SlideShare a Scribd company logo
1 of 57
Download to read offline
600 – 889 West Pender Street
Vancouver, BC V6C 3B2
Office: (604) 568-5464
http://www.overholtlawyers.com
PRIVACY IN THE WORKPLACE:
Employee Monitoring and
Surveillance
March 30, 2021 via Zoom
Jennifer S. Kwok
jennifer@overholtlawyers.com
604-676-4189 (direct)
Webinar Agenda
1) Privacy Protection Laws (PIPEDA and BC’s PIPA)
2) What is personal information in the context of employment?
3) Consent under privacy law
4) Surveillance and monitoring of employees – the various tests
5) Privacy decisions
4) Best practices (storage, access, retention, policies)
Statutory Framework
1) Personal Information Protection and
Electronic Documents Act (PIPEDA)
2) BC’s Personal Information Protection Act
(PIPA)
3) BC’s Freedom of Information and Protection
of Privacy Act (FIPPA)
APPLICABLE LEGISLATION
Which legislation applies to your organization?
1) PIPEDA
2) PIPA
3) FIPPA
 PIPEDA was created to balance competing interests of
allowing commercial activity to function and protection of
individual privacy and personal information
 PIPEDA, FIPPA and PIPA only protect “personal information”
 Personal information is defined as:
“Information about an identifiable individual.”
 If there is a possibility of associating anonymous info with an
identifiable person, this is not “anonymous”
PIPEDA – General Overview
 Under PIPEDA, PIPA, and FIPPA personal information
also includes “employee personal information” but does
does not include:
o (business) contact information
 Consent is not required for the collection, use and
disclosure of business contact information for the purpose
of communicating with an individual about their
employment, business or profession
“Personal Information” is Not…
 Under PIPA “personal information” also does not include “work
product” information
 This is “information collected or prepared as part of an individual's
or group's responsibilities/activities related to their employment or
business but does not include personal information about an
individual who did not prepare or collect the personal information.”
 Consent not required for its collection, use, disclosure
 PIPEDA also contains exceptions to consent requirements where
personal information is produced by an individual in the course of
their employment, business or profession.
“Personal Information” is Not…
 Personal information about employees is
interpreted very broadly, and may include:
o Personnel files, performance evaluations, employee
complaints, discipline
o Home address, birthdate, salaries, benefits
o Medical, biometric or health information
o Pictures and recordings of employees
“Employee Personal Information”
 The knowledge and consent of an individual is
required to collect, use or disclose their personal
information except under certain circumstances
as permitted by law
oWhat is the purpose of the collection?
oHow will it be used?
oHow and to whom will it be disclosed?
CONSENT IS REQUIRED
 Under FIPPA:
A public body is not required to collect personal
information directly from the individual if the
information is about an employee, and the
collection of the information is necessary for the
purposes of managing or terminating an
employment relationship between a public body
and the employee
CONSENT IS NOT REQUIRED…
 Under PIPEDA:
Employee personal information is excluded from
the consent requirements if the collection, use or
disclosure of the information is necessary to
establish, manage or terminate an employment
relationship between the federal work, undertaking
or business and the individual
CONSENT IS NOT REQUIRED…
 Under PIPA:
Employee personal information is excluded from
the consent requirements if it is being collected,
used or disclosed for the purposes reasonably
required to establish, manage or terminate an
employment relationship between the
organization and that individual
CONSENT IS NOT REQUIRED…
 Under PIPA:
o The collection, use or disclosure must be
reasonable
 Under FIPPA and PIPEDA:
o The collection, use or disclosure must be
necessary
REASONABLENESS / NECESSITY
 In addition, employees must be provided with notice, in
advance that the information will be collected
 They must also be advised of the employer’s
purpose(s) for collecting the information
 And, the information must only be used for the
purpose of establishing, managing or terminating the
employment relationship
BUT NOTICE IS REQUIRED…
What are some legitimate purposes your
organization might have to monitor
employees?
MONITORING EMPLOYEES
What are some legitimate purposes to monitor employees?
- Location information of employees for safety and physical security
reasons
- Location information to properly allocate business resources
- Employee productivity and performance/misuse of resources
- To prevent breaches of confidential information
- To deter workplace harassment or violence or other misconduct
- To deter fraud or theft
- To obtain evidence of employee malingering (abuse of benefits)
MONITORING EMPLOYEES
 What types of employee monitoring, if
any, is in your workplace or is being
contemplated?
MONITORING METHODS
The most common methods include:
a)Video surveillance (covert or overt)
b)Audio recording
c)GPS, RFID or other location tracking
d)Keystroke monitoring
e) Review of employee work emails/internet/computer systems
f)Wearables (apple watch, fitbit)*
g)Biometric data (iris scanning, fingerprints, voice prints)
MONITORING METHODS
 Something to keep in mind:
The existence of a legitimate purpose or
reason to monitor does not mean that the
method chosen to achieve the purpose is
also reasonable in the circumstances
IS THE METHOD APPROPRIATE?
 Privacy commissioners, judges, and
arbitrators have developed different tests to
evaluate whether monitoring or surveilling
of employees is acceptable.
THE DIFFERENT TESTS
1) Is the measure demonstrably necessary to meet a
specific need?
2) Is the measure likely to be effective in meeting
that need?
3) Is the loss of privacy proportional to the benefit
gained?
4) Is there a less privacy-invasive way of achieving
the same end?
The Federal Privacy Commissioner
 Considers the overriding criteria of
reasonableness in assessing compliance
with PIPA.
The BC Privacy Commissioner
 Relevant factors the BC OIPC will consider include:
1) Is the personal information sensitive?
2) How much personal information is being collected or used?
3) Is the collection, use, disclosure of the personal information
likely to be effective in fulfilling the employer’s objectives?
4) Do alternatives exist and have they been given reasonable
consideration?
5) Is the monitoring covert or overt?
THE BC APPROACH - FACTORS
 Video that captures an individual’s physical image or movement
usually constitutes personal information
 Covert and overt surveillance are treated differently, with covert
monitoring treated as extremely privacy-invasive only permissible
in limited cases
 Arbitrators have also consistently adopted the reasonableness test
in situations involving covert video surveillance conducted outside
of the workplace
 Misconception – it is not the case that privacy obligations do not
apply if surveillance conducted in a public place
VIDEO SURVEILLANCE
The employer suspected employee engaged in a construction
business outside of his work. The employee called in sick on a
Friday and advised that he would also be sick on the following
Monday. The employer engaged a third party investigator to
covertly monitor the employee’s activities on Monday. The
investigation did indeed show that the grievor was working on a
construction project when he claimed to be sick. The employer
terminated his employment. The union argued that the
surveillance video was inadmissible as an invasion of the
employee’s privacy.
VIDEO SURVEILLANCE - SCENARIO
 1) Reasonable
 2) Not reasonable
 Doman Forest Products Ltd. v. I.W.A.-Canada, Local 1-357,1990 CarswellBC 2030 British Columbia
Arbitration
POLLING QUESTION
The grievor had been off work receiving workers’ compensation
benefits. The employer suspected that the employee was abusing his
sick leave benefits and was suspicious of him as it had heard rumours
that he was involved in a private contracting business. It retained a
private investigator to monitor the grievor's activities. Based on the
investigator's report and a video tape which showed the grievor
working at two construction sites while he was on sick leave, the
Employer concluded that the grievor had been engaged actively in
supervising construction work, and therefore was fraudulently on sick
leave. An issue arose during the hearing as to the admissibility of the
video tape evidence obtained by the private investigator.
VIDEO SURVEILLANCE - SCENARIO
 1) Reasonable
 2) Not reasonable
 Steels Industrial Products Ltd. v. Teamsters, Local 213, 1991 CarswellBC 3326 British Columbia Arbitration
POLLING QUESTION
 Different considerations apply when cameras are visible to
employees.
 Does the surveillance represent a legitimate exercise of
management rights?
 The tests for evaluating the permissibility of overt monitoring
are the same
 Employers need to define the objectives which should related
to addressing actual past incidents
 Employees need to be informed!!
VIDEO SURVEILLANCE - OVERT
 In determining whether video surveillance cameras are
reasonable in a workplace, the OIPC has stated the following:
“Video surveillance should only be used as a last resort after
exhausting less privacy-invasive alternatives, such as
improved workplace supervision or implementation of theft-
prevention controls. Organizations need to consider whether
video surveillance will achieve the intended purpose and whether
the concerns are serious enough to warrant implementing this
highly invasive technology.”
VIDEO SURVEILLANCE - OVERT
 The BC Privacy Commissioner has said that video
camera cannot – and should not – replace adequate
employee supervision
 Other considerations:
• Even if video is not a breach of PIPA, this does not
necessarily mean that all images captured by the system
would be admissible as evidence in a proceeding, such as
a wrongful dismissal case
VIDEO SURVEILLANCE - OVERT
The employer installed six digital recording surveillance cameras
in its mechanical facility area. The rationale was that it was
necessary to reduce vandalism (following 2 incidents) and deter
theft, as well as to provide security for staff; (there were reports of
female staff feeling vulnerable). The surveillance was not
surreptitious and was not limited to employees. Visitors, suppliers
and trespassers would be captured.
VIDEO SURVEILLANCE - SCENARIO
 1) Reasonable
 2) Not reasonable
 Eastmond v. Canadian Pacific Railway, 2004 FC 852
POLLING QUESTION
 The employer had video cameras at a coal mine throughout the site and
in its office area. The stated purpose in the operational areas was to
monitor and oversee production and to ensure work was being
performed safely. In the non-operational areas, the primary purpose was
safety and security. Cameras focused on tool cribs were for the purpose
of deterring employee theft. The cameras recorded continuously for up to
30 days then the footage was erased. The supervisors could also view
the camera recordings in real time.
 The employer informed the Union of the purpose of the collection, use
and disclosure of employee personal information through the use of
video cameras. It also provided a full list of cameras, their location and
who can access them.
VIDEO SURVEILLANCE - SCENARIO
 1) Reasonable
 2) Not reasonable
 3) Some of the cameras are reasonable
 Teck Coal Limited, 2020 BC OIPC 24
POLLING QUESTION
 Best practices:
1. Implement a policy that sets out the criteria that must be
met before video surveillance is undertaken
2. Detail who is authorized to operate the system and view
3. Limit the collection to that which is necessary to achieve
the stated purpose(s) and limit the use of the surveillance
to its stated purpose(s)
4. Address the location and areas of capture of the recording
equipment as well as the placement of cameras/angles of
vision/zoom/stop motion
VIDEO SURVEILLANCE - OVERT
 Best practices:
5. State the times that the recording will be in effect, the period
of surveillance, and the areas covered
6. State the period of retention of the data, how it will be
stored in a secure manner, and how it will be securely
destroyed
7. It should not be used in areas where people have a high
expectation of privacy (washrooms, change areas)
8. Notify the public (appropriate signage)
VIDEO SURVEILLANCE - OVERT
 Legitimate purposes might include:
• Making sure employee’s use of technology is limited to work-related
activities
• Protecting against leaks of confidential information
• Measuring employee productivity
• Protection of business assets and equipment (from viruses)
• Protection of the company against risks of improper use of systems,
illegal downloads, harassment, time-theft
IT MONITORING (EMAILS/INTERNET)
 Information collected through IT monitoring is usually
considered personal information
 For example, information in emails sent using a business
account could contain personal information respecting
employees or others
 Therefore, the tests for assessing whether IT monitoring is
necessary/reasonable apply
IT MONITORING (EMAILS/INTERNET)
The employee was employed by a library (public body) as a computer
technician. During his probationary period, the employer some concerns that
he needed to adopt a more consultative or 'teamwork' approach in fulfilling
his duties. A keystroke logging program was installed on the Applicant's
computer and it logged everything the user did on the computer. The
Applicant was not informed this had been done, but he discovered the
program about a month later. The Applicant immediately disabled the
program on his computer, and eventually removed it. No one other than the
Applicant ever viewed the information that had been logged by the program
from his computer. The Public Body had given the Applicant permission to
conduct personal internet banking on his work computer during non-working
time. The Public Body's computer use policy also allowed such use during
non-working hours.
IT MONITORING - SCENARIO
 1) Reasonable
 2) Not reasonable
 F2005-003 Parkland Regional Library – OIPC Alberta, 2005 CarswellAlta 2348
POLLING QUESTION
From the decision:
 Because such key-stroke monitoring programs involve a
continuous monitoring of an employee's working life, they are
highly intrusive into the privacy of employees. Where such
programs are employed surreptitiously, the encroachment on
an employee's personal privacy is even greater
 Surreptitious use of the software will result in "necessary"
information only where forewarning employees that such a
program will be used means that information needed for
management cannot be collected
ALBERTA PRIVACY COMMISSIONER
 The employee was a teacher and was charged with
possession of child pornography which was discovered after
the school’s computer technician remotely accessed the
contents of his work laptop and found explicit images of a
grade 10 student. The school board provided the laptop to the
police who conducted further searches on the computer.
ACCESSING LAPTOP - SCENARIO
 There were a number of factors that both supported and
diminished his reasonable expectation of privacy in the
contents of the laptop:
o the School’s policy permitted incidental personal use of its IT
o the policy stated that teachers’ emails remained private
o the school board permitted users to password protect their laptops
o the policy states all data generated on the laptop was considered the
exclusive property of the school board
o the acceptable use policy warned users not to expect privacy in
connection with files on the hard-drive
o teachers were explained the policy annually
R. v. Cole
Did this constitute an unreasonable search and seizure?
 1) Yes
 2) No
POLLING QUESTION
Guiding principles for a higher expectation of privacy:
 When employee owns the device
 The more personal or private in nature
 Data stored in personal email account
 Folders marked as personal
 Use of a password/encryption
POLLING QUESTION
The policy should include:
1.Clear permissions and prohibited use of computer systems
2.The employer’s right to access technological devices and the
reasons for such access
3.The fact that employees have no reasonable expectation of
privacy in technology or equipment provided by the employer
for business purposes
4.The fact that employees may not use work-issued technology
for personal purposes
ACCEPTABLE USE POLICY
 Employers should be able to demonstrate that the benefits of
email monitoring are proportional to the invasion of the
employees’ reasonable expectation of privacy
 In other words, the employer must prove that the business
interests outweigh the employees’ loss of privacy and less
intrusive methods (such as blocking websites) were
considered but rejected as insufficient to fulfill the legitimate
purpose(s)
ACCESS TO COMPUTERS/DEVICES
 GPS and RFID devices can provide continuous and fairly
accurate location data and the if tracking device is associated
with a particular individual, then clearly that individual’s
movements can be tracked
 Ability to monitor employee activities on a continuous, real-
time basis
 Generally the same tests used for video monitoring are
applied by privacy commissioners and arbitrators wrt GPS
GPS AND LOCATION TRACKING
Employees were a mobile workforce that attended client sites to
service elevators and generally worked alone. They almost always
went directly from their home to the client work site to begin their
workday. The employer issued cellphones to collect and use GPS
information in part for employee management purposes. The phones
were specifically assigned to each mechanic. They inputted when they
were on duty and off duty. They also inputted when they arrived at or
left client sites. The GPS information was only sent to the employer for
times when a mechanic’s phone was set to “on duty” status which
would be throughout the workday, except during break periods. The
GPS info was transmitted every 11 minutes and was accurate to a
range of 3 to 15 metres.
GPS AND TELEMATICS - SCENARIO
 1) Reasonable
 2) Not reasonable
 Kone Inc. (Re), [2013] BCIPCD No. 23
POLLING QUESTION
 Biometrics refers to range of techniques, devices, systems
that enable machines to recognize individuals or authenticate
their identities (retina scanning, fingerprinting, palm vein
scanning, voice recognition, DNA)
 The Federal Privacy Commissioner views all biometrics as
privacy invasive to a certain extent because they involve the
collection of an individual’s physical characteristics, but not all
biometrics are highly privacy invasive in and of themselves.
NEW TOOLS - BIOMETRICS
 An employee was terminated for alleged time theft. The
employer required employees to swipe an access card and to
perform a biometric hand scan in order to gain entry to the
protected area of a nuclear facility. They had to repeat the
process in order to exit. This entry and exit data was recorded
and kept for an extended but unspecified period. The union
argued that the employer’s use of these records for
disciplinary purposes was an unreasonable violation of privacy
rights and therefore, not admissible.
HAND SCAN - SCENARIO
 1) Reasonable and admissible
 2) Not reasonable and inadmissible
 Ontario Power Generation v Society of Energy Professionals,
2015 CanLII 26177
POLLING QUESTION
 Assessment of the legitimate use of employee monitoring
devices has not changed from pre-pandemic
 Be wary of jumping on the bandwagon of new technology
simply because it exists, is easily available and inexpensive
 Be cautious about using technology to supervise your
employees. Best practice is always to outline expectations,
have clear and unambiguous policies and only use technology
as a very last resort and as minimally as needed when no
other options are available
SUMMARY
 “I will underscore a key point about technological change and PIPA. The
range of circumstances that may be relevant in a given case will
undoubtedly change as technological innovation drives changes in
employment relationships and ways of working… As technology-enabled
work practices evolve, employers may implement practices with novel
implications for personal information protection in the employment
setting. As the line between one’s work and one’s personal life grows
fainter through ubiquitous computing and connectivity, new
considerations will arise. Technological change will raise new challenges
for determining what is reasonable for the purposes of PIPA’s
employment related provisions.”
Schindler Elevator Corp, 2012 BCIPC No. 25
FINAL THOUGHTS
Questions?
Thank you for attending!
Want to learn more about Law @ Work?
Subscribe to our blog at http://www.overholtlawyers.com/blog/
– or –
Follow Us on Social Media
Carman J. Overholt, QC Brent Mullin Gurpreet Gill
Jennifer S. Kwok Preston I.A.D. Parsons Kai Ying Chieh
Main: (604) 568-5464
trustedadvisors@overholtlawyers.com

More Related Content

What's hot

Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data SecurityWilmerHale
 
Pp10 input process-output
Pp10 input process-outputPp10 input process-output
Pp10 input process-outputmenisantixs
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Programdavidcurriecia
 
Information security management
Information security managementInformation security management
Information security managementUMaine
 
Data protection and privacy
Data protection and privacyData protection and privacy
Data protection and privacyhimanshu jain
 
Understanding employee privacy
Understanding employee privacyUnderstanding employee privacy
Understanding employee privacyG&A Partners
 
Data Privacy and Data Protection: Rotary’s Compliance with GDPR
Data Privacy and Data Protection: Rotary’s Compliance with GDPRData Privacy and Data Protection: Rotary’s Compliance with GDPR
Data Privacy and Data Protection: Rotary’s Compliance with GDPRRotary International
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodcharvill
 
LEGAL ISSUES IN HUMAN RESOURCES MANAGEMENT.pptx
LEGAL ISSUES IN HUMAN RESOURCES MANAGEMENT.pptxLEGAL ISSUES IN HUMAN RESOURCES MANAGEMENT.pptx
LEGAL ISSUES IN HUMAN RESOURCES MANAGEMENT.pptxEmilio Fer Villa
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider ThreatPECB
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systemsProf. Othman Alsalloum
 
Security and information assurance
Security and information assuranceSecurity and information assurance
Security and information assurancebdemchak
 
Information classification
Information classificationInformation classification
Information classificationJyothsna Sridhar
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss PreventionReza Kopaee
 
Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...IT Governance Ltd
 
Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and PrivacyVertex Holdings
 

What's hot (20)

Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
 
Pp10 input process-output
Pp10 input process-outputPp10 input process-output
Pp10 input process-output
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Information security management
Information security managementInformation security management
Information security management
 
Data protection and privacy
Data protection and privacyData protection and privacy
Data protection and privacy
 
Understanding employee privacy
Understanding employee privacyUnderstanding employee privacy
Understanding employee privacy
 
Data Privacy and Data Protection: Rotary’s Compliance with GDPR
Data Privacy and Data Protection: Rotary’s Compliance with GDPRData Privacy and Data Protection: Rotary’s Compliance with GDPR
Data Privacy and Data Protection: Rotary’s Compliance with GDPR
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
 
LEGAL ISSUES IN HUMAN RESOURCES MANAGEMENT.pptx
LEGAL ISSUES IN HUMAN RESOURCES MANAGEMENT.pptxLEGAL ISSUES IN HUMAN RESOURCES MANAGEMENT.pptx
LEGAL ISSUES IN HUMAN RESOURCES MANAGEMENT.pptx
 
Security & Compliance
Security & ComplianceSecurity & Compliance
Security & Compliance
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider Threat
 
BCP-DRP Audit.ppt
BCP-DRP Audit.pptBCP-DRP Audit.ppt
BCP-DRP Audit.ppt
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
Security and information assurance
Security and information assuranceSecurity and information assurance
Security and information assurance
 
Information classification
Information classificationInformation classification
Information classification
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...
 
General Data Protection Regulation
General Data Protection RegulationGeneral Data Protection Regulation
General Data Protection Regulation
 
Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and Privacy
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 

Similar to Privacy in the Workplace: Employee Monitoring and Surveillance

New Technologies in the Workplace: Privacy Issues
New Technologies in the Workplace: Privacy IssuesNew Technologies in the Workplace: Privacy Issues
New Technologies in the Workplace: Privacy Issueslgarib
 
Workplace Surveilance
Workplace SurveilanceWorkplace Surveilance
Workplace SurveilanceSampath
 
Evolving Issues in Workplace Privacy
Evolving Issues in Workplace PrivacyEvolving Issues in Workplace Privacy
Evolving Issues in Workplace Privacymkeane
 
security investigationsecurity investigation.pptx.pptx
security investigationsecurity investigation.pptx.pptxsecurity investigationsecurity investigation.pptx.pptx
security investigationsecurity investigation.pptx.pptxLovelyDelaCruzGanoan
 
Reasonable security practices and procedures and sensitive personal data or i...
Reasonable security practices and procedures and sensitive personal data or i...Reasonable security practices and procedures and sensitive personal data or i...
Reasonable security practices and procedures and sensitive personal data or i...Vijay Dalmia
 
Reasonable security practices and procedures and sensitive personal data or i...
Reasonable security practices and procedures and sensitive personal data or i...Reasonable security practices and procedures and sensitive personal data or i...
Reasonable security practices and procedures and sensitive personal data or i...Vijay Dalmia
 
New Data Privacy Rules By Amit Khandelwal
New Data Privacy Rules By Amit KhandelwalNew Data Privacy Rules By Amit Khandelwal
New Data Privacy Rules By Amit Khandelwalamitkhand
 
Employment and Labour Law Seminar - June 13, 2013
Employment and Labour Law Seminar - June 13, 2013Employment and Labour Law Seminar - June 13, 2013
Employment and Labour Law Seminar - June 13, 2013This account is closed
 
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018Next Dimension Inc.
 
Week Of 2009 08 31
Week Of 2009 08 31Week Of 2009 08 31
Week Of 2009 08 31mbarreto13
 
Security Industry Association Privacy Framework
Security Industry Association Privacy FrameworkSecurity Industry Association Privacy Framework
Security Industry Association Privacy Framework- Mark - Fullbright
 
Reasonable Security Practices And Procedures And Sensitive Personala 24 06 2...
Reasonable Security Practices And Procedures And Sensitive Personala  24 06 2...Reasonable Security Practices And Procedures And Sensitive Personala  24 06 2...
Reasonable Security Practices And Procedures And Sensitive Personala 24 06 2...Vijay Dalmia
 
Key Issues In Workplace Privacy
Key Issues In Workplace PrivacyKey Issues In Workplace Privacy
Key Issues In Workplace PrivacyDan Michaluk
 
Implementing an Information Security Program
Implementing an Information Security ProgramImplementing an Information Security Program
Implementing an Information Security ProgramRaymond Cunningham
 
Siskinds | Incident Response Plan
Siskinds | Incident Response PlanSiskinds | Incident Response Plan
Siskinds | Incident Response PlanNext Dimension Inc.
 
Workplace Surveilance
Workplace SurveilanceWorkplace Surveilance
Workplace SurveilanceSampath
 
Workplace Surveillance
Workplace SurveillanceWorkplace Surveillance
Workplace SurveillanceSampath
 

Similar to Privacy in the Workplace: Employee Monitoring and Surveillance (20)

New Technologies in the Workplace: Privacy Issues
New Technologies in the Workplace: Privacy IssuesNew Technologies in the Workplace: Privacy Issues
New Technologies in the Workplace: Privacy Issues
 
Workplace Surveilance
Workplace SurveilanceWorkplace Surveilance
Workplace Surveilance
 
Evolving Issues in Workplace Privacy
Evolving Issues in Workplace PrivacyEvolving Issues in Workplace Privacy
Evolving Issues in Workplace Privacy
 
security investigationsecurity investigation.pptx.pptx
security investigationsecurity investigation.pptx.pptxsecurity investigationsecurity investigation.pptx.pptx
security investigationsecurity investigation.pptx.pptx
 
Reasonable security practices and procedures and sensitive personal data or i...
Reasonable security practices and procedures and sensitive personal data or i...Reasonable security practices and procedures and sensitive personal data or i...
Reasonable security practices and procedures and sensitive personal data or i...
 
Reasonable security practices and procedures and sensitive personal data or i...
Reasonable security practices and procedures and sensitive personal data or i...Reasonable security practices and procedures and sensitive personal data or i...
Reasonable security practices and procedures and sensitive personal data or i...
 
New Data Privacy Rules By Amit Khandelwal
New Data Privacy Rules By Amit KhandelwalNew Data Privacy Rules By Amit Khandelwal
New Data Privacy Rules By Amit Khandelwal
 
Key Points on The Law Relating To CCTV
Key Points on The Law Relating To CCTVKey Points on The Law Relating To CCTV
Key Points on The Law Relating To CCTV
 
Employment and Labour Law Seminar - June 13, 2013
Employment and Labour Law Seminar - June 13, 2013Employment and Labour Law Seminar - June 13, 2013
Employment and Labour Law Seminar - June 13, 2013
 
4514611.ppt
4514611.ppt4514611.ppt
4514611.ppt
 
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
 
Week Of 2009 08 31
Week Of 2009 08 31Week Of 2009 08 31
Week Of 2009 08 31
 
Security Industry Association Privacy Framework
Security Industry Association Privacy FrameworkSecurity Industry Association Privacy Framework
Security Industry Association Privacy Framework
 
Reasonable Security Practices And Procedures And Sensitive Personala 24 06 2...
Reasonable Security Practices And Procedures And Sensitive Personala  24 06 2...Reasonable Security Practices And Procedures And Sensitive Personala  24 06 2...
Reasonable Security Practices And Procedures And Sensitive Personala 24 06 2...
 
Key Issues In Workplace Privacy
Key Issues In Workplace PrivacyKey Issues In Workplace Privacy
Key Issues In Workplace Privacy
 
Implementing an Information Security Program
Implementing an Information Security ProgramImplementing an Information Security Program
Implementing an Information Security Program
 
Siskinds | Incident Response Plan
Siskinds | Incident Response PlanSiskinds | Incident Response Plan
Siskinds | Incident Response Plan
 
Workplace Surveilance
Workplace SurveilanceWorkplace Surveilance
Workplace Surveilance
 
Workplace Surveillance
Workplace SurveillanceWorkplace Surveillance
Workplace Surveillance
 
Cybersecurity and Data Privacy Whistleblower Protections
Cybersecurity and Data Privacy Whistleblower ProtectionsCybersecurity and Data Privacy Whistleblower Protections
Cybersecurity and Data Privacy Whistleblower Protections
 

More from Overholt Law

What to Expect in Human Resources Management in 2022: A Review of Recent Deve...
What to Expect in Human Resources Management in 2022: A Review of Recent Deve...What to Expect in Human Resources Management in 2022: A Review of Recent Deve...
What to Expect in Human Resources Management in 2022: A Review of Recent Deve...Overholt Law
 
Human Resources Management in Challenging Times - Pandemic Edition
Human Resources Management in Challenging Times - Pandemic EditionHuman Resources Management in Challenging Times - Pandemic Edition
Human Resources Management in Challenging Times - Pandemic EditionOverholt Law
 
Overholt Law Breakfast Seminar - Employment, Labour Relations, Human Rights a...
Overholt Law Breakfast Seminar - Employment, Labour Relations, Human Rights a...Overholt Law Breakfast Seminar - Employment, Labour Relations, Human Rights a...
Overholt Law Breakfast Seminar - Employment, Labour Relations, Human Rights a...Overholt Law
 
Overholt Law Breakfast Seminar - The Latest Developments in the Law Governing...
Overholt Law Breakfast Seminar - The Latest Developments in the Law Governing...Overholt Law Breakfast Seminar - The Latest Developments in the Law Governing...
Overholt Law Breakfast Seminar - The Latest Developments in the Law Governing...Overholt Law
 
Overholt Law Breakfast Seminar - Sexual Harassment in the Workplace - June 20...
Overholt Law Breakfast Seminar - Sexual Harassment in the Workplace - June 20...Overholt Law Breakfast Seminar - Sexual Harassment in the Workplace - June 20...
Overholt Law Breakfast Seminar - Sexual Harassment in the Workplace - June 20...Overholt Law
 
Overholt Law Seminar - Sexual Harassment in the Workplace
Overholt Law Seminar - Sexual Harassment in the WorkplaceOverholt Law Seminar - Sexual Harassment in the Workplace
Overholt Law Seminar - Sexual Harassment in the WorkplaceOverholt Law
 
Overholt Law - October 2017 Breakfast Seminar Presentation
Overholt Law - October 2017 Breakfast Seminar PresentationOverholt Law - October 2017 Breakfast Seminar Presentation
Overholt Law - October 2017 Breakfast Seminar PresentationOverholt Law
 
Overholt Law – September 2017 Breakfast Seminar Presentation
Overholt Law – September 2017 Breakfast Seminar PresentationOverholt Law – September 2017 Breakfast Seminar Presentation
Overholt Law – September 2017 Breakfast Seminar PresentationOverholt Law
 
Overholt Law – May 2017 Breakfast Seminar Presentation
Overholt Law – May 2017 Breakfast Seminar PresentationOverholt Law – May 2017 Breakfast Seminar Presentation
Overholt Law – May 2017 Breakfast Seminar PresentationOverholt Law
 
Overholt Law - October 2016 Breakfast Seminar Presentation
Overholt Law - October 2016 Breakfast Seminar PresentationOverholt Law - October 2016 Breakfast Seminar Presentation
Overholt Law - October 2016 Breakfast Seminar PresentationOverholt Law
 
Overholt Law - Spring 2016 Breakfast Seminar Presentation
Overholt Law - Spring 2016 Breakfast Seminar PresentationOverholt Law - Spring 2016 Breakfast Seminar Presentation
Overholt Law - Spring 2016 Breakfast Seminar PresentationOverholt Law
 

More from Overholt Law (11)

What to Expect in Human Resources Management in 2022: A Review of Recent Deve...
What to Expect in Human Resources Management in 2022: A Review of Recent Deve...What to Expect in Human Resources Management in 2022: A Review of Recent Deve...
What to Expect in Human Resources Management in 2022: A Review of Recent Deve...
 
Human Resources Management in Challenging Times - Pandemic Edition
Human Resources Management in Challenging Times - Pandemic EditionHuman Resources Management in Challenging Times - Pandemic Edition
Human Resources Management in Challenging Times - Pandemic Edition
 
Overholt Law Breakfast Seminar - Employment, Labour Relations, Human Rights a...
Overholt Law Breakfast Seminar - Employment, Labour Relations, Human Rights a...Overholt Law Breakfast Seminar - Employment, Labour Relations, Human Rights a...
Overholt Law Breakfast Seminar - Employment, Labour Relations, Human Rights a...
 
Overholt Law Breakfast Seminar - The Latest Developments in the Law Governing...
Overholt Law Breakfast Seminar - The Latest Developments in the Law Governing...Overholt Law Breakfast Seminar - The Latest Developments in the Law Governing...
Overholt Law Breakfast Seminar - The Latest Developments in the Law Governing...
 
Overholt Law Breakfast Seminar - Sexual Harassment in the Workplace - June 20...
Overholt Law Breakfast Seminar - Sexual Harassment in the Workplace - June 20...Overholt Law Breakfast Seminar - Sexual Harassment in the Workplace - June 20...
Overholt Law Breakfast Seminar - Sexual Harassment in the Workplace - June 20...
 
Overholt Law Seminar - Sexual Harassment in the Workplace
Overholt Law Seminar - Sexual Harassment in the WorkplaceOverholt Law Seminar - Sexual Harassment in the Workplace
Overholt Law Seminar - Sexual Harassment in the Workplace
 
Overholt Law - October 2017 Breakfast Seminar Presentation
Overholt Law - October 2017 Breakfast Seminar PresentationOverholt Law - October 2017 Breakfast Seminar Presentation
Overholt Law - October 2017 Breakfast Seminar Presentation
 
Overholt Law – September 2017 Breakfast Seminar Presentation
Overholt Law – September 2017 Breakfast Seminar PresentationOverholt Law – September 2017 Breakfast Seminar Presentation
Overholt Law – September 2017 Breakfast Seminar Presentation
 
Overholt Law – May 2017 Breakfast Seminar Presentation
Overholt Law – May 2017 Breakfast Seminar PresentationOverholt Law – May 2017 Breakfast Seminar Presentation
Overholt Law – May 2017 Breakfast Seminar Presentation
 
Overholt Law - October 2016 Breakfast Seminar Presentation
Overholt Law - October 2016 Breakfast Seminar PresentationOverholt Law - October 2016 Breakfast Seminar Presentation
Overholt Law - October 2016 Breakfast Seminar Presentation
 
Overholt Law - Spring 2016 Breakfast Seminar Presentation
Overholt Law - Spring 2016 Breakfast Seminar PresentationOverholt Law - Spring 2016 Breakfast Seminar Presentation
Overholt Law - Spring 2016 Breakfast Seminar Presentation
 

Recently uploaded

Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsVanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsAbdul-Hakim Shabazz
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝soniya singh
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书Fs Las
 
如何办理纽约州立大学石溪分校毕业证学位证书
 如何办理纽约州立大学石溪分校毕业证学位证书 如何办理纽约州立大学石溪分校毕业证学位证书
如何办理纽约州立大学石溪分校毕业证学位证书Fir sss
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesHome Tax Saver
 
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书FS LS
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书Sir Lt
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A HistoryJohn Hustaix
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书SD DS
 
Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxsrikarna235
 
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptx
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptxAn Introduction guidance of the European Union Law 2020_EU Seminar 4.pptx
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptxKUHANARASARATNAM1
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书Fir L
 
如何办理佛蒙特大学毕业证学位证书
 如何办理佛蒙特大学毕业证学位证书 如何办理佛蒙特大学毕业证学位证书
如何办理佛蒙特大学毕业证学位证书Fir sss
 
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书SD DS
 
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》o8wvnojp
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...shubhuc963
 
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书SD DS
 
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxConstitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxsrikarna235
 
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书SD DS
 

Recently uploaded (20)

Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsVanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
 
如何办理纽约州立大学石溪分校毕业证学位证书
 如何办理纽约州立大学石溪分校毕业证学位证书 如何办理纽约州立大学石溪分校毕业证学位证书
如何办理纽约州立大学石溪分校毕业证学位证书
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax Rates
 
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A History
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
 
Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptx
 
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptx
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptxAn Introduction guidance of the European Union Law 2020_EU Seminar 4.pptx
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptx
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书
 
如何办理佛蒙特大学毕业证学位证书
 如何办理佛蒙特大学毕业证学位证书 如何办理佛蒙特大学毕业证学位证书
如何办理佛蒙特大学毕业证学位证书
 
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
 
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in  Pusa Road🔝 9953330565 🔝 escort Serviceyoung Call Girls in  Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
 
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...
 
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
 
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxConstitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
 
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
 

Privacy in the Workplace: Employee Monitoring and Surveillance

  • 1. 600 – 889 West Pender Street Vancouver, BC V6C 3B2 Office: (604) 568-5464 http://www.overholtlawyers.com PRIVACY IN THE WORKPLACE: Employee Monitoring and Surveillance March 30, 2021 via Zoom Jennifer S. Kwok jennifer@overholtlawyers.com 604-676-4189 (direct)
  • 2. Webinar Agenda 1) Privacy Protection Laws (PIPEDA and BC’s PIPA) 2) What is personal information in the context of employment? 3) Consent under privacy law 4) Surveillance and monitoring of employees – the various tests 5) Privacy decisions 4) Best practices (storage, access, retention, policies)
  • 3. Statutory Framework 1) Personal Information Protection and Electronic Documents Act (PIPEDA) 2) BC’s Personal Information Protection Act (PIPA) 3) BC’s Freedom of Information and Protection of Privacy Act (FIPPA)
  • 4. APPLICABLE LEGISLATION Which legislation applies to your organization? 1) PIPEDA 2) PIPA 3) FIPPA
  • 5.  PIPEDA was created to balance competing interests of allowing commercial activity to function and protection of individual privacy and personal information  PIPEDA, FIPPA and PIPA only protect “personal information”  Personal information is defined as: “Information about an identifiable individual.”  If there is a possibility of associating anonymous info with an identifiable person, this is not “anonymous” PIPEDA – General Overview
  • 6.  Under PIPEDA, PIPA, and FIPPA personal information also includes “employee personal information” but does does not include: o (business) contact information  Consent is not required for the collection, use and disclosure of business contact information for the purpose of communicating with an individual about their employment, business or profession “Personal Information” is Not…
  • 7.  Under PIPA “personal information” also does not include “work product” information  This is “information collected or prepared as part of an individual's or group's responsibilities/activities related to their employment or business but does not include personal information about an individual who did not prepare or collect the personal information.”  Consent not required for its collection, use, disclosure  PIPEDA also contains exceptions to consent requirements where personal information is produced by an individual in the course of their employment, business or profession. “Personal Information” is Not…
  • 8.  Personal information about employees is interpreted very broadly, and may include: o Personnel files, performance evaluations, employee complaints, discipline o Home address, birthdate, salaries, benefits o Medical, biometric or health information o Pictures and recordings of employees “Employee Personal Information”
  • 9.  The knowledge and consent of an individual is required to collect, use or disclose their personal information except under certain circumstances as permitted by law oWhat is the purpose of the collection? oHow will it be used? oHow and to whom will it be disclosed? CONSENT IS REQUIRED
  • 10.  Under FIPPA: A public body is not required to collect personal information directly from the individual if the information is about an employee, and the collection of the information is necessary for the purposes of managing or terminating an employment relationship between a public body and the employee CONSENT IS NOT REQUIRED…
  • 11.  Under PIPEDA: Employee personal information is excluded from the consent requirements if the collection, use or disclosure of the information is necessary to establish, manage or terminate an employment relationship between the federal work, undertaking or business and the individual CONSENT IS NOT REQUIRED…
  • 12.  Under PIPA: Employee personal information is excluded from the consent requirements if it is being collected, used or disclosed for the purposes reasonably required to establish, manage or terminate an employment relationship between the organization and that individual CONSENT IS NOT REQUIRED…
  • 13.  Under PIPA: o The collection, use or disclosure must be reasonable  Under FIPPA and PIPEDA: o The collection, use or disclosure must be necessary REASONABLENESS / NECESSITY
  • 14.  In addition, employees must be provided with notice, in advance that the information will be collected  They must also be advised of the employer’s purpose(s) for collecting the information  And, the information must only be used for the purpose of establishing, managing or terminating the employment relationship BUT NOTICE IS REQUIRED…
  • 15. What are some legitimate purposes your organization might have to monitor employees? MONITORING EMPLOYEES
  • 16. What are some legitimate purposes to monitor employees? - Location information of employees for safety and physical security reasons - Location information to properly allocate business resources - Employee productivity and performance/misuse of resources - To prevent breaches of confidential information - To deter workplace harassment or violence or other misconduct - To deter fraud or theft - To obtain evidence of employee malingering (abuse of benefits) MONITORING EMPLOYEES
  • 17.  What types of employee monitoring, if any, is in your workplace or is being contemplated? MONITORING METHODS
  • 18. The most common methods include: a)Video surveillance (covert or overt) b)Audio recording c)GPS, RFID or other location tracking d)Keystroke monitoring e) Review of employee work emails/internet/computer systems f)Wearables (apple watch, fitbit)* g)Biometric data (iris scanning, fingerprints, voice prints) MONITORING METHODS
  • 19.  Something to keep in mind: The existence of a legitimate purpose or reason to monitor does not mean that the method chosen to achieve the purpose is also reasonable in the circumstances IS THE METHOD APPROPRIATE?
  • 20.  Privacy commissioners, judges, and arbitrators have developed different tests to evaluate whether monitoring or surveilling of employees is acceptable. THE DIFFERENT TESTS
  • 21. 1) Is the measure demonstrably necessary to meet a specific need? 2) Is the measure likely to be effective in meeting that need? 3) Is the loss of privacy proportional to the benefit gained? 4) Is there a less privacy-invasive way of achieving the same end? The Federal Privacy Commissioner
  • 22.  Considers the overriding criteria of reasonableness in assessing compliance with PIPA. The BC Privacy Commissioner
  • 23.  Relevant factors the BC OIPC will consider include: 1) Is the personal information sensitive? 2) How much personal information is being collected or used? 3) Is the collection, use, disclosure of the personal information likely to be effective in fulfilling the employer’s objectives? 4) Do alternatives exist and have they been given reasonable consideration? 5) Is the monitoring covert or overt? THE BC APPROACH - FACTORS
  • 24.  Video that captures an individual’s physical image or movement usually constitutes personal information  Covert and overt surveillance are treated differently, with covert monitoring treated as extremely privacy-invasive only permissible in limited cases  Arbitrators have also consistently adopted the reasonableness test in situations involving covert video surveillance conducted outside of the workplace  Misconception – it is not the case that privacy obligations do not apply if surveillance conducted in a public place VIDEO SURVEILLANCE
  • 25. The employer suspected employee engaged in a construction business outside of his work. The employee called in sick on a Friday and advised that he would also be sick on the following Monday. The employer engaged a third party investigator to covertly monitor the employee’s activities on Monday. The investigation did indeed show that the grievor was working on a construction project when he claimed to be sick. The employer terminated his employment. The union argued that the surveillance video was inadmissible as an invasion of the employee’s privacy. VIDEO SURVEILLANCE - SCENARIO
  • 26.  1) Reasonable  2) Not reasonable  Doman Forest Products Ltd. v. I.W.A.-Canada, Local 1-357,1990 CarswellBC 2030 British Columbia Arbitration POLLING QUESTION
  • 27. The grievor had been off work receiving workers’ compensation benefits. The employer suspected that the employee was abusing his sick leave benefits and was suspicious of him as it had heard rumours that he was involved in a private contracting business. It retained a private investigator to monitor the grievor's activities. Based on the investigator's report and a video tape which showed the grievor working at two construction sites while he was on sick leave, the Employer concluded that the grievor had been engaged actively in supervising construction work, and therefore was fraudulently on sick leave. An issue arose during the hearing as to the admissibility of the video tape evidence obtained by the private investigator. VIDEO SURVEILLANCE - SCENARIO
  • 28.  1) Reasonable  2) Not reasonable  Steels Industrial Products Ltd. v. Teamsters, Local 213, 1991 CarswellBC 3326 British Columbia Arbitration POLLING QUESTION
  • 29.  Different considerations apply when cameras are visible to employees.  Does the surveillance represent a legitimate exercise of management rights?  The tests for evaluating the permissibility of overt monitoring are the same  Employers need to define the objectives which should related to addressing actual past incidents  Employees need to be informed!! VIDEO SURVEILLANCE - OVERT
  • 30.  In determining whether video surveillance cameras are reasonable in a workplace, the OIPC has stated the following: “Video surveillance should only be used as a last resort after exhausting less privacy-invasive alternatives, such as improved workplace supervision or implementation of theft- prevention controls. Organizations need to consider whether video surveillance will achieve the intended purpose and whether the concerns are serious enough to warrant implementing this highly invasive technology.” VIDEO SURVEILLANCE - OVERT
  • 31.  The BC Privacy Commissioner has said that video camera cannot – and should not – replace adequate employee supervision  Other considerations: • Even if video is not a breach of PIPA, this does not necessarily mean that all images captured by the system would be admissible as evidence in a proceeding, such as a wrongful dismissal case VIDEO SURVEILLANCE - OVERT
  • 32. The employer installed six digital recording surveillance cameras in its mechanical facility area. The rationale was that it was necessary to reduce vandalism (following 2 incidents) and deter theft, as well as to provide security for staff; (there were reports of female staff feeling vulnerable). The surveillance was not surreptitious and was not limited to employees. Visitors, suppliers and trespassers would be captured. VIDEO SURVEILLANCE - SCENARIO
  • 33.  1) Reasonable  2) Not reasonable  Eastmond v. Canadian Pacific Railway, 2004 FC 852 POLLING QUESTION
  • 34.  The employer had video cameras at a coal mine throughout the site and in its office area. The stated purpose in the operational areas was to monitor and oversee production and to ensure work was being performed safely. In the non-operational areas, the primary purpose was safety and security. Cameras focused on tool cribs were for the purpose of deterring employee theft. The cameras recorded continuously for up to 30 days then the footage was erased. The supervisors could also view the camera recordings in real time.  The employer informed the Union of the purpose of the collection, use and disclosure of employee personal information through the use of video cameras. It also provided a full list of cameras, their location and who can access them. VIDEO SURVEILLANCE - SCENARIO
  • 35.  1) Reasonable  2) Not reasonable  3) Some of the cameras are reasonable  Teck Coal Limited, 2020 BC OIPC 24 POLLING QUESTION
  • 36.  Best practices: 1. Implement a policy that sets out the criteria that must be met before video surveillance is undertaken 2. Detail who is authorized to operate the system and view 3. Limit the collection to that which is necessary to achieve the stated purpose(s) and limit the use of the surveillance to its stated purpose(s) 4. Address the location and areas of capture of the recording equipment as well as the placement of cameras/angles of vision/zoom/stop motion VIDEO SURVEILLANCE - OVERT
  • 37.  Best practices: 5. State the times that the recording will be in effect, the period of surveillance, and the areas covered 6. State the period of retention of the data, how it will be stored in a secure manner, and how it will be securely destroyed 7. It should not be used in areas where people have a high expectation of privacy (washrooms, change areas) 8. Notify the public (appropriate signage) VIDEO SURVEILLANCE - OVERT
  • 38.  Legitimate purposes might include: • Making sure employee’s use of technology is limited to work-related activities • Protecting against leaks of confidential information • Measuring employee productivity • Protection of business assets and equipment (from viruses) • Protection of the company against risks of improper use of systems, illegal downloads, harassment, time-theft IT MONITORING (EMAILS/INTERNET)
  • 39.  Information collected through IT monitoring is usually considered personal information  For example, information in emails sent using a business account could contain personal information respecting employees or others  Therefore, the tests for assessing whether IT monitoring is necessary/reasonable apply IT MONITORING (EMAILS/INTERNET)
  • 40. The employee was employed by a library (public body) as a computer technician. During his probationary period, the employer some concerns that he needed to adopt a more consultative or 'teamwork' approach in fulfilling his duties. A keystroke logging program was installed on the Applicant's computer and it logged everything the user did on the computer. The Applicant was not informed this had been done, but he discovered the program about a month later. The Applicant immediately disabled the program on his computer, and eventually removed it. No one other than the Applicant ever viewed the information that had been logged by the program from his computer. The Public Body had given the Applicant permission to conduct personal internet banking on his work computer during non-working time. The Public Body's computer use policy also allowed such use during non-working hours. IT MONITORING - SCENARIO
  • 41.  1) Reasonable  2) Not reasonable  F2005-003 Parkland Regional Library – OIPC Alberta, 2005 CarswellAlta 2348 POLLING QUESTION
  • 42. From the decision:  Because such key-stroke monitoring programs involve a continuous monitoring of an employee's working life, they are highly intrusive into the privacy of employees. Where such programs are employed surreptitiously, the encroachment on an employee's personal privacy is even greater  Surreptitious use of the software will result in "necessary" information only where forewarning employees that such a program will be used means that information needed for management cannot be collected ALBERTA PRIVACY COMMISSIONER
  • 43.  The employee was a teacher and was charged with possession of child pornography which was discovered after the school’s computer technician remotely accessed the contents of his work laptop and found explicit images of a grade 10 student. The school board provided the laptop to the police who conducted further searches on the computer. ACCESSING LAPTOP - SCENARIO
  • 44.  There were a number of factors that both supported and diminished his reasonable expectation of privacy in the contents of the laptop: o the School’s policy permitted incidental personal use of its IT o the policy stated that teachers’ emails remained private o the school board permitted users to password protect their laptops o the policy states all data generated on the laptop was considered the exclusive property of the school board o the acceptable use policy warned users not to expect privacy in connection with files on the hard-drive o teachers were explained the policy annually R. v. Cole
  • 45. Did this constitute an unreasonable search and seizure?  1) Yes  2) No POLLING QUESTION
  • 46. Guiding principles for a higher expectation of privacy:  When employee owns the device  The more personal or private in nature  Data stored in personal email account  Folders marked as personal  Use of a password/encryption POLLING QUESTION
  • 47. The policy should include: 1.Clear permissions and prohibited use of computer systems 2.The employer’s right to access technological devices and the reasons for such access 3.The fact that employees have no reasonable expectation of privacy in technology or equipment provided by the employer for business purposes 4.The fact that employees may not use work-issued technology for personal purposes ACCEPTABLE USE POLICY
  • 48.  Employers should be able to demonstrate that the benefits of email monitoring are proportional to the invasion of the employees’ reasonable expectation of privacy  In other words, the employer must prove that the business interests outweigh the employees’ loss of privacy and less intrusive methods (such as blocking websites) were considered but rejected as insufficient to fulfill the legitimate purpose(s) ACCESS TO COMPUTERS/DEVICES
  • 49.  GPS and RFID devices can provide continuous and fairly accurate location data and the if tracking device is associated with a particular individual, then clearly that individual’s movements can be tracked  Ability to monitor employee activities on a continuous, real- time basis  Generally the same tests used for video monitoring are applied by privacy commissioners and arbitrators wrt GPS GPS AND LOCATION TRACKING
  • 50. Employees were a mobile workforce that attended client sites to service elevators and generally worked alone. They almost always went directly from their home to the client work site to begin their workday. The employer issued cellphones to collect and use GPS information in part for employee management purposes. The phones were specifically assigned to each mechanic. They inputted when they were on duty and off duty. They also inputted when they arrived at or left client sites. The GPS information was only sent to the employer for times when a mechanic’s phone was set to “on duty” status which would be throughout the workday, except during break periods. The GPS info was transmitted every 11 minutes and was accurate to a range of 3 to 15 metres. GPS AND TELEMATICS - SCENARIO
  • 51.  1) Reasonable  2) Not reasonable  Kone Inc. (Re), [2013] BCIPCD No. 23 POLLING QUESTION
  • 52.  Biometrics refers to range of techniques, devices, systems that enable machines to recognize individuals or authenticate their identities (retina scanning, fingerprinting, palm vein scanning, voice recognition, DNA)  The Federal Privacy Commissioner views all biometrics as privacy invasive to a certain extent because they involve the collection of an individual’s physical characteristics, but not all biometrics are highly privacy invasive in and of themselves. NEW TOOLS - BIOMETRICS
  • 53.  An employee was terminated for alleged time theft. The employer required employees to swipe an access card and to perform a biometric hand scan in order to gain entry to the protected area of a nuclear facility. They had to repeat the process in order to exit. This entry and exit data was recorded and kept for an extended but unspecified period. The union argued that the employer’s use of these records for disciplinary purposes was an unreasonable violation of privacy rights and therefore, not admissible. HAND SCAN - SCENARIO
  • 54.  1) Reasonable and admissible  2) Not reasonable and inadmissible  Ontario Power Generation v Society of Energy Professionals, 2015 CanLII 26177 POLLING QUESTION
  • 55.  Assessment of the legitimate use of employee monitoring devices has not changed from pre-pandemic  Be wary of jumping on the bandwagon of new technology simply because it exists, is easily available and inexpensive  Be cautious about using technology to supervise your employees. Best practice is always to outline expectations, have clear and unambiguous policies and only use technology as a very last resort and as minimally as needed when no other options are available SUMMARY
  • 56.  “I will underscore a key point about technological change and PIPA. The range of circumstances that may be relevant in a given case will undoubtedly change as technological innovation drives changes in employment relationships and ways of working… As technology-enabled work practices evolve, employers may implement practices with novel implications for personal information protection in the employment setting. As the line between one’s work and one’s personal life grows fainter through ubiquitous computing and connectivity, new considerations will arise. Technological change will raise new challenges for determining what is reasonable for the purposes of PIPA’s employment related provisions.” Schindler Elevator Corp, 2012 BCIPC No. 25 FINAL THOUGHTS
  • 57. Questions? Thank you for attending! Want to learn more about Law @ Work? Subscribe to our blog at http://www.overholtlawyers.com/blog/ – or – Follow Us on Social Media Carman J. Overholt, QC Brent Mullin Gurpreet Gill Jennifer S. Kwok Preston I.A.D. Parsons Kai Ying Chieh Main: (604) 568-5464 trustedadvisors@overholtlawyers.com