CSA PLUS 8300-1996 Making the CSA Privacy Code Work for You (Includes Plus 8830-95).pdf

上传人:confusegate185 文档编号:621592 上传时间:2018-12-21 格式:PDF 页数:259 大小:15.74MB
下载 相关 举报
CSA PLUS 8300-1996 Making the CSA Privacy Code Work for You (Includes Plus 8830-95).pdf_第1页
第1页 / 共259页
CSA PLUS 8300-1996 Making the CSA Privacy Code Work for You (Includes Plus 8830-95).pdf_第2页
第2页 / 共259页
CSA PLUS 8300-1996 Making the CSA Privacy Code Work for You (Includes Plus 8830-95).pdf_第3页
第3页 / 共259页
CSA PLUS 8300-1996 Making the CSA Privacy Code Work for You (Includes Plus 8830-95).pdf_第4页
第4页 / 共259页
CSA PLUS 8300-1996 Making the CSA Privacy Code Work for You (Includes Plus 8830-95).pdf_第5页
第5页 / 共259页
点击查看更多>>
资源描述

1、PLUS 8300 Making the CSA Privacy Code Work for You A workbook on applying the CSA Model Code for the Protection of Personal Information to your organization (CAN/CSA-Q830) PLUS 8300 Making the CSA Privacy Code Work for You A workbook on applying the CSA Model Code for the Protection of Personal Info

2、rmation (CAN/CSA-Q830) to your organization Published in December 7 996 by Canadian Standards Asssociation 7 78 Rexdale Boulevard, ftobicoke, Ontario, Canada M9 W 7 R3 Acknowledgments This Publication was developed under the guidance of the Technical Committee on Privacy and, in particular, the foll

3、owing individuals: M. Long - Ottawa - Publication Coordinator and Prime Author C. Bennett - Victoria - Associate Professor, University of Victoria T. Campbell - Toronto - Contributor A. Coles - Edmonton - Contributor D. McKendry - Ottawa - Contributor R. Roy - Ottawa - Contributor Note on tailoring

4、the Code Organizations may choose to develop an organization-specific code based on the CIA Code. The commentaries which accompany each of the Code principles may be tailored to provide organization-specific examples. The principles themselves are interrelated and must be applied in their entirety a

5、nd without alteration (see CSA Code, General Requirements, Clauses 3.7.7 and 3.7 -2, and Appendix D of this Publication). Note on registering with the Quality Management Institute - a division of CSA A separate publication is attached which gives details of tbe steps to be undertaken should you wish

6、 to register your organizations adoption of the Code with the Quality Management Institute (OW. ISBN 0-921 347-57-X 0 Canadian Standards Association - 1996 All rights reserved. No part of this Publication, other than sections indicated bejow, may be reproduced in any form, in an electronic retrieval

7、 system or otherwise, without express prior permission of the publisher. This workbook contains forms which may be used to document personal information management practices and procedures. These forms are clearly identified and may be reproduced without perm iss ion. Technical Editor: Robin Haighto

8、n Managing L ditor: Gary Burford Making the CSA Privacy Code Work for You Contents Introduction The purpose of this workbook Chapter 1 The importance of u national voluntary informa tion protection code Chapter 2 Significonce of the ten prhciples Chapter 3 How to implement the CSA Code in your orgun

9、lzution Stage 1: Establishing an implementation ream and plan Stage 2: Assessing your current information use policies and practices Stage 3: Bringing poIicies and practices in line with the CSA Code Step 7. Step 2. How to identify information purposes Ways to explain purposes and obtain consent Ste

10、p 3. What to do when you want to use information for new purposes Step 4. Step 5. How long you should keep information How to make sure personal information is secure Step 6. How to address individuol concerns about personal information use Stage 4: Documenting policies and procedures Stage 5: Truin

11、ing employees and implementing Q communications plan Stage 6: Periodic review and auditing Appendices A - Privacy publications and information sources B - QMI recognition program C - Information on safeguards and security D - Tailoring the Code: report to CSA Technical Committee on Privacy Page V 1

12、7 21 23 26 34 34 37 42 45 48 54 61 64 69 75 ai 83 87 E - Health information December 1996 89 PLUS 8300 iV December 7 996 In trod u ction The purpose o this workboo k HE PUBLICATION CAN/CSA-Q830, A Mode/ Code for the Protection of Personal information, T referred to as the CSA Code, (a) provides the

13、principles for the management of personal information; (b) specifies the minimum requirements for the adequate protection of personal information held by pa rtic i pati n g organizations; (c) makes the Canadian public aware of how personal information should be protected; and (d) provides standards

14、by which the international community can measure the protection of personal information in Canada. This workbook is designed to provide practical, useful advice to help organizations understand and apply CSAs Model Code for the protection of personal information. The workbook is intended to be used

15、in conjunction with the CSA Code, but it is not a replacement. The text of the CSA Code in its entirety should be referred to, when required, as the final authority on matters of.interpretation. The workbook was developed and reviewed by the CSA Technical Committee on Privacy, to provide guidance on

16、 how to apply the CSA Code effectively, Organizations will find it a valuable tool, particularly for those individuals directly responsible for implementing the CSA Code. However, the use of the workbook is not mandatory. The CSA Code can be applied in all types of organizations, from small sole pro

17、prietorships to large corporate enterprises; from service clubs and charities to universities and hospitals; from organizations that hold very little personal information to those that specialize in information collection and use. While CSA has produced only one workbook to cover this vast range of

18、information users, the principles of the CSA Code are universal and can, accordingly, be applied to all types of organizations whether they are large or small, locally based or multinational, and whether they use the simplest of information management methods or are at the leading edge of electronic

19、 information use. What differs principally between organizations is the amount and variety of information collected, its sensitivity, and its relative value, both to the individuals providing it and the organizations using it. The workbook addresses these differences with examples drawn from a range

20、 of organizational experiences and with practical, commonsense solutions. Whatever type of organization you are involved with, this workbook will provide you with basic information you need to implement the CSA Code in an appropriate way. December 7 996 V PLUS 8300 The CSA Code was developed as a na

21、tional voluntary standard for personal information protection. As you apply the CSA Code, remember that its ultimate success depends upon an underlying commitment to integrity and fairness in the use of personal information. Organizations must always balance their need for information collection, us

22、e, and disclosure with the privacy rights of the i nd ivid u a I. Implementing the CSA Code may be a time-consuming task; however, once implemented, the ongoing maintenance of systems and procedures to meet the Standard should become a routine operation. In support of the CSA Code, the Quality Manag

23、ement Institute (QMI) is offering three levels or tiers of recognition as follows: Tier 1 - Declaration of the organizations intent to apply the CSA Code. Tier 2 - Verification by QMI that the CSA Code has been implemented to an acceptable standard. Tier 3 - Registration with QMI. For more details o

24、n these tiers and the role of the Quality Management Institute, see Appendix 8. CSA has also published (August 7 995) the background research report, Implementing Privacy Codes of Practice: A Report to the Canadian Standards Association (PLUS 8830), written by Colin Bennett of the University of Vict

25、oria. Readers who seek further background information about the functions and implementation of Privacy Codes in Canada and overseas might also want to obtain this publication. December 7 996 Chapter 3 The importance of a national voluntary information protection code S NUMEROUS SURVEYS and polls ha

26、ve indicated, Canadians have become increasingly A concerned about their privacy and the protection of their personal data. In 1990, the Canadian Standards Association embarked on the development of a Model Code for the Protection of Personal Information that would provide useful guidance to organiz

27、ations, increase consumer confidence, and establish a process whereby individuals and organizations could resolve privacy concerns. CSA has a long history in the development of voluntary standards. Development of the CSA Code was, therefore, a natural outgrowth of CSA activities in business manageme

28、nt, reflecting CSA interests in safety, consumer concerns, and international harmonization. The finai CSA Code, subsequently approved by the Standards Council of Canada as a National Standard of Canada, and published in March 1996, provides a common standard for the protection of personal informatio

29、n that can be employed throughout all levels of public and private enterprise, supported by the broad resources of the Ca n ad i a n St and a rd s Association . The Code is based on the Organization for Economic Co-operation and Development (OECD) “Guidelines on the Protection of Privacy and Transbo

30、rder Flows of Personal Data“ to which the Government of Canada made a commitment in 1984. However, with the rapid increase in electronic data communications and the new interactive world of the information highway, the OECD privacy principles have been reformulated to better reflect the Canadian con

31、text and the new challenges of data protection in the information society. The ten principles of the CSA Code, when taken together, constitute a fair and equitable balance between the privacy rights of individuals and the legitimate personal information requirements of private and public rector orga

32、nizations. They also reflect excellent business practices that can considerably improve the confidence of consumers who provide their personal information to o rg a n iza ti o n s. Adhering to the CSA Code will improve the quality of personal information management within an organization. This can c

33、ontribute to competitive advantages such as a stronger relationship with customers, better employee relations, and more cost-effective management of personal information. December 1996 7 PLUS 8300 In inter-firm transactions, other organizations may prefer to deal with entities that also adhere to th

34、e Code, as a quality assurance measure. Privacy Tip: the meaning of “personal information” Personal information is any information about a specific, identifiable individual, including such commonly available details as name, address, and telephone number. Despite the fact that some personal informat

35、ion is widely available (eg, through telephone directories or public databases), this does not, in any way, lessen the responsibility to apply the Codes principles to its collection, use, and disclosure. The CSA Code incorporates the principles that every element of personal information should only

36、be used for purposes that are defined and explained in advance to the individual, and that use or disclosure for any other purposes requires further knowledge and consent. (See Principal 3, page 11, for methods to obtain consent.) The CSA Code also provides a national standard for personal informati

37、on protection that can be applied on an organization-specific or sectoral basis to address concerns about transborder data flow. Data protection laws, giving governments the authority to block data flow to jurisdictions without adequate data protection, have been passed by members of the European Un

38、ion, as well as New Zealand. Canadians now face the very real prospect that transborder flow of personal data between Canada and other countries may be prohibited, unless we adopt adequate data protection standards. The CSA Model Code for the Protection of Personal Information is expected to become

39、a standard upon which Canadians will judge the effectiveness of personal information protection in all types of organizations. Adopting the Code as a responsible, proactive measure makes good business sense. Impacts of privacy loss in the information age Many Canadians feel they have lost control ov

40、er the use of their personal information. Personal data provided to organizations for specific reasons may end up being used for completely unrelated purposes -often without any form of consent or knowledge by the individual concerned. In addition, data profiling - the use of computer data-matching

41、capabilities to create profiles of individuals - allows previously separate pieces of personal information to be compiled in ways never intended by the individual. A data profile is a powerful information or marketing tool that can be used by organizations to target clients or, conversely, limit and

42、 deny access to services. No one would deny the immense benefits of computerization in improving organizational efficiency and providing more personalized service. However, without proper safeguards to prevent the collection, use, or disclosure of erroneous data, or to prevent the use or disclosure

43、of information without consent, there can be unintended consequences. Stories are reported regularly in the media about individuals whose privacy, dignity, and even freedom have been eroded because incomplete, incorrect, or irrelevant data was entered into a file. While people may have the opportuni

44、ty to correct such erroneous data, the burden of proof is usually on the individual - and it can be a frustrating, demoralizing, or even insurmountable challenge to locate the source of “bad data,” convince others that it is indeed wrong, and have it corrected. Individuals also pay the price when pe

45、rsonal information - correct or otherwise - is purposely or inadvertently disclosed without their permission. There is no means of regaining privacy once it has been lost. 2 December 7 996 Making the C5d Privacy Code Work for You Moreover, organizations themselves pay a high price for failing to ade

46、quately safeguard personal data that has been entrusted to them. The consequences of such failures are measured in public anger and cynicism, diminished consumer confidence, lost business opportunities, and the high cost of correcting mistakes after they have been made. The following stories illustr

47、ate just how high the cost can be, for both individuals and organizations, due to inadequate personal information protection practices. A telecommunications company regularly donated computer printouts to local day care centres as drawing paper. On one occasion, the printouts included details of cal

48、ling card customer names and numbers. With the disclosure of this sensitive data, the company was forced to recall and reissue all of its customer calling cards, at a cost of more than $500,000 and considerable public embarrassment. Adequate procedures in the disposal of company records might have p

49、revented this disclosure. A woman received a phone call from a funeral home offering its services shortly after a hospital visit in which she was diagnosed with terminal cancer. The patient and her family were outraged by the insensitivity of this call and, upon further investigation, learned that a member of the hospital staff had provided the funeral home with details of the womans illness. The incident was widely reported in the media and a lawsuit subsequently was launched against both the hospital and the funeral home. While it is always more difficult to guard against such deliberat

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 标准规范 > 国际标准 > 其他

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1