<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>A to Z &#8211; Office of the Information and Privacy Commissioner of Alberta</title>
	<atom:link href="https://oipc.ab.ca/resources/a-to-z/feed/" rel="self" type="application/rss+xml" />
	<link>https://oipc.ab.ca</link>
	<description>Office of the Information and Privacy Commissioner of Alberta</description>
	<lastBuildDate>Fri, 17 Apr 2026 15:46:52 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://oipc.ab.ca/wp-content/uploads/2022/01/cropped-OIPC-Icon-32x32.png</url>
	<title>A to Z &#8211; Office of the Information and Privacy Commissioner of Alberta</title>
	<link>https://oipc.ab.ca</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Guidance for Public Bodies in Developing Privacy Management Programs</title>
		<link>https://oipc.ab.ca/resource/popa-guidance-pmp/</link>
		
		<dc:creator><![CDATA[Chris Stinner]]></dc:creator>
		<pubDate>Thu, 16 Apr 2026 17:13:01 +0000</pubDate>
				<guid isPermaLink="false">https://oipc.ab.ca/?post_type=resource&#038;p=17480</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<h1>Introduction</h1>
<p>In a world that increasingly depends on technology and personal information, organizational accountability is essential for maintaining public trust. This guidance explains what it means for a public body to be accountable today and how to establish a Privacy Management Program (PMP) to support that responsibility. It outlines the requirements for public bodies under Alberta’s <a href="https://www.canlii.org/en/ab/laws/stat/sa-2024-c-p-28.5/latest/sa-2024-c-p-28.5.html#sec25" target="_blank" rel="noopener"><em>Protection of Privacy Act (</em>POPA)</a> and <a href="https://canlii.ca/t/2ks77#sec6" target="_blank" rel="noopener">Protection of Privacy (Ministerial) Regulation</a> (M-Reg) and builds on earlier best-practice guidance from privacy commissioners in Alberta, British Columbia, and Canada in <a href="https://oipc.ab.ca/wp-content/uploads/2022/02/Accountability-2012.pdf" target="_blank" rel="noopener"><em>Getting Accountability Right with a Privacy Management Program</em></a>. By following the approach described in this document, public bodies will be better prepared to meet their legal responsibilities under POPA, including protecting privacy, providing appropriate access to personal information, and supporting accountability, transparency, and fairness.</p>
<p>This guidance also includes a checklist to help public bodies set up a successful Privacy Management Program (see Appendix A).</p>
<h1>Purpose and structure of this guidance</h1>
<h2>Purpose</h2>
<p>The purpose of this guidance is to help public bodies comply with the POPA requirement to establish and implement a PMP. It addresses four topic areas that are needed for a public body to build its PMP:</p>
<ol>
<li>preparing to set up and maintain a PMP,</li>
<li>legislative alignment, i.e. ensuring a public body’s PMP meets the requirements of POPA,</li>
<li>operationalizing accountability, i.e. translating legal requirements into actions a public body must take, and</li>
<li>program expectations, i.e., a comprehensive breakdown of the policies, practices, and roles required for effective internal oversight.</li>
</ol>
<h2>Structure</h2>
<p>This guidance uses a ‘building block’ approach to help public bodies develop their PMP. Part 1 introduces the core building blocks of the PMP; organizational commitment, and a layered approach to program controls. Part 2 focuses on assessing and improving the PMP. Part 3 discusses how the PMP is used to demonstrate compliance.</p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<div style="border: 1px solid #ccc; padding: 15px; border-radius: 5px;">
<p><strong>Table of Contents</strong></p>
<p><strong><a href="#developing-comprehensive-pmp">1. DEVELOPING A COMPREHENSIVE PRIVACY MANAGEMENT PROGRAM</a></strong></p>
<ul>
<li><a href="#organizational-commitment">Organizational Commitment</a></li>
<li><a href="#privacy-management-program-requirements">Privacy management program requirements based on volume and sensitivity (determination)</a></li>
<li><a href="#program-controls-all">Program controls for all public bodies</a></li>
<li><a href="#program-controls-sensitive-high-volume">Program controls for public bodies with sensitive or high volumes of personal information</a></li>
</ul>
<p><strong><a href="#ongoing-assessment-revision">2. ONGOING ASSESSMENT AND REVISION</a></strong></p>
<ul>
<li><a href="#develop-oversight-review-plan">Develop an oversight and review plan</a></li>
<li><a href="#assess-revise-program-controls">Assess and revise program controls</a></li>
</ul>
<p><strong><a href="#demonstrating-compliance">3. DEMONSTRATING COMPLIANCE</a></strong></p>
<ul>
<li><a href="#access-to-pmp">Access to the PMP by the public</a></li>
<li><a href="#reduce-administrative-burden">Using the PMP to reduce administrative burden</a></li>
<li><a href="#appendix-a">Appendix A &#8211; Checklist of POPA requirements for public bodies</a></li>
<li><a href="#appendix-b">Appendix B &#8211; Infographics</a></li>
<li><a href="#appendix-c">Appendix C &#8211; Glossary</a></li>
</ul>
</div>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="developing-comprehensive-pmp"></a></p>
<h1>1. Developing a Comprehensive Privacy Management Program</h1>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="organizational-commitment"></a></p>
<h2>Organizational Commitment</h2>
<h3>Senior management commitment and support</h3>
<p>Leadership is the cornerstone of building an organizational culture that respects privacy rights. For a PMP to be effective, senior management must take a leading role in promoting it.</p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-6"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<ul>
<li><strong>Resource allocation:</strong> the head of the public body must ensure that the designated privacy officer has the necessary financial, human, and technical resources to establish, implement, and periodically review, assess and update the PMP.</li>
<li><strong>Mandatory compliance:</strong> while public bodies face competing priorities, compliance with POPA is a legal obligation. This means that sufficient support must be given to meet the requirements under this Act.</li>
<li><strong>Public trust:</strong> the ability to collect personal information from Albertans effectively rests on public confidence. Proper funding and executive support for the public body’s PMP prevents the erosion of that trust.</li>
<li><strong>Reducing compliance overhead:</strong> a well-championed and PMP helps minimize the costly and time-intensive process of remediation by means of complaints, investigations, and court cases.</li>
</ul>

		</div>
	</div>
</div></div></div><div class="wpb_column vc_column_container vc_col-sm-6"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element  vc_custom_1775736594790" >
		<div class="wpb_wrapper">
			<p><span style="color: #ffffff;"><strong><em>head of the public body<br />
</em></strong><em>“head”, in relation to a public body, means,</em></span></p>
<p><span style="color: #ffffff;"><em>(i)    if the public body is a department, branch or office of the Government of Alberta, the member of the Executive Council who presides over it,</em></span></p>
<p><span style="color: #ffffff;"><em> (ii)    if the public body is an agency, board, commission, corporation, office or other body designated as a public body in the regulations, the person designated by the member of the Executive Council responsible for that body to act as the head of that body or, if a head is not so designated, the person who acts as the chief officer and is charged with the administration and operation of that body,</em></span></p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<h3>Designation and role of the Privacy Officer</h3>
<p>The head of a public body must designate/identify one or more individuals as the Privacy Officer for the public body. The Privacy Officer is responsible for ensuring the public body’s compliance with POPA and its regulations<a href="#_ftn1" name="_ftnref1">[1]</a>.</p>
<p><strong>Core responsibilities of the Privacy Officer:</strong></p>
<ul>
<li><strong>Liaison:</strong> Serving as the primary point of contact for privacy inquiries and concerns.</li>
<li><strong>Policy development:</strong> Supporting the creation, implementation, and maintenance of privacy policies and procedures.</li>
<li><strong>Compliance oversight:</strong> ensuring the public body adheres to POPA and overseeing the management of the PMP.</li>
</ul>
<p>Regardless of the public body’s size, the Privacy Officer is accountable for the public body’s privacy practices. The Privacy Officer is the PMP’s architect and leader. The specific duties and activities include:</p>
<ul>
<li>Establishing and regularly revising program controls (policies, procedures, etc.).</li>
<li>Developing and delivering employee training and education.</li>
<li>Documenting, monitoring, and auditing the implementation of the PMP.</li>
<li>Representing the public body during investigations by the Office of the Information and Privacy Commissioner (OIPC).</li>
</ul>
<ul>
<li>Together with senior management, champion a workplace culture that prioritizes privacy.</li>
</ul>
<h3>Ensuring a Privacy Officer can do their work well</h3>
<p><strong>Privacy Officer within the public body’s governance structure</strong></p>
<p>In many jurisdictions, a privacy officer, or equivalent official, is somewhat shielded from reprisal by executives who may have interests that conflict with those of the privacy officer’s role. Care must be taken to mitigate this potential conflict by having the Privacy Officer report directly to the head of the public body who is accountable for the overall performance and compliance of the public body.</p>
<p><strong>Adequate resourcing</strong></p>
<p>The need for resourcing is determined by the size and complexity of the public body.</p>
<ul>
<li><strong>Small public bodies:</strong> The privacy officer may be able to manage privacy duties alongside other professional responsibilities.</li>
<li><strong>Large public bodies:</strong> In organizations that handle high volumes or sensitive personal information, the Privacy Officer should typically be a full-time role supported by dedicated staff (e.g. within a Privacy Office).</li>
</ul>
<p><strong>Budgetary Integration </strong></p>
<p>Budget for the PMP and a public body’s privacy functions (e.g. Privacy Office) is required to ensure long-term sustainability of the PMP. Such funding should be established as a <strong>non-discretionary</strong> line item within the public body’s annual budget.</p>
<h3>Auditing, reporting and escalation</h3>
<p>A successful PMP must include reporting mechanisms. These tools ensure that the Privacy Officer and management remain informed about the program&#8217;s effectiveness, identify gaps, and implement solutions for improvement.</p>
<p><strong>Internal audit and assurance</strong></p>
<p>To maintain accountability, public bodies must incorporate the PMP into their internal audit program such that it is objectively evaluated for how well the PMP supports and achieves POPA compliance.</p>
<ul>
<li><strong>Methodology:</strong> Audits should collect and document metrics that can be used to evaluate the PMP’s performance (percentage of employees who have been trained or retrained, how many complaints have been filed, how many privacy incidents have occurred, etc.).</li>
<li><strong>Independent review:</strong> In case of a significant privacy incident or systemic problems, public bodies should consider using external<a href="#_ftn2" name="_ftnref2">[2]</a> auditors to provide an unbiased assessment of (parts of) their privacy compliance framework.</li>
</ul>
<p><strong>Incident escalation and management</strong></p>
<p>Prompt reporting of a breach of personal information or of privacy complaints is essential. The PMP must clearly define the responsibilities, timelines and expectations of the escalation process.</p>
<ul>
<li><strong>Duties of the head:</strong> Under POPA, the head is obligated to protect personal information in the custody or control of the public body and to make reasonable security arrangements against such risks as unauthorized access, collection, use, disclosure or destruction. If an incident involving the loss of, unauthorized access to or unauthorized disclosure of this personal information (Privacy Incident), the public body is required to notify individuals affected by the breach <u>without unreasonable delay</u> where there is a real risk of significant harm to these individuals (one or more) as required in the Act and regulations<a href="#_ftn3" name="_ftnref3">[3]</a>. As well, public bodies must have a process to receive and manage complaints about any alleged unauthorized collection, use or disclosure of personal information<a href="#_ftn4" name="_ftnref4">[4]</a>.</li>
<li><strong>The Privacy Officer’s role:</strong> All Privacy Incidents must be escalated to the Privacy Officer. The Privacy Officer acts as the central manager of the Privacy Incident, coordinating with necessary experts, e.g. IT professionals, legal counsel, and communications advisors, etc. to resolve the matter. The Privacy Officer also reports Privacy Incidents to the head. For complaints, the Privacy Officer is responsible to investigate to determine whether the complaint is substantiated and take any action as may be needed to address the complaint and mitigate the risk of recurrence, including recommending discipline of employees for snooping or other serious violations.</li>
<li><strong>Progress tracking:</strong> For privacy complaints, staff should track progress and report to the privacy officer to ensure the organization is following its documented protocols effectively and timely. Such reporting, when properly implemented, ensures early detection of systemic problems with meeting the public body’s statutory obligations.</li>
</ul>
<p><strong>Testing and validation</strong></p>
<p>Public bodies should periodically evaluate their Privacy Incident protocols. These exercises should evaluate:</p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-6"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<ul>
<li><strong>Identification:</strong> How quickly the Incident is spotted (and if it is spotted at all by staff).</li>
<li><strong>Escalation:</strong> How efficiently the right people are notified.</li>
<li><strong>Containment:</strong> How effectively the Incident is contained, e.g. any unauthorized access or disclosure is stopped.</li>
<li><strong>Compliance:</strong> how well the public body is able to fulfill its requirements regarding Privacy Incident Management under POPA<a href="#_ftn5" name="_ftnref5">[5]</a>.</li>
</ul>
<p style="font-size: 0.9em; color: grey;"><a href="#">Back to top of the page</a></p>

		</div>
	</div>
</div></div></div><div class="wpb_column vc_column_container vc_col-sm-6"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element  vc_custom_1775736676478" >
		<div class="wpb_wrapper">
			<p><span style="color: #ffffff;"><strong><em>POPA </em></strong><em>25(1) A public body must establish and implement a privacy management program consisting of documented policies and procedures that promote the public body’s compliance with its duties under this Act. </em></span></p>
<p><span style="color: #ffffff;"><em>25 (2) A privacy management program must (a) be proportional to the volume and sensitivity of the personal information in the custody or under the control of the public body, and (b) comply with the prescribed requirements.</em></span></p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="privacy-management-program-requirements"></a></p>
<h2>Privacy management program requirements based on volume and sensitivity (determination)</h2>
<p>POPA requires a tiered approach to public bodies’ PMPs. All public bodies must meet the requirements under section 6(1) of the M-Reg. Those public bodies that process high volumes or sensitive information must meet additional requirements under 6(2) of the M-Reg. The following determines if your public body needs to meet these additional requirements:</p>
<p><strong>Sensitivity of personal information</strong></p>
<p>A public body <strong>must determine</strong> if it has custody or control of highly sensitive information. Section 1 of the M-Reg defines <em>high-sensitivity information </em>as:</p>
<p><em>(a) biometric information about an individual;</em></p>
<p><em>(b) financial information about an individual;</em></p>
<p><em>(c) personal information respecting a minor, senior or vulnerable individual</em></p>
<p>Biometric information is further defined in section 1(a) of the Act as:</p>
<p><em>information derived from an individual’s unique measurable characteristics;</em></p>
<p><strong>Volume of personal information</strong></p>
<p>A public body <strong>must determine</strong> if it has custody or control of a high volume of Albertans’ personal information. High volume is not defined, as it is to be interpreted as a contextual, qualitative threshold based on risk.</p>
<p><strong>Determination</strong></p>
<p>In accordance with the determinations made, the public body must proceed with efforts to meet the requirements applicable to all public bodies, and if applicable, those imposed on public bodies that handle highly sensitive personal information, high volumes of personal information, or both. Implementing all the requirements found under section 6 of the regulation is also a matter of best practice, regardless of the handling of highly sensitive personal information or high volumes of personal information by a public body.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#">Back to top of the page</a></p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="program-controls-all"></a></p>
<h2>Program controls for all public bodies</h2>
<h3>Personal information inventory</h3>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-6"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>A comprehensive personal information inventory is an essential prerequisite for privacy compliance under POPA. If a public body does not know the nature and volume of the personal information it collects, uses, and retains, it cannot realistically meet its statutory obligations. Additionally, an inventory is indispensable for meeting transparency requirements regarding personal information holdings (e.g. see section 57 of POPA regarding personal information banks). The personal information inventory directly supports section 6(1)(c) of the M-Reg, which mandates the establishment of a security classification system for personal information and data derived from personal information. Without a comprehensive inventory, a public body cannot accurately classify its personal information holdings. It would also be unable to apply and provide transparency about the appropriate safeguards required for automated systems that process personal information under Section 6(1)(b)(iii) of the M-Reg. The creation of a personal information inventory can be part of the broader effort to create a data inventory<a href="#_ftn6" name="_ftnref6">[6]</a> for a public body.</p>
<p><strong>What is a personal information inventory?</strong></p>
<p>A personal information inventory should capture all recorded personal information that is in the custody or control of a public body, including that held by vendors. This personal information includes unique identifiers, biometrics, data, or meta-data that could, when combined with other data, reasonably identify an individual. Identifying the sensitivity and categories of this information is a prerequisite for the mandatory training of employees required by section 6(1)(d) of the M-Reg, as staff must understand the specific nature of the personal information they handle to fulfill their obligations, and specific to the way they work with personal information in the public body’s business processes. Furthermore, documenting this inventory allows the Privacy Officer to maintain effective oversight and ensure that the public body’s internal policies, including those for correcting information or managing Privacy Incidents, are grounded in an accurate map of the organization&#8217;s data landscape.</p>

		</div>
	</div>
</div></div></div><div class="wpb_column vc_column_container vc_col-sm-6"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element  vc_custom_1775737008148" >
		<div class="wpb_wrapper">
			<p><span style="color: #ffffff;"><strong><em>M-Reg 143/2025 </em></strong></span></p>
<p><span style="color: #ffffff;"><strong><em>6(1)</em></strong><em> A privacy management program established by a public body under section 25 of the Act must include</em></span></p>
<p><span style="color: #ffffff;"><strong><em>(a)</em></strong><em> the designation or identification of a privacy officer within the public body who is responsible for ensuring the public body’s compliance with the Act,</em></span><br />
<span style="color: #ffffff;"><strong><em>(b)</em></strong><em> internal policies and procedures to address the public body’s duties under the Act, including policies and procedures for <strong>(i)</strong> responding to</em></span><br />
<span style="color: #ffffff;"><strong><em>(A)</em></strong><em> requests for the correction of an individual’s personal information under section 7 of the Act,</em></span><br />
<span style="color: #ffffff;"><strong><em>(B)</em></strong><em> incidents described in section 10(2) of the Act, and</em></span><br />
<span style="color: #ffffff;"><strong><em>(C)</em></strong><em> complaints made under section 38(2) of the Act,</em></span><br />
<span style="color: #ffffff;"><strong><em>(ii)</em></strong><em> the creation, use and disclosure of non personal data, if the public body will create, use or disclose non personal data, and</em></span><br />
<span style="color: #ffffff;"><strong><em>(iii)</em></strong><em> how automated systems will use personal information, including any security or technical safeguards that will be implemented to protect personal information, if the public body will use personal information in an automated system to generate content or make decisions, recommendations or predictions,</em></span><br />
<span style="color: #ffffff;"><strong><em>(c)</em></strong><em> the establishment of a security classification system for personal information, data derived from personal information and non personal data in the custody or under the control of the public body,</em></span><br />
<span style="color: #ffffff;"><strong><em>(d)</em></strong><em> mandatory training for employees of the public body about the obligations of those employees under the Act, with specified expiry periods after which retraining is required, and</em></span><br />
<span style="color: #ffffff;"><strong><em>(e)</em></strong><em> timelines for the periodic review, assessment and update of the privacy management program.</em></span></p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p><strong>The personal information inventory role in PMPs</strong></p>
<p>As highlighted, an accurate inventory is the baseline for designing and implementing an effective PMP. It provides the necessary data to manage information-sharing agreements and personal information banks, and is fundamental to detailing the authority for collection and the parties to whom personal information is disclosed. This inventory must be frequently updated, and by doing so it supports the Min Reg section 6(1)(e) requirement for periodic review and assessment of the PMP by providing a clear benchmark for what information is currently held and how it is protected. By doing the following, the public body creates the essential foundation for privacy compliance:</p>
<ul>
<li>documenting the location (physical and logical) of storage;</li>
<li>the categories of personal information it holds;</li>
<li>the categories of individuals , such as minors, adults, or seniors, whose personal information it holds;</li>
<li>the specific purposes for data collected, used and disclosed; and by</li>
<li>asserting the sensitivity and security classification of this personal information,</li>
</ul>
<p>The personal information inventory will assist when the public body has to respond to complaints and access requests. It will assist in making determinations about when a privacy impact assessment (PIA) is required and makes completing the PIA easier. Lastly, it will help the Privacy Officer effectively establish and manage the PMP so the public body will be compliant with POPA and its regulations.</p>
<h3>Policies, procedures and Safeguards</h3>
<p>Public bodies are required to establish their internal operations through specific policies and procedures. Section 6(1)(b) of the M-Reg details these requirements and also refers back to the related sections of POPA.</p>
<p><strong>Statutory policies and procedures</strong></p>
<p>Public bodies must establish policies and procedures to handle:</p>
<p><u>Requests for Correction of personal information (section 6(1)(b)(i)(A) M-Reg, section 7 POPA)</u></p>
<ul>
<li><strong>Accuracy:</strong> Policies and procedures must outline how the public body will receive and process requests to correct errors in personal information (e.g., birth dates, contact info).</li>
<li><strong>Opinions vs. facts:</strong> Since professional opinions cannot be ‘corrected’, the policy or procedures must provide a mechanism for individuals to append a statement of disagreement to the record.</li>
<li><strong>Notification:</strong> If a correction is made, the policies or procedures must include a process to notify any third party to whom the information was disclosed.</li>
</ul>
<p><u>Privacy incidents (section 6(1)(b)(i)(B) M-Reg, section 10(2) POPA)</u></p>
<ul>
<li><strong>Privacy Incident containment:</strong> Policies and procedures must detail immediate steps to contain a Privacy Incident.</li>
<li><strong>Investigation: </strong>Policies and procedures must guide the Privacy Officer on the duty to conduct an investigation to determine the cause of the Privacy Incident and the steps to take to prevent recurrence.</li>
<li><strong>Risk assessment:</strong> Policies and procedures must guide the Privacy Officer on evaluating whether a breach creates a &#8220;real risk of significant harm&#8221; (RROSH) to individuals ensuring adherence to the requirements in section 4 of the M-Reg.</li>
<li><strong>Reporting timelines:</strong> Policies and procedures must guide the Privacy Officer on how they will carry out their duty to notify the Minister, the OIPC, and to affected individuals &#8220;without unreasonable delay&#8221; about the Privacy Incident as prescribed by section 10 (2) of POPA and section 4 of the M-Reg.</li>
</ul>
<p><u>Complaints (section 6(1)(b)(i)(C), POPA section 38(2))</u></p>
<ul>
<li><strong>Internal review first:</strong> Policies and procedures must establish a process for receiving and responding to privacy complaints, including any follow up by the OIPC. Under POPA, individuals are required to seek a response from the public body to their complaint before bringing the matter to the OIPC.</li>
<li><strong>Documentation:</strong> Procedures must be in place to systematically handle complaints, the steps taken following a complaint, and the final response provided to the complainant.</li>
</ul>
<p>For more information <a href="https://oipc.ab.ca/breach-notification/#public-bodies-popa" target="_blank" rel="noopener">see our guidance about breach notification to the OIPC.</a></p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-6"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<strong>Non-personal data management</strong><br />
If a public body creates or uses &#8220;non-personal data&#8221; (anonymized, synthetic, or de-identified data derived from personal information), Division 2 of Part 3 POPA, especially section 21, require specific oversight by the public body:</p>

		</div>
	</div>
</div></div></div><div class="wpb_column vc_column_container vc_col-sm-6"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element  vc_custom_1775737458442" >
		<div class="wpb_wrapper">
			<p><span style="color: #ffffff;"><strong>POPA</strong> 1(n): “<em>non‑personal data” means data, including data derived from personal information, that has been generated, modified or anonymized so that it does not identify any individual, and includes synthetic data and any other type of non‑personal data identified in the regulations;</em></span></p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<ul>
<li><strong>Quality assurance:</strong> Non-personal data must be created in accordance with POPA requirements and as documented in the prescribed policy (section 6(1)(b)(ii) M-Reg). This means that policies should include requirements 1) to document personal information used to create the data, 2) the purpose for creating the data, 3) the method for creating the data, 4) a data quality assurance process to verify that de-identification methods are effective and cannot be easily reversed (re-identification).</li>
<li><strong>Auditability:</strong> Methods used to create non-personal data must be documented, and replicable for auditing purposes.</li>
<li><strong>Bias mitigation:</strong> Procedures should identify and account for potential biases in the non-personal data sets to ensure they remain accurate for research or planning.</li>
</ul>
<p><strong>Automated systems and AI</strong></p>
<p>When personal information is used in automated systems<a href="#_ftn1" name="_ftnref1">[1]</a>, including those generating content (Generative AI) or making predictions/decisions, section 6(1)(b)(iii) M-Reg mandates rigorous safeguards. Policies and procedures should set out the following details:</p>
<ul>
<li><strong>Transparency:</strong> Policies and procedures must ensure, and explain how individuals are notified if their information is being processed by an automated system to make a decision about them<a href="#_ftn2" name="_ftnref2">[2]</a>.</li>
<li><strong>Automated system specific information security controls:</strong> Technical controls must be documented and implemented (e.g., encryption of communication and data at rest, access control measures such as multi-factor authentication), and administrative controls (e.g., human-in-the-loop oversight)<a href="#_ftn3" name="_ftnref3">[3]</a>.</li>
<li><strong>Risk mitigation:</strong> Procedures should address how these systems will be monitored for algorithmic bias, procedural and outcome fairness, and emerging AI privacy threats<a href="#_ftn4" name="_ftnref4">[4]</a> like unauthorized data scraping from or by AI model.</li>
</ul>
<p><strong>Periodic review of PMP</strong></p>
<ul>
<li><strong>Keeping the PMP up to date: </strong>The public body must establish timelines for the periodic review, assessment and update of the PMP as required by section 6(1)(e) of the M-Reg. Chapter 5 has more information on the steps required to do this effectively.</li>
<li><strong>Security classification:</strong> Based on the information obtained by making the personal information inventory, the public body can proceed by creating and maintaining a security classification system for personal information, data derived from personal information and non personal data (as required under section 6(1)(c) of the M-Reg). This classification can be continuously used to ensure the right controls are in place to protect personal information, e.g., based on the sensitivity or volume of information that needs to be protected.</li>
<li><strong>Mandatory training:</strong> Section 6(1)(d) of the M-Reg requires all employees (inclusive of service providers and other contractors) of the public body to undergo training about their obligations under POPA relevant to their work duties and to take mandatory retraining on a regular basis. Awareness of and training on the PMP is a core part of this training. An easy way to ensure any mandatory retraining happens, is to link it to annual performance evaluations of employees.</li>
</ul>
<p>For more information on establishing AI governance in the Public Sector, various useful publications touching on the subject have been published<a href="#_ftn11" name="_ftnref11">[11]</a>.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#">Back to top of the page</a></p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="program-controls-sensitive-high-volume"></a></p>
<h2>Program controls for public bodies with sensitive or high volumes of personal information</h2>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-6"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
For public bodies handling high volumes or highly sensitive personal information, the requirements established under section 6(1) of the M-Reg must be met in addition to those set out in section 6(2) of the M-Reg. This section lists additional privacy and accountability requirements to mitigate the elevated risks associated with large-scale and/or handling of sensitive personal information including that deemed of high sensitivity in section 1 of the M-Reg.</p>
<h3>Ensuring delegation and accountability</h3>
<p>Public bodies must document the specific roles and responsibilities of all employee roles (section 6(2)(a)(i) M-Reg), not just the Privacy Officer. This is commonly done by including privacy related tasks and obligations in policies, procedures, delegation documents (e.g. delegation matrix), job descriptions, etc. This effectively creates a chain of accountability from all staff working with personal information to senior management, and ultimately to the head of the public body. This requirement dovetails with the section 6(1)(d) M-Reg requirements for training (staff should be trained on their responsibilities as delegated).</p>
<h3>Risk management</h3>
<p><strong>PIAs:</strong> Under section 6(2)(a)(ii) of the M-Reg, the process for completing and submitting PIAs must be formalized. This also means that public bodies must know when PIAs are required and make this part of assessment of new or revised programs, activities and services. Furthermore, the personal information inventory and security classification conducted under section 6(1)(c) of the M-Reg can help identifying when a PIA is required under section 7(1)(a) of the M-Reg. Lastly the public body should be aware of when PIAs must be submitted to the Commissioner in accordance with section 7(5) of the M-Reg, and include dedicated activities in program and project management for assessing whether the submission to the Commissioner is mandatory.</p>

		</div>
	</div>
</div></div></div><div class="wpb_column vc_column_container vc_col-sm-6"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element  vc_custom_1775737556939" >
		<div class="wpb_wrapper">
			<p><span style="color: #ffffff;"><strong><em>M-reg 143/2025 </em></strong></span></p>
<p><span style="color: #ffffff;"><em>6(2)  If a public body has custody or control of a high volume of personal information or highly sensitive personal information, the public body’s privacy management program must also include the following:</em></span></p>
<p><span style="color: #ffffff;"><em> (a)    documentation of the public body’s internal privacy management structure and internal policies and procedures to address the public body’s duties under the Act, which must address </em></span></p>
<p><span style="color: #ffffff;"><em>(i)    the roles, responsibilities and accountabilities of employees of the public body in relation to the public body’s obligations under the Act,</em></span></p>
<p><span style="color: #ffffff;"><em> (ii)    the public body’s process for completing and submitting privacy impact assessments,</em></span></p>
<p><span style="color: #ffffff;"><em> (iii)    the public body’s policies and procedures for proactive monitoring of information systems that hold personal information, data derived from personal information or non-personal data, to assess security measures and mitigate risks,</em></span></p>
<p><span style="color: #ffffff;"><em> (iv)    the public body’s policies and procedures related to oral, electronic and written consent, and</em></span></p>
<p><span style="color: #ffffff;"><em> (v)    the public body’s policies related to the use of personal information in artificial intelligence systems, the creation of data derived from personal information and the creation of non personal data, if the public body is using personal information in artificial intelligence systems, the creation of non personal data or data matching activities;</em></span></p>
<p><span style="color: #ffffff;"><em>(b)    written administrative, technical and physical safeguards for managing personal information, data derived from personal information and non personal data.</em></span></p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
See our <a href="https://oipc.ab.ca/privacy-impact-assessments/#public-bodies-popa" target="_blank" rel="noopener">PIA resources to assist public bodies know when to submit a PIA to the OIPC and how to complete a PIA.</a></p>
<p><strong>Proactive monitoring of information systems:</strong> Under section 6(2)(a)(iii) of the M-Reg, the public body is required to proactively monitor information systems that hold personal information and related data, and document such efforts in policies and procedures. This obligation is important given the central role information systems play in ensuring the safety of personal information, and the significant Privacy Incidents that can occur if such monitoring fails or is not implemented at all. To be sure, monitoring may not stop all Privacy Incidents from occurring, but often helps in limiting the extent of a Privacy Incident.</p>
<p>&nbsp;</p>
<p><strong>Best practices:</strong> As a matter of best practice, the public body may as part of the PMP, consider other risk management tools at its disposal that are relevant to mitigate privacy risks. The importance of conducting Security Threat and Risks Assessments (STRA) and/or an Algorithmic Impact Assessment (AIA) increases where the use of innovative technology may form a risk to the privacy protection of Albertans or other risks that can flow from the use of automated decision making systems, such as unfairness and bias. This can be seen either from an information security risk perspective (consider using STRAs), or when the accuracy, completeness and correct interpretation of personal information may affect algorithmically (or AI) derived processes or outcomes for individuals (consider using AIA). Furthermore, STRAs can be one way to work on complying with the requirements of 6(2)(a)(iii).</p>
<h3>Consent and communication protocols</h3>
<p>While all public bodies must manage personal information, those with sensitive data must have well-defined section 6(2)(a)(iv) M-Reg policies for obtaining consent, as well as consider the requirements under <a href="https://canlii.ca/t/2ks72#sec2" target="_blank" rel="noopener">section 2 of the Protection of Privacy Regulation.</a></p>
<ul>
<li><strong>Consent:</strong> Documentation must address how consent is captured and recorded across oral, electronic, and written interactions.</li>
<li><strong>Sensitivity context:</strong> For all consent, but especially for highly sensitive information<a href="#_ftn12" name="_ftnref12">[12]</a> the policy or procedure <a href="https://oipc.ab.ca/wp-content/uploads/2022/02/Meaningful-Consent-2018.pdf" target="_blank" rel="noopener">must ensure that consent given is ‘informed and meaningful,’</a> providing clear evidence that the individual understands the implications of the data use.</li>
</ul>
<h3>AI governance and data matching</h3>
<p>Building on the automated systems requirements in section 6(1)(b)(iii) of the M-Reg, section 6(2)(a)(v) of the M-Reg introduces specific requirements for Artificial Intelligence (AI) and data matching.</p>
<ul>
<li><strong>AI policy:</strong> If the body uses AI, it must have specific policies governing its use, particularly how the AI creates derived data (data points inferred about an individual by a machine).</li>
<li><strong>Data matching policy and restrictions:</strong> Policies must strictly govern data matching activities, ensure compliance with part 3 of POPA, and ensure required PIAs are created and submitted to the OIPC as required by the regulations.</li>
<li><strong>Non-personal data and data derived from personal information:</strong> Section 6(2)(a)(v) of the M-Reg has some overlap with 6(1)(b)(ii), and requires a detailed policy or procedure on the creation of non-personal data and data derived from personal information.</li>
</ul>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-6"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<h3>Administrative, technical and physical safeguards</h3>
<p>In addition to requirements regarding safeguards that apply to all public bodies under section 10 of POPA, under section 6(2)(b) of the M-Reg, public bodies managing high volumes or highly sensitive personal information must implement and document appropriate administrative, technical, and physical safeguards for the entire personal information/data lifecycle, covering not only the original personal information but also data derived from it and non-personal data sets<a href="#_ftn13" name="_ftnref13">[13]</a>.</p>

		</div>
	</div>
</div></div></div><div class="wpb_column vc_column_container vc_col-sm-6"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element  vc_custom_1775737635952" >
		<div class="wpb_wrapper">
			<p><span style="color: #ffffff;"><strong><em>Reg 132/2025</em></strong><em> Section 1(2) (a) “administrative safeguard” means a policy, procedure or practice to manage a public body’s conduct that protects the privacy of personal information, data derived from personal information and non-personal data;</em></span><br />
<span style="color: #ffffff;"><em>(b) “physical safeguard” means a measure to protect a public body’s physical assets, including electronic information systems, from natural and environmental hazards and unauthorized intrusion;</em></span><br />
<span style="color: #ffffff;"><em>(c) “technical safeguard” means a measure to protect a public body’s electronic information and control access to it.</em></span></p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p style="font-size: 0.9em; color: grey;"><a href="#">Back to top of the page</a></p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="ongoing-assessment-revision"></a></p>
<h1>2. Ongoing assessment and revision</h1>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="develop-oversight-review-plan"></a></p>
<h2>Develop an oversight and review plan</h2>
<p>Building on the foundational requirements of section 6(1) of the M-Reg and the enhanced expectations in section 6(2), a PMP is not static and requires periodic review under section 6(1)(e). Therefore, public bodies must establish timelines for the periodic review, assessment, and update of its PMP. Vital information for this process is provided via reporting and monitoring.</p>
<p><strong>Why periodic review is important</strong></p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-6"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<ul>
<li style="list-style-type: none;">
<ul>
<li><strong>Public body initiated change:</strong> Public bodies regularly launch new (increasingly digital) services or change administrative practices. Periodic changes in organization structure may occur that merge or divest program areas from one public body to another. A review ensures that the section 6(1)(b) policies and procedures (for corrections, breaches, and complaints) stay relevant, and attuned to new or changed programs and activities, as well as when technology used in those programs and activities evolves.</li>
</ul>
</li>
</ul>

		</div>
	</div>
</div></div></div><div class="wpb_column vc_column_container vc_col-sm-6"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element  vc_custom_1775737861537" >
		<div class="wpb_wrapper">
			<p><span style="color: #ffffff;"><strong><em>M-Reg 143/2025 </em></strong></span></p>
<p><span style="color: #ffffff;"><em>6(1) A privacy management program established by a public body under section 25 of the Act must include (&#8230;)<br />
(</em><em>e) timelines for the periodic review, assessment and update of the privacy management program.</em></span></p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<ul>
<li><strong>Closing compliance gaps resulting from changes in the public bodies’ environment:</strong> A PMP needs monitoring and frequent updating due to changed or new regulations, <a href="https://oipc.ab.ca/decisions/orders/" target="_blank" rel="noopener">OIPC orders regarding POPA</a>, or emerging privacy and information security threats<a href="#_ftn14" name="_ftnref14">[14]</a>. Regular assessment allows the public body to find and fix non-compliance, introduce new best practices, and address weakness in their safeguards.</li>
<li><strong>Testing safeguards:</strong> For public bodies that process a high volume or highly sensitive personal information, periodic review is the only way to verify that the written administrative, technical, and physical safeguards (section 6(2)(b)) are actually being followed in practice. Given the dynamic nature of technology, periodic reassessment and testing is standard<a href="#_ftn15" name="_ftnref15">[15]</a>.</li>
</ul>
<p><strong>Reporting and monitoring</strong></p>
<p>The designation of a Privacy Officer under section 6(1)(a) of the M-Reg is important in establishing oversight. In high-volume or sensitive environments, the Privacy Officer’s role expands under section 6(2)(a)(iii) of the M-Reg to include responsibility for proactively monitoring information systems that contain personal information to regularly assess and mitigate security risks.</p>
<p><strong>The need for reporting</strong></p>
<p>Reporting is a mechanism that supports accountability. The Privacy Officer acts as the bridge between technical operations and senior leadership:</p>
<ul>
<li><strong>Senior management awareness:</strong> The Privacy Officer must report PMP performance and deficiencies to senior management. For example, if the mandatory training (section 6(1)(d) M-Reg) has limited effective uptake, or is not monitored and registered, leadership must be informed to authorize resources for retraining and measures such as instructing that the training form part of performance management.</li>
<li><strong>Showing due care:</strong> in some cases, the results of these internal reports and audits may be relied upon to prove that the public body is meeting its duty of care or other legal requirements. If used properly, and executed diligently, reporting and monitoring create assurance for, and proof of, due care for personal information.</li>
</ul>
<p><strong>The need for monitoring</strong></p>
<p>Monitoring is a more direct and continuous observance of the PMP&#8217;s effectiveness (compared to the periodic and structured nature of reporting).</p>
<ul>
<li><strong>Proactive monitoring:</strong> Under section 6(2)(a)(iii) of the M-Reg, the Privacy Officer can delegate and supervise the monitoring of information systems to mitigate risks before they become incidents. These activities typically involve auditing logs of access to (systems containing) personal information and to ensure the security classification system (section 6(1)(c) M-Reg) and related access controls are effective. The Privacy Officer need not be involved in depth in the day-to-day aspects of monitoring but will be accountable for the privacy-related components such as the incident thresholds of the monitoring and reporting.</li>
<li><strong>Algorithm and AI oversight:</strong> For Public Bodies using automated systems and AI, the privacy officer or any delegates must monitor automated systems to ensure they operate according to <a href="http://www.ombudsman.ab.ca/determining-fairness/administrative-fairness-guidelines/" target="_blank" rel="noopener">fairness principles</a>, maintain the safeguards established in the PMP, and that their use does not result in the public body contravening POPA.</li>
</ul>
<p style="font-size: 0.9em; color: grey;"><a href="#">Back to top of the page</a></p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="assess-revise-program-controls"></a></p>
<h2>Assess and revise program controls</h2>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-6"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
To maintain compliance with section 6(1)(e) of the M-Reg, reporting, monitoring and otherwise evaluating must be used to improve the PMP. This improvement cycle ensures that as the public body and its programs, activities and technology use evolve, its privacy controls adapt to meet emerging threats and operational changes.</p>

		</div>
	</div>
</div></div></div><div class="wpb_column vc_column_container vc_col-sm-6"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element  vc_custom_1775737739703" >
		<div class="wpb_wrapper">
			<p><span style="color: #ffffff;"><strong><em>M-Reg</em></strong><em> <strong>143/2025 </strong></em></span></p>
<p><span style="color: #ffffff;"><em>6(1) A privacy management program established by a public body under section 25 of the Act must include[…]</em></span></p>
<p><span style="color: #ffffff;"><em>(e) timelines for the periodic review, assessment and update of the privacy management program.</em></span></p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p><strong>The PMP improvement cycle</strong></p>
<p>Assessing and revising program controls involves review and adjustment across these key areas:</p>
<p><strong>a) update personal information inventories</strong></p>
<p>The inventory is the foundation of the public body’s PMP. Periodic reviews must account for new data collection points, databases, and address personal information held as part of common or integrated programs or activities. If your inventory is outdated, your security classification system (6(1)(c) M-Reg) is likely inaccurate, risking leaving sensitive data under-protected. In addition, the timeliness or quality of responses to access requests may be affected.</p>
<p><strong>b) revise policies and procedures</strong></p>
<p>Policies and procedures should be revised based on lessons learned from the Privacy Officer’s monitoring (6(2)(a)(iii) M-Reg). If a specific procedure is consistently bypassed because it is too cumbersome, it must be redesigned to ensure it remains both functional and compliant with requirements in the Act and regulations.</p>
<p><strong>c) update risk assessments</strong></p>
<p>PIAs and related types of assessments (e.g. STRAs) are not one-and-done exercises. Under section 6(2)(a)(ii) of the M-Reg, the process for completing PIAs must be periodically revisited whenever a practice, program, project or service is substantially changed, not just when it is first put in place.</p>
<p><strong>e) improve incident response protocols as they are used</strong></p>
<p>Every Privacy Incident is an opportunity to refine the policies and procedures or controls required under section 6(1)(b)(i) and 6(2)(b) of the M-Reg. Post-Privacy Incident debriefs should result in updates to response procedures, communication trees, containment strategies, and inform the enhancements of controls. Undertaking this work will minimize the risk of recurrence of harm stemming from unauthorized access to, disclosure or loss of personal information.</p>
<p><strong>f) ensure service provider management</strong></p>
<p>Public bodies remain responsible for data in the custody of service providers (e.g. third-party vendors). The improvement cycle must include regular audits of service provider contracts and security practices to ensure they align with the body&#8217;s administrative, physical or technical safeguards (6(2)(b)) and help the public body otherwise meet their obligations under POPA. Insufficient or weak service provider management can lead to privacy breaches<a href="#_ftn16" name="_ftnref16">[16]</a>.</p>
<p>For more information on this topic please see the OIPC’s <a href="/popa/providers/guide/" target="_blank" rel="noopener">Guidance for Public Bodies when Contracting Service Providers</a>.</p>
<p><strong>g) improve external communication for transparency and accountability</strong></p>
<p>Transparency and accountability are core pillars of POPA, and of <a href="https://www.coe.int/en/web/centre-of-expertise-for-multilevel-governance/12-principles" target="_blank" rel="noopener">good governance</a> in general. Public bodies should periodically review and if needed, update their public-facing privacy notices and complaint-handling procedures. Public bodies also may want to regularly review and update published information regarding the number of Privacy Incidents, access requests statistics, personal information banks, and their use of AI (e.g. an AI registry<a href="#_ftn17" name="_ftnref17">[17]</a>). Communications should be simplified and updated to ensure the public clearly understands the public body’s practices in these regards, and how to exercise their rights to correction and to make complaints. Such practices of good governance, showcasing transparency and accountability, will increase public trust in the public body.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#">Back to top of the page</a></p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="demonstrating-compliance"></a></p>
<h1>3. Demonstrating compliance</h1>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="access-to-pmp"></a></p>
<h2>Access to the PMP by the public</h2>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-6"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
Public bodies have an obligation under POPA, section 25(3), to provide the PMP to any person who requests a copy of the PMP. The regulation specifies that this may also be done by publishing the PMP, so it is readily accessible to the public. From a transparency and accessibility perspective, it is recommended that public bodies publish the PMP on their website.</p>
<p>Furthermore, the regulation cautions, and gives the public body the ability to redact or omit certain sensitive information relating to the security of personal information in the custody or under the control of the public body. Commonly, such information includes detailed descriptions of security controls, (parts of) assessments such as STRAs or penetration tests and similar documentation that may be used for adversarial purposes.</p>

		</div>
	</div>
</div></div></div><div class="wpb_column vc_column_container vc_col-sm-6"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element  vc_custom_1775737789928" >
		<div class="wpb_wrapper">
			<p><span style="color: #ffffff;"><strong><em>POPA 25(3)</em></strong><em>  Any person may request a copy of a public body’s privacy management program and the public body must provide the person with a copy, or with directions to where the person may access a copy, within 30 business days of the request.  </em></span></p>
<p><span style="color: #ffffff;"><strong>M-Reg &#8211; sections 6(3) and (4)</strong></span></p>
<p><span style="color: #ffffff;"><em>Each public body must establish a process for making the public body’s privacy management program available to the public on request or must make the public body’s privacy management program publicly available on the public body’s website.</em></span></p>
<p><span style="color: #ffffff;"><em>(4)  When making a public body’s privacy management program available to the public, a public body may withhold technical information, security related information and other information that could compromise the security of personal information in the custody or under the control of the public body.</em></span></p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p style="font-size: 0.9em; color: grey;"><a href="#">Back to top of the page</a></p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="reduce-administrative-burden"></a></p>
<h2>Using the PMP to reduce administrative burden</h2>
<p>A public body can leverage the PMP for external messaging, and to reduce re-documenting parts of the PMP for purposes that lean on its policies and other controls. By referencing the PMP as a source, or quoting from it, where programs, activities and operations include privacy aspects, administrative burden can be reduced, and only a single source needs to be corrected should external feedback prompt the public body to do so. An example is citing the security standards contained in the PMP, within a PIA, or using its content as reference in external communications and engagement projects.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#">Back to top of the page</a></p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="appendix-a"></a></p>
<h1>Appendix A &#8211; Checklist of PMP requirements for public bodies</h1>
<p>The following checklist can help public bodies assess whether they have met the requirements for PMPs as set out in this Guidance.</p>
<p><span style="color: #ff0000;"><strong>Download a standalone copy of the checklist here</strong></span>  <a href="/popa/pmp/checklist/" target="_blank" rel="noopener">[PDF]</a></p>
<p><strong>Requirements for all public bodies (see M-Reg section 6(1) and POPA section 25, 10)</strong></p>
<p>☐  <strong>Designated Privacy Officer</strong>: Identify or designate an individual responsible for ensuring the public body&#8217;s compliance with the Act and regulations. Ensure that where necessary, authority is delegated from the head of the public body, to the Privacy Officer.</p>
<p>☐  <strong>Documented internal policies &amp; procedures</strong>: Establish written rules addressing the public body’s duties, including:</p>
<p style="padding-left: 40px;">☐ <strong> Access and correction</strong>: Processes for responding to requests for personal information or requests for correction.</p>
<p style="padding-left: 40px;">☐<strong>  Privacy complaints</strong>: A defined process for receiving and responding to privacy-related complaints.</p>
<p style="padding-left: 40px;">☐  <strong>Privacy Incident response</strong>: A policy and process for responding to breaches and notifying affected individuals in accordance with the Act and regulations</p>
<p style="padding-left: 40px;">☐  <strong>Non-personal data</strong>: Policies for the creation, use, and disclosure of non-personal data (anonymized or synthetic data).</p>
<p style="padding-left: 40px;">☐<strong>  Automated systems</strong>: Procedures for the use and safeguarding of personal information within automated systems (e.g., AI or algorithms).</p>
<p>☐  <strong>Personal information inventory: </strong>Create a personal information inventory which can be used to meet the requirements of the Act and regulations.</p>
<p>☐  <strong>Security classification system</strong>: Implement a system to classify personal information, derived data, and non-personal data based on sensitivity.</p>
<p>☐  <strong>Safeguards:</strong> Establish administrative, technical and physical safeguards for safeguarding and managing personal information.</p>
<p>☐  <strong>Mandatory employee training: </strong>Ensure all employees and contractors undergo regular training to understand their obligations under the Act.</p>
<p>☐  <strong>Periodic review cycle</strong>: Establish specific timelines for the regular review and assessment of the PMP to ensure it remains effective.</p>
<p>☐  <strong>Public transparency: </strong>Establish a process to make the PMP documentation available to the public upon request or by default (e.g. published on website).</p>
<p><strong>Enhanced Requirements if public bodies process sensitive or high volumes of PI (see M-Reg section 6(2))</strong></p>
<p>The additional requirements to include policies and procedures for certain activities, and the public body’s duties regarding these activities, apply if the public body manages a high volume of personal information or highly sensitive information:</p>
<p>☐  <strong>Define accountability</strong>: Document the public body’s internal privacy management structure. Clearly document the roles, responsibilities, and accountabilities of all employees in relation to the public body’s obligations under the Act.</p>
<p>☐  <strong>Privacy Impact Assessment (PIA) process: </strong>Document policies and procedures for creation and ongoing management (updating as needed) of PIAs for new programs and activities or substantial changes to existing ones <a href="https://oipc.ab.ca/privacy-impact-assessments/#public-bodies-popa" target="_blank" rel="noopener">including for submitting the PIAs to the OIPC</a>.</p>
<p>☐  <strong>Policies and procedures for proactive monitoring of information: </strong>Document policies and procedures setting out how the public body actively monitors systems holding personal information, data derived from personal information or non-personal data, to assess security measures and mitigate risks.</p>
<p>☐  <strong>Consent documentation</strong>: Document policies and procedures to ensure consent, written, oral or electronic, is obtained in accordance with POPA and its regulations.</p>
<p>☐  <strong>Employee and third-party oversight</strong>: Define the roles, responsibilities and accountabilities of employees (which in POPA include third-party contractors and service providers) of the public body in relation to the public body’s obligations under the Act.</p>
<p>☐  <strong>Policies for high-risk uses</strong>: Establish policies and procedures related to the use of personal information in artificial intelligence systems, the creation of data derived from personal information and the creation of non-personal data.</p>
<p>☐  <strong>Safeguards:</strong> Establish written administrative, technical and physical safeguards for managing personal information, data derived from personal information and non-personal data.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#">Back to top of the page</a></p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="appendix-b"></a></p>
<h1>Appendix B &#8211; Infographics</h1>
<p><strong>Developing a Comprehensive Privacy Management Program</strong></p>
<p>&nbsp;</p>
<p><strong><img fetchpriority="high" decoding="async" class="aligncenter wp-image-17481" src="https://oipc.ab.ca/wp-content/uploads/2026/04/POPA-PMP-DD.png" alt="" width="1024" height="517" />Maintaining and Using the Privacy Management Program</strong></p>
<p><img decoding="async" class="aligncenter wp-image-17482" src="https://oipc.ab.ca/wp-content/uploads/2026/04/POPA-PMP-DC.png" alt="" width="819" height="317" /></p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="appendix-c"></a></p>
<h1>Appendix C &#8211; Glossary</h1>

<table id="tablepress-11" class="tablepress tablepress-id-11">
<thead>
<tr class="row-1">
	<th class="column-1">Term</th><th class="column-2">Definition</th>
</tr>
</thead>
<tbody class="row-striping row-hover">
<tr class="row-2">
	<td class="column-1">Privacy management program (PMP)</td><td class="column-2">A structured framework of policies, practices, responsibilities and roles designed to ensure a public body complies with, and is accountable for its privacy obligations under POPA.</td>
</tr>
<tr class="row-3">
	<td class="column-1">Automated decision-making (ADM)</td><td class="column-2">The use of technology, including Artificial Intelligence (AI), to make decisions about Albertans or otherwise profile or rank them.</td>
</tr>
<tr class="row-4">
	<td class="column-1">Privacy officer</td><td class="column-2">A mandatory role designated by the head of a public body. This individual is the architect of the PMP and is responsible for overseeing compliance and serving as a liaison for privacy concerns.</td>
</tr>
<tr class="row-5">
	<td class="column-1">Personal information inventory</td><td class="column-2">A comprehensive list of all recorded personal information held by a public body. It includes data storage locations, categories of personal information, and the purposes for collection.</td>
</tr>
<tr class="row-6">
	<td class="column-1">Security classification system</td><td class="column-2">A method of categorizing personal information based on its sensitivity to ensure appropriate levels of protection and access control.</td>
</tr>
<tr class="row-7">
	<td class="column-1">Accountability</td><td class="column-2">In the context of the PMP, this means the requirement for an organization to prove it is following privacy principles and to take responsibility for its personal information handling practices.</td>
</tr>
<tr class="row-8">
	<td class="column-1">Data matching</td><td class="column-2">The practice of linking personal information between two or more information systems.</td>
</tr>
<tr class="row-9">
	<td class="column-1">Human-in-the-loop</td><td class="column-2">An administrative control for automated systems whereby a human reviews or oversees the decisions made by AI or other ADM to ensure fairness and accuracy.</td>
</tr>
<tr class="row-10">
	<td class="column-1">Privacy impact assessment (PIA)</td><td class="column-2">An assessment to identify and address the authority to collect, use and disclose personal information of a program, activity, or service and to assess and address privacy risks of the same.</td>
</tr>
<tr class="row-11">
	<td class="column-1">Privacy incident</td><td class="column-2">Any loss of, unauthorized access to, or unauthorized disclosure of personal information. Also commonly referred to as a “privacy breach”.</td>
</tr>
<tr class="row-12">
	<td class="column-1">RROSH (Real Risk of Significant Harm)</td><td class="column-2">The legal threshold used to determine if a public body must notify individuals, the Commissioner and the Minister following a privacy incident.</td>
</tr>
<tr class="row-13">
	<td class="column-1">STRA (Security Threat and Risk Assessment)</td><td class="column-2">A technical review focused on identifying security vulnerabilities within an information system.</td>
</tr>
<tr class="row-14">
	<td class="column-1">AIA (Algorithmic Impact Assessment)</td><td class="column-2">A tool used to evaluate the risks, such as bias or unfairness, associated with using automated decision-making systems or AI.</td>
</tr>
</tbody>
</table>
<!-- #tablepress-11 from cache -->

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<h2>Footnotes</h2>
<p><a href="#_ftnref1" name="_ftn1">[1]</a> See POPA section 55 and M-Reg section 6(1)(a).</p>
<p><a href="#_ftnref2" name="_ftn2">[2]</a> The auditor should be at least ‘arms length’ from the process or program area audited. Consideration should be given to use an auditor who is external to the public body.</p>
<p><a href="#_ftnref3" name="_ftn3">[3]</a> Section 10 of POPA, section 1(1)(c) of the Protection of Privacy Regulation, and section 4 of the M-Reg.</p>
<p><a href="#_ftnref4" name="_ftn4">[4]</a> Section 38(2) of POPA and Section 6(1)(b)(i)(C) of the M-Reg.</p>
<p><a href="#_ftnref5" name="_ftn5">[5]</a> See <a href="https://oipc.ab.ca/wp-content/uploads/2022/02/Breach-Response-2018.pdf" target="_blank" rel="noopener">https://oipc.ab.ca/wp-content/uploads/2022/02/Breach-Response-2018.pdf</a> for generic breach guidance, and <a href="/popa/breach/tool/" target="_blank" rel="noopener">https://oipc.ab.ca/popa/breach/tool/</a> for the POPA breach notice assessment tool</p>
<p><a href="#_ftnref6" name="_ftn6">[6]</a> For an explanation regarding data inventory and how to create one, see <a href="https://www.dasca.org/world-of-data-science/article/what-is-data-inventory-and-how-to-create-it-effectively" target="_blank" rel="noopener">https://www.dasca.org/world-of-data-science/article/what-is-data-inventory-and-how-to-create-it-effectively</a>.</p>
<p><a href="#_ftnref7" name="_ftn7">[7]</a> Automated systems may include ‘traditional’ algorithms, as well as applications of AI.</p>
<p><a href="#_ftnref8" name="_ftn8">[8]</a> Also see sections 5 and 6 of POPA.</p>
<p><a href="#_ftnref9" name="_ftn9">[9]</a> For an introduction on the types of controls applicable to AI and many forms of automated systems that rely on it, see <a href="https://verifywise.ai/lexicon/ai-security-controls" target="_blank" rel="noopener">https://verifywise.ai/lexicon/ai-security-controls</a>.</p>
<p><a href="#_ftnref10" name="_ftn10">[10]</a> See <a href="https://owaspai.org/docs/6_privacy/" target="_blank" rel="noopener">https://owaspai.org/docs/6_privacy/</a> for a primer on this subject.</p>
<p><a href="#_ftnref11" name="_ftn11">[11]</a> <a href="https://yukonaccountability.ca/sites/default/files/resources/OMB-GettingAheadoftheCurve-v6.pdf" target="_blank" rel="noopener">https://yukonaccountability.ca/sites/default/files/resources/OMB-GettingAheadoftheCurve-v6.pdf</a> and <a href="https://oipc.ab.ca/wp-content/uploads/2025/08/AI-Comments-from-the-OIPC-Regarding-Responsible-AI-Governance-in-Alberta-July-15-2025.pdf" target="_blank" rel="noopener">https://oipc.ab.ca/wp-content/uploads/2025/08/AI-Comments-from-the-OIPC-Regarding-Responsible-AI-Governance-in-Alberta-July-15-2025.pdf</a></p>
<p><a href="#_ftnref12" name="_ftn12">[12]</a> See <a href="#privacy-management-program-requirements">chapter 4(b)</a> for details on sensitive personal information</p>
<p><a href="#_ftnref13" name="_ftn13">[13]</a> For a more comprehensive overview of the types of controls and their uses see <a href="https://purplesec.us/learn/security-controls/" target="_blank" rel="noopener">https://purplesec.us/learn/security-controls/</a>.</p>
<p><a href="#_ftnref14" name="_ftn14">[14]</a> See e.g. <a href="https://www.cyber.gc.ca/en/guidance/national-cyber-threat-assessment-2025-2026" target="_blank" rel="noopener">https://www.cyber.gc.ca/en/guidance/national-cyber-threat-assessment-2025-2026</a> and <a href="https://www.sentinelone.com/cybersecurity-101/cybersecurity/cyber-security-trends/">https://www.sentinelone.com/cybersecurity-101/cybersecurity/cyber-security-trends/</a>.</p>
<p><a href="#_ftnref15" name="_ftn15">[15]</a> See e.g. <a href="https://www.nist.gov/privacy-framework/nist-sp-800-115" target="_blank" rel="noopener">https://www.nist.gov/privacy-framework/nist-sp-800-115</a> for details on activities such as vulnerability scanning and penetration testing.</p>
<p><a href="#_ftnref16" name="_ftn16">[16]</a> See <a href="https://www.verizon.com/business/resources/reports/dbir/" target="_blank" rel="noopener">https://www.verizon.com/business/resources/reports/dbir/</a> this 2025 report states <em>‘30% of breaches were linked to third-party involvement, twice as much as last year, and </em><em> </em><em>driven in part by vulnerability exploitation and business interruptions’.</em></p>
<p><a href="#_ftnref17" name="_ftn17">[17]</a> See <a href="https://www.canada.ca/en/treasury-board-secretariat/news/2025/11/canada-launches-first-register-of-ai-uses-in-federal-government.html" target="_blank" rel="noopener">https://www.canada.ca/en/treasury-board-secretariat/news/2025/11/canada-launches-first-register-of-ai-uses-in-federal-government.html</a> for information regarding AI registry use by the Canadian federal government.</p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>April 2026<br />

<table id="tablepress-2" class="tablepress tablepress-id-2">
<tbody class="row-striping">
<tr class="row-1">
	<td class="column-1"><p><strong>Disclaimer</strong><br><br />
This document is not intended as, nor is it a substitute for, legal advice, and is not binding on the Information and Privacy Commissioner of Alberta. Responsibility for compliance with the law (and any applicable professional or trade standards or requirements) remains with each organization, custodian or public body. All examples used are provided as illustrations. The official versions of the laws <a href="https://oipc.ab.ca/legislation/" target="_blank" rel="noopener">the OIPC oversees</a> and their associated regulations should be consulted for the exact wording and for all purposes of interpreting and applying the legislation. The Acts are available on the website of <a href="https://www.alberta.ca/alberta-kings-printer.aspx" rel="noopener" target="_blank">Alberta King's Printer</a>.</p></td>
</tr>
</tbody>
</table>
<!-- #tablepress-2 from cache --></p>

		</div>
	</div>
</div></div></div></div>
</div>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Guidance for Public Bodies when Contracting Service Providers</title>
		<link>https://oipc.ab.ca/resource/popa-guidance-service-providers/</link>
		
		<dc:creator><![CDATA[Chris Stinner]]></dc:creator>
		<pubDate>Thu, 16 Apr 2026 17:12:59 +0000</pubDate>
				<guid isPermaLink="false">https://oipc.ab.ca/?post_type=resource&#038;p=17494</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<div style="border: 1px solid #ccc; padding: 15px; border-radius: 5px;">
<p><strong>Table of Contents</strong></p>
<p><a href="#introduction">Introduction</a><br />
<a href="#public-bodies-governance-and-accountability">Public bodies’ governance and accountability</a><br />
<a href="#pre-contract-planning-phase">Pre-contract/Planning Phase</a><br />
<a href="#contract">Contract</a><br />
<a href="#oversight">Oversight</a><br />
<a href="#conclusion">Conclusion</a><br />
<a href="#checklist">Appendix – Service Provider Contract Privacy Checklist </a><br />
<a href="#references">References</a><br />
<a href="#glossary">Glossary</a></p>
</div>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="introduction"></a></p>
<h1>Introduction</h1>
<h2>Purpose of this guidance</h2>
<p>Public bodies<a href="#_ftn1" name="_ftnref1">[1]</a> in Alberta are required to comply with the <em>Protection of Privacy Act</em> (POPA) and its associated regulations the <em>Protection of Privacy (Ministerial) Regulation</em> (M-Regulation) and the <em>Protection of Privacy Regulation</em> (Regulation). POPA governs the collection, use, disclosure and management of <strong>personal information</strong><a href="#_ftn2" name="_ftnref2">[2]</a> in the custody or control of public bodies. They are also required to provide access to individuals who request access to their own personal information in accordance with the <em>Access to Information Act</em>.</p>
<p>This guidance is designed to help public bodies meet their obligations under POPA and ATIA, as described, when engaging the services of a service provider to perform services on behalf of the public body that involves the service provider collecting, using, disclosing or managing personal information on the public body’s behalf. For example, a public body may want to use a new application to support one of their programs and the program involves the collection, use or disclosure of personal information. This could involve contracting an information technology service provider to provide support for the application, hosting the application remotely and providing back-up services for the records. Another example would be a public body hiring a records management company to store paper records containing personal information at an off-site storage facility with support services until the end of the records retention period.</p>
<p>Any service provider that is, or may be, planning to provide services to public bodies will also benefit from this guidance as it will have a better understanding about public bodies’ duties under these laws.</p>
<p>This guidance is not intended for public bodies who are entering into contracts with other public bodies in the development of a <strong>common or integrated program or service.</strong><br />
<a id="what-is-a-service-provider"></a></p>
<h2>What is a “service provider”?</h2>
<p>A service provider is any organization or body that is external to the public body and that provides services to the public body under a contract.</p>
<p>Where, as part of providing services to the public body, the service provider will have access to or collect, use or disclose personal information on behalf of the public body under a contract, the service provider becomes an “<strong>employee</strong>” of the public body for the purposes of POPA and is bound as an employee to adhere to the public body’s requirements under POPA as they relate to these activities.</p>
<p>Similarly, ATIA also applies to public bodies. If a service provider under a contract for services is tasked with providing access to personal information on behalf of the public body, it will be an “employee” of that public body for that purpose and subject to the ATIA requirements regarding access to the personal information. For most service provider contracts, the service provider’s only task in regard to access or correction requests under ATIA will be to cooperate with the public body in responding to these requests.<br />
<a id="why-is-it-important-to-read-this-guidance"></a></p>
<h2>Why is it important to read this guidance?</h2>
<p>The role of service providers has grown disproportionately in the past few decades due to the development of cloud services, software as a service and other mainly technology driven developments. According to a recent survey, 80% of organizations suffered a data breach in 2022 caused by a third party. In recognition that most organizations use service providers as part of their operations, many modern privacy laws contain obligations that hold service providers directly accountable for compliance under these laws including for breach reporting.</p>
<p>When public bodies enter into a contract with a service provider, they remain accountable for any collection, use or disclosure and management of information carried out on their behalf by the service provider. This guidance will assist public bodies to develop policies and procedures for contracting with service providers that align with their privacy obligations under POPA and, as applicable, under ATIA. This guidance should not be used in isolation but rather in conjunction with other policies and procedures (e.g., procurement, information classification, cybersecurity).<br />
<a id="explanatory-note"></a></p>
<h2>Explanatory note</h2>
<p>Any reference to “POPA” that follows includes the right of access under the ATIA to one’s own personal information, unless the service provider is providing access and correction services on behalf of the public body, which will be explained.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#">Back to top of the page</a><a id="public-bodies-governance-and-accountability"></a></p>
<h1>Public bodies’ governance and accountability</h1>
<p>To meet the requirements of POPA, a public body must have a governance framework in place to facilitate compliance. This includes having appropriate policies and procedures in place when contracting service providers.<br />
<a id="roles-and-responsibilities"></a></p>
<h2>Roles and Responsibilities</h2>
<p>The <strong>head</strong> of the Public Body holds ultimate responsibility for decisions and compliance. The head may delegate others to have the authority to make decisions on behalf of the head (e.g. Privacy Officer), including entering into contracts with service providers.</p>
<p>As indicated, a service provider under a contract relationship with a public body is defined as an <strong>employee</strong> under POPA s. 1(h):</p>
<p><em>“employee”, in relation to a public body, includes a person who performs a service for the public body as an appointee, volunteer or student or under a contract or agency relationship with the public body;</em></p>
<p>While a contracted service provider is not an employee in the labor relations sense, it is included in the POPA definition of employee. This ensures it is bound by the Act. Because the types of services will vary, the public body will need to look at each situation and be sure to clearly articulate which privacy requirements must be met. Public bodies must ensure they, and by extension their service providers, are complying with POPA.</p>
<p>Public bodies are accountable for any information handled on their behalf by their service providers. Therefore, they must ensure any collection, use and disclosure is legally authorized under POPA. Having a contract in place with the appropriate terms and conditions provides the public body with assurance that it is able to maintain control of the information. Roles and responsibilities should be clear, including what activities are authorized and which ones are prohibited. Public bodies will need to ensure they are able to meet their obligations under POPA.<br />
<a id="privacy-management-program-and-service-providers"></a></p>
<h2>Privacy Management Program and Service Providers</h2>
<p>Public bodies are required to have a <strong>Privacy Management Program </strong>(PMP) inclusive of policies and procedures for service provider procurement, contracting, and management including oversight and auditing. Public bodies must develop their procurement processes to meet POPA. The processes must ensure the public body is choosing a service provider who will be able to support the public body’s legal obligations under POPA. For more information on PMPs please see the OIPC’s <a href="/popa/pmp/guide/" target="_blank" rel="noopener">Guidance for Public Bodies in Developing Privacy Management Programs</a>.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#">Back to top of the page</a><a id="pre-contract-planning-phase"></a></p>
<h1>Pre-contract/Planning Phase</h1>
<p>Public bodies should plan out their procurement strategy including spending some time thinking about what services are needed and how they will align with business needs, including compliance with POPA. This up-front planning will most likely save public bodies money in the long run and may even prevent the public body from experiencing a privacy or security breach.<br />
<a id="determining-scope-of-services-involving-personal-information"></a></p>
<h2>Determining Scope of Services Involving Personal Information</h2>
<p>Public bodies should identify:</p>
<ul>
<li>the business purpose for the activity and what service the public body is looking for.</li>
<li>how the service fits into public body’s operations.</li>
<li>the personal information that the service provider will collect, use or disclose on behalf of the public body to perform the service.</li>
<li>its legal authority for this collection, use or disclosure of the personal information.</li>
</ul>
<h2>Determining Service Level Expectations</h2>
<p>Determine the classification of personal information that the service provider will collect, use or disclose on behalf of the public body. This is necessary to establish the measures the service provider will need to implement to carry out the service for the public body in compliance with POPA.<br />
<a id="assessing-the-privacy-posture-of-a-potential-service-provider"></a></p>
<h2>Assessing the Privacy Posture of a Potential Service Provider</h2>
<p>Before engaging a service provider, a public body may wish to examine the privacy posture of a potential service provider to assess whether it has in place privacy practices that will support the public body’s duties under POPA if the public body were to contract with the service provider for the services. The following are some areas a public body may wish to examine prior to considering whether to retain the services of a particular service provider (where this is permitted). Note that these considerations are not exhaustive but rather some key considerations.</p>
<ul>
<li>Does the service provider have a privacy policy? Often service providers will have a privacy policy on their website or in their marketing material. Public bodies can review these to see if at first glance they appear to have operationalized privacy practices in what appears to be a reasonable manner as part of their business, and references a privacy law to which they are subject. Service providers with transparent privacy policies that are easy to understand may enhance trust in their ability to protect the personal information that they will have access to in performing the services.</li>
<li>Does the service provider have a privacy officer listed? Public bodies can contact the privacy officer with privacy questions they might have regarding the services and their privacy practices.</li>
<li>Does the website:
<ul>
<li>describe what personal information is collected, used or disclosed for the service and does this appear reasonable based on the service provided;</li>
<li>describe any secondary uses of personal information, such as for improving products or services or marketing, or training artificial intelligence, which may not be permitted in some circumstances;</li>
<li>mention selling personal information, which is prohibited under POPA but may be permitted under other privacy laws;</li>
<li>mention the use of other third parties that help them provide the service (e.g. cloud providers, apps that link to the main service), which can create risks when subcontractors are part of the service.</li>
</ul>
</li>
<li>Does the service provider express a commitment concerning protecting the confidentiality, availability, and integrity of personal information in its custody or control? Does it provide any details as to how it does this?</li>
<li>Does the service provider describe having security certifications?</li>
<li>Does the service provider indicate where the personal information used in its services is processed and stored? Data stored in other jurisdictions may be subject to laws in those jurisdictions. In certain jurisdictions, access to information, including personal information, may be accessible by government or law enforcement in these jurisdictions.</li>
<li>Has the service provider suffered a breach or been involved in court cases concerning its personal information processing or handling practices?</li>
</ul>
<h2>Conducting a Privacy Impact Assessment (PIA)</h2>
<p>Before contracting with a service provider, public bodies should assess whether in contracting with a particular service provider, they will be in compliance with POPA. Completing a PIA is a useful tool to assist in assessing compliance.</p>
<p>POPA requires public bodies to complete PIAs in certain circumstances. The OIPC has developed a tool to help public bodies determine if they are required to prepare a PIA and if the PIA must be submitted to the OIPC for review (see <a href="https://oipc.ab.ca/popa/pia/tool/" target="_blank" rel="noopener">POPA Privacy Impact Assessment Submission Assessment Tool</a>). Whenever a public body submits a PIA to the OIPC, it must do so using the <a href="https://oipc.ab.ca/popa/pia/template/" target="_blank" rel="noopener">OIPC PIA template</a>. Even if a PIA is not required to be prepared, when contracting with a service provider, a PIA will help a public body determine whether, in contracting the service, it will be compliance with POPA.</p>
<p>Completing a PIA will give public bodies confidence that when entering into a service provider relationship, they will be positioned to meet their obligations under POPA by identifying and mitigating any risks to privacy determined through the PIA process.</p>
<p>The public body may already have a PIA on a similar service. If so, consider reviewing that PIA to see what safeguards were put in place for the initiative. This may help with the writing of the new PIA. Be aware that PIAs are a point-in-time document and as technology evolves, the risks change too. Therefore, what was appropriate a few years ago may not be adequate today due to changes to legislation, products or services offered by service providers, technological risks, or other factors.<br />
<a id="complying-with-the-tendering-process"></a></p>
<h2>Complying with the Tendering Process</h2>
<p>Depending on the size and complexity of a project, as well as the contract value, public bodies may be required to solicit proposals for services (open competition, selective tendering, limited tendering). Public bodies should Include requirements that will support POPA compliance in the Request for Proposal (RFP) and in the evaluation criteria used to choose the preferred service provider. It will be important to identify any mandatory requirements that must be met and to mitigate any risks to an acceptable level. Prepare to have individuals on the evaluation committee who have sufficient knowledge of access to information, privacy and security.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#">Back to top of the page</a><a id="contract"></a></p>
<h1>Contract</h1>
<p>Once the public body has gathered information on the service and the service provider, the applicable privacy assessment has been completed, and the tendering process is complete if applicable, the public body will need to draft the contract for the service provider that will incorporate the requirements of POPA that the service provider will need to comply with for delivery of the service. The key areas that need to be addressed in any contract with a service provider wherein the service provider will collect, use, disclose, manage or have access to personal information are as follows.<br />
<a id="control-and-accountability"></a></p>
<h2>Control and Accountability</h2>
<p>Maintaining control means stipulating in the contract that the public body at all times retains “control” over the information that will be in the custody of the service provider for the services. This is essential to ensuring that the personal information remains subject to POPA and that the public body is able to exercise its control over how this information is used and managed by the service provider.</p>
<p>The contract must set out the roles and responsibilities of the parties as it relates to the personal information while in the custody of the service provider. The public body must ensure these roles and responsibilities support its ability to meet POPA requirements. There are risks to storing data outside of Canada, or with service providers from certain countries, due to other countries having laws that may permit access for government activities, such as national defence, or for law enforcement. The contract should clarify how the service provider would notify the public body of any requests it receives to produce personal information it has in its custody.</p>
<p>Last, the contract should specify how the public body will maintain oversight of the service provider’s duties to ensure it complies with both contractual requirements and POPA and include the right of the public body to audit for compliance.<br />
<a id="legal-authorities-for-collection-use-or-disclosure"></a></p>
<h2>Legal Authorities for Collection, Use or Disclosure</h2>
<p>The contract must define what the service provider can and cannot do with the personal information. Any collection, use or disclosure the service provider carries out on behalf of the public body must be legally authorized under <strong>POPA<a href="#_ftn3" name="_ftnref3">[3]</a></strong>. The contract provisions must clarify what activity is authorized as it relates to the personal information and what activity is prohibited and specify measures that must be taken by the service provider to ensure downstream compliance by its employees or subcontractors. Public bodies may also decide to contractually restrict service providers’ ability to subcontract altogether. Public bodies must also ensure that the contract allows them to meet all of POPA’s requirements, including for accuracy and security (more on this below) and completion of PIAs as may be required by the public body.<br />
<a id="requests-for-access-or-correction"></a></p>
<h2>Requests for Access or Correction</h2>
<p>The contract must also address requests for access to (as set out in ATIA) or correction of personal information (as set out in POPA). If the contractor is involved in this activity (i.e., by providing access or correction services on behalf of the public body), the contract should specify this and ensure the access or correction process that the contractor must follow is laid out in the contract. Who will interact with the OIPC regarding any reviews of these requests must also be clarified in the contract. While it might seem preferable that a contractor undertake these activities, there are risks of non-compliance due to the rigor in the access and correction processes laid out in the Acts with oversight by the Commissioner. Given this, a public body should generally maintain responsibility for processing access and correction requests for personal information in the custody of a contractor. In most cases, the role of a service provider as it relates to this activity will be cooperation with the public body to facilitate the public body’s response to these requests, which should be set out in the contract as a duty of cooperation by the service provider.<br />
<a id="safeguards-and-retention"></a></p>
<h2>Safeguards and Retention</h2>
<p>The contract must set out the specific security requirements that the contractor must meet, which must, at minimum, align with those of the public body and the requirements in POPA and its regulations. In addition, the contract should include wording that requires the service provider to cooperate with the public body for the preparation of PIAs or STRAs, or if the public body is under investigation by a regulatory authority.</p>
<p>The contract must also specify what the public body expects the service provider to do whenever it experiences a breach of personal information it holds on behalf of the public body, including timelines. This helps to ensure the public body can meet its requirements concerning breaches including for notification as required by POPA and its regulations.</p>
<p>The contract must also establish retention periods for the information stored by the service provider and establish a process for the service provider to certify to the public body when personal information has been destroyed at the end of its retention.<br />
<a id="complaint-handling"></a></p>
<h2>Complaint Handling</h2>
<p>The contract must also address how any complaints alleging unauthorized access, collection, use or disclosure by the contractor (or their employees or subcontractors) will be handled. For the same reason as indicated for access and correction requests, it is recommended that public bodies maintain responsibility for complaints management. Additionally, managing complaints provides insight into the personal information handling practices of the service provider and provides the public body with the opportunity to address any issues that arise through this process.<br />
<a id="termination"></a></p>
<h2>Termination</h2>
<p>In addition to the foregoing, the contract must outline clear outcomes in the event the service provider ceases to operate or the contract terminates. Public bodies must be able to terminate the contract and retrieve the records from the service provider with assurance that no records are retained by the service provider. Additionally, the contract should address compatibility between the service provider’s system of storing personal information and that of the public body’s. This is important, since the public body must be able to import the personal information into a new information system, or to archive it as dictated by applicable retention periods. The contract must include clear expectations around data format, applicable timelines and security arrangements. This will ensure the data can be moved across different information systems with minimal integration issues and it will be readable by the public body.</p>
<p>For more specific details to consider in a contract, please see the <a href="#checklist">Appendix – Service Provider Contract Privacy Checklist</a>.<br />
<a id="oversight"></a></p>
<p style="font-size: 0.9em; color: grey;"><a href="#">Back to top of the page</a></p>
<h1>Oversight</h1>
<p>The public body should develop processes that ensure their service providers are meeting the contractual obligations. The frequency of these reviews may be informed by policies of the public body, which may be part of the public body’s Privacy Management Program. When auditing a service provider to verify adherence to contract terms, the public body should have defined processes to ensure the details of the audit are clearly documented and retained and there are distinct steps on how to escalate issues of non-compliance. There may be similar processes for audits conducted on a reactive basis, such as when an incident occurs.</p>
<p>The OIPC may request information from a public body due to a complaint or a request for review under ATIA or POPA. The Commissioner may also conduct investigations. The public body and by extension, the service provider, may be required to provide information to the Commissioner to conduct the review or investigation. Where a service provider is involved, they will be part of the review or investigation and must cooperate. That said, as an employee of the public body, any non-compliance by a service provider with POPA is non-compliance by the public body. Investigations may result in Orders or in the event of an offence, charges and fines.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#">Back to top of the page</a><a id="conclusion"></a></p>
<h1>Conclusion</h1>
<p>Public bodies collect, use and disclose personal information in order to provide public services to Albertans. When entering into a contract with a service provider, public bodies remain accountable for this information and must have appropriate policies and procedures to ensure, in the use of service providers, they will meet their obligations under POPA.</p>
<p>Public bodies must ensure that contracts entered into with service providers contain clauses that will ensure the service provider, and its employees or subcontractors, comply with the public body’s duties under POPA. Having an accountability framework such as a PMP with appropriate policies and procedures regarding contracting with service providers will help guide those who are part of the processes involved in retaining the services of a service provider, including for procurement, contracting and, managing contracts to ensure legal obligations are met.</p>
<p>This guidance is meant to support the public body in developing policies and procedures for acquiring and managing service providers that will facilitate compliance with POPA and in contracting and oversight.</p>
<p>We welcome any feedback concerning this guidance. Please send the same to <a href="mailto:generalinfo@oipc.ab.ca">generalinfo@oipc.ab.ca</a>.<br />
<a id="checklist"></a></p>
<h2>Appendix – Service Provider Contract Privacy Checklist</h2>
<p>Public bodies can use this checklist whenever they seek to enter into a contract with a service provider who performs a service <u>on behalf of the public body</u> and in doing so has access to personal information subject to the <em>Protection of Privacy Act:</em></p>
<p><strong><span style="color: #ff0000;">Download the checklist here </span> <a href="/popa/providers/checklist/doc/" target="_blank" rel="noopener">[DOCX]</a>  <a href="/popa/providers/checklist/pdf/" target="_blank" rel="noopener">[PDF]</a></strong><br />
<a id="references"></a></p>
<h2><strong>References</strong></h2>
<p>Ontario IPC Guidance: <em><a href="https://www.ipc.on.ca/en/resources/privacy-and-access-public-sector-contracting-third-party-service-providers" target="_blank" rel="noopener">Privacy and Access in Public Sector Contracting with Third Party Service Providers</a></em></p>
<p>Treasury Board of Canada Secretariat <a href="https://www.canada.ca/en/treasury-board-secretariat/services/access-information-privacy/privacy/guidance-document-taking-privacy-into-account-before-making-contracting-decisions.html#_Control_and_accountability" target="_blank" rel="noopener"><em>Guidance Document: Taking Privacy into Account Before Making Contracting Decisions</em></a></p>
<p>Government of Alberta, <a href="https://open.alberta.ca/dataset/1bf254db-7f2f-4980-9264-d968a330bb67/resource/8aa91489-df75-4f8c-be7c-2193a1a2fe8d/download/contractorbrochure.pdf" target="_blank" rel="noopener"><em>Contractor&#8217;s Guide to the Freedom of Information and Protection of Privacy Act</em></a></p>
<h2>Footnotes</h2>
<p><a href="#_ftnref1" name="_ftn1">[1]</a> (t) “public body” means<br />
(i) a department, branch or office of the Government of Alberta,<br />
(ii) an agency, board, commission, corporation, office or other body designated as a public body in the regulations,<br />
(iii) the Executive Council Office,<br />
(iv) the office of a member of the Executive Council,<br />
(v) the Legislative Assembly Office,<br />
(vi) the office of the Auditor General, the Ombudsman, the Chief Electoral Officer, the Ethics Commissioner, the Information and Privacy Commissioner, the Child and Youth Advocate or the Public Interest Commissioner, or<br />
(vii) a local public body,<br />
but does not include<br />
(viii) the office of the Speaker of the Legislative Assembly and the office of a Member of the Legislative Assembly, or<br />
(ix) the Court of Appeal, the Court of King’s Bench or the Court of Justice;</p>
<p>The full definition of a public body can be found in the ATIA at <a href="https://kings-printer.alberta.ca/documents/Acts/a01p4.pdf#page=11" target="_blank" rel="noopener">Alberta King&#8217;s Printer</a>.</p>
<p><a href="#_ftnref2" name="_ftn2">[2]</a> Bolded terms can be found in the Glossary.</p>
<p><a href="#_ftnref3" name="_ftn3">[3]</a> Often, service providers that provide services nationally or internationally reference legislation that does not apply to Alberta’s public sector, such as PIPEDA, the GDPR or the public sector privacy laws of other jurisdictions<em>. </em>These laws differ from POPA and compliance with these laws does not ensure compliance with POPA.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#">Back to top of the page</a></p>
<p>&nbsp;</p>
<h2><strong>Glossary</strong></h2>
<p>
<table id="tablepress-12" class="tablepress tablepress-id-12">
<thead>
<tr class="row-1">
	<th class="column-1">Term</th><th class="column-2">POPA Ref</th><th class="column-3">Definition</th>
</tr>
</thead>
<tbody class="row-striping row-hover">
<tr class="row-2">
	<td class="column-1">Common or Integrated Program or Service</td><td class="column-2">1(d)</td><td class="column-3">(d) “common or integrated program or service”, in relation to a public body, means a program or service planned, administered, delivered, managed, monitored or evaluated by<br />
  (i)    the public body working collaboratively with one or more other public bodies, or<br />
  (ii)    another public body working on behalf of<br />
    (A)    the public body, or<br />
    (B)    the public body and one or more other public bodies;</td>
</tr>
<tr class="row-3">
	<td class="column-1">Data derived from Personal Information</td><td class="column-2">1(e)</td><td class="column-3">“data derived from personal information” means data<br />
created by data matching, and<br />
that identifies any individual whose personal information was used in the data matching;</td>
</tr>
<tr class="row-4">
	<td class="column-1">Employee</td><td class="column-2">1(h)</td><td class="column-3">“employee”, in relation to a public body, includes a person who performs a service for the public body as an appointee, volunteer or student or under a contract or agency relationship with the public body;</td>
</tr>
<tr class="row-5">
	<td class="column-1">Head of the Public Body</td><td class="column-2">1(i)</td><td class="column-3">“head”, in relation to a public body, means a head as defined in the Access to Information Act</td>
</tr>
<tr class="row-6">
	<td class="column-1">Information</td><td class="column-2"></td><td class="column-3">for the purpose of this document, “information” is used to refer to any records in the control of the public body including personal information, data derived from personal information, non-personal information, and other business records.</td>
</tr>
<tr class="row-7">
	<td class="column-1">Non-Personal Data</td><td class="column-2">1(n)</td><td class="column-3">“non personal data” means data, including data derived from personal information, that has been generated, modified or anonymized so that it does not identify any individual, and includes synthetic data and any other type of non personal data identified in the regulations;</td>
</tr>
<tr class="row-8">
	<td class="column-1">Personal Information</td><td class="column-2">1(q)</td><td class="column-3">recorded information about an identifiable individual, including<br />
the individual’s name, home or business address, home or business telephone number, home or business email address, or other contact information, except where the individual has provided the information on behalf of the individual’s employer or principal in the individual’s capacity as an employee or agent,<br />
the individual’s race, national or ethnic origin, colour or religious or political beliefs or associations,<br />
the individual’s age, gender identity, sex, sexual orientation, marital status or family status,<br />
an identifying number, symbol or other particular assigned to the individual,<br />
the individual’s fingerprints, other biometric information, blood type, genetic information or inheritable characteristics,<br />
information about the individual’s health and health care history, including information about the individual’s physical or mental health,<br />
information about the individual’s educational, financial, employment or criminal history, including criminal records where a pardon has been given,<br />
anyone else’s opinions about the individual, and<br />
the individual’s personal views or opinions, except if they are about someone else;</td>
</tr>
<tr class="row-9">
	<td class="column-1">Privacy Management Program</td><td class="column-2">1(t)</td><td class="column-3">“privacy management program” means a privacy management program established and implemented under section 25</td>
</tr>
<tr class="row-10">
	<td class="column-1">Record</td><td class="column-2">1(v)</td><td class="column-3">“record” means a record as defined in the Access to Information Act;</td>
</tr>
</tbody>
</table>
<!-- #tablepress-12 from cache --><br />
April 2026</p>

		</div>
	</div>


<table id="tablepress-2-no-2" class="tablepress tablepress-id-2">
<tbody class="row-striping">
<tr class="row-1">
	<td class="column-1"><p><strong>Disclaimer</strong><br><br />
This document is not intended as, nor is it a substitute for, legal advice, and is not binding on the Information and Privacy Commissioner of Alberta. Responsibility for compliance with the law (and any applicable professional or trade standards or requirements) remains with each organization, custodian or public body. All examples used are provided as illustrations. The official versions of the laws <a href="https://oipc.ab.ca/legislation/" target="_blank" rel="noopener">the OIPC oversees</a> and their associated regulations should be consulted for the exact wording and for all purposes of interpreting and applying the legislation. The Acts are available on the website of <a href="https://www.alberta.ca/alberta-kings-printer.aspx" rel="noopener" target="_blank">Alberta King's Printer</a>.</p></td>
</tr>
</tbody>
</table>
<!-- #tablepress-2-no-2 from cache -->
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Privacy Impact Assessment (PIA) Template and Completion Guide (POPA)</title>
		<link>https://oipc.ab.ca/resource/popa-pia-template-completion-guide/</link>
		
		<dc:creator><![CDATA[Chris Stinner]]></dc:creator>
		<pubDate>Mon, 09 Mar 2026 12:55:24 +0000</pubDate>
				<guid isPermaLink="false">https://oipc.ab.ca/?post_type=resource&#038;p=17354</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>Section 26 of the <em>Protection of Privacy Act</em> (POPA) requires a public body to prepare a privacy impact assessment (PIA) in prescribed circumstances and, if required by the regulations, submit the PIA to the Information and Privacy Commissioner in accordance with the regulations. In addition, as part of the Commissioner’s responsibility to monitor how POPA is administered to ensure that its purposes are achieved, the Commissioner may, as described in section 27(1)(j) of POPA, request a copy of a public body’s PIA.</p>
<p>Section 7(1) of the <em>Protection of Privacy Act</em> (Ministerial) <em>Regulation</em> (M-Regulation) lists the circumstances in which a public body must prepare and submit a PIA to the Commissioner.</p>
<p>This <strong>POPA PIA Template Completion Guide</strong> (“Completion Guide”) is a companion document to the <a href="https://oipc.ab.ca/popa/pia/template/" target="_blank" rel="noopener">POPA PIA Template</a>. The aim of this Completion Guide is to assist public bodies in completing the POPA PIA Template. This Completion Guide provides explanation or clarification, where necessary, for each question asked in the POPA PIA Template and describes what is expected of the public body in each question. We recommend that you complete the POPA PIA Template while consulting this PIA Completion Guide.<br />
The term “<strong>project</strong>” when used in this document means any administrative practice, program or service, or a change to any existing administrative practice, program or service that a public body plans to implement, which will involve the collection, use or disclosure of personal information and which includes one or more of the factors listed in section 7(5)(a) to (e) of the M-Regulation.</p>
<p>If a public body is unsure whether it is required to <span style="text-decoration: underline;">complete</span> a PIA or <span style="text-decoration: underline;">complete and submit</span> a PIA to the Information and Privacy Commissioner, the public body should consider using the <a href="https://oipc.ab.ca/popa/pia/tool/" target="_blank" rel="noopener">PIA Submission Assessment Tool</a> to make that determination.</p>
<p><span style="color: #ff0000;"><strong>Please note that sections in the POPA PIA Template with an asterisk (*) are mandatory and must be completed.</strong> <strong>Any PIA that does not complete the mandatory sections, </strong><strong>will be deemed incomplete and will not be accepted for review by the OIPC.</strong></span></p>
<p>If you encounter issues while using the completion guide or have questions, please <a href="https://oipc.ab.ca/about-us/contact-us/" target="_blank" rel="noopener">contact us</a>.</p>
<p><span style="color: #ff0000;"><strong>Note: Public bodies <u>should not</u> submit this completion guide to the OIPC as part of their PIA submission.</strong></span></p>
<p>Given that section 26(1) of POPA requires a public body to prepare a PIA in prescribed circumstances and, if required by the regulations, submit it to the Commissioner in accordance with the regulations, the head of a public body is legally required to sign off on POPA PIAs. However, 55(1) of POPA authorizes the head of a public body to delegate to any person any power, duty or function of the head under the Act, except the power to delegate under this section. Section 55(2) requires that a delegation under subsection (1) be in writing and may contain any conditions or restrictions the head of the public body considers appropriate. To this end, the Designate of a public body may sign off on the public body’s PIA if that Designate has been delegated such a power. A copy of the delegation of power should be included with the PIA.</p>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<div style="border: 1px solid #ccc; padding: 15px; border-radius: 5px;">
<p><strong>Table of Contents</strong></p>
<ul>
<li><a href="#general-information-public-body-existing-pias-project">A. General Information About the Public Body or Bodies, Existing PIAs, and the Project*</a></li>
<li><a href="#project-details">B. Details About the Project*</a></li>
<li><a href="#privacy-management-program">C. Information About Your Privacy Management Program (PMP)*</a></li>
<li><a href="#personal-information-authority-collection-use-disclosure">D. Identify Personal Information Involved and Your Authority to Collect, Use or Disclose the Information*</a></li>
<li><a href="#access-correction-accuracy-retention-disposition">E. Access, Correction, Accuracy, Retention, Disposition*</a></li>
<li><a href="#protection-of-information">F. Protection of Information*</a></li>
<li><a href="#service-providers">G. Service Providers*</a></li>
<li><a href="#project-risk-assessment-mitigation">H. Project Risk Assessment and Mitigation*</a></li>
<li><a href="#appendix-a-data-matching">Appendix A. Data Matching</a></li>
<li><a href="#appendix-b-common-integrated-program-service">Appendix B. Common or Integrated Program or Service</a></li>
<li><a href="#appendix-c-automated-systems-innovative-technology">Appendix C. Use of Automated Systems or Other Forms of Innovative Technology</a></li>
<li><a href="#appendix-d-pia-cover-letter">Appendix D. PIA Cover Letter*</a></li>
<li><a href="#appendix-e-pia-submission-checklist">Appendix E. PIA Submission Checklist*</a></li>
</ul>
</div>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="general-information-public-body-existing-pias-project"></a></p>
<h3>A. General Information about the public body or bodies, existing PIAs, and the project *</h3>
<p><em>Questions in this section are asked as a legislative requirement and to enable the OIPC in processing the PIA file.</em></p>
<p><strong> Question 1</strong></p>
<p>Section 26 of POPA requires a public body to prepare a PIA in the circumstances listed in section 7 of the M-Regulation, when a project involves the collection, use or disclosure of personal information. If a public body is not collecting, using or disclosing personal information as part of its project, there is no requirement under POPA to submit a PIA to the Commissioner for the project.</p>
<p><strong> Question 2</strong></p>
<p>The legislation is clear on when a public body is required to prepare a PIA, and only in the prescribed circumstances as listed in the POPA PIA template is a public body required under POPA to submit a PIA to the OIPC. Please note that the list of highly sensitive information identified under section 1 of the M-Regulation is not an exhaustive list. Other personal information may be of high sensitivity.</p>
<p>In this question, if only the last checkbox (the loss of, unauthorized access to or unauthorized disclosure of the personal information could result in significant harm) is selected, the public body may not be required to submit a PIA to the Commissioner. Nonetheless, the OIPC recommends that public bodies use the POPA PIA template while preparing PIAs under section 7(1)(a) of the M-Regulation as the Commissioner may request copies of those PIAs under section 27(1)(j) of POPA. Using the template will ensure that the public bodies complete their PIAs in alignment with the PIA requirements under POPA and the M-Regulation of which the PIA template is based on.</p>
<p><strong> Question 3</strong><br />
When submitting a PIA to the OIPC as required under section 26 of POPA, the OIPC needs to know certain information about the public body including who the head of the public body is at the time the PIA is submitted. This is because under POPA the head has specified duties including for protection of personal information (section 10(1)).</p>
<p><strong> Question 4</strong><br />
Section 7(4)(b) of the M-Regulation allows for two or more public bodies to submit a PIA for a common or integrated program or service, hence the need to know if the PIA is for such a project.</p>
<p><strong> Question 5</strong><br />
No additional explanation needed.</p>
<p><strong> Question 6 </strong><br />
No additional explanation needed.</p>
<p><strong> Question 7</strong><br />
Sometimes, a new PIA is related to a PIA which has already been submitted to the OIPC and is still under review. In such cases, it is important that the OIPC is aware of this PIA to ensure the recent PIA is not reviewed in isolation from the related PIA. There are also times where information in an existing PIA is referenced in a new PIA. It is also important to know if such a PIA exists or has been previously reviewed by the OIPC.</p>
<p><strong> Question 8</strong></p>
<p>A PIA amendment addresses privacy and security risks associated with changes to an existing project that impacts the collection, use and/or disclosure of personal information. A PIA amendment focuses on areas that have changed in an existing project, and how the public body has identified and addressed privacy and security risks associated with the change. An amendment to a previously submitted PIA requires that the updated or new PIA is reviewed in consultation with the previously submitted PIA.</p>
<p><strong>Question 9</strong><br />
Some public bodies have their own filing convention for their internal use. Providing this number ensures the OIPC, in addition to the OIPC’s file number, references this number in its communication with the public body.</p>
<p><strong>Question 10</strong></p>
<p>This informs the OIPC whether the project under consideration has been implemented or not.</p>
<p><strong>Question 11</strong><br />
This question aims to inform the public body which sections of the appendices to the POPA PIA template are relevant to their project as well as relevant resource expertise needed to assist the public body in completing the technical aspect of the PIA. The question also informs the OIPC what to consider regarding legislative requirements during the PIA review process as different projects may have unique compliance privacy and security issues to consider.</p>
<p>For projects that involve automated systems, section 7(3) of the M-Regulation states that a PIA must provide a level of detail commensurate with the complexity of the practice, program, project or service the PIA relates to. As such, the public body is required to also complete an Algorithm Impact Assessment (AIA). AIA is a tool used for identifying and addressing the risks and impacts of automated decision-making systems. Typically comprising of a set of questionnaires, the tool can be used to determine the impact level of an automated decision-making system including biases, human rights violations, ethical violations, marginalization and accessibility issues. The OIPC is in the process of developing an AIA tool. Once completed, it will be published on the <a href="https://oipc.ab.ca/">https://oipc.ab.ca</a> and a link to it will be added to the POPA PIA Template and this document. In the interim, the OIPC recommends that where a project involves automated systems, public bodies consult industry standard algorithm impact assessment guidelines in preparing and submitting their AIAs with their PIAs.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#">Back to top of the page</a></p>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="project-details"></a></p>
<h3>B. Details About the Project*</h3>
<p><strong>Question 12</strong><br />
This information assists the OIPC in understanding the project, its business rationale and the purpose or objective it intends to achieve for the public body. This question also informs the OIPC on why the collection, use and/or disclosure of personal information is required by the public body to meet the needs of the project. It is imperative that the public body provides sufficient detail on the project. In addition, in this question, the public body is required to provide technical information about the project under consideration. For instance, if the public body is a police agency implementing a body worn camera (BWC), the public body is expected to describe each body worn camera unit, its associated features and IT infrastructure that operates the BWC. Also, information on BWC storage media, how information is transferred from the camera to the IT network, where information is stored and who is responsible for managing the information, etc. must be provided. In other words, the entire lifecycle of the personal information involved must be addressed in all aspects of the project. The public body should also consider attaching technical details of the project as necessary.</p>
<p><strong>Question 13</strong></p>
<p>An electronic information system has specific technical requirements, such as logging and auditing, access controls, that need to be considered and assessed to ensure the access and privacy rights of Albertans are upheld, which is why we need this information.</p>
<p><strong>Question 14</strong></p>
<p>Other stakeholders’ involvement in a project may determine who is collecting, using or disclosing personal information in the project and as a result shed some light on how the public body ought to consider the legal authority for each stakeholder to collect, use and/or disclose personal information involved in the project.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#">Back to top of the page</a></p>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="privacy-management-program"></a></p>
<h3>C. Information About Your Privacy Management Program (PMP)*</h3>
<p><strong>Question 15</strong></p>
<p>Section 25(1) of POPA requires a public body to establish and implement a PMP and make it public or provide a copy of the PMP upon request pursuant to section 25(5). These requirements will come into effect on June 11, 2026. The public body’s policies and procedures must comply with the requirements of POPA and its regulations. The OIPC has developed guidance to assist public bodies in meeting their PMP obligations under POPA.</p>
<p>Not having a PMP leaves a gap in the completion of the PIA. This could potentially lead to non-compliance. It is important to provide the OIPC PMP file number of the public body’s most current PMP where applicable, as doing so saves the public body time and effort by referencing the already submitted PMP and avoids duplication. Also from a PIA review standpoint, it is relevant to review the PIA to assess the public body’s compliance with applicable legislation.</p>
<p><strong>For more information on PMPs please see the OIPC’s <a href="/popa/pmp/guide/" target="_blank" rel="noopener">Guidance for Public Bodies in Developing Privacy Management Programs</a>.</strong></p>
<p style="font-size: 0.9em; color: grey;"><a href="#">Back to top of the page</a></p>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="personal-information-authority-collection-use-disclosure"></a></p>
<h3>D. Identify Personal Information Involved and your Authority to Collect, Use or Disclose the Information*</h3>
<p><strong>Question 16</strong></p>
<p>This question ensures that the public body identifies the personal information that it intends to collect, use or disclose in the project. In doing so, the public body would have to start thinking about its legal authority to collect, use or disclose personal information and whether those authorities align with sections 4, 12 and 13 of POPA, respectively. In addition, the public body is required to consider the limitation principle under sections 12(4) and 13(4) of POPA. Under section 12(4) the public body needs to explain how the use of personal information in the project is <strong>only to the extent necessary</strong> to enable the public body to carry out its identified purposes in a <strong>reasonable manner</strong><em>. </em>Similarly, under section 13(4) of POPA, the public body needs to explain how the public body public disclosure of personal information is <strong>only to the extent necessary</strong> to enable the public body to carry out its identified purposes in <strong>a reasonable manner</strong>. Personal information means recorded information about an identifiable individual. Some examples of personal information include an individual’s name, home or business address, home or business email address, race, gender identity, fingerprints and financial history. For a complete listing of what is considered personal information, please see <strong>section 1(q) of POPA.</strong></p>
<p><strong>Question 17</strong><br />
Section 5 of POPA provides for the manner of collection of personal information. It is important that the collection of personal information for this project meets the requirements of section 5 of POPA. In this question, the public body needs to consider and explain how section 5(2) of POPA is complied with in this project if personal information is collected directly from the individuals who are the subjects of the information, including when and how a collection notice is provided to those individuals. In particular, the public body needs to explain whether section 5(2) of POPA applies to its project and how the public body complies with it.</p>
<p><strong>Question 18 </strong><br />
While there are legal authorities for public bodies in POPA to use or disclose personal information, there are situations where a public body may rely on individuals’ consent to use or disclose their personal information. Such consent must meet the prescribed requirements of section 2 of the Protection of Privacy Regulation (“the Regulation”). That is, the consent process for the project needs to clearly explain whether consent is obtained electronically or manually. Where consent is collected electronically, the public body should state how individuals give their consent. While a consent form is the implementation of the above consent requirements, public bodies need to have policies and procedures in place to collect and manage consent.</p>
<p><strong>Question 19 </strong><br />
There are circumstances where personal information can be collected indirectly, which means the collection comes from a source that is not the person whom the information is about. If that is the case in this project, this question gives the public body the opportunity to describe why, and how personal information is collected indirectly.</p>
<p><strong>Question 20</strong> – An information flow diagram is not the same as a business flow or a network diagram. An information flow diagram identifies the flow of specific pieces of information from one entity to another and when the entities involved are collecting, using or disclosing the information in question. It has arrows indicating the direction of flow of information between the entities. In some cases, information flow could be bi-directional between two entities. The information flows help in identifying the legal authority for collecting, using or disclosing personal information by each entity involved in the flow of the information. A network diagram depicts an IT network infrastructure or network segment and its associated components which may include, servers, routers, firewalls, databases, etc. A business flow diagram is a step-by-step process on how a specific business task is accomplished.</p>
<p><strong>Question 21 </strong><br />
No additional explanation needed.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#">Back to top of the page</a></p>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="access-correction-accuracy-retention-disposition"></a></p>
<h3>E. Access, Correction, Accuracy, Retention, Disposition*</h3>
<p><strong>Question 22</strong></p>
<p>This question is asked to remind a public body to ensure it takes steps to make individuals aware of their rights to request access to their personal information that is in the custody or under the control of the public body. Usually, public bodies should be transparent by making their access to information request processes public, with specific contact information of a person or business unit that handles access to information requests. In certain circumstances, public bodies should make proactive disclosure to minimize the number of access requests they get.</p>
<p><strong>Question 23</strong><br />
While this may be addressed as part of the PMP, public bodies are required to have access request policies in place to ensure that Albertans can exercise their rights to access their information. Such a policy governs how a public body implements its access to personal information processes to ensure consistency in processing such requests.</p>
<p><strong>Question 24</strong></p>
<p>This question is asked to ensure a public body has established a process to make individuals aware of their right to request correction to their personal information involved in the project. Usually, public bodies should be transparent by making their correction to personal information request processes public with specific contact information of a person or business unit that handles correction requests.</p>
<p><strong>Question 25</strong></p>
<p>While this may be addressed as part of the PMP, public bodies are required to have correction request policies in place that govern how Albertans can exercise their rights to correct their personal information and to ensure consistency in processing such requests.</p>
<p><strong>Question 26</strong></p>
<p>Public bodies have an obligation to make every reasonable effort to ensure that information about individuals that the public body relies on to make decisions that affect those individuals is accurate and complete.</p>
<p><strong>Question 27</strong></p>
<p>It is important to understand how the public body complies with section 6(b) of POPA for this project by ensuring that there exists a retention and disposition policy for information used in this project to govern how long personal information must be retained.</p>
<p><strong>Question 28</strong></p>
<p>Implementing record retention and disposition policies into information systems ensures that information that has reached its retention period is automatically flagged by the system for disposition instead of it being a manual process that is prone to inconsistencies and human errors resulting in information being retained past its retention period. Information held longer than its retention period poses a risk of loss, unauthorized access, or unauthorized disclosure.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#">Back to top of the page</a></p>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="protection-of-information"></a></p>
<h3>F. Protection of Information*</h3>
<p><strong>Question 29 </strong><br />
Information security classification means assigning security levels to information that are based on the sensitivity of the information in question. Classifying the information based on the public body’s information classification standard assists the public body to protect the information by implementing security controls that are proportionate to the classification levels of the information. Each public body is required to implement an information security classification system to assist the public body to classify information that it collects, uses or discloses as required under section 2(1) of the M-Regulation.<span style="color: #ff0000;"> Public bodies must meet this requirement before submitting their PIAs to the Commissioner for review.</span></p>
<p><strong>Question 30</strong><br />
The “reasonable security arrangements” standard set out in section 10(1) of POPA are determined by the security classification of the personal information involved in the project. If the security classification is high, then the security measures, i.e., the administrative, technical and physical safeguards, must be correspondingly high. Whereas, if the security classification is low, then fewer measures may suffice to meet the standard. <span style="color: #ff0000;">Section 6(2(b) of the M-Regulation requires public bodies having custody or control of a high volume of personal information or highly sensitive personal information to have documented safeguards</span>. POPA does not stipulate a threshold for “high volume” or “significant percentage of the population”. The interpretation of this section of the M-Regulation is contextual in relation to the project. Although Section 1 of the M-Regulation deems certain personal information to be highly sensitive (biometric and financial information, and personal information of minors and seniors), this list is not an exhaustive or exclusive list. Other types of personal information may be deemed to be highly sensitive in specific contexts.</p>
<ol>
<li>Administrative safeguards govern the implementation of other protective measures and ensures that such measures are implemented consistently during the life cycle of the project. Consistent implementation of protective measures reduces vulnerabilities usually caused by lack of good security governance.</li>
<li>No additional explanation needed.</li>
<li>The technical safeguards should directly protect the information involved in the project, not just the general technical safeguards implemented by the public body. For instance, access controls should be specific for the project and describe how such controls ensure only authorized individuals have the right level of access to information involved in the project. In addition, any security assessments results such as vulnerability assessment and penetration tests conducted specific to the project should be included as part of the public body’s PIA submission, as such results provide additional information on risks that were identified and how they were resolved as part of the project implementation.</li>
</ol>
<p><strong>Question 31</strong><br />
Continuous assessment and monitoring of safeguards assists the public body in ensuring that the safeguards are working as expected. For instance, employees should be required to take refresher trainings on privacy and security. Also, monitoring controls such as intrusion detection and prevention systems should be implemented.</p>
<p><strong>Question 32 </strong><br />
Section 6(1)(b) of the M-Regulation requires public bodies to establish policies and procedures that ensures they comply with the public body’s obligations under POPA such as responding to incidents (unauthorized access to, unauthorized disclosure of or loss of personal information). Section 6(1)(d) of the M-Regulation also requires public bodies to train their employees about the employee’s obligations under POPA. As part of that training, public bodies should make their employees aware of their obligations under POPA, which includes notifying the public body of incidents under section 10(2) of POPA.</p>
<p><strong>Question 33 </strong><br />
Access control policies ensure that access to the Electronic Information System (EIS) is consistently managed, including requests to access the EIS, account provisioning and revocation of account when an employee no longer needs access to the EIS. Through enforceable access control policies, a public body will be able to ensure that an employee only gains access to the information they require to perform their job functions.</p>
<p><span style="color: #ff0000;">If the project involves a high volume of personal information or highly sensitive personal information, a documented access control policy must be attached to the PIA submission.</span> POPA does not stipulate a threshold for “high volume” or “significant percentage of the population”. The interpretation of this section of the M-Regulation is contextual in relation to the project. Although Section 1 of the M-Regulation deems certain personal information to be highly sensitive (biometric and financial information, and personal information of minors and seniors), this list is not an exhaustive or exclusive list. Other types of personal information may be deemed to be highly sensitive in specific contexts.</p>
<p><strong>Question 34</strong><br />
Having an access requests process for the EIS ensures access requests are submitted by appropriate business heads for approval by the appropriate authority prior to processing and account provisioning. Each request should identify the permission level for employees requiring access and ensure the permission level gives the employee only the right access required for the specific job tasks.</p>
<p><strong>Question 35</strong><br />
All access requests to the EIS must be approved by the appropriate level of management, to ensure that employees who access the EIS are authorized to do so.</p>
<p><strong>Question 36 </strong><br />
It is important to ensure that access to the EIS is revoked in a timely manner when employees no longer need such access, to prevent potential unauthorized access to personal information. It is also to ensure dormant accounts are removed from the system, as such accounts pose security risks.</p>
<p><strong>Question 37</strong><br />
The access control table provides clarification on the access privileges of the users of the system including the kind of actions each user can take and what information the user can access, and how the permission limits users only to the information they need to perform their job tasks or functions. The public body’s information technology (IT) department plays a significant role in implementing access controls in systems and will be a good resource for assisting in completing this table.</p>
<p><strong>Question 38</strong><br />
Logging and auditing policies ensure that information systems are built and implemented to capture audit logs of activities that are occurring within the system, including unauthorized activities listed under section 10(2) of POPA. Such a policy also ensures proactive auditing of information systems to detect and manage incidents defined under section 10(2) of POPA.</p>
<p><span style="color: #ff0000;">If the project involves a high volume of personal information or highly sensitive personal information, a documented auditing and logging policy must be attached to the PIA submission.</span> POPA does not stipulate a threshold for “high volume” or “significant percentage of the population”. The interpretation of this section of the M-Regulation is contextual in relation to the project. Although Section 1 of the M-Regulation deems certain personal information to be highly sensitive (biometric and financial information, and personal information of minors and seniors), this list is not an exhaustive or exclusive list. Other types of personal information may be deemed to be highly sensitive in specific contexts.</p>
<p><strong>Question 39</strong><br />
Being able to capture and maintain audit logs of personal information means that the public body can identify and investigate unauthorized access to, unauthorized disclosure of, or loss of personal information in order to meet its obligations under section 10(2) and (3) of POPA and sections 4(3), (4) and (5) of the M-Regulation.</p>
<p><strong>Question 40</strong><br />
Proactive auditing is a way of monitoring access to an EIS to detect and respond to potential unauthorized access to, unauthorized disclosure of, or loss of personal information.</p>
<p><strong>Question 41</strong><br />
No additional explanation needed.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#">Back to top of the page</a></p>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="service-providers"></a></p>
<h3>G. Service Providers*</h3>
<p><strong>Question 42 </strong><br />
Given that service providers, which includes corporations, are considered employees under section 1(h) of POPA, a public body is accountable for the service provider’s compliance with POPA. Therefore, it is important for the public body to consider privacy issues that may involve the service provider’s role in relation to any personal information it may collect, use, disclose or access as an “employee” of the public body.</p>
<p><strong>Question 43</strong><br />
If a service provider will have access to personal information as part of providing its services to the public body or if it will collect, use or disclose personal information on behalf of the public body, the public body must ensure it complies with POPA as it relates to these activities. Therefore, the contract with the public body must address all related compliance issues such that through the implementation of the terms of the contract agreed to between the public body and the service provider, the public body has confidence that the service provider will comply with POPA in providing its services concerning any personal information involved in service delivery. A service provider must also protect the personal information it has in its custody, or that it is otherwise responsible for, according to the terms of the contract which must ensure compliance with section 10(1) of POPA, i.e., the security of the personal information must at minimum align with the public body’s security safeguards for this type of information. The agreement must also set out how the service provider interacts with the public body’s privacy management program. Without an agreement that addresses all these compliance related issues, there is a risk of non-compliance by the public body as a result of the activities of its service provider. Consequently, as part of the PIA review, any agreement entered into with a service provider must be reviewed by our office as part of the PIA review process. This is because the service provider agreement plays a central role in determining whether the service provider-employee is positioned within the terms of the contract to comply with POPA.<span style="color: #ff0000;"> <strong>Submitting a copy of the agreement with your PIA is a mandatory requirement</strong>.</span></p>
<p>Section 7(6) of the M-Regulation provides that where a public body is required under POPA or the Regulation, to enter into an agreement relating to the practice, program, project or service the PIA relates to, the portions of the agreement relating to the protection of privacy must be submitted to the Commissioner together with the PIA. Under section 1(1)(h) of POPA, an “employee” includes those providing a service to the public body “under contract.” The contract with the service provider would demonstrate the public body’s authority under POPA to share personal information with the service provider or otherwise permit it to collect, use or disclose personal information on its behalf. Therefore, it is an essential part of the PIA submission.</p>
<p><strong>Question 44</strong><br />
A public body may delegate responding to access to information request responsibility to its service provider. However, the public body must ensure that its contractual agreement with the service provider adequately addresses access to information request processing and describe how the service will be provided to the public body.</p>
<p><strong>Question 45<br />
</strong>To ensure the public body is able to meet its obligations under POPA the public body must ensure it maintains control of the personal information involved in the project where this information is collected or accessible by the service provider. This is required to ensure the personal information remains subject to POPA and the <em>Access to Information Act</em> (ATIA) to preserve the rights of individuals concerning their personal information under these Acts. Failure to retain control of the personal information amounts to a disclosure, which is prohibited under POPA without authority for said disclosure. This means, that there is a high likelihood of a breach if a public body fails to retain control of personal information in an agreement and provides personal information to the service provider for the services. For this question, if the public body’s answer is yes, the public body must identify specific sections of its contract with the service provider that ensures the public body maintains control of the information for the project. <span style="color: #ff0000;"><strong>Public</strong> <strong>bodies must meet this requirement before submitting their PIAs to the Commissioner for review.</strong></span></p>
<p><strong>Question 46</strong><br />
For this question, refer to the information set out in the commentary above for Question 43.</p>
<p><strong>Question 47</strong><br />
Service providers are considered employees of the public body and should have appropriate training prior to accessing personal information and continue to have refresher training for the duration of their contract. Section 6(1)(d) of the M-Regulation.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#">Back to top of the page</a></p>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="project-risk-assessment-mitigation"></a></p>
<h3>H. Project Risk Assessment and Mitigation*</h3>
<p>This section of the PIA template requires public bodies to identify the project’s privacy and security risks and associated administrative, technical and physical safeguards that address these risks. This completion guide provides some <strong>example descriptions</strong> of the types of risks identified in the POPA PIA Template risk table.</p>
<p><strong>Question 48</strong><br />
Conducting security vulnerability assessments (VA) during the implementation of an information system that processes identifying information ensures exploitable security vulnerabilities or weaknesses are identified, prioritized and addressed in a timely manner<strong>.</strong> A penetration test (pentest) is performed to test if security controls are working as expected. VA and pentest are part of an overall risk management strategy and should be conducted periodically. Other security assessments can also be conducted and included in the PIA. Providing copies of these assessments with your PIA goes on to demonstrate the public body’s commitment to protect personal information pursuant to section 10 of POPA.</p>
<p><strong>H1. General Risks (to be completed for all PIA submissions) *</strong></p>
<p><strong>Risk 1</strong><br />
E.g., personal information is collected by the public body and/or the information system is configured to accept personal information that does not relate directly to and is necessary for the project. Systems built for the global market have default configurations that allow for the collection of vast amounts of personal information. Such systems should be hardened by disabling data fields that are not required for specific project implementations to manage the risk of over collection.</p>
<p><strong>Risk 2</strong><br />
E.g., information that was collected for this project is used for a purpose not directly related to the project, contrary to section 12 of POPA.</p>
<p><strong>Risk 3</strong><br />
E.g., information that was collected for this project is disclosed contrary to section 13 of POPA. Personal information could be intercepted while in transit due to lack of appropriate security control, leading to unauthorized disclosure. There are also situations where the public body or its employees disclose personal information for secondary purposes without legal authority. Unauthorized disclosure could also be via insecure disposal of information processing media.</p>
<p><strong>Risk 4</strong><br />
E.g., information collected for this project is accessed by unauthorized users or malicious software due to lack of reasonable safeguards, contrary to section 10(1) of POPA.</p>
<p><strong>Risk 5</strong><br />
E.g., information collected for this project is lost as a result of human error or malicious software attacks, such as ransomware, which renders information inaccessible. This may lead to the inability of the public body to perform its business functions or respond to requests from individuals to access their information. Disgruntled employees can also deliberately destroy personal information. Also, changes to IT systems without proper IT change management process and lack of disaster recovery strategy could lead to loss of information.</p>
<p><strong>Risk 6</strong><br />
E.g., A public body loses control of electronic and/or paper-based information as a result of insufficient or absence of contractual agreements with a third-party service provider. Loss of custody may involve the theft of paper records or a server that contains personal information in the public body’s premises.</p>
<p><strong>Risk 7</strong><br />
E.g., information collected for this project is inadvertently or maliciously destroyed contrary to POPA and the policies of the public body, such that the public body is unable to respond to access to information requests or carry out its business functions. Lack of an enforceable record retention and disposition policy could also lead to unauthorized destruction.</p>
<p><strong>Risk 8</strong><br />
E.g., information collected for this project is rendered inaccurate, or incomplete, contrary to section 6(a) of POPA. This may occur if employees are not adequately trained on good data entry practices or if system changes do not follow industry standard change management processes or information is not reasonably protected from unauthorized modification.</p>
<p><strong>Risk 9</strong><br />
E.g., personal information collected for this project is retained contrary to section 6(b) of POPA or the project retention procedures as established by the public body (section 7(2)(f) of the M-Regulation). In some cases, this may be a consequence of the absence of a record retention policy or lack of enforcement of an existing record retention policy.</p>
<p><strong>Risk 10</strong><br />
E.g., individuals’ information is collected for this project without providing proper notice at the time of collection, contrary to section 5(2) of POPA. Notice fails to align with the manner of collection and the requirement of POPA such as collecting personal information directly from individuals by telephone but providing notice via the public body’s website.</p>
<p><strong>Risk 11</strong><br />
E.g., the public body fails to make individuals aware of their rights to request access to or correction of their personal information, and how to make such requests.</p>
<p><strong>Risk 12</strong><br />
E.g., lack of or inadequate privacy breach management means that privacy breaches will not be consistently detected and managed. In addition, affected individuals of privacy breaches/incidents, the Commissioner and the Minister will not be notified in a timely manner as required under section 10(2) of POPA.</p>
<p><strong>Risk 13</strong><br />
E.g. without assessing third parties’ controls, the public body is unable to attest whether the third party reasonably protects personal information in respect of the services provided to the public body in compliance with POPA and its regulations. As a result, the public body could fail to meet its obligations to protect personal information under section 10 of POPA.</p>
<p><strong>Risk 14</strong><br />
E.g. personal information collected for this project for purposes under section 12 of POPA is being used for secondary purposes (e.g. to train artificial intelligence (AI) or by the third party for quality improvement purposes) without authority.</p>
<p><strong>Risk 15 </strong><br />
E.g., inadequate or absence of logging capabilities of systems limits the ability of the public body to identify and manage privacy breaches of personal information. In addition, it limits the Commissioner’s ability to investigate access to personal information violations including investigating potential offences under section 60 of POPA.</p>
<p><strong>Risk 16</strong><br />
E.g., failure to have human oversight and validation measures for information systems could potentially lead to data accuracy and reliability issues.</p>
<p><strong>Risk 17</strong><br />
Failing to conduct a security vulnerability assessment means that the public body may not be aware of exploitable security vulnerabilities that exists in its environment and as a result, would not take steps to address those security vulnerabilities in a timely manner thereby exposing personal information to potential compromise.</p>
<p><strong>H2. Risks Associated with Cloud Computing</strong></p>
<p><strong>Risk 1</strong><br />
E.g. In a multitenant cloud environment, compromise of one environment could lead to the compromise of other environments due to inappropriate segregation and isolation of cloud resources. In addition, there could potentially be information leakage between environments leading to unauthorized disclosure of personal information.</p>
<p><strong>Risk 2 </strong><br />
E.g., lack of formalized contractual arrangements that specifically consider POPA requirements could lead to loss of custody and/or control of personal information stored in the cloud environment as well as gaps in security management and non-compliance with POPA.</p>
<p><strong>Risk 3</strong><br />
E.g. the absence of clear and good governance on privacy and security of personal information could result in gaps in privacy and security management leading to non-compliance with POPA.</p>
<p><strong>Risk 4</strong><br />
E.g., POPA requirements including privacy breach management is not addressed in the contractual agreement between the public body and the cloud provider, which could lead to non-compliance with section 10(2) of POPA.</p>
<p><strong>Risk 5</strong><br />
E.g. a cloud provider goes out of business or declares bankruptcy, making it impossible for the public body to access personal information in the provider’s environment.</p>
<p><strong>Risk 6</strong><br />
E.g., a cloud provider uses proprietary technologies, making it difficult for the public body to migrate services to another provider, locking-in the public body. A public body may want to change provider if the existing provider suffers multiple security incidents that have caused privacy breaches.</p>
<p><strong>Risk 7</strong><br />
E.g., the USA PATRIOT Act and Cloud Act allow the US government to access personal information held by US-based companies in the US (USA PATRIOT Act) and anywhere in the world (Cloud Act).</p>
<p><strong>Risk 8</strong><br />
E.g., a cloud provider uses personal information for their own purposes, such as de-identifying personal information and/or using the personal information for training their AI models.</p>
<p><strong>Risk 9</strong><br />
E.g., the cloud provider sells personal information or fails to securely sanitize information processing media prior to re-use or disposition leading to unauthorized disclosure of the personal information.</p>
<p><strong>Risk 10</strong><br />
E.g. lack of reasonable authentication and authorization controls such as failures to implement and enforce multifactor authentication could potentially lead to unauthorized access to personal information.</p>
<p><strong>Risk 11</strong><br />
E.g. weak or lack of encryption could lead to unauthorized access to and disclosure of personal information in transit and at rest.</p>
<p><strong>H3. </strong><strong>Risks Associated with Research</strong></p>
<p><strong>Risk 1</strong><br />
E.g., the public body fails to assess whether non-identifying data can be used to accomplish the research purpose prior to disclosing individually identifying personal information or has not obtained the Commissioner’s approval for such disclosure as required under section 15(a) of POPA.</p>
<p><strong>Risk 2 </strong><br />
E.g., the public body fails to perform a public interest analysis prior to disclosing personal information for research or statistical purposes where the information is involved in data matching.</p>
<p><strong>Risk 3</strong><br />
E.g. the public body fails to conduct an assessment of risk of harm prior to disclosing personal information for research or statistical purposes where the information is involved in data matching.</p>
<p><strong>Risk 4</strong><br />
E.g., the public body has not approved conditions relating to security and confidentiality, the removal or destruction of individual identifiers and prohibition of subsequent use or disclosure of the information without express authorization of the public body.</p>
<p><strong>Risk 5 </strong><br />
E.g., a research agreement has not been signed prior to the public body disclosing personal information or the research agreement in place does not meet the requirements of section 15(d) of POPA and section 4 of the Regulation.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#">Back to top of the page</a></p>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="appendix-a-data-matching"></a></p>
<h3>Appendix A. Data Matching</h3>
<p><em>Only complete this section if the project involves data matching as defined under section 1(f) of POPA.</em></p>
<p><strong>Question 1</strong><br />
No additional explanation needed.</p>
<p><strong>Question 2</strong><br />
There are specific circumstances in which a public body may <em>c</em>arry out data matching as listed in section 17(1) of POPA. Any prescribed purposes will be found in the regulation otherwise such a purpose does not exist.</p>
<p><strong>Question 3</strong><br />
No additional explanation needed.</p>
<p><strong>Question 4</strong><br />
Prior to collecting personal information from another public body for the purpose of data matching, a public body must first create a governance structure that clearly identifies the responsibilities and accountability of each public body involved in carrying out the data matching to ensure access and privacy rights of Albertans are protected. The governance structure must clearly identify the responsibilities and accountability of each public body as it relates to:</p>
<ol>
<li>the custody and control of personal information,</li>
<li>the correction of errors or omissions in an individual’s personal information,</li>
<li>breach notifications, and</li>
<li>other duties imposed by the Act.</li>
</ol>
<p><span style="color: #ff0000;">Public bodies must meet this requirement before submitting their PIAs to the Commissioner for review.</span></p>
<p><strong>Question 5</strong> – The data matching agreement is required to ensure clarity regarding the roles and responsibilities of each public body involved in the data matching project as well as legislative compliance. The minimum requirements of the agreement are as follows:</p>
<p>the agreement must:</p>
<ol>
<li>identify</li>
</ol>
<p>(i) the authority under which the public body will carry out data matching, and</p>
<p>(ii) the purpose for which the public body will carry out data matching,</p>
<ol>
<li>identify each public body’s role and how each public body’s role relates to the purpose of the data matching to which the addendum relates,</li>
<li>describe how the personal information will be securely transmitted, matched or linked by the public bodies,</li>
<li>identify whether the data derived from the personal information used for data matching will be disclosed to the public body from whom the personal information was collected,</li>
<li>identify each public body’s responsibilities respecting reasonable security arrangements, including respecting administrative safeguards, physical safeguards and technical safeguards, for the protection of personal information against such risks as unauthorized access, collection, use, disclosure or destruction, and</li>
<li>establish a clear governance structure respecting the responsibilities and accountability of each public body.</li>
</ol>
<p><strong>Question 6</strong></p>
<p>This question requires that a public body participating in data matching identifies collections, uses or disclosures of personal information that only apply to that public body. In doing so, the public body is required, by law, to have an addendum for the unique collections, uses or disclosures to accompany the join PIA submitted for the project.</p>
<p><strong>Question 7 </strong><br />
No additional explanation needed.</p>
<p><strong>Question 8</strong></p>
<p><strong>Risk Assessment and Mitigation &#8211; Risks Associated with Data Matching. </strong></p>
<p><em>This Completion Guide will provide some examples of the description of the types of risks identified in the Risk Assessment and Mitigation table for risks related to data matching. </em></p>
<p><strong>Risk 1</strong></p>
<p>E.g. section 7(2)(g) of the M-Regulation requires the establishment of a <span style="color: #ff0000;">clear governance structure respecting the responsibilities and accountability</span> of two public bodies involved in data matching if one public body is collecting personal information from another public body for the purpose of data matching.</p>
<p><strong>Risk 2</strong></p>
<p>E.g., this risk assessment is to ensure that section 17 of POPA is complied with, given that this section prohibits public bodies, except for the Office of Statistics and Information, from collecting personal information directly from an individual for the purpose of data matching.</p>
<p><strong>Risk 3</strong><br />
E.g., section 6 of POPA requires a public body to make every reasonable effort to ensure that an individual’s personal information is accurate and complete before using such information to make a decision that directly affects that individual.</p>
<p><strong>Risk 4</strong><br />
E.g., as required by section 6 of POPA, the quality of the source data will play a significant part in the quality of the resulting data from data matching, so it is important for public bodies to ensure that the quality of the source is validated prior to conducting the data matching.</p>
<p><strong>Risk 5</strong><br />
E.g., data matching activities normally take place in a test environment. The resulting data is then migrated to the production environment. Therefore, the test environment security controls should be proportionate to the security classification of the data involved in data matching. Failure to implement reasonable and proportionate security arrangements to protect personal information within the public body’s data matching environment, exposes it to potential incidents under section 10 (2) of POPA especially given that a single test environment may be used for multiple projects and thus accessed by various users.</p>
<p><strong>Risk 6</strong><br />
E.g. this is about validating the final product. The public body should ensure that the final product is the desired outcome, and that no data errors are in the resulting data set, or if errors are identified, that they are addressed. (section 6 of POPA).</p>
<p><strong>Risk 7</strong><br />
E.g., this is about securely cleaning the test environment that was used for data matching by securely deleting personal information from that environment before it is used for other purposes or used by other users to prevent potential unauthorized access to personal information.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#">Back to top of the page</a></p>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="appendix-b-common-integrated-program-service"></a></p>
<h3>Appendix B. Common or Integrated Program or Service</h3>
<p><strong>Question 1</strong><br />
A common or integrated program or service must comply with specific requirements under POPA and the M-Regulation. It is therefore important for the public body to carefully consider those requirements prior to implementing new common or integrated program or service or making changes to an existing common or integrated program or service.</p>
<p><strong>Question 2</strong></p>
<p>Since common or integrated program or services requires each public body to identify its responsibilities and accountabilities identifying each public body assist in determining the areas of responsibility and accountability for each public body.</p>
<p>For question 2c, if the PIA is for a change in an existing common or integrated program or service, providing an existing PIA file number assists the OIPC in making reference to relevant information in that file during the review of the current PIA as the public body focuses on addressing privacy and security risks associated with the change. The public body may also choose to use the existing Microsoft Word copy of the existing PIA to identify areas that have changed by striking the outdated information and entering updated or new information in a different-colour text.</p>
<p><strong>Question 3</strong></p>
<p>This question is about making sure that there is a governance structure in place for the common or integrated program or services. This governance structure <em>(a documented set of rules and processes that identify the roles, responsibilities and accountability for each public body participating in the integrated program or service), </em>that clearly identifies responsibilities and accountabilities <span style="color: #ff0000;">must be in place prior to the PIA being submitted to the Commissioner for review.</span></p>
<p>The governance structure must clearly identify the responsibilities and accountability of each public body as it relates to:</p>
<ol>
<li>the custody and control of personal information,</li>
<li>the correction of errors or omissions in an individual’s personal information,</li>
<li>breach notifications, and</li>
<li>other duties imposed by the Act.</li>
</ol>
<p><strong>Question 4</strong></p>
<p>This agreement is required to ensure each public body involved in a common or integrated program or service independently comply with POPA<strong>. </strong>The minimum requirements for such an agreement include:</p>
<ol>
<li>identify the purpose of the common or integrated program or service,</li>
<li>identify each public body’s roles and responsibilities respecting the common or integrated program or service and how the roles and responsibilities of each public body relate to the purpose of the common or integrated program or service, identify each public body’s responsibilities under the Act,</li>
<li>establish rules respecting reasonable security arrangements, including respecting administrative safeguards, physical safeguards and technical safeguards, for the protection of personal information against such risks as unauthorized access, collection, use, disclosure or destruction, and</li>
<li>establish a clear governance structure respecting the responsibilities and accountability of each public body.</li>
</ol>
<p><strong>Question 5</strong></p>
<p>This question requires that a public body participating in a common or integrated program or service identifies collections, uses or disclosures of personal information that only apply to that public body. In doing so, the public body is required, by law, to have an addendum PIA for the unique collections, uses or disclosures to accompany the joint PIA submitted for the project.</p>
<p><strong>Question 6</strong></p>
<p><strong>Risk Assessment and Mitigation &#8211; Common or Integrated Program or Service Risks</strong></p>
<p><em>This completion guide will provide some examples of the description of the types of risks identified in the Risk Assessment and Mitigation table for common or integrated program or service risks</em></p>
<p><strong>Risk 1</strong><br />
E.g., governance structure including policies are not in place or are inadequate leading to inconsistencies in the management of the program that creates exploitable privacy and security vulnerabilities.</p>
<p><strong>Risk 2</strong><br />
E.g., policies are not in place or are not clear on accountability for different aspects of the program including accountability for privacy.</p>
<p><strong>Risk 3</strong></p>
<p>E.g., the responsibilities of each public body involved in the common or integrated program including for privacy management are not clearly defined.</p>
<p><strong>Risk 4</strong></p>
<p>E.g., the information security classification for one or more public bodies do not align with the sensitivity of information, leading to gaps in the protection of personal information.</p>
<p><strong>Risk 5</strong><br />
E.g., the public bodies involved fail to make individuals aware of how they can exercise their access and privacy rights under applicable POPA and ATIA.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#">Back to top of the page</a></p>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="appendix-c-automated-systems-innovative-technology"></a></p>
<h3>Appendix C. Use of Automated Systems or Other Forms of Innovative Technology</h3>
<p><strong>Question 1</strong></p>
<p>An Algorithm Impact Assessment (AIA), is a risk assessment or evaluation process that determines the impact of an automated system on individuals whose personal information is collected, used or disclosed in the use of automated systems such as artificial intelligence or other forms of innovative technology. Section 7(3) of the M-Regulation requires that a PIA contains a level of detail commensurate with the complexity of the practice, program, project or service the PIA relates to. As such, the public body is required to also complete an AIA. The OIPC is in the process of developing an AIA tool, which will be published on the OIPC website and a link included in the POPA PIA template and this document. In the interim, the OIPC recommends that where a project involves automated systems, public bodies consult industry standard algorithm impact assessment guidelines in preparing and submitting their AIAs with their PIAs.</p>
<p><strong>Question 2</strong></p>
<p><strong>Risks Associated with the use of Automated Systems or </strong><strong>other forms of innovative technology.</strong></p>
<p><strong>Risk 1</strong><br />
E.g. failure to maintain custody or control of personal information ingested by an automated system due to lack of controls to securely and automatically delete information from the automated system.</p>
<p><strong>Risk 2 </strong><br />
E.g. lack of or insufficient automated systems governance policies and procedures leads to inconsistent implementation and use of automated systems, resulting in automated systems-related vulnerabilities and privacy compliance issues.</p>
<p><strong>Risk 3</strong><br />
E.g. automated systems such as artificial intelligence, are known to hallucinate by fabricating results or outputs. Lack of monitoring including lack of oversight of AI systems leads to failures to detect and address hallucination issues.</p>
<p><strong>Risk 4</strong><br />
E.g. Using poor quality and unreliable training data leads to issues with automated systems results including hallucination. In addition, using training data that is not an accurate representation of the population where the automated systems will be deployed could potentially lead to inaccurate results and bias.</p>
<p><strong>Risk 5</strong><br />
E.g. if inputs in automated systems are not validated and protected, such inputs can be manipulated prior to processing by the automated system. This makes input vulnerable to tampering and the automated system vulnerable to faulty results.</p>
<p><strong>Risk 6</strong><br />
E.g., understanding whether the automated system model is static or dynamic, it may be difficult to implement the right monitoring mechanism for the models. For instance, while dynamic models continuously learn from new data sets in process, a static model is as good as its last update.</p>
<p><strong>Risk 7</strong><br />
E.g., Underfitting an automated system model with its training data means that the automated system model is trained to be too broad in its generalization making the model prone to false positives when processing new data.</p>
<p><strong>Risk 8</strong><br />
E.g., Overfitting an automated system model with its training data means that the automated system model is trained too closely aligned with its training data, leading to lack of generalization by the model and making the model prone to false negatives when it processes new data.</p>
<p><strong>Risk 9</strong><br />
E.g., misconfiguration of an automated system is a security vulnerability that could be exploitable, leading potential to unauthorized access to or disclosure of personal information.</p>
<p><strong>Risk 10</strong><br />
E.g., lack of processes for individuals to be made aware of and appeal decisions made by automated systems could infringe on individuals’ access and privacy rights.</p>
<p><strong>Risk 11</strong> – E.g., insufficient logging and auditing means that the activities of the automated system cannot be reasonably monitored to ensure it is working as expected or to detect potential compromise of the system.</p>
<p><strong>Risk 12 </strong><br />
E.g., lack of monitoring of the automated system based on established policies and processes means that issues with the functioning of the automated system cannot be detected and addressed in a timely manner.</p>
<p><strong>Risk 13</strong><br />
E.g., without conducting a vulnerability assessment means that exploitable vulnerabilities associated with an automated system cannot be identified and addressed. A copy of the results of the assessment should form part of the PIA to demonstrate the public body’s commitment to protect personal information pursuant to section 10 of POPA.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#">Back to top of the page</a></p>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="appendix-d-pia-cover-letter"></a></p>
<h3>Appendix D. PIA Cover Letter *</h3>
<p>While the head of a public body may assign privacy responsibilities to other individuals within the public body, the head of the public body is ultimately accountable for meeting the public body’s obligations under POPA. To this end, the PIA must include a cover letter signed by the head of the public body.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#">Back to top of the page</a></p>

		</div>
	</div>

<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="appendix-e-pia-submission-checklist"></a></p>
<h3>Appendix E. PIA Submission Checklist *</h3>
<p>This checklist is there to ensure the public body reviews its PIA and ensures all sections of the PIA have been considered, relevant sections completed, and all supporting document included in the PIA submission.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#">Back to top of the page</a></p>

		</div>
	</div>
<br />

	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
March 2026</p>

		</div>
	</div>
<br />

<table id="tablepress-2-no-3" class="tablepress tablepress-id-2">
<tbody class="row-striping">
<tr class="row-1">
	<td class="column-1"><p><strong>Disclaimer</strong><br><br />
This document is not intended as, nor is it a substitute for, legal advice, and is not binding on the Information and Privacy Commissioner of Alberta. Responsibility for compliance with the law (and any applicable professional or trade standards or requirements) remains with each organization, custodian or public body. All examples used are provided as illustrations. The official versions of the laws <a href="https://oipc.ab.ca/legislation/" target="_blank" rel="noopener">the OIPC oversees</a> and their associated regulations should be consulted for the exact wording and for all purposes of interpreting and applying the legislation. The Acts are available on the website of <a href="https://www.alberta.ca/alberta-kings-printer.aspx" rel="noopener" target="_blank">Alberta King's Printer</a>.</p></td>
</tr>
</tbody>
</table>
<!-- #tablepress-2-no-3 from cache --></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Joint Statement: AI-Generated Imagery and the Protection of Privacy (2026)</title>
		<link>https://oipc.ab.ca/resource/joint-statement-on-ai-generated-imagery-and-the-protection-of-privacy-feb-23-2026/</link>
		
		<dc:creator><![CDATA[Elaine Schiman]]></dc:creator>
		<pubDate>Mon, 23 Feb 2026 21:37:16 +0000</pubDate>
				<guid isPermaLink="false">https://oipc.ab.ca/?post_type=resource&#038;p=17322</guid>

					<description><![CDATA[This joint statement was issued on February 23, 2026, with a total of 61 signatories from around the world, including&#8230;]]></description>
										<content:encoded><![CDATA[<p>This joint statement was issued on February 23, 2026, with a total of 61 signatories from around the world, including the Office of the Information and Privacy Commissioner of Alberta.</p>
<p>Click <a href="https://oipc.ab.ca/wp-content/uploads/2026/02/Joint-Statement-AI-Generated-Imagery-February-23-2026.pdf">here</a> to read the statement.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Practice Note &#8211; Returning/Destroying Records</title>
		<link>https://oipc.ab.ca/resource/practice-note-returning-destroying-records/</link>
		
		<dc:creator><![CDATA[Chris Stinner]]></dc:creator>
		<pubDate>Fri, 23 Jan 2026 16:43:27 +0000</pubDate>
				<guid isPermaLink="false">https://oipc.ab.ca/?post_type=resource&#038;p=17278</guid>

					<description><![CDATA[January 2026]]></description>
										<content:encoded><![CDATA[
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<h2><strong>Overview</strong></h2>
<p>Since taking office in August 2022, Commissioner Diane McLeod has been reviewing the practices of the Office of the Information and Privacy Commissioner (OIPC) when it comes to returning/destroying records that parties provide to the Commissioner when she is performing her legislative functions. From this review, it has become apparent that there are varying interpretations of in what circumstances records must be returned/destroyed, and therefore various practices under which some records have not been returned from files dating as far back as 15+ years.</p>
<p>Under section 56 of the <em>Freedom of Information and Protection of Privacy Act </em>(the FOIP Act), section 50 of the <em>Access to Information Act </em>(ATIA), section 29 of the <em>Protection of Privacy Act </em>POPA), section 88 of the <em>Health Information Act </em>(HIA) and section 38 of the <em>Personal Information Protection Act </em>(PIPA), the Commissioner may require that any record be produced to the Commissioner in conducting a Commissioner-led investigation or an inquiry and, except for PIPA, in giving advice and recommendations. Records pertaining to investigations, inquiries and giving advice and recommendations are case file records of the OIPC.</p>
<p>Section 56(5) of the FOIP Act, section 88(5) of the HIA and section 38(5) of PIPA require that the Commissioner return any record or any copy of any record produced. Section 50(5) of ATIA and section 29(5) of POPA require that the Commissioner return any original paper record produced and destroy any copy of any record, including any electronic record, produced.</p>
<p>This Practice Note sets out how the Commissioner now intends to deal with the statutory requirement to return/destroy records that are required to be produced to the Commissioner.</p>
<p>&nbsp;</p>
<h2><strong>Records that the Commissioner will return</strong></h2>
<p>The Commissioner has determined that the following requirements must be met for returning records:</p>
<ul>
<li>There must have been a Commissioner-led investigation or inquiry or a request to give advice and recommendations.</li>
<li>The Commissioner must have required the records to be produced.</li>
<li>The Public Body, Custodian or Organization that produced the records must still be in existence.</li>
</ul>
<p>If the foregoing requirements are met, the Commissioner will return the following records:</p>
<ul>
<li>original paper records produced by a Public Body under ATIA and POPA</li>
<li>records that were produced to the Commissioner in an electronic medium such as a CD or USB key</li>
</ul>
<p>&nbsp;</p>
<h2><strong>Records that the Commissioner will not return</strong></h2>
<p>The Commissioner has determined that records provided in settlement will not be returned, as there is no authority to require records to be produced.</p>
<p>The Commissioner has also determined that records that the Commissioner required to be produced in a Commissioner-led investigation or an inquiry or in giving advice and recommendations will also not be returned if any of the following circumstances are met:</p>
<ul>
<li>The records that were produced are paper records that are not original paper records.</li>
<li>The Public Body, Custodian or Organization that produced the records no longer exists.</li>
<li>The records are a copy that the Commissioner made for the investigation or inquiry.</li>
<li>The records are a copy that the Commissioner made and provided to the Court.</li>
<li>The records were produced in an electronic form and provided to the Commissioner by email or by electronic document drop box.</li>
</ul>
<p>Any records set out above that are not returned will be destroyed according to the <em>Records Retention and Disposition Schedule </em>(the <em>Schedule</em>) of the OIPC. The current <em>Schedule </em>of the OIPC requires that case file records be retained for 20 years and then destroyed.</p>

		</div>
	</div>

<p>January 2026</p>

<table id="tablepress-2-no-4" class="tablepress tablepress-id-2">
<tbody class="row-striping">
<tr class="row-1">
	<td class="column-1"><p><strong>Disclaimer</strong><br><br />
This document is not intended as, nor is it a substitute for, legal advice, and is not binding on the Information and Privacy Commissioner of Alberta. Responsibility for compliance with the law (and any applicable professional or trade standards or requirements) remains with each organization, custodian or public body. All examples used are provided as illustrations. The official versions of the laws <a href="https://oipc.ab.ca/legislation/" target="_blank" rel="noopener">the OIPC oversees</a> and their associated regulations should be consulted for the exact wording and for all purposes of interpreting and applying the legislation. The Acts are available on the website of <a href="https://www.alberta.ca/alberta-kings-printer.aspx" rel="noopener" target="_blank">Alberta King's Printer</a>.</p></td>
</tr>
</tbody>
</table>
<!-- #tablepress-2-no-4 from cache -->
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Letter from OIPC to Ministers of PPHS and HSHS regarding Bill 11 &#8211; December 1 2025</title>
		<link>https://oipc.ab.ca/resource/letter-from-oipc-to-ministers-of-pphs-and-hshs-regarding-bill-11-december-1-2025/</link>
		
		<dc:creator><![CDATA[Elaine Schiman]]></dc:creator>
		<pubDate>Mon, 01 Dec 2025 22:26:38 +0000</pubDate>
				<guid isPermaLink="false">https://oipc.ab.ca/?post_type=resource&#038;p=17186</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Joint Resolution: Protecting the privacy of children and youth through responsible use of educational technologies in the classroom (2025)</title>
		<link>https://oipc.ab.ca/resource/joint-resolution-protecting-the-privacy-of-children-and-youth-through-responsible-use-of-educational-technologies-in-the-classroom-2025/</link>
		
		<dc:creator><![CDATA[Elaine Schiman]]></dc:creator>
		<pubDate>Thu, 20 Nov 2025 16:57:01 +0000</pubDate>
				<guid isPermaLink="false">https://oipc.ab.ca/?post_type=resource&#038;p=17161</guid>

					<description><![CDATA[A joint resolution on protecting the privacy of children and youth through responsible use of educational technologies in the classroom&#8230;]]></description>
										<content:encoded><![CDATA[<p>A joint resolution on protecting the privacy of children and youth through responsible use of educational technologies in the classroom was issued by Canada’s federal, provincial and territorial information and privacy commissioners and ombuds with responsibilities under access and privacy laws, after their October 2025 annual meeting in Banff, Alberta, hosted by the Office of the Information and Privacy Commissioner of Alberta.</p>
<p>A <a href="https://oipc.ab.ca/canadas-privacy-regulators-call-for-strong-protection-of-childrens-privacy-in-the-development-and-use-of-educational-technologies/">news release</a> on the resolution was issued on November 20, 2025.</p>
<p>The resolution is available on the website of the Office of the Privacy Commissioner of Canada:</p>
<p><a href="https://www.priv.gc.ca/en/about-the-opc/what-we-do/provincial-and-territorial-collaboration/joint-resolutions-with-provinces-and-territories/res_20251008_edtech/">Protecting the privacy of children and youth through responsible use of educational technologies in the classroom</a></p>
<p>November 2025</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Joint Resolution: Trust, Transparency and Democracy in an Era of Misinformation (2025)</title>
		<link>https://oipc.ab.ca/resource/joint-resolution-trust-transparency-and-democracy-in-an-era-of-misinformation-2025/</link>
		
		<dc:creator><![CDATA[Elaine Schiman]]></dc:creator>
		<pubDate>Wed, 05 Nov 2025 19:24:16 +0000</pubDate>
				<guid isPermaLink="false">https://oipc.ab.ca/?post_type=resource&#038;p=17137</guid>

					<description><![CDATA[A joint resolution on trust, transparency and democracy in an era of misinformation was issued by Canada’s federal, provincial and&#8230;]]></description>
										<content:encoded><![CDATA[<p>A joint resolution on trust, transparency and democracy in an era of misinformation was issued by Canada’s federal, provincial and territorial information and privacy commissioners and ombuds with responsibilities under access and privacy laws, after their October 2025 annual meeting in Banff, Alberta, hosted by the Office of the Information and Privacy Commissioner of Alberta.</p>
<p>A <a href="https://oipc.ab.ca/canadas-information-regulators-call-on-their-respective-governments-to-promote-a-more-robust-information-ecosystem/">news release</a> on the resolution was issued on November 5, 2025.</p>
<p>The resolution is available on the website of the Office of the Information Commissioner of Canada:</p>
<p><a href="https://www.oic-ci.gc.ca/en/resources/news-releases/canadas-information-regulators-call-their-respective-governments-promote#trust">Trust, Transparency and Democracy in an Era of Misinformation</a></p>
<p>November 2025</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Social Media Privacy Tips for Parents and Caregivers</title>
		<link>https://oipc.ab.ca/resource/social-media-privacy-tips-for-parents-and-caregivers/</link>
		
		<dc:creator><![CDATA[Elaine Schiman]]></dc:creator>
		<pubDate>Tue, 23 Sep 2025 17:31:00 +0000</pubDate>
				<guid isPermaLink="false">https://oipc.ab.ca/?post_type=resource&#038;p=17078</guid>

					<description><![CDATA[Click the link below to read about some resources that provide social media privacy tips for parents and caregivers. Social&#8230;]]></description>
										<content:encoded><![CDATA[<p>Click the link below to read about some resources that provide social media privacy tips for parents and caregivers.</p>
<p><a href="https://oipc.ab.ca/wp-content/uploads/2025/09/Social-Media-Privacy-Tips-for-Parents-and-Caregivers.pdf">Social Media Privacy Tips for Parents and Caregivers</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>AI Scribe PIA Guidance</title>
		<link>https://oipc.ab.ca/resource/ai-scribe-pia-guidance/</link>
		
		<dc:creator><![CDATA[Elaine Schiman]]></dc:creator>
		<pubDate>Wed, 03 Sep 2025 18:15:51 +0000</pubDate>
				<guid isPermaLink="false">https://oipc.ab.ca/?post_type=resource&#038;p=17030</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
