Personal Information Protection and Electronic Documents Act [“PIPEDA”]

S.C. 2000, c. 5

Assented to 2000-04-13

An Act to support and promote electronic commerce by protecting personal information that is collected, used or disclosed in certain circumstances, by providing for the use of electronic means to communicate or record information or transactions and by amending the Canada Evidence Act, the Statutory Instruments Act and the Statute Revision Act

PIPEDA Requirement (Verbatim from Schedule 1 of the Act)Company Policy Provision
Principle 1: Accountability
4.1: An organization is responsible for personal information under its control and shall designate an individual or individuals who are accountable for the organization’s compliance with the following principles.See Privacy Policy, How to Contact Us; Policy Packet, Information Security Roles and Responsibilities
4.1.3: An organization is responsible for personal information in its possession or custody, including information that has been transferred to a third party for processing. The organization shall use contractual or other means to provide a comparable level of protection while the information is being processed by a third party.See Third-Party Management Policy, School Addendum, Section 2
Principle 2: Identifying Purposes
4.2: The purposes for which personal information is collected shall be identified by the organization at or before the time the information is collected.See Privacy Policy, How We Collect and Use Information, Section 2
4.2.3: The identified purposes should be specified at or before the time of collection to the individual from whom the personal information is collected.See security statement, Section 3.2
Principle 3: Consent
4.3: The knowledge and consent of the individual are required for the collection, use, or disclosure of personal information, except where inappropriate.See terms of use, School Addendum, Section 1; Security Statement,Section 3.2
4.3.3: An organization shall not, as a condition of the supply of a product or service, require an individual to consent to the collection, use, or disclosure of information beyond that required to fulfil the explicitly specified, and legitimate purposes.See Security Statement, Section 2
Principle 4: Limiting Collection
4.4: The collection of personal information shall be limited to that which is necessary for the purposes identified by the organization. Information shall be collected by fair and lawful means.See Security Statement, Section 4
Principle 5: Limiting Use, Disclosure, and Retention
4.5: Personal information shall not be used or disclosed for purposes other than those for which it was collected, except with the consent of the individual or as required by law. Personal information shall be retained only as long as necessary for the fulfilment of those purposes.See Security Statement, Section 6; Terms Of Use, School Addendum, Section 4; Data Management Policy, Appendix A
Principle 6: Accuracy
4.6: Personal information shall be as accurate, complete, and up-to-date as is necessary for the purposes for which it is to be used.See Security Statement, Section 6, "Correction of RECORDS"
Principle 7: Safeguards
4.7: Personal information shall be protected by security safeguards appropriate to the sensitivity of the information.See Security Statement, Section 5; Privacy Policy, How We Store and Protect Your Information; Cryptography Policy and Operations Security Policy
Principle 8: Openness
4.8: An organization shall make readily available to individuals specific information about its policies and practices relating to the management of personal information.See Privacy Policy; Security Statement; Terms Of Use
Principle 9: Individual Access
4.9: Upon request, an individual shall be informed of the existence, use, and disclosure of his or her personal information and shall be given access to that information. An individual shall be able to challenge the accuracy and completeness of the information and have it amended as appropriate.See Security Statement, Section 6, "Viewing of RECORDS"; Privacy Policy, Access to Individual Data
Principle 10: Challenging Compliance
4.10: An individual shall be able to address a challenge concerning compliance with the above principles to the designated individual or individuals accountable for the organization’s compliance.See Privacy Policy, How to Contact Us; Security Statement, Section 3.2