By John Jager, CIPP/C

Effective May 1, 2010, amendments to Alberta’s Personal Information Protection Act (PIPA) created an obligation for organizations to notify the information and privacy commissioner of any incident involving the loss of or unauthorized access to or disclosure of PI, “where a reasonable person would consider that there exists a real risk of significant harm to an individual as a result of the loss or unauthorized access or disclosure.” The amended PIPA also provides that the commissioner may require the organization to notify individuals to whom there is a real risk of significant harm as a result of the loss or unauthorized access or disclosure, “in a form and manner prescribed by the regulations,” and “within a time period determined by the commissioner.”

Since these provisions have come into effect, the commissioner has published a number of decisions that provide guidance as to how the he has interpreted “real risk of significant harm” and subsequently decided if the organization should notify affected individuals. Here are a number of examples of decisions published on the commissioner’s Web site.

In P2011-ND-006 - Transalta Corporation, the commissioner decided that there was a real risk of significant harm to employees when medical test forms sent in the mail by a third-party service provider to an organization were lost. While the forms contained low to moderately sensitive information, data elements such as name, address and telephone number could be combined with date of birth to commit identity theft. The organization was ordered to provide notification to affected employees as a real risk of significant harm exists as mail services are often targeted for identity theft and other criminal activity; the fact that lost personal information had not yet been accessed or disclosed did not mean there was no real risk (e.g., the information was in paper form that was readily accessible and could be used by anyone who may find it).

In P2010-ND-003 - TD Investment Services Inc.,  it was determined that there was a real risk of significant harm to an individual when a fax containing the individual’s personal information was accidentally sent to the individual's workplace (it was unknown how long the fax was left on the recipient fax machine nor how many individuals may have had access to it). The individual notified the organization that the fax had been sent to her workplace and, in response, the organization offered the individual a complimentary subscription to a credit bureau monitoring service in order to reduce the risk of identity theft. The commissioner noted that for an organization to be required to notify an affected individual there must be some harm that could be caused as a result of the incident and the harm must be significant (important, meaningful with non-trivial consequences or effects); in this case the harm is the possibility for identity theft and, given the sensitivity of the information, there is a real risk of significant harm.

P2010-ND-001 - Knights of Columbus Charitable Foundation dealt with the discovery of underwriting documents (including Social Security numbers, financial account numbers and driver's license numbers) found outside the organization's headquarters. In this case, a real risk of significant harm existed given the moderate to high sensitivity of the information and the fact that the cause of the breach was unknown. It is interesting to note that although the incident occurred in the United States, the commissioner had jurisdiction as the personal information included that of a number of Albertans, which was collected by an organization licensed to operate in Alberta.

In P2011-ND-002 - Mini Mall Self Storage, it was determined that there was a real risk of significant harm to individuals when unencrypted computers were stolen from business premises; the computers contained highly sensitive information of customers (customer credit card numbers, expiry dates and specific banking information) and employees (Social Insurance Numbers and birth dates). Had the business not already notified employees and customers, either by letter or in person, it would have been ordered to provide notification as a real risk of significant harm exists due to the sensitivity of the information (it provides partial or comprehensive individual profiles that could be used for identity theft or fraud) and the fact that the unencrypted information was stolen and not recovered.

In P2011-ND-003 - CEDA International Corporation, there was a real risk of significant harm to individuals when a company's human resources folder was found to be accessible to all employees on a public drive. The folder contained highly sensitive information of employees (e.g. Social Insurance numbers, banking information including transit and account numbers, discipline records and medical information). The company was ordered to provide notification to affected employees due to the sensitivity of the information (the individual profiles could be used for identity theft and/or fraud) and the fact that the information was located on an unsecured employee public drive for a three to five-month period and was likely accessed and viewed by unauthorized individuals.

In P2010-ND-005 - Full Bars Communications Inc., external hard drives were stolen from a business owner's home garage. The hard drives contained information for current and former employees (including Social Insurance Numbers and driver's license numbers) and customers (including truncated credit card numbers). The organization was required to notify its employees as there was a real risk of significant harm to the current and former employees (it had already notified current employees and must notify former employees). Notification to customers was not required, as truncated credit card numbers are unlikely to be used for fraudulent purposes or to perpetuate identity theft.

In light of the above examples, organizations must carefully review each security breach incident and consider the sensitivity of the information, the protection afforded the information (e.g. encryption) and the likelihood that the information can be used for identity theft.

John Jager, CIPP/C, is vice president of research services at Nymity, Inc., which offers Web-based privacy support to help organizations control their privacy risk. He can be reached at john.jager@nymity.com.


If you want to comment on this post, you need to login.


Board of Directors

See the esteemed group of leaders shaping the future of the IAPP.

Contact Us

Need someone to talk to? We’re here for you.

IAPP Staff

Looking for someone specific? Visit the staff directory.

Learn more about the IAPP»

Daily Dashboard

The day’s top stories from around the world

Privacy Perspectives

Where the real conversations in privacy happen

The Privacy Advisor

Original reporting and feature articles on the latest privacy developments

Privacy Tracker

Alerts and legal analysis of legislative trends

Privacy Tech

Exploring the technology of privacy

Canada Dashboard Digest

A roundup of the top Canadian privacy news

Europe Data Protection Digest

A roundup of the top European data protection news

Asia-Pacific Dashboard Digest

A roundup of the top privacy news from the Asia-Pacific region

IAPP Westin Research Center

Original works. Groundbreaking research. Emerging scholars.

Advertise in IAPP Publications

Find out how to get your message in front the people you want to reach. Download a media kit now.

Get more News »

Find a KnowledgeNet Chapter Near You

Network and talk privacy at IAPP KnowledgeNet meetings, taking place worldwide.

Women Leading Privacy

Events, volunteer opportunities and more designed to help you give and get career support and expand your network.

IAPP Job Board

Looking for a new challenge, or need to hire your next privacy pro? The IAPP Job Board is the answer.

Join the Privacy List

Have ideas? Need advice? Subscribe to the Privacy List. It’s crowdsourcing, with an exceptional crowd.

Find more ways to Connect »

Find a Privacy Training Class

Two-day privacy training classes are held around the world. See the complete schedule now.

Online Privacy Training

Build your knowledge. The privacy know-how you need is just a click away.

The Training Post—Can’t-Miss Training Updates

Subscribe now to get the latest alerts on training opportunities around the world.

New Web Conferences Added!

See our list of upcoming web conferences. Just log on, listen in and learn!

Train Your Staff

Get your team up to speed on privacy by bringing IAPP training to your organization.

Learn more »

CIPP Certification

The global standard for the go-to person for privacy laws, regulations and frameworks

CIPM Certification

The first and only privacy certification for professionals who manage day-to-day operations

CIPT Certification

The industry benchmark for IT professionals worldwide to validate their knowledge of privacy requirements

Certify Your Staff

Find out how you can bring the world’s only globally recognized privacy certification to a group in your organization.

Learn more about IAPP certification »

Get Close-up

Looking for tools and info on a hot topic? Our close-up pages organize it for you in one easy-to-find place.

Where's Your DPA?

Our interactive DPA locator helps you find data protection authorities and summary of law by country.

IAPP Westin Research Center

See the latest original research from the IAPP Westin fellows.

Looking for Certification Study Resources?

Find out what you need to prepare for your exams

More Resources »

GDPR Comprehensive: Registration Open

New! Intensive two-day GDPR training led by the sharpest minds in the field. It's a can't-miss event.

The Congress Is Cancelled

The IAPP Europe Data Protection Congress 2015 is cancelled. Click through to learn more.

Sponsor an Event

Increase visibility for your organization—check out sponsorship opportunities today.

Exhibit at an Event

Put your brand in front of the largest gatherings of privacy pros in the world. Learn more.

More Conferences »

Become a Member

Start taking advantage of the many IAPP member benefits today

Corporate Members

See our list of high-profile corporate members—and find out why you should become one, too

Renew Your Membership

Don’t miss out for a minute—continue accessing your benefits

Join the IAPP»