SlideShare a Scribd company logo
1 of 15
Presented By
Pandemic and
privacy issues
Dan Michaluk
October 21, 2021
Oh how far we’ve come since March 2020
2
Agenda
o COVID safety and the processing of personal information
o What law governs the collection of personal information by Schedule 2
employers?
o Key personal information flows
• Basic active screening
• Advanced screening (vaccination status, negative antigen test)
• Location tracking in the workplace
• Illness reporting and alerting to the risk of an exposure
o Other information flows
• Accommodation, antigen testing, surveys, accommodation, work from home
flows
Pandemic and privacy issues
3
o Prevention
• Everyone who breathes process a risk – we make sure
they are “fit” to enter the workplace, which requires us to
gather information that allows us to be satisfied that the risk
is acceptable
• We crave any meaningful information that speaks to the
risk – e.g., symptoms (including temperature), contact
history, travel history, and now vaccination status
o Response
• We need to know when someone is likely to have been
contagious when in the workplace
• We need to know who they were in close contact with when
in the workplace
• We then need to warn and exclude (which takes us back to
prevention)
Workplace safety rests on the processing of information
COVID safety and processing of PI
4
o PHIPA does not apply to an employer who collects
health information for employment-related purposes
– i.e., for screening purposes
• This is the Information and Privacy Commissioner’s
clear position (see Sunnybrook Health)
• Arbitrators remain confused by an old court case called
Hooper
o (M)FIPPA has an employment-related records
exclusion that leaves employees (for the most part)
without statutory privacy rights
o Ramifications are more technical than practical, but
it certainly doesn’t help to suggest to employees
your collection is governed by these statutes
o The Canadian Charter of Rights and Freedoms is
also a fairly poor basis for any objection
Neither PHIPA nor (M)FIPPA apply
What law governs?
5
o The issue - whether the collection of a particular
data element is reasonable and justified considering
both the privacy impact and the safety related
benefit (and the bias towards data minimization)
o Employment contracts grant a form of privacy right
by implication
• Unreasonable rule requiring collection of information =
potential constructive dismissal of non-union employee
or potential collective agreement breach
o The actual risk in many of these policy issues turns
on practical factors
• How many non-union employees are likely to quit and
sue?
• Are the unions on side?
There are employment law risks
What law governs?
6
o The province says active screening for
workers is required by law
o It maintains a screening protocol that
continuously changes
o PI collected correlate to risk factors
(symptoms, travel, exposure)
o Need is not controversial, though under or
over-shooting the provincial protocol raises
questions – e.g., temperature checks
o Left with a retention and security issue – use
for the data is spent within a very short time,
leaving 30 day retention a best practice
Basic active screening
Key personal information flows
7
o The fundamental question – can we collect?
o This is a question of need and proportionality
o People say vaccination status information
status is sensitive, but it isn’t really
o Risks in the Ontario public sector
• Weak Charter challenge rests on coercion
• Discrimination risks that can be mitigated
• Privacy claims via the employment contract or
collective agreement
o We have a public sector standard developing
that is relevant and part of the defence, though
certainly not determinative
Advanced screening – only the vaccinated may enter
Key personal information flows
8
o Privacy and security risks arise out quick
move to adopt applications and third-party
services – see YRDSB case for guidance
o Dealing with proof
• One time authentication? (best practice)
• Record the proof? (its done)
o Scope of the record – status only or + vaccine
type + dates of inoculation
o Retention – life of program with purge for
departing employees
o Program review – quarterly? bi-annually?
Advanced screening – other issues
Key personal information flows
9
o CMOH has presented it as a lower-impact
alternative to vaccination mandates, which
has split the public sector and created
issues and risks
o Can be integrated into screening function,
raising similar issues to collecting
vaccination status information
o Regarding sensitivity – one can argue that
antigen testing information is at the very low
end of sensitivity because it says very little
about an individual, though it does reveal
they are not vaccinated
Advanced screening – antigen tests
Key personal information flows
10
o This is part of the standard of care and supported
by ample guidance
o Key privacy issue relates to the level of precision
that’s needed and respect for the data minimization
principle
o What’s really needed, and what’s the impact?
• A work schedule
• A work schedule plus enhanced information?
• Precise location tracking at intervals
• Live location tracking
o There are technologies in use
• Apps for those without work schedules
• Is anyone using wearables? (there is labour case law)
Location tracking in the workplace
Key personal information flows
11
o Good screening should limit this
o But we must know when screening has failed to
prevent someone from entering the workplace while
potentially contagious
o This requires an administrative rule and a collection
– you must report if you are diagnosed/test positive
o We then must notify and exclude close contacts
(now, who are not vaccinated, which invites
collection of status information!)
o We do that without direct identification, though there
is certainly a risk of indirect identification that is
generally borne by those who get sick (arguably an
acceptable balance)
Illness reporting and exposure notification
Key personal information flows
12
o A “hard” vaccination mandate invites a large
number of religious accommodation requests
o Fairly simple information flow – rationale
collected for the purpose of administering the
request
o Don’t promise who will access that request –
leave that to you discretion
o Our experience
• 5 requests per 1,000 employees, and a much
higher student rate
• 20% reconsideration request rate
• 8% approval rate
Accommodation
Other information flows
13
o Administering testing (versus self-testing) is health care
and should be administered as health care = PHIPA
• If institution is the custodian, testing records should be kept
at arms’ length
o Surveys – typically optional, identifiers collected +
constraint on use and security, including through
pseudo anonymization
o Work from home flows
• I don’t believe Ontario employers are tracking productivity,
regardless of what the media says
• Ontario employers should be monitoring endpoints for
security purposes anyway!
• There are some issues to manage about video calls from
home – can an employer justify a cameras on rule?
Testing, surveys and work from home
Other information flows
14
For more information, contact:
The information contained herein is of a general nature and is not intended to constitute legal advice, a complete statement of the law, or an opinion on
any subject. No one should act upon it or refrain from acting without a thorough examination of the law after the facts of a specific situation are considered.
You are urged to consult your legal adviser in cases of specific questions or concerns. BLG does not warrant or guarantee the accuracy, currency or
completeness of this presentation. No part of this presentation may be reproduced without prior written permission of Borden Ladner Gervais LLP.
© 2021 Borden Ladner Gervais LLP. Borden Ladner Gervais is an Ontario Limited Liability Partnership.
Thank You
Dan Michaluk
Partner
416.367.6097
dmichaluk@blg.com

More Related Content

What's hot

Cyber Insurance and Incident Response Practice
Cyber Insurance and Incident Response Practice Cyber Insurance and Incident Response Practice
Cyber Insurance and Incident Response Practice Dan Michaluk
 
Aprio cybersecurity and board information
Aprio cybersecurity and board informationAprio cybersecurity and board information
Aprio cybersecurity and board informationAprio
 
How to manage a data breach
How to manage a data breachHow to manage a data breach
How to manage a data breachDan Michaluk
 
Cyber legal update oct 7 2015
Cyber legal update oct 7 2015Cyber legal update oct 7 2015
Cyber legal update oct 7 2015Dan Michaluk
 
Canadian Association of University Solicitors - Privacy Update 2016
Canadian Association of University Solicitors - Privacy Update 2016Canadian Association of University Solicitors - Privacy Update 2016
Canadian Association of University Solicitors - Privacy Update 2016Dan Michaluk
 
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model RulesData Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model Rulessaurnou
 
How your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyHow your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyTechSoup Canada
 
CMW Cyber Liability Presentation
CMW Cyber Liability PresentationCMW Cyber Liability Presentation
CMW Cyber Liability PresentationSean Graham
 
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2TechSoup Canada
 
Privacy and breaches in health care - a legal update
Privacy and breaches in health care - a legal updatePrivacy and breaches in health care - a legal update
Privacy and breaches in health care - a legal updateDan Michaluk
 
Advantage ppt data breaches km approved - final (djm notes)
Advantage ppt  data breaches   km approved - final (djm notes)Advantage ppt  data breaches   km approved - final (djm notes)
Advantage ppt data breaches km approved - final (djm notes)Dan Michaluk
 
Managing and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policiesManaging and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policiesIISPEastMids
 
Cybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data EncryptionCybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data EncryptionShawn Tuma
 
Working with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security StrategiesWorking with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security StrategiesMeg Weber
 
Data protection regulation
Data protection regulationData protection regulation
Data protection regulationGreg Ezeilo
 
CYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMSCYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMSScott Suhy
 
Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1Asad Zaman
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach CostResilient Systems
 

What's hot (20)

Cyber Insurance and Incident Response Practice
Cyber Insurance and Incident Response Practice Cyber Insurance and Incident Response Practice
Cyber Insurance and Incident Response Practice
 
Aprio cybersecurity and board information
Aprio cybersecurity and board informationAprio cybersecurity and board information
Aprio cybersecurity and board information
 
How to manage a data breach
How to manage a data breachHow to manage a data breach
How to manage a data breach
 
Cyber legal update oct 7 2015
Cyber legal update oct 7 2015Cyber legal update oct 7 2015
Cyber legal update oct 7 2015
 
Canadian Association of University Solicitors - Privacy Update 2016
Canadian Association of University Solicitors - Privacy Update 2016Canadian Association of University Solicitors - Privacy Update 2016
Canadian Association of University Solicitors - Privacy Update 2016
 
Cas cyber prez
Cas cyber prezCas cyber prez
Cas cyber prez
 
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model RulesData Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
 
How your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyHow your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacy
 
CMW Cyber Liability Presentation
CMW Cyber Liability PresentationCMW Cyber Liability Presentation
CMW Cyber Liability Presentation
 
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
 
Privacy and breaches in health care - a legal update
Privacy and breaches in health care - a legal updatePrivacy and breaches in health care - a legal update
Privacy and breaches in health care - a legal update
 
Advantage ppt data breaches km approved - final (djm notes)
Advantage ppt  data breaches   km approved - final (djm notes)Advantage ppt  data breaches   km approved - final (djm notes)
Advantage ppt data breaches km approved - final (djm notes)
 
Managing and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policiesManaging and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policies
 
Cybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data EncryptionCybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data Encryption
 
Working with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security StrategiesWorking with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security Strategies
 
The Basics of Cyber Insurance
The Basics of Cyber InsuranceThe Basics of Cyber Insurance
The Basics of Cyber Insurance
 
Data protection regulation
Data protection regulationData protection regulation
Data protection regulation
 
CYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMSCYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMS
 
Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach Cost
 

Similar to The pandemic and privacy

SA Law | Employment | HR forum slides
SA Law | Employment | HR forum slidesSA Law | Employment | HR forum slides
SA Law | Employment | HR forum slidesHester Potiuk
 
HIPAA presentation GAHU v7
HIPAA presentation GAHU v7HIPAA presentation GAHU v7
HIPAA presentation GAHU v7Jason Karn
 
Critical Issues in School Board Cyber Security
Critical Issues in School Board Cyber SecurityCritical Issues in School Board Cyber Security
Critical Issues in School Board Cyber SecurityDan Michaluk
 
The mobile health IT security challenge: way bigger than HIPAA?
The mobile health IT security challenge: way bigger than HIPAA?The mobile health IT security challenge: way bigger than HIPAA?
The mobile health IT security challenge: way bigger than HIPAA?Stephen Cobb
 
Ann Cavoukian Presentation
Ann Cavoukian PresentationAnn Cavoukian Presentation
Ann Cavoukian PresentationCityAge
 
Governance And Data Protection In The Health Sector - Billy Hawkes
Governance And Data Protection In The Health Sector - Billy HawkesGovernance And Data Protection In The Health Sector - Billy Hawkes
Governance And Data Protection In The Health Sector - Billy Hawkeshealthcareisi
 
Chapter 3Risk Management in EmploymentEmployment Re.docx
Chapter 3Risk Management in EmploymentEmployment Re.docxChapter 3Risk Management in EmploymentEmployment Re.docx
Chapter 3Risk Management in EmploymentEmployment Re.docxketurahhazelhurst
 
Back in Business: Information Every Idaho Employer Should Know
Back in Business: Information Every Idaho Employer Should KnowBack in Business: Information Every Idaho Employer Should Know
Back in Business: Information Every Idaho Employer Should KnowParsons Behle & Latimer
 
Introduction to FOI law (the law of information)
Introduction to FOI law (the law of information)Introduction to FOI law (the law of information)
Introduction to FOI law (the law of information)Dan Michaluk
 
Hbjql criminal records_where_do_they_come_from_and_what_to_do_when_your_appli...
Hbjql criminal records_where_do_they_come_from_and_what_to_do_when_your_appli...Hbjql criminal records_where_do_they_come_from_and_what_to_do_when_your_appli...
Hbjql criminal records_where_do_they_come_from_and_what_to_do_when_your_appli...vp1234
 
Are You HIPAA Safe?
Are You HIPAA Safe?Are You HIPAA Safe?
Are You HIPAA Safe?TriageLogic
 
Keynote Presentation "Building a Culture of Privacy and Security into Your Or...
Keynote Presentation "Building a Culture of Privacy and Security into Your Or...Keynote Presentation "Building a Culture of Privacy and Security into Your Or...
Keynote Presentation "Building a Culture of Privacy and Security into Your Or...Health IT Conference – iHT2
 
HR Insights 24.02.21 - The Impact of Vaccinations
HR Insights 24.02.21 - The Impact of Vaccinations HR Insights 24.02.21 - The Impact of Vaccinations
HR Insights 24.02.21 - The Impact of Vaccinations James Cheetham
 
Challenges and opportunities in the paperless NHS & beyond - A data protectio...
Challenges and opportunities in the paperless NHS & beyond - A data protectio...Challenges and opportunities in the paperless NHS & beyond - A data protectio...
Challenges and opportunities in the paperless NHS & beyond - A data protectio...Osborne Clarke
 
A Shot in the Arm? Issues Employers Should Consider When Making Decisions Abo...
A Shot in the Arm? Issues Employers Should Consider When Making Decisions Abo...A Shot in the Arm? Issues Employers Should Consider When Making Decisions Abo...
A Shot in the Arm? Issues Employers Should Consider When Making Decisions Abo...Roetzel & Andress
 
COVID Vaccination Policy & The Workplace (Ontario Laws)
COVID Vaccination Policy & The Workplace (Ontario Laws)COVID Vaccination Policy & The Workplace (Ontario Laws)
COVID Vaccination Policy & The Workplace (Ontario Laws)GreaterOshawaChamber
 
Training innovations information governance slideshare 2015
Training innovations information governance slideshare 2015Training innovations information governance slideshare 2015
Training innovations information governance slideshare 2015Patrick Doyle
 

Similar to The pandemic and privacy (20)

Whistle blowing
Whistle blowingWhistle blowing
Whistle blowing
 
SA Law | Employment | HR forum slides
SA Law | Employment | HR forum slidesSA Law | Employment | HR forum slides
SA Law | Employment | HR forum slides
 
HIPAA presentation GAHU v7
HIPAA presentation GAHU v7HIPAA presentation GAHU v7
HIPAA presentation GAHU v7
 
Critical Issues in School Board Cyber Security
Critical Issues in School Board Cyber SecurityCritical Issues in School Board Cyber Security
Critical Issues in School Board Cyber Security
 
The mobile health IT security challenge: way bigger than HIPAA?
The mobile health IT security challenge: way bigger than HIPAA?The mobile health IT security challenge: way bigger than HIPAA?
The mobile health IT security challenge: way bigger than HIPAA?
 
Ann Cavoukian Presentation
Ann Cavoukian PresentationAnn Cavoukian Presentation
Ann Cavoukian Presentation
 
Governance And Data Protection In The Health Sector - Billy Hawkes
Governance And Data Protection In The Health Sector - Billy HawkesGovernance And Data Protection In The Health Sector - Billy Hawkes
Governance And Data Protection In The Health Sector - Billy Hawkes
 
Chapter 3Risk Management in EmploymentEmployment Re.docx
Chapter 3Risk Management in EmploymentEmployment Re.docxChapter 3Risk Management in EmploymentEmployment Re.docx
Chapter 3Risk Management in EmploymentEmployment Re.docx
 
Back in Business: Information Every Idaho Employer Should Know
Back in Business: Information Every Idaho Employer Should KnowBack in Business: Information Every Idaho Employer Should Know
Back in Business: Information Every Idaho Employer Should Know
 
Introduction to FOI law (the law of information)
Introduction to FOI law (the law of information)Introduction to FOI law (the law of information)
Introduction to FOI law (the law of information)
 
Hbjql criminal records_where_do_they_come_from_and_what_to_do_when_your_appli...
Hbjql criminal records_where_do_they_come_from_and_what_to_do_when_your_appli...Hbjql criminal records_where_do_they_come_from_and_what_to_do_when_your_appli...
Hbjql criminal records_where_do_they_come_from_and_what_to_do_when_your_appli...
 
Are You HIPAA Safe?
Are You HIPAA Safe?Are You HIPAA Safe?
Are You HIPAA Safe?
 
Keynote Presentation "Building a Culture of Privacy and Security into Your Or...
Keynote Presentation "Building a Culture of Privacy and Security into Your Or...Keynote Presentation "Building a Culture of Privacy and Security into Your Or...
Keynote Presentation "Building a Culture of Privacy and Security into Your Or...
 
HR Insights 24.02.21 - The Impact of Vaccinations
HR Insights 24.02.21 - The Impact of Vaccinations HR Insights 24.02.21 - The Impact of Vaccinations
HR Insights 24.02.21 - The Impact of Vaccinations
 
COVID-19 Vaccinations and the Workplace
COVID-19 Vaccinations and the WorkplaceCOVID-19 Vaccinations and the Workplace
COVID-19 Vaccinations and the Workplace
 
Challenges and opportunities in the paperless NHS & beyond - A data protectio...
Challenges and opportunities in the paperless NHS & beyond - A data protectio...Challenges and opportunities in the paperless NHS & beyond - A data protectio...
Challenges and opportunities in the paperless NHS & beyond - A data protectio...
 
A Shot in the Arm? Issues Employers Should Consider When Making Decisions Abo...
A Shot in the Arm? Issues Employers Should Consider When Making Decisions Abo...A Shot in the Arm? Issues Employers Should Consider When Making Decisions Abo...
A Shot in the Arm? Issues Employers Should Consider When Making Decisions Abo...
 
Overview on data privacy
Overview on data privacy Overview on data privacy
Overview on data privacy
 
COVID Vaccination Policy & The Workplace (Ontario Laws)
COVID Vaccination Policy & The Workplace (Ontario Laws)COVID Vaccination Policy & The Workplace (Ontario Laws)
COVID Vaccination Policy & The Workplace (Ontario Laws)
 
Training innovations information governance slideshare 2015
Training innovations information governance slideshare 2015Training innovations information governance slideshare 2015
Training innovations information governance slideshare 2015
 

More from Dan Michaluk

Ecno cyber - 23 June 2023 - djm(137852631.1).pptx
Ecno cyber - 23 June 2023 - djm(137852631.1).pptxEcno cyber - 23 June 2023 - djm(137852631.1).pptx
Ecno cyber - 23 June 2023 - djm(137852631.1).pptxDan Michaluk
 
Union access to information
Union access to informationUnion access to information
Union access to informationDan Michaluk
 
Cybersecurity Risk Governance
Cybersecurity Risk GovernanceCybersecurity Risk Governance
Cybersecurity Risk GovernanceDan Michaluk
 
The privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsThe privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsDan Michaluk
 
Advocates' Society Tricks of the Trade 2019 - A Privacy Update
Advocates' Society Tricks of the Trade 2019 - A Privacy UpdateAdvocates' Society Tricks of the Trade 2019 - A Privacy Update
Advocates' Society Tricks of the Trade 2019 - A Privacy UpdateDan Michaluk
 
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam CompliancePrivacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam ComplianceDan Michaluk
 
Role of a breach coach
Role of a breach coachRole of a breach coach
Role of a breach coachDan Michaluk
 
PHIPA for school boards
PHIPA for school boardsPHIPA for school boards
PHIPA for school boardsDan Michaluk
 
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam CompliancePrivacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam ComplianceDan Michaluk
 
Finding internet evidence
Finding internet evidenceFinding internet evidence
Finding internet evidenceDan Michaluk
 
Sexual Assault in Higher Education - Law Policy and Practice
Sexual Assault in Higher Education - Law Policy and PracticeSexual Assault in Higher Education - Law Policy and Practice
Sexual Assault in Higher Education - Law Policy and PracticeDan Michaluk
 
Student Conduct Investigations - Examining Evidence and Determining Credibiliity
Student Conduct Investigations - Examining Evidence and Determining CredibiliityStudent Conduct Investigations - Examining Evidence and Determining Credibiliity
Student Conduct Investigations - Examining Evidence and Determining CredibiliityDan Michaluk
 
Cybersecurity and data loss - It's not just about lost USB keys today
Cybersecurity and data loss - It's not just about lost USB keys todayCybersecurity and data loss - It's not just about lost USB keys today
Cybersecurity and data loss - It's not just about lost USB keys todayDan Michaluk
 
Cacuss 2015 sexual violence
Cacuss 2015 sexual violenceCacuss 2015 sexual violence
Cacuss 2015 sexual violenceDan Michaluk
 
Responding to Data Breaches
Responding to Data BreachesResponding to Data Breaches
Responding to Data BreachesDan Michaluk
 

More from Dan Michaluk (15)

Ecno cyber - 23 June 2023 - djm(137852631.1).pptx
Ecno cyber - 23 June 2023 - djm(137852631.1).pptxEcno cyber - 23 June 2023 - djm(137852631.1).pptx
Ecno cyber - 23 June 2023 - djm(137852631.1).pptx
 
Union access to information
Union access to informationUnion access to information
Union access to information
 
Cybersecurity Risk Governance
Cybersecurity Risk GovernanceCybersecurity Risk Governance
Cybersecurity Risk Governance
 
The privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsThe privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analytics
 
Advocates' Society Tricks of the Trade 2019 - A Privacy Update
Advocates' Society Tricks of the Trade 2019 - A Privacy UpdateAdvocates' Society Tricks of the Trade 2019 - A Privacy Update
Advocates' Society Tricks of the Trade 2019 - A Privacy Update
 
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam CompliancePrivacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam Compliance
 
Role of a breach coach
Role of a breach coachRole of a breach coach
Role of a breach coach
 
PHIPA for school boards
PHIPA for school boardsPHIPA for school boards
PHIPA for school boards
 
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam CompliancePrivacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam Compliance
 
Finding internet evidence
Finding internet evidenceFinding internet evidence
Finding internet evidence
 
Sexual Assault in Higher Education - Law Policy and Practice
Sexual Assault in Higher Education - Law Policy and PracticeSexual Assault in Higher Education - Law Policy and Practice
Sexual Assault in Higher Education - Law Policy and Practice
 
Student Conduct Investigations - Examining Evidence and Determining Credibiliity
Student Conduct Investigations - Examining Evidence and Determining CredibiliityStudent Conduct Investigations - Examining Evidence and Determining Credibiliity
Student Conduct Investigations - Examining Evidence and Determining Credibiliity
 
Cybersecurity and data loss - It's not just about lost USB keys today
Cybersecurity and data loss - It's not just about lost USB keys todayCybersecurity and data loss - It's not just about lost USB keys today
Cybersecurity and data loss - It's not just about lost USB keys today
 
Cacuss 2015 sexual violence
Cacuss 2015 sexual violenceCacuss 2015 sexual violence
Cacuss 2015 sexual violence
 
Responding to Data Breaches
Responding to Data BreachesResponding to Data Breaches
Responding to Data Breaches
 

Recently uploaded

如何办理威斯康星大学密尔沃基分校毕业证学位证书
 如何办理威斯康星大学密尔沃基分校毕业证学位证书 如何办理威斯康星大学密尔沃基分校毕业证学位证书
如何办理威斯康星大学密尔沃基分校毕业证学位证书Fir sss
 
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxConstitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxsrikarna235
 
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书SD DS
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...shubhuc963
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一st Las
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书1k98h0e1
 
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书FS LS
 
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》o8wvnojp
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书Fir L
 
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSVIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSDr. Oliver Massmann
 
Succession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil CodeSuccession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil CodeMelvinPernez2
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementShubhiSharma858417
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝soniya singh
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书SD DS
 
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书SD DS
 
如何办理纽约州立大学石溪分校毕业证学位证书
 如何办理纽约州立大学石溪分校毕业证学位证书 如何办理纽约州立大学石溪分校毕业证学位证书
如何办理纽约州立大学石溪分校毕业证学位证书Fir sss
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaAbheet Mangleek
 
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptx
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptxAn Introduction guidance of the European Union Law 2020_EU Seminar 4.pptx
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptxKUHANARASARATNAM1
 
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书srst S
 
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiAlexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiBlayneRush1
 

Recently uploaded (20)

如何办理威斯康星大学密尔沃基分校毕业证学位证书
 如何办理威斯康星大学密尔沃基分校毕业证学位证书 如何办理威斯康星大学密尔沃基分校毕业证学位证书
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxConstitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
 
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
 
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
 
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
 
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSVIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
 
Succession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil CodeSuccession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil Code
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreement
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
 
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
 
如何办理纽约州立大学石溪分校毕业证学位证书
 如何办理纽约州立大学石溪分校毕业证学位证书 如何办理纽约州立大学石溪分校毕业证学位证书
如何办理纽约州立大学石溪分校毕业证学位证书
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in India
 
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptx
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptxAn Introduction guidance of the European Union Law 2020_EU Seminar 4.pptx
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptx
 
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
 
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiAlexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
 

The pandemic and privacy

  • 1. Presented By Pandemic and privacy issues Dan Michaluk October 21, 2021
  • 2. Oh how far we’ve come since March 2020 2
  • 3. Agenda o COVID safety and the processing of personal information o What law governs the collection of personal information by Schedule 2 employers? o Key personal information flows • Basic active screening • Advanced screening (vaccination status, negative antigen test) • Location tracking in the workplace • Illness reporting and alerting to the risk of an exposure o Other information flows • Accommodation, antigen testing, surveys, accommodation, work from home flows Pandemic and privacy issues 3
  • 4. o Prevention • Everyone who breathes process a risk – we make sure they are “fit” to enter the workplace, which requires us to gather information that allows us to be satisfied that the risk is acceptable • We crave any meaningful information that speaks to the risk – e.g., symptoms (including temperature), contact history, travel history, and now vaccination status o Response • We need to know when someone is likely to have been contagious when in the workplace • We need to know who they were in close contact with when in the workplace • We then need to warn and exclude (which takes us back to prevention) Workplace safety rests on the processing of information COVID safety and processing of PI 4
  • 5. o PHIPA does not apply to an employer who collects health information for employment-related purposes – i.e., for screening purposes • This is the Information and Privacy Commissioner’s clear position (see Sunnybrook Health) • Arbitrators remain confused by an old court case called Hooper o (M)FIPPA has an employment-related records exclusion that leaves employees (for the most part) without statutory privacy rights o Ramifications are more technical than practical, but it certainly doesn’t help to suggest to employees your collection is governed by these statutes o The Canadian Charter of Rights and Freedoms is also a fairly poor basis for any objection Neither PHIPA nor (M)FIPPA apply What law governs? 5
  • 6. o The issue - whether the collection of a particular data element is reasonable and justified considering both the privacy impact and the safety related benefit (and the bias towards data minimization) o Employment contracts grant a form of privacy right by implication • Unreasonable rule requiring collection of information = potential constructive dismissal of non-union employee or potential collective agreement breach o The actual risk in many of these policy issues turns on practical factors • How many non-union employees are likely to quit and sue? • Are the unions on side? There are employment law risks What law governs? 6
  • 7. o The province says active screening for workers is required by law o It maintains a screening protocol that continuously changes o PI collected correlate to risk factors (symptoms, travel, exposure) o Need is not controversial, though under or over-shooting the provincial protocol raises questions – e.g., temperature checks o Left with a retention and security issue – use for the data is spent within a very short time, leaving 30 day retention a best practice Basic active screening Key personal information flows 7
  • 8. o The fundamental question – can we collect? o This is a question of need and proportionality o People say vaccination status information status is sensitive, but it isn’t really o Risks in the Ontario public sector • Weak Charter challenge rests on coercion • Discrimination risks that can be mitigated • Privacy claims via the employment contract or collective agreement o We have a public sector standard developing that is relevant and part of the defence, though certainly not determinative Advanced screening – only the vaccinated may enter Key personal information flows 8
  • 9. o Privacy and security risks arise out quick move to adopt applications and third-party services – see YRDSB case for guidance o Dealing with proof • One time authentication? (best practice) • Record the proof? (its done) o Scope of the record – status only or + vaccine type + dates of inoculation o Retention – life of program with purge for departing employees o Program review – quarterly? bi-annually? Advanced screening – other issues Key personal information flows 9
  • 10. o CMOH has presented it as a lower-impact alternative to vaccination mandates, which has split the public sector and created issues and risks o Can be integrated into screening function, raising similar issues to collecting vaccination status information o Regarding sensitivity – one can argue that antigen testing information is at the very low end of sensitivity because it says very little about an individual, though it does reveal they are not vaccinated Advanced screening – antigen tests Key personal information flows 10
  • 11. o This is part of the standard of care and supported by ample guidance o Key privacy issue relates to the level of precision that’s needed and respect for the data minimization principle o What’s really needed, and what’s the impact? • A work schedule • A work schedule plus enhanced information? • Precise location tracking at intervals • Live location tracking o There are technologies in use • Apps for those without work schedules • Is anyone using wearables? (there is labour case law) Location tracking in the workplace Key personal information flows 11
  • 12. o Good screening should limit this o But we must know when screening has failed to prevent someone from entering the workplace while potentially contagious o This requires an administrative rule and a collection – you must report if you are diagnosed/test positive o We then must notify and exclude close contacts (now, who are not vaccinated, which invites collection of status information!) o We do that without direct identification, though there is certainly a risk of indirect identification that is generally borne by those who get sick (arguably an acceptable balance) Illness reporting and exposure notification Key personal information flows 12
  • 13. o A “hard” vaccination mandate invites a large number of religious accommodation requests o Fairly simple information flow – rationale collected for the purpose of administering the request o Don’t promise who will access that request – leave that to you discretion o Our experience • 5 requests per 1,000 employees, and a much higher student rate • 20% reconsideration request rate • 8% approval rate Accommodation Other information flows 13
  • 14. o Administering testing (versus self-testing) is health care and should be administered as health care = PHIPA • If institution is the custodian, testing records should be kept at arms’ length o Surveys – typically optional, identifiers collected + constraint on use and security, including through pseudo anonymization o Work from home flows • I don’t believe Ontario employers are tracking productivity, regardless of what the media says • Ontario employers should be monitoring endpoints for security purposes anyway! • There are some issues to manage about video calls from home – can an employer justify a cameras on rule? Testing, surveys and work from home Other information flows 14
  • 15. For more information, contact: The information contained herein is of a general nature and is not intended to constitute legal advice, a complete statement of the law, or an opinion on any subject. No one should act upon it or refrain from acting without a thorough examination of the law after the facts of a specific situation are considered. You are urged to consult your legal adviser in cases of specific questions or concerns. BLG does not warrant or guarantee the accuracy, currency or completeness of this presentation. No part of this presentation may be reproduced without prior written permission of Borden Ladner Gervais LLP. © 2021 Borden Ladner Gervais LLP. Borden Ladner Gervais is an Ontario Limited Liability Partnership. Thank You Dan Michaluk Partner 416.367.6097 dmichaluk@blg.com