
Energy Audit Retrofit Contract Legalities PittfallsEnergy Audit Retrofit Contract Legalities Pittfalls
Energy Audit Retrofit Contract Legalities Pittfalls
 
The Future of Employment Law
The Future of Employment LawThe Future of Employment Law
The Future of Employment Law
 
Chapter # 7
Chapter # 7Chapter # 7
Chapter # 7
 
Employers and Social Media: You Love to Love It & Love to Hate It
Employers and Social Media:  You Love to Love It & Love to Hate ItEmployers and Social Media:  You Love to Love It & Love to Hate It
Employers and Social Media: You Love to Love It & Love to Hate It
 
SM Impact and Ethics in Workplace_Atansuyi, Kostak and Manhanga_073012_FINAL
SM Impact and Ethics in Workplace_Atansuyi, Kostak and Manhanga_073012_FINALSM Impact and Ethics in Workplace_Atansuyi, Kostak and Manhanga_073012_FINAL
SM Impact and Ethics in Workplace_Atansuyi, Kostak and Manhanga_073012_FINAL
 
2013_Expanded_Employment_Law_Update_New_Developments_and_Trends
2013_Expanded_Employment_Law_Update_New_Developments_and_Trends2013_Expanded_Employment_Law_Update_New_Developments_and_Trends
2013_Expanded_Employment_Law_Update_New_Developments_and_Trends
 
Hbo chapter 10 issues between organizations and individuals
Hbo chapter 10 issues between organizations and individualsHbo chapter 10 issues between organizations and individuals
Hbo chapter 10 issues between organizations and individuals
 
Chapter 14 The Employee’s Right to Privacy and Management of.docx
Chapter 14 The Employee’s Right to Privacy and Management of.docxChapter 14 The Employee’s Right to Privacy and Management of.docx
Chapter 14 The Employee’s Right to Privacy and Management of.docx
 
Chapter 14 The Employee’s Right to Privacy and Management of.docx
Chapter 14 The Employee’s Right to Privacy and Management of.docxChapter 14 The Employee’s Right to Privacy and Management of.docx
Chapter 14 The Employee’s Right to Privacy and Management of.docx
 
Social Media: Employment & HR Implications
Social Media: Employment & HR ImplicationsSocial Media: Employment & HR Implications
Social Media: Employment & HR Implications
 
Social Media in the Workplace and Beyond
Social Media in the Workplace and BeyondSocial Media in the Workplace and Beyond
Social Media in the Workplace and Beyond
 
Please answer all the questions QUESTION 1 How has the .pdf
Please answer all the questions  QUESTION 1 How has the .pdfPlease answer all the questions  QUESTION 1 How has the .pdf
Please answer all the questions QUESTION 1 How has the .pdf
 
Chapter 14Ethical Risks and Responsibilities of IT Innovations.docx
Chapter 14Ethical Risks and Responsibilities of IT Innovations.docxChapter 14Ethical Risks and Responsibilities of IT Innovations.docx
Chapter 14Ethical Risks and Responsibilities of IT Innovations.docx
 
Project Plan CreationInclude the following components in an M.docx
Project Plan CreationInclude the following components in an M.docxProject Plan CreationInclude the following components in an M.docx
Project Plan CreationInclude the following components in an M.docx
 
Top 11 Tools For Writing An Effective Research Paper -
Top 11 Tools For Writing An Effective Research Paper -Top 11 Tools For Writing An Effective Research Paper -
Top 11 Tools For Writing An Effective Research Paper -
 

Plus de Dan Michaluk

Ecno cyber - 23 June 2023 - djm(137852631.1).pptx
Ecno cyber - 23 June 2023 - djm(137852631.1).pptxEcno cyber - 23 June 2023 - djm(137852631.1).pptx
Ecno cyber - 23 June 2023 - djm(137852631.1).pptxDan Michaluk
 
Critical Issues in School Board Cyber Security
Critical Issues in School Board Cyber SecurityCritical Issues in School Board Cyber Security
Critical Issues in School Board Cyber SecurityDan Michaluk
 
Introduction to FOI law (the law of information)
Introduction to FOI law (the law of information)Introduction to FOI law (the law of information)
Introduction to FOI law (the law of information)Dan Michaluk
 
Higher Education Sexual Violence Presentation
Higher Education Sexual Violence PresentationHigher Education Sexual Violence Presentation
Higher Education Sexual Violence PresentationDan Michaluk
 
Cyber class action claims at an inflection point
Cyber class action claims at an inflection pointCyber class action claims at an inflection point
Cyber class action claims at an inflection pointDan Michaluk
 
The pandemic and privacy
The pandemic and privacyThe pandemic and privacy
The pandemic and privacyDan Michaluk
 
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...
Cyber security for the regulator and regulated  - Ontario Regulatory Authorit...Cyber security for the regulator and regulated  - Ontario Regulatory Authorit...
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...Dan Michaluk
 
Union access to information
Union access to informationUnion access to information
Union access to informationDan Michaluk
 
Cybersecurity Risk Governance
Cybersecurity Risk GovernanceCybersecurity Risk Governance
Cybersecurity Risk GovernanceDan Michaluk
 
Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?Dan Michaluk
 
The Current State of FOI
The Current State of FOIThe Current State of FOI
The Current State of FOIDan Michaluk
 
Cyber, secrecy and the public body
Cyber, secrecy and the public bodyCyber, secrecy and the public body
Cyber, secrecy and the public bodyDan Michaluk
 
The privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsThe privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsDan Michaluk
 
Advocates' Society Tricks of the Trade 2019 - A Privacy Update
Advocates' Society Tricks of the Trade 2019 - A Privacy UpdateAdvocates' Society Tricks of the Trade 2019 - A Privacy Update
Advocates' Society Tricks of the Trade 2019 - A Privacy UpdateDan Michaluk
 
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam CompliancePrivacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam ComplianceDan Michaluk
 
Cyber Insurance and Incident Response Practice
Cyber Insurance and Incident Response Practice Cyber Insurance and Incident Response Practice
Cyber Insurance and Incident Response Practice Dan Michaluk
 
Role of a breach coach
Role of a breach coachRole of a breach coach
Role of a breach coachDan Michaluk
 
PHIPA for school boards
PHIPA for school boardsPHIPA for school boards
PHIPA for school boardsDan Michaluk
 
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam CompliancePrivacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam ComplianceDan Michaluk
 
Finding internet evidence
Finding internet evidenceFinding internet evidence
Finding internet evidenceDan Michaluk
 

Plus de Dan Michaluk (20)

Ecno cyber - 23 June 2023 - djm(137852631.1).pptx
Ecno cyber - 23 June 2023 - djm(137852631.1).pptxEcno cyber - 23 June 2023 - djm(137852631.1).pptx
Ecno cyber - 23 June 2023 - djm(137852631.1).pptx
 
Critical Issues in School Board Cyber Security
Critical Issues in School Board Cyber SecurityCritical Issues in School Board Cyber Security
Critical Issues in School Board Cyber Security
 
Introduction to FOI law (the law of information)
Introduction to FOI law (the law of information)Introduction to FOI law (the law of information)
Introduction to FOI law (the law of information)
 
Higher Education Sexual Violence Presentation
Higher Education Sexual Violence PresentationHigher Education Sexual Violence Presentation
Higher Education Sexual Violence Presentation
 
Cyber class action claims at an inflection point
Cyber class action claims at an inflection pointCyber class action claims at an inflection point
Cyber class action claims at an inflection point
 
The pandemic and privacy
The pandemic and privacyThe pandemic and privacy
The pandemic and privacy
 
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...
Cyber security for the regulator and regulated  - Ontario Regulatory Authorit...Cyber security for the regulator and regulated  - Ontario Regulatory Authorit...
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...
 
Union access to information
Union access to informationUnion access to information
Union access to information
 
Cybersecurity Risk Governance
Cybersecurity Risk GovernanceCybersecurity Risk Governance
Cybersecurity Risk Governance
 
Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?
 
The Current State of FOI
The Current State of FOIThe Current State of FOI
The Current State of FOI
 
Cyber, secrecy and the public body
Cyber, secrecy and the public bodyCyber, secrecy and the public body
Cyber, secrecy and the public body
 
The privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsThe privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analytics
 
Advocates' Society Tricks of the Trade 2019 - A Privacy Update
Advocates' Society Tricks of the Trade 2019 - A Privacy UpdateAdvocates' Society Tricks of the Trade 2019 - A Privacy Update
Advocates' Society Tricks of the Trade 2019 - A Privacy Update
 
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam CompliancePrivacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam Compliance
 
Cyber Insurance and Incident Response Practice
Cyber Insurance and Incident Response Practice Cyber Insurance and Incident Response Practice
Cyber Insurance and Incident Response Practice
 
Role of a breach coach
Role of a breach coachRole of a breach coach
Role of a breach coach
 
PHIPA for school boards
PHIPA for school boardsPHIPA for school boards
PHIPA for school boards
 
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam CompliancePrivacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam Compliance
 
Finding internet evidence
Finding internet evidenceFinding internet evidence
Finding internet evidence
 

Dernier

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 

Dernier (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

Workplace privacy here and now

  • 1. Workplace Privacy Here and Now Dan Michaluk February 3, 2011 OBA Institute - Fulfilling Your Privacy Obligations
  • 2. Outline The four hot button issues relate to The boundary between work and private life The right of access to stored communications PIPEDA application to employment in the province HO-010 – Managing the risk of employee malfeasance
  • 3. Work Life Versus Private Life Bob and Sue had a long day. They go to the Dirty Dog Pub after work and, over the course of four hours, take jabs at their supervisor, Phil.
  • 4. Work Life Versus Private Life Jack had a long day. He goes home, cracks open a beer, and boots up his home computer. Using a picture of his supervisor taken from the company intranet and some internet based software, he alters the picture so the manager looks ridiculous. Jack posts it to his Facebook page. He feels good.
  • 5. Work Life Versus Private Life Duty of fidelity applies when employee expression is likely to significantly affect a legitimate employer interest All other activity is “private” The kind of social interaction we engage in today is more likely to conflict with employer interests
  • 6. Work Life Versus Private Life Employee speech can negatively… …affect an employer’s duty to other employees …affect an employee’s ability to do his/her job …affect public perception of employee performance …affect an employer’s reputation
  • 7. Work Life Versus Private Life Cape Breton-Victoria Regional School Board From NSCA on January 25th Recognizes potential harm to reputation, but no jurisdiction to impose penalty in circumstances Likely means that potential harm to reputation can only be acted upon if “substantial and warranted” If that’s balancing at the threshold, okay
  • 8. Access to “Personal” Communications Employers need access to their systems Text messages can be incredibly useful in an investigation Three rights Routine monitoring (limited and needs based) Periodic audit (standard) Investigation on reasonable suspicion (standard)
  • 9. Access to “Personal” Communications Unfettered right or access is dying a slow death Lethbridge College – Arbitrator Ponak, 2007 Johnson v. Bell Canada – Fed Ct., 2008 Cole – Ont. S.C.J., 2009 Tfaily – Ont. C.A., 2010 City of Ottawa – Ont. S.C.J., 2010 (subtext)
  • 10. Access to “Personal” Communications What does balancing look like? The College recognizes the value of being able to work and study without concern of being under constant surveillance and therefore does not routinely monitor the activities of individuals.
  • 11. Access to “Personal” Communications What does balancing look like? However, the College does perform periodic random audits to ensure acceptable network use and will investigate situations based on a reasonable suspicion of breach. As such, users should have no expectation of privacy when using the College’s network. If you wish to send personal communications that are private you should not use the College network.
  • 12. PIPEDA Application Pre State Farm – Are we PIPEDA regulated? We use service providers as processing agents They have no independent interest in the information They handle personal information in our stead But we pay them
  • 13. PIPEDA Application State Farm - Landmark Insurer conducts surveillance for insured defendant (through its counsel, as agent) Insurer does have an independent interest in collection… insurer does get paid But no a collection in course of commercial activity… this is about defending a civil claim Ratio – construe the essence of the activity More flexible than agency… more ambiguous
  • 14. HO-010 – Managing Employee Malfeasance Unauthorized access by diagnostic imaging tech. Second similar breach at hospital (see HO-002) Limited role-based access restrictions on health care providers (access to systems and not within systems controlled) All systems not audited
  • 15. HO-010 – Managing Employee Malfeasance Findings on duty to manage malfeasance Unreasonable to continue access without a written undertaking to abide by rules (ordered) Hospitals must report to regulatory college (ordered) Complainant has right to know what discipline was imposed Post-breach communiqué to employees called for (ordered)
  • 16. HO-010 – Managing Employee Malfeasance Suggestion that identity of wrongdoer and penalty imposed should be published A suggestion at best… not backed by order or reasoning in text of order Not normative in employee and labour relations Seems mean-spirited Raises defamation issues
  • 17. Workplace Privacy Here and Now Dan Michaluk February 3, 2011 OBA Institute - Fulfilling Your Privacy Obligations