Volume 12 • Number 10 In This Issue: September 2015 Federal Court Certifies Action for Publicity Given to Private Life Federal Court Certifies Action for Publicity Given to Private Life Gillian Scott and W. David Rankin .................... 97 Health Privacy Revisited— Upcoming Changes to Ontario’s Health Privacy Laws Ratika Gandhi ................................ 99 Privacy Commissioners Issue Joint Guidance on Bring Your Own Device Programs Martin P. J. Kratz et al. ..................... 102 Protecting Athlete Privacy: Alleged Concerns in Quebec Macdonald Allen ......................... 104 You and Your Robot Are Welcome Here: Canada’s Friendly Drone Laws Emily MacKinnon ....................... 106 Gillian Scott W. David Rankin Partner Osler, Hoskin & Harcourt LLP Associate Osler, Hoskin & Harcourt LLP Breaking new ground, the Federal Court recently certified a proposed privacy class action alleging the novel tort of publicity given to private life on the condition that the plaintiffs name an identified representative of the class. In John Doe and Suzie Jones v. Her Majesty the Queen [John Doe],1 two plaintiffs alleged that Health Canada breached their privacy, leading them to seek certification under pseudonyms to protect their identities. The court certified, for the first time in a Canadian class action, the novel claim of publicity given to private life. Recognizing the tension between privacy and the role of class representatives, however, the court required the plaintiffs to identify a named representative. Background: Medical Marihuana Privacy Breach The anonymous plaintiffs in John Doe alleged that Health Canada wrongfully identified them as participants in the federal program for access to medical marihuana. In November 2013, Health Canada sent oversized envelopes marked “Marihuana Medical Access Program” through Canada Post to approximately 40,000 individuals registered in the program. The plaintiffs alleged that by identifying on the envelopes the participants’ names together with the name of the program, Health Canada breached their privacy and exposed them to security concerns. They claimed that a reasonable person would conclude from the envelopes that the addressees were associated with the federal program, suffered from serious medical conditions, and possessed or consumed marihuana. CANADIAN PRIVACY LAW REVIEW • Volume 12 • Number 10 Canadian Privacy Law Review The Canadian Privacy Law Review is published monthly by LexisNexis Canada Inc., 123 Commerce Valley Drive East, Suite 700, Markham, Ont., L3T 7W8, and is available by subscription only. Web site: www.lexisnexis.ca Design and compilation © LexisNexis Canada Inc. 2015. Unless otherwise stated, copyright in individual articles rests with the contributors. ISBN 0-433-44417-7 ISSN 1708-5446 ISBN 0-433-44418-5 (print & PDF) ISBN 0-433-44650-1 (PDF) ISSN 1708-5454 (PDF) Subscription rates: $280.00 (print or PDF) $425.00 (print & PDF) Editor-in-Chief: Professor Michael A. Geist Canada Research Chair in Internet and E-Commerce Law University of Ottawa, Faculty of Law E-mail: [email protected] LexisNexis Editor: Boris Roginsky LexisNexis Canada Inc. Tel.: (905) 479-2665 ext. 308 Fax: (905) 479-2826 E-mail: [email protected] Advisory Board: ● ● ● ● ● ● ● ● Ann Cavoukian, former Information and Privacy Commissioner of Ontario, Toronto David Flaherty, Privacy Consultant, Victoria Elizabeth Judge, University of Ottawa Christopher Kuner, Hunton & Williams, Brussels Suzanne Morin, Ottawa Bill Munson, Information Technology Association of Canada, Toronto Stephanie Perrin, Service Canada, Integrity Risk Management and Operations, Gatineau Patricia Wilson, Osler, Hoskin & Harcourt LLP, Ottawa Note: This Review solicits manuscripts for consideration by the Editor-in-Chief, who reserves the right to reject any manuscript or to publish it in revised form. The articles included in the Canadian Privacy Law Review reflect the views of the individual authors and do not necessarily reflect the views of the advisory board members. This Review is not intended to provide legal or other professional advice and readers should not act on the information contained in this Review without seeking specific independent advice on the particular matters with which they are concerned. 98 The November 2013 mailings were contrary to past practice, and, on November 21, 2013, the Deputy Minister of Health Canada acknowledged that the envelopes resulted from administrative error. In response to 339 complaints, the Privacy Commissioner subsequently concluded that the mailings violated the Privacy Act2 by referring to the program together with the individuals’ names. Court Certifies Class Action, Given Low Evidentiary Threshold Justice Phelan continued the trend in the federal courts of applying a relatively low evidentiary threshold at the certification stage.3 Thus, Phelan J. held that certification was appropriate in John Doe, subject to amendments to the pleadings, including identifying a named representative. It was not plain and obvious that the plaintiffs’ causes of action would fail, and the Privacy Commissioner’s report was itself sufficient to provide “some basis in fact” for the other elements of the class certification test. In addition to causes of action in breach of contract/warranty, negligence, and breach of confidence, the plaintiffs alleged novel causes of action for intrusion upon seclusion and publicity given to private life. Justice Phelan held that the area of privacy rights is developing rapidly and that the development or limitation of novel breach of privacy claims should not be decided at certification. Although Canadian courts have been dealing with the novel cause of action for intrusion upon seclusion since the Ontario Court of Appeal’s decision in Jones v. Tsige,4 the tort of publicity given to private life has not yet been directly recognized in a Canadian class action. In the United States, the tort is defined as follows: One who gives publicity to a matter concerning the private life of another is subject to liability to the other for invasion of his privacy, if the matter publicized is of a kind that a) would be highly offensive to a reasonable person and b) is not of legitimate concern to the public.5 Justice Phelan took issue only with the pleading of breaches of ss. 7 and 8 of the Canadian Charter of Rights and Freedoms (“Charter”). However, consistent with his view on the rapid development of privacy rights, he gave the plaintiffs an opportunity to amend the allegations under the Charter. CANADIAN PRIVACY LAW REVIEW • Volume 12 • Number 10 Publicity Given to Private Life and Anonymity of Class Representatives John Doe demonstrates that the rapid development of privacy law has implications for class action procedure. In particular, certifying the U.S. tort of publicity given to private life—which has at its core the publication of private information—raises the issue of whether the class representative may remain anonymous under a pseudonym or must be identified to fulfill the representative’s role. On one hand, publicly identifying the class representative may further publicize aspects of the representative’s private life and may cause further damage. This concern is particularly important in the class action context, given the requirement of providing notice to class members and the generally higher profile nature of class proceedings. On the other hand, class representatives must be accountable to absent class members in how they exercise their responsibilities to the class, including instructing counsel, reviewing settlement offers, and negotiating retainers with counsel. Justice Phelan recognized this tension and held that “it is the Court’s intention that, if feasible, at least one public class representative should be identified”.6 Justice Phelan made the certification order conditional on the plaintiffs amending their Statement of Claim “naming an identified class representative”. The plaintiffs’ counsel suggested in the course of argument that this was feasible. John Doe shows that even in privacy class actions where the alleged damage arises from the publication of class members’ names, at least one named representative plaintiff should be identified (if at all possible) to be accountable to class members in the prosecution of the litigation. We expect the significance of this decision to be tested where data breaches result in public disclosure of private information, such as cases where hackers leak information stolen from corporate networks. Other class action decisions recognize that in some circumstances, the class representative may remain anonymous.7 For more on the responsibilities of class representatives on behalf of absent class members, see our post regarding meaningful scrutiny of the proposed representative plaintiff.8 © Osler, Hoskin & Harcourt LLP ____________________ 1 2 3 4 5 6 7 8 2015 FC 916, Docket: T-1931-13. R.S.C., 1985, c. P-21. For more on the federal courts’ liberal and purposive approach to class action certification, see our recent post on the Condon v. Canada decision, [2015] F.C.J. No. 803, 2015 FCA 159, Docket: A-165-14: Gillian Scott and Aislinn Reid, “Privacy Class Action Appeal Decision Confirms Low Threshold on Certification”, Canadian Class Action Defence, July 23, 2015, <http:// www.canadianclassactiondefence.com/2015/07/ privacy-class-action-appeal-decision-confirms-lowthreshold-on-certification/>. [2012] O.J. No. 148, 2012 ONCA 32. Restatement (Second) of Torts, §652D. Supra note 1, para. 63. Jane Doe 1 and Jane Doe 2 v. Manitoba, [2008] M.J. No. 292, 2008 MBQB 217. Tristram Mallett and W. David Rankin, “Meaningful Scrutiny of the Proposed Representative Plaintiff”, Canadian Class Action Defence, June 18, 2014, <http://www.canadianclassactiondefence.com/ 2014/06/meaningful-scrutiny-of-the-proposedrepresentative-plaintiff/>. Health Privacy Revisited— Upcoming Changes to Ontario’s Health Privacy Laws Ratika Gandhi Associate McMillan LLP Privacy matters to Ontarians and even more so in light of a number of highly publicized breaches of sensitive personal health information (“PHI”) in circumstances where one would expect PHI to be protected and treated with the utmost confidentiality. As well, there has been increasing pressure to modernize the province’s health privacy laws as 99 CANADIAN PRIVACY LAW REVIEW • Volume 12 • Number 10 a result of changing health care delivery models, electronic health records, and the collaboration among a greater number of individuals involved in the provision of a patient’s health care. With this mind, Ontario’s Health Minister Eric Hoskins has announced the government’s commitment to privacy and accountability in the health care system and amendments to the Personal Health Information Protection Act, 2004 [PHIPA].1 While PHIPA is a relatively new piece of legislation in Ontario, having been introduced just over ten years ago, many stakeholders believe that it needs to be updated to reflect growing privacy concerns as well as to better align itself with recent changes made to the federal privacy legislation that governs commercial activities in the private sector—the Personal Information Protection and Electronic Documents Act [PIPEDA].2 PHIPA has been deemed to be substantially similar to PIPEDA, and as such, recent amendments to PIPEDA that include provisions that now make it easier to prosecute offences as well as those that impose increased fines for non-compliance must also make their way into PHIPA. put forth, and in what form, below are some of the key amendments from EPHIPA that if and when re-introduced have implications for health care providers and prescribed organizations. Key EPHIPA Provisions Prescribed Organizations On May 29, 2013, the Ontario government introduced Bill 78, the Electronic Personal Health Information Protection Act [EPHIPA] to amend PHIPA, with a focus on information sharing and coordination among health care providers involved in a patient’s circle of care, through the creation of a single provincial electronic health record maintained by prescribed organizations. While no specific prescribed organization was listed in Bill 78, it is assumed that eHealth Ontario will be the first entity to be named as such. One of the main focuses of EPHIPA is the introduction of prescribed organizations as essentially the service providers of the electronic health record database and its related systems. A similar concept does exist in the current regulations made under PHIPA in the form of health information network providers (HINPs). HINPs are defined in the general regulation to PHIPA as a “person who provides services to two or more health information custodians where the services are provided primarily to custodians to enable the custodians to use electronic means to disclose personal health information to one another, whether or not the person is an agent of any of the custodians”. The regulations under PHIPA prescribe minimum standards that are applicable to HINPs, including obligations relating to security of PHI, notification of breaches of confidentiality, and logging and documenting of data accesses. As well, a HINP must enter into a written agreement with each health information custodian concerning the services provided to the custodian that (1) describes the services that the provider is required to provide for the custodian; (2) describes the administrative, technical, and physical safeguards relating to the confidentiality and security of the information; and (3) requires the HINP to comply with PHIPA and its regulations. EPHIPA previously reached second reading but died on the Order Paper when the legislature dissolved on May 2, 2014. In a news report released on June 10, 2015, by the Ontario Ministry of Health and Long-Term Care, the government has announced its intention to re-introduce a number of the protections to electronic and other PHI, as presented in 2013 through EPHIPA. While it is not completely clear when the new amendments will be The EPHIPA provisions relating to prescribed organizations are in the same spirit as those relevant to HINPs and build upon the framework that is already in place. However, the EPHIPA provisions applicable to prescribed organizations contain more robust requirements, including a tri-annual audit of the prescribed organization’s privacy and security framework by the Information and Privacy Commissioner. 100 CANADIAN PRIVACY LAW REVIEW • Volume 12 • Number 10 Collection, Use, and Disclosure of PHI by Health Information Custodians (HICs) Under EPHIPA, a HIC can provide PHI to a prescribed organization for the purposes of creating or maintaining the electronic health record, and in doing so, the HIC will not be considered to be “disclosing” PHI, and the prescribed organization will not be considered to be “collecting” PHI. Disclosure is deemed to occur where a HIC, other than the HIC that originally provided the PHI to the prescribed organization, initially views, handles, or deals with the PHI in the electronic health record for the first time. A HIC collects PHI on the initial instance on which it views, handles, or otherwise deals with PHI in the electronic health record that the HIC has not provided itself to the prescribed organization. Any subsequent viewing, handling, or dealing with PHI in the electronic health record by either the original HIC who provided the PHI to the prescribed organization in the first place, or a HIC that has already viewed, handled, or dealt with PHI in the electronic health record, is deemed to be a “use” so long as no new or additional information is viewed, handled, or otherwise dealt with. EPHIPA also specifies that the only purpose for which a HIC can collect PHI is to provide health care or to eliminate or reduce a significant risk of serious bodily harm to a person or group of persons. modifications, to the “lock-box” provisions in PHIPA, and like such lock-box provisions, there are circumstances under which a HIC may override the consent directive, including to eliminate or reduce a significant risk of serious bodily harm to the patient or others. However, unlike lock-box requests, EPHIPA provides that a prescribed organization is the exclusive manager of consent directives, and as such, all patient requests to limit access must be made to and decided by the prescribed organization. Prescribed organizations must audit, log, and monitor access to PHI that is subject to a consent directive and may override a consent directive for the purpose of notifying a HIC about potentially harmful medication interactions so long as such notification does not reveal underlying PHI that is subject to the directive. Mandatory Reporting of Privacy Breaches In the event that PHI in the electronic health record is stolen, lost, or accessed by unauthorized persons, the prescribed organization must notify the HIC that provided the PHI in question. As well, the prescribed organization must notify the Information and Privacy Commissioner in writing where the prescribed organization (or someone that it has retained) has dealt with the PHI in the electronic health record in a manner that is contrary to the legislation or where there has been an unauthorized release of PHI in the electronic health record. Consent Directives Increase in Fines for PHIPA Offences Despite the proposed changes introduced by EPHIPA, the legislation will retain the overarching general privacy principles promulgated by PHIPA and PIPEDA, including the concepts of limited access to a patient’s PHI. In particular, under EPHIPA, a patient may limit access to his or her PHI in the electronic health record by a consent directive provided to a prescribed organization. Through a consent directive, a patient may withhold or withdraw his or her consent to the collection, use, and disclosure of his or her PHI contained in the electronic health record for the purpose of providing or assisting in the provision of health care to the individual. This concept is similar, with some Under EPHIPA, there is no limitation period for prosecution of offences under PHIPA. More importantly, EPHIPA doubles the monetary fines for offences committed under the legislation. For an individual offender, the fine is increased from $50,000 to $100,000, and for a corporate offender, the fine is increased from $250,000 to $500,000. If such proposed amendments are reintroduced, this could significantly increase organizations’ exposure for offences. Contractual Considerations Until the proposed amendments are actually introduced, it is difficult to fully comment on 101 CANADIAN PRIVACY LAW REVIEW • Volume 12 • Number 10 the implications for all those involved in the provision of health care. However, it appears that prescribed organizations as well as HICs may have a number of additional responsibilities that they must consider. While the amendments to PHIPA found in EPHIPA do provide a number of explicit duties and obligations applicable to parties involved in the creation, contribution, and access to the electronic health record, it is still arguably important to specify and delineate these responsibilities and liabilities through contractual means. In particular, network services agreements (as currently required for HINPs) are still relevant in that they should still be used to set out the specific services to be provided by a prescribed organization as well as identify the responsibilities and allocate risk between the prescribed organization and participants in the electronic health network. Additionally, there continues to be a need for data-sharing agreements, since these agreements address the exchange and sharing of PHI between participants of a network, typically excluding the HINP (or prescribed organization). © McMillan LLP ___________________ 1 2 S.O. 2004, c. 3, Schedule A. S.C. 2000, c. 5. Privacy Commissioners Issue Joint Guidance on Bring Your Own Device Programs Martin P. J. Kratz, QC Michael R. Whitt, QC Partner, Trademark Agent, Head of Intellectual Property Bennett Jones LLP Partner, Patent Agent, Trademark Agent, Co-Head of Information Technology Bennett Jones LLP Stephen D. Burns J. Sébastien A. Gittens Partner, Trademark Agent Bennett Jones LLP Associate, Trademark Agent Bennett Jones LLP Conclusion It has become apparent that the use of electronic health records and the changing health care delivery model, while extremely beneficial and efficient in many ways, present a greater risk of unauthorized access, use, and disclosure of PHI. As Brian Beamish, the Ontario Privacy Commissioner, stated “patients who don’t have faith in the security and privacy of electronic health records may not provide full and accurate information to their health care providers—and that could impact the health care they receive”. As such, amendments to PHIPA are necessary and overdue, and the provisions first introduced by EPHIPA were meant to protect Ontarians’ PHI as well as provide greater oversight and compliance. While the actual amendments have yet to be released, it is important for HICs and prospective prescribed organizations to consider the types of changes to health privacy laws that will likely be introduced in the near future and prepare for the additional responsibilities that will result. 102 Graeme S. Harrison Associate Bennett Jones LLP An organization’s information can be put at risk when staff begin to bring their own devices and use them in the workplace. As a result, in such cases, an organization should consider adopting an appropriate bring your own device (BYOD) program to seek to manage the risks inherent in such activity. CANADIAN PRIVACY LAW REVIEW • Volume 12 • Number 10 Generally, a BYOD program allows an organization’s employees to use their personal mobile devices for both personal and business purposes. A threshold issue for an organization is to consider what devices may be included in a BYOD policy, as society has moved far past smart phones to all sorts of wearable devices that can capture, process, and post an organization’s confidential information and the personal information of its staff and customers. While there are many benefits to a BYOD program (e.g., an increase in employee satisfaction and productivity), organizations should evaluate the various inherent risks associated with the implementation and use of a BYOD program and take reasonable steps to mitigate such risks. To support this process, the Office of the Privacy Commissioner of Canada, along with its provincial counterparts in Alberta and British Columbia, recently released a new joint guidance document (Is a Bring Your Own Device (BYOD) Program the Right Choice for Your Organization?), which highlights various key privacy and security risks that should be considered when making decisions regarding a BYOD program. The following is a brief summary of a few of these considerations: Conduct a Privacy Impact Assessment (PIA) and Threat Risk Assessment (TRA): Conducting a PIA and TRA will help identify and address risks associated with the collection, use, disclosure, storage, and retention of personal information. These assessments may lead an organization to restrict the use of applications with, for example, cloud services. Develop, Communicate, Implement, and Enforce a BYOD-Specific Policy: Establishing the obligations and expectations of BYOD users is essential to the prevention of privacy and security threats. Organizations are encouraged to work with internal departments, such as information technology, information management, legal, finance, and human resources, to develop an enforceable, easy-to-understand BYOD policy. Such a policy should address issues such as user responsibilities, acceptable and unacceptable uses of BYOD devices, application management, and access requests. Mitigate Risks through Containerization: Containerization refers to the compartmentalization of an organization’s corporate information from any other information that may be resident on an employee’s mobile device. Undertaking this process creates a clear division as to what is subject to an organization’s BYOD policy and what is not. Formalize a BYOD Incident Management Process: Despite any effort to address all privacy and security risks, organizations should be cognizant that vulnerabilities will continue to exist. In the event of a privacy or security breach, organizations should accordingly have an incident management process in place to help with the identification, containment, reporting, investigation, and correction of that breach in a timely manner. Maintain an Inventory: In order to minimize privacy and security threats, organizations should maintain an up-to-date inventory of authorized mobile devices and apps participating in its respective BYOD program. Maintaining such an inventory will help an organization to, among other things, take appropriate steps during an incident response. Employees whose personal mobile devices are improperly secured put all of the information on the mobile device, including the organization’s confidential information, at risk. Thus, an organization may suffer significant harm, including financial loss, loss of competitive advantage, and/or damage to its reputation if any such device is lost, stolen, jailbroken, or rooted. This does not mean that an organization should avoid a BYOD program. Increasingly, staff are demanding such programs, so it may become a recruiting and retention issue. However, the organization should seek to create a secure environment where the benefits of a BYOD program can be enjoyed and where the risks are minimized 103 CANADIAN PRIVACY LAW REVIEW • Volume 12 • Number 10 by (1) setting up suitable and appropriate BYOD policies, (2) educating users on those policies, (3) supervising user conduct under the policies, and (4) implementing suitable technological measures to support those policies. © Bennett Jones LLP Protecting Athlete Privacy: Alleged Concerns in Quebec Macdonald Allen Associate WeirFoulds LLP The World Anti-Doping Agency (WADA) adopted the International Standard for the Protection of Privacy and Personal Information in May 2009 to address concerns about the treatment of sensitive athlete information. Today, concerns over the adequacy of the protection of personal information legislation in Quebec have, according to reports, led to requests that WADA’s headquarters be transferred from Quebec to Europe. To address such concerns, Canada’s federal government is seeking to extend the applicability of its federal data protection law to WADA. WADA collects a significant amount of data from athletes around the world. WADA’s coordinated enforcement initiatives often require transferring data between different jurisdictions. Among WADA’s initiatives that impact athlete privacy are its data management database called ADAMS, its “whereabouts” rules with respect to an athlete’s location information for random testing and an athlete’s biological passport. To address mounting concerns over its treatment of sensitive and personal athlete information, WADA adopted the International Standard for the Protection of Privacy and Personal Information (ISPPPI) in May 2009. The ISPPPI came into force on June 1, 2009.1 On January 1, 2015, certain revisions 104 to the ISPPPI came into effect. From the ISPPPI’s preamble, its main purpose “is to ensure that organizations and persons involved in anti-doping in sport apply appropriate, sufficient and effective privacy protections to Personal Information that they Process, regardless of whether this is also required by applicable laws [emphasis in original]”.2 The ISPPPI establishes a minimum set of rules to protect the personal information of athletes. WADA was established in 1999 in Lausanne, Switzerland. In April 2002, WADA moved its headquarters to Montreal, Quebec.3 WADA warns that it will collect and store personal information in Canada and/or Switzerland. WADA’s online privacy policy issues a warning that “both Switzerland and, to a more limited extent, Canada, have been deemed by the European Commission to be jurisdictions that provide adequate levels of legal protection for privacy. While Quebec offers an equivalent level of protection, no such formal decision has been taken”.4 In Canada, privacy and protection of information law is regulated by federal and provincial statutes. One of the reasons that the Canadian federal law on data protection, the Personal Information and Protection of Electronic Documents Act [PIPEDA],5 was established was to “create a vehicle for Canada to provide a level of protection for personal information that would facilitate the flow of personal information from [European Union] member states to Canada”.6 PIPEDA was declared as providing an adequate level of protection by the European Commission on December 20, 2001.7 During the preparation of the ISPPPI, a WADA expert group specifically took into account a number of international privacy rules and standards, including but not limited to, Directive 95/46/EC of the European Parliament and of the Council of October 24, 1995, on the processing of personal data and on the free movement of such data.8 On June 4, 2014, an independent European advisory body (the “Working Party”), established under Article 29 of Directive 95/46/EC on data protection and privacy, prepared an opinion on the protection CANADIAN PRIVACY LAW REVIEW • Volume 12 • Number 10 of personal data in Quebec. The adequacy of the data protection legislation in force in Quebec referred to Articles 35 to 41 of the Civil Code of Quebec9 and the Act Respecting the Protection of Personal Information in the Private Sector (the “Quebec Act”).10 Among other things, the Working Party considered that the Canadian federal and provincial opinions on the scope of the application of the Quebec legislation to both interprovincial and international transfers of personal information did not coincide. The Canadian federal privacy commissioner was of the view that PIPEDA applied to interprovincial or provincial transfers of personal information, while the Quebec provincial Commission d’Accès a l’information (CAI) considered that in the case of interprovincial and international transactions, both the federal and provincial legislation applied.11The Working Party considered that it was “necessary to clarify the territorial scope of the Quebec Act before any decision on its adequacy is taken by the European Commission”.12 As of the writing of this article, Quebec’s provincial legislation has not received an adequacy decision by the European Commission. Under Article 8.2 of the ISPPPI, Anti-Doping Organisations (as defined in the ISPPPI) shall not disclose Personal Information (as defined in the ISPPPI) to other Anti-Doping Organisations where there is evidence that the recipient Anti-Doping Organisation does not or cannot comply with the ISPPPI. Where there are concerns that another Anti-Doping Organisation is incapable of complying with the ISPPPI, those concerns shall be made known to the Anti-Doping Organisation and WADA as soon as possible.13 Concerns over the adequacy of the provincial protection of information legislation in Quebec have apparently led to requests that WADA’s headquarters be transferred to Europe.14 To address such concerns, the Canadian federal government’s omnibus budget bill, the Economic Action Plan 2015 Act (“Bill C-59”)15 seeks to amend PIPEDA.16 In Division 13 of Bill C-59, PIPEDA is amended by specifically making the federal legislation applicable to organisations set out in a new schedule to the act. At this time, the only organisation included in the new schedule is WADA. As noted in the Senate Standing Committee’s report on the content of Bill C-59, “the proposed amendments to PIPEDA would expand the potential application of the law beyond federal works, undertakings and businesses and the commercial activities of private-sector organizations to include any organization that is added to Schedule 4 with respect to the personal information set out in that Schedule.17 The amendments to PIPEDA establish a precedent to broaden the scope of PIPEDA to include organisations that are not federal works, undertakings or businesses, or otherwise engaged in commercial activities.18 It is unclear what effect this amendment will have on WADA’s operations. In its written submission to the Standing Committee on National Finance, the Privacy Commissioner of Canada noted that “the extension of PIPEDA’s application to WADA […] will not remove the application of substantially similar Quebec privacy law as it applies to collections, uses and disclosures of personal information within the Province of Quebec”.19 Quebec’s provincial legislation was deemed substantially similar to PIPEDA in December 2003.20 Global organisations such as WADA, which transfer data within provincial, national, and international borders, often adopt privacy compliance measures that meet the strictest legislative requirements in whichever jurisdiction they operate. On that basis, WADA’s operations likely satisfy the requirements of both Canada’s federal and provincial protection of information legislation but may expose the organisation to complaints under each regulatory regime. The real effect of the amendments to PIPEDA may be to the judicial analysis of Canada’s division of powers and inter-jurisdictional immunity with respect to privacy and protection of information legislation due to questions about the amendment’s constitutional validity.21 © WeirFoulds LLP 105 CANADIAN PRIVACY LAW REVIEW • Volume 12 • Number 10 [Editor’s note: To access the article “Protecting Athlete Privacy: Alleged Concerns in Quebec” first published in World Sports Law Report, visit either <http://www.e-comlaw.com/ world-sports-law-report/ article_template.asp?Contents=Yes&from= wslr&ID=1792> or <http://www.weirfoulds.com/ _WF-Protecting-Athlete-Privacy>.] _____________________ 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 WADA, International Standard for the Protection of Privacy and Personal Information, <https:// wada-main-prod.s3.amazonaws.com/resources/files/ WADA_IS_PPPI_2009_EN.pdf>. Ibid. WADA, “Regional Offices”, <https:// www.wada-ama.org/en/contact-us/regional-offices>. WADA, “Privacy Policy”, <https:// www.wada-ama.org/en/privacy-policy>. S.C. 2000, c. 5. Office of the Privacy Commissioner of Canada, The Case for Reforming the Personal Information Protection and Electronic Documents Act, p. 6, <https:// www.priv.gc.ca/parl/2013/pipeda_r_201305_e.pdf>. Article 29 Data Protection Working Party, “Opinion 7/2014 on the Protection of Personal Data in Quebec” (June 4, 2014), <http://ec.europa.eu/justice/ data-protection/article-29/documentation/ opinion-recommendation/files/2014/wp219_en.pdf>. Supra note 1, “Preamble”. Civil Code of Quebec, CQLR c C-1991. The Quebec Act, CQLR c P-39.1. Supra note 7 at p. 4. Ibid., p. 5. Supra note 1, article 8.2. Michael Geist, “How Bill C-59 Reshapes Canadian Privacy Law”, Michael Geist, June 15, 2015, <http:// www.michaelgeist.ca/2015/06/how-bill-c-59-reshapescanadian-privacy-law/>; see also Allison Lampert, “Canada Will Act to Keep Doping Agency in Montreal”, Reuters Canada, April 20, 2015, <http://ca.reuters.com/ article/sportsNews/idCAKBN0NB2CJ20150420>. Canada. Parliament. Bill C-59, Economic Action Plan 2015 Act, 41st Parl., 2nd Sess., 2015 (assented to June 23, 2015). Senate Standing Committee on National Finance, “Report on the Subject Matter of Bill C-59”, Twenty-Second Report, June 2015, p. 25, <http://www.parl.gc.ca/ sencommitteebusiness/ CommitteeReports.aspx?Language=e&Parl=41& Ses=2&comm_id=1013>. Ibid., p. 26. Letter from Privacy Commissioner of Canada to Standing Senate Committee on National Finance (June 1, 2015), <http://www.parl.gc.ca/Content/HOC/Committee/412/ FINA/WebDoc/WD7992837/412_FINA_C-59_Briefs% 5COfficeOfThePrivacyCommissionerOfCanada-e.pdf>. Ibid., p. 2. 106 20 21 Privacy Commissioner of Canada, Learning from a Decade of Experience: Quebec’s Private Sector Privacy Act (Montreal: Government of Canada): 4, <https:// www.priv.gc.ca/information/pub/dec_050816_e.pdf>. Supra note 14. You and Your Robot Are Welcome Here: Canada’s Friendly Drone Laws Emily MacKinnon Associate McCarthy Tétrault LLP Whether used to view real estate, monitor remote industrial operations, deliver goods, shoot scenes in the television and film industry, or assist with search and rescue, Canada’s flexible regulations and its focus on enabling drone operations have made it a leader in the nascent drone industry. This is only logical: in Canada’s remote and challenging terrain, the commercial use of drones makes a lot of sense. It may also be easier to integrate drones into our relatively uncrowded airspace. Other jurisdictions are working to catch up: for instance, on March 29 of this year, the Hong Kong Privacy Commissioner for Personal Data published a guidance note that supplements previous guidance on the use of closed circuit television systems and for the first time addressed the use of drones. Wherever located, all drone-using businesses face the challenge of navigating increasing safety and privacy concerns. Companies considering drone operations in Canada need to be aware of the rules. Regulating by Weight In Canada, drone safety is often addressed by regulations specifying where drones may be flown. Most jurisdictions distinguish between drones flown for commercial purposes and those flown for recreational purposes, provided the drone is below a particular weight. In the U.S., that weight is 55 lbs, CANADIAN PRIVACY LAW REVIEW • Volume 12 • Number 10 or just under 25 kgs. In Hong Kong, that weight is a much lower—7 kgs. In Canada, drones under 35 kgs are model aircraft as long as they are flown recreationally. They must be flown in accordance with Transport Canada’s guidelines—for instance, they cannot be flown within five nautical miles of an aerodrome—but they are otherwise largely unregulated. Transport Canada’s new proposed drone regulations, unveiled on May 28, 2015, however, would drop the drone weight below which they are unregulated to 25 kgs. Currently, drones that are flown for commercial purposes or that exceed 35 kgs are unmanned air vehicles (UAVs).1 Up until November 2014, all UAVs could be flown only in accordance with a special flight operations certificate (SFOC). As of November 2014, blanket exemptions apply to UAVs weighing less than 25 kgs, provided certain rules are followed. The new proposed drone regulations would replace these exemptions, which are due to expire in December 2016. Flexible Permits in Canada For now, SFOCs offer regulators a flexible response to the rapidly-evolving drone industry. And they are popular. In 2014, 1,672 SFOCs were issued—up from 945 in 2013, and 347 in 2012. With an SFOC, Transport Canada can design rules that make sense for particular UAV pilots and for particular UAV flights. This is a major advantage over jurisdictions like the U.S., for instance, which until recently required drone operators to hold fullfledged private pilot licences. In Canada, drone pilots are currently required to have only a “satisfactory level of knowledge, experience and skill”, although it is likely that UAV pilot permits will eventually be required. Technology-Neutral Privacy Laws Addressing privacy concerns may be as simple as ensuring that existing laws encompass drones. This is the approach taken by Hong Kong in its recent guidelines. Similarly, Canada’s Privacy Commissioner has opined that Canada’s existing privacy laws apply to drones. While lateral surveillance— private citizens surveilling other private citizens— is often not covered by privacy statutes, torts such as intrusion upon seclusion may fill that gap. Even if existing laws apply, however, drones present a unique challenge for enforcement. Catching the drone—and its operator—is not always simple, as French authorities discovered when tracking drones in Paris. In fact, many police forces in Canada use drones themselves—which raises the spectre of police drones being used to track and chase scofflaw civilian drones and their operators. Hong Kong’s guidelines suggest using flashing lights or other methods to inform observers that the drone is recording video, much like the requirement in Japan and South Korea that all cell phone cameras emit a “shutter” sound when taking a photo. Similar suggestions have been made in the U.S. but so far have not been widely championed. Flying beyond Visual Line-of-Sight Sending drones beyond the visual range of the pilot is key to the commercial use of drones. The point, after all, is to send drones to locations inaccessible by people. Such operations crystallize safety and privacy concerns, however—think of the mystery drone seen peering into apartments in Vancouver— and as a consequence, most regulators will not permit drone operations beyond visual line of sight. Even the recent U.S. draft drone regulations, published in February 2015, would restrict operations to visual line of sight. Canada has taken a different approach. SFOCs may be issued for drone operations beyond visual line of sight, provided (1) the drone has a sense and avoid system, (2) the operations will be conducted entirely within restricted airspace, or (3) the applicant has implemented some other method of mitigating collision risks. Looking to the future, Transport Canada’s Unmanned Air Vehicle Working Group will be exploring regulations for drone operations beyond visual line of sight. We—and the drones— will be watching with interest. © McCarthy Tétrault LLP 107 CANADIAN PRIVACY LAW REVIEW • Volume 12 • Number 10 1 Do not get too used to Canada’s terminology—the international organization that governs civil aviation, ICAO, uses the terms Remotely Piloted Aircraft Systems (RPAS) and Unmanned Aircraft Systems (UAS), and Canada is eventually likely to follow its lead. INVITATION TO OUR READERS Do you have an article that you think would be appropriate for Canadian Privacy Law Review and that you would like to submit? Do you have any suggestions for topics you would like to see featured in future issues of Canadian Privacy Law Review? If so, please feel free to contact Michael A. Geist @[email protected] OR [email protected] 108
© Copyright 2026 Paperzz