<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>OIPC Processes &#8211; Office of the Information and Privacy Commissioner of Alberta</title>
	<atom:link href="https://oipc.ab.ca/resources/oipc-processes/feed/" rel="self" type="application/rss+xml" />
	<link>https://oipc.ab.ca</link>
	<description>Office of the Information and Privacy Commissioner of Alberta</description>
	<lastBuildDate>Thu, 16 Apr 2026 17:15:57 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://oipc.ab.ca/wp-content/uploads/2022/01/cropped-OIPC-Icon-32x32.png</url>
	<title>OIPC Processes &#8211; Office of the Information and Privacy Commissioner of Alberta</title>
	<link>https://oipc.ab.ca</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Privacy Impact Assessment (PIA) Template and Completion Guide (POPA)</title>
		<link>https://oipc.ab.ca/resource/popa-pia-template-completion-guide/</link>
		
		<dc:creator><![CDATA[Chris Stinner]]></dc:creator>
		<pubDate>Mon, 09 Mar 2026 12:55:24 +0000</pubDate>
				<guid isPermaLink="false">https://oipc.ab.ca/?post_type=resource&#038;p=17354</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>Section 26 of the <em>Protection of Privacy Act</em> (POPA) requires a public body to prepare a privacy impact assessment (PIA) in prescribed circumstances and, if required by the regulations, submit the PIA to the Information and Privacy Commissioner in accordance with the regulations. In addition, as part of the Commissioner’s responsibility to monitor how POPA is administered to ensure that its purposes are achieved, the Commissioner may, as described in section 27(1)(j) of POPA, request a copy of a public body’s PIA.</p>
<p>Section 7(1) of the <em>Protection of Privacy Act</em> (Ministerial) <em>Regulation</em> (M-Regulation) lists the circumstances in which a public body must prepare and submit a PIA to the Commissioner.</p>
<p>This <strong>POPA PIA Template Completion Guide</strong> (“Completion Guide”) is a companion document to the <a href="https://oipc.ab.ca/popa/pia/template/" target="_blank" rel="noopener">POPA PIA Template</a>. The aim of this Completion Guide is to assist public bodies in completing the POPA PIA Template. This Completion Guide provides explanation or clarification, where necessary, for each question asked in the POPA PIA Template and describes what is expected of the public body in each question. We recommend that you complete the POPA PIA Template while consulting this PIA Completion Guide.<br />
The term “<strong>project</strong>” when used in this document means any administrative practice, program or service, or a change to any existing administrative practice, program or service that a public body plans to implement, which will involve the collection, use or disclosure of personal information and which includes one or more of the factors listed in section 7(5)(a) to (e) of the M-Regulation.</p>
<p>If a public body is unsure whether it is required to <span style="text-decoration: underline;">complete</span> a PIA or <span style="text-decoration: underline;">complete and submit</span> a PIA to the Information and Privacy Commissioner, the public body should consider using the <a href="https://oipc.ab.ca/popa/pia/tool/" target="_blank" rel="noopener">PIA Submission Assessment Tool</a> to make that determination.</p>
<p><span style="color: #ff0000;"><strong>Please note that sections in the POPA PIA Template with an asterisk (*) are mandatory and must be completed.</strong> <strong>Any PIA that does not complete the mandatory sections, </strong><strong>will be deemed incomplete and will not be accepted for review by the OIPC.</strong></span></p>
<p>If you encounter issues while using the completion guide or have questions, please <a href="https://oipc.ab.ca/about-us/contact-us/" target="_blank" rel="noopener">contact us</a>.</p>
<p><span style="color: #ff0000;"><strong>Note: Public bodies <u>should not</u> submit this completion guide to the OIPC as part of their PIA submission.</strong></span></p>
<p>Given that section 26(1) of POPA requires a public body to prepare a PIA in prescribed circumstances and, if required by the regulations, submit it to the Commissioner in accordance with the regulations, the head of a public body is legally required to sign off on POPA PIAs. However, 55(1) of POPA authorizes the head of a public body to delegate to any person any power, duty or function of the head under the Act, except the power to delegate under this section. Section 55(2) requires that a delegation under subsection (1) be in writing and may contain any conditions or restrictions the head of the public body considers appropriate. To this end, the Designate of a public body may sign off on the public body’s PIA if that Designate has been delegated such a power. A copy of the delegation of power should be included with the PIA.</p>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<div style="border: 1px solid #ccc; padding: 15px; border-radius: 5px;">
<p><strong>Table of Contents</strong></p>
<ul>
<li><a href="#general-information-public-body-existing-pias-project">A. General Information About the Public Body or Bodies, Existing PIAs, and the Project*</a></li>
<li><a href="#project-details">B. Details About the Project*</a></li>
<li><a href="#privacy-management-program">C. Information About Your Privacy Management Program (PMP)*</a></li>
<li><a href="#personal-information-authority-collection-use-disclosure">D. Identify Personal Information Involved and Your Authority to Collect, Use or Disclose the Information*</a></li>
<li><a href="#access-correction-accuracy-retention-disposition">E. Access, Correction, Accuracy, Retention, Disposition*</a></li>
<li><a href="#protection-of-information">F. Protection of Information*</a></li>
<li><a href="#service-providers">G. Service Providers*</a></li>
<li><a href="#project-risk-assessment-mitigation">H. Project Risk Assessment and Mitigation*</a></li>
<li><a href="#appendix-a-data-matching">Appendix A. Data Matching</a></li>
<li><a href="#appendix-b-common-integrated-program-service">Appendix B. Common or Integrated Program or Service</a></li>
<li><a href="#appendix-c-automated-systems-innovative-technology">Appendix C. Use of Automated Systems or Other Forms of Innovative Technology</a></li>
<li><a href="#appendix-d-pia-cover-letter">Appendix D. PIA Cover Letter*</a></li>
<li><a href="#appendix-e-pia-submission-checklist">Appendix E. PIA Submission Checklist*</a></li>
</ul>
</div>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="general-information-public-body-existing-pias-project"></a></p>
<h3>A. General Information about the public body or bodies, existing PIAs, and the project *</h3>
<p><em>Questions in this section are asked as a legislative requirement and to enable the OIPC in processing the PIA file.</em></p>
<p><strong> Question 1</strong></p>
<p>Section 26 of POPA requires a public body to prepare a PIA in the circumstances listed in section 7 of the M-Regulation, when a project involves the collection, use or disclosure of personal information. If a public body is not collecting, using or disclosing personal information as part of its project, there is no requirement under POPA to submit a PIA to the Commissioner for the project.</p>
<p><strong> Question 2</strong></p>
<p>The legislation is clear on when a public body is required to prepare a PIA, and only in the prescribed circumstances as listed in the POPA PIA template is a public body required under POPA to submit a PIA to the OIPC. Please note that the list of highly sensitive information identified under section 1 of the M-Regulation is not an exhaustive list. Other personal information may be of high sensitivity.</p>
<p>In this question, if only the last checkbox (the loss of, unauthorized access to or unauthorized disclosure of the personal information could result in significant harm) is selected, the public body may not be required to submit a PIA to the Commissioner. Nonetheless, the OIPC recommends that public bodies use the POPA PIA template while preparing PIAs under section 7(1)(a) of the M-Regulation as the Commissioner may request copies of those PIAs under section 27(1)(j) of POPA. Using the template will ensure that the public bodies complete their PIAs in alignment with the PIA requirements under POPA and the M-Regulation of which the PIA template is based on.</p>
<p><strong> Question 3</strong><br />
When submitting a PIA to the OIPC as required under section 26 of POPA, the OIPC needs to know certain information about the public body including who the head of the public body is at the time the PIA is submitted. This is because under POPA the head has specified duties including for protection of personal information (section 10(1)).</p>
<p><strong> Question 4</strong><br />
Section 7(4)(b) of the M-Regulation allows for two or more public bodies to submit a PIA for a common or integrated program or service, hence the need to know if the PIA is for such a project.</p>
<p><strong> Question 5</strong><br />
No additional explanation needed.</p>
<p><strong> Question 6 </strong><br />
No additional explanation needed.</p>
<p><strong> Question 7</strong><br />
Sometimes, a new PIA is related to a PIA which has already been submitted to the OIPC and is still under review. In such cases, it is important that the OIPC is aware of this PIA to ensure the recent PIA is not reviewed in isolation from the related PIA. There are also times where information in an existing PIA is referenced in a new PIA. It is also important to know if such a PIA exists or has been previously reviewed by the OIPC.</p>
<p><strong> Question 8</strong></p>
<p>A PIA amendment addresses privacy and security risks associated with changes to an existing project that impacts the collection, use and/or disclosure of personal information. A PIA amendment focuses on areas that have changed in an existing project, and how the public body has identified and addressed privacy and security risks associated with the change. An amendment to a previously submitted PIA requires that the updated or new PIA is reviewed in consultation with the previously submitted PIA.</p>
<p><strong>Question 9</strong><br />
Some public bodies have their own filing convention for their internal use. Providing this number ensures the OIPC, in addition to the OIPC’s file number, references this number in its communication with the public body.</p>
<p><strong>Question 10</strong></p>
<p>This informs the OIPC whether the project under consideration has been implemented or not.</p>
<p><strong>Question 11</strong><br />
This question aims to inform the public body which sections of the appendices to the POPA PIA template are relevant to their project as well as relevant resource expertise needed to assist the public body in completing the technical aspect of the PIA. The question also informs the OIPC what to consider regarding legislative requirements during the PIA review process as different projects may have unique compliance privacy and security issues to consider.</p>
<p>For projects that involve automated systems, section 7(3) of the M-Regulation states that a PIA must provide a level of detail commensurate with the complexity of the practice, program, project or service the PIA relates to. As such, the public body is required to also complete an Algorithm Impact Assessment (AIA). AIA is a tool used for identifying and addressing the risks and impacts of automated decision-making systems. Typically comprising of a set of questionnaires, the tool can be used to determine the impact level of an automated decision-making system including biases, human rights violations, ethical violations, marginalization and accessibility issues. The OIPC is in the process of developing an AIA tool. Once completed, it will be published on the <a href="https://oipc.ab.ca/">https://oipc.ab.ca</a> and a link to it will be added to the POPA PIA Template and this document. In the interim, the OIPC recommends that where a project involves automated systems, public bodies consult industry standard algorithm impact assessment guidelines in preparing and submitting their AIAs with their PIAs.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#">Back to top of the page</a></p>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="project-details"></a></p>
<h3>B. Details About the Project*</h3>
<p><strong>Question 12</strong><br />
This information assists the OIPC in understanding the project, its business rationale and the purpose or objective it intends to achieve for the public body. This question also informs the OIPC on why the collection, use and/or disclosure of personal information is required by the public body to meet the needs of the project. It is imperative that the public body provides sufficient detail on the project. In addition, in this question, the public body is required to provide technical information about the project under consideration. For instance, if the public body is a police agency implementing a body worn camera (BWC), the public body is expected to describe each body worn camera unit, its associated features and IT infrastructure that operates the BWC. Also, information on BWC storage media, how information is transferred from the camera to the IT network, where information is stored and who is responsible for managing the information, etc. must be provided. In other words, the entire lifecycle of the personal information involved must be addressed in all aspects of the project. The public body should also consider attaching technical details of the project as necessary.</p>
<p><strong>Question 13</strong></p>
<p>An electronic information system has specific technical requirements, such as logging and auditing, access controls, that need to be considered and assessed to ensure the access and privacy rights of Albertans are upheld, which is why we need this information.</p>
<p><strong>Question 14</strong></p>
<p>Other stakeholders’ involvement in a project may determine who is collecting, using or disclosing personal information in the project and as a result shed some light on how the public body ought to consider the legal authority for each stakeholder to collect, use and/or disclose personal information involved in the project.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#">Back to top of the page</a></p>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="privacy-management-program"></a></p>
<h3>C. Information About Your Privacy Management Program (PMP)*</h3>
<p><strong>Question 15</strong></p>
<p>Section 25(1) of POPA requires a public body to establish and implement a PMP and make it public or provide a copy of the PMP upon request pursuant to section 25(5). These requirements will come into effect on June 11, 2026. The public body’s policies and procedures must comply with the requirements of POPA and its regulations. The OIPC has developed guidance to assist public bodies in meeting their PMP obligations under POPA.</p>
<p>Not having a PMP leaves a gap in the completion of the PIA. This could potentially lead to non-compliance. It is important to provide the OIPC PMP file number of the public body’s most current PMP where applicable, as doing so saves the public body time and effort by referencing the already submitted PMP and avoids duplication. Also from a PIA review standpoint, it is relevant to review the PIA to assess the public body’s compliance with applicable legislation.</p>
<p><strong>For more information on PMPs please see the OIPC’s <a href="/popa/pmp/guide/" target="_blank" rel="noopener">Guidance for Public Bodies in Developing Privacy Management Programs</a>.</strong></p>
<p style="font-size: 0.9em; color: grey;"><a href="#">Back to top of the page</a></p>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="personal-information-authority-collection-use-disclosure"></a></p>
<h3>D. Identify Personal Information Involved and your Authority to Collect, Use or Disclose the Information*</h3>
<p><strong>Question 16</strong></p>
<p>This question ensures that the public body identifies the personal information that it intends to collect, use or disclose in the project. In doing so, the public body would have to start thinking about its legal authority to collect, use or disclose personal information and whether those authorities align with sections 4, 12 and 13 of POPA, respectively. In addition, the public body is required to consider the limitation principle under sections 12(4) and 13(4) of POPA. Under section 12(4) the public body needs to explain how the use of personal information in the project is <strong>only to the extent necessary</strong> to enable the public body to carry out its identified purposes in a <strong>reasonable manner</strong><em>. </em>Similarly, under section 13(4) of POPA, the public body needs to explain how the public body public disclosure of personal information is <strong>only to the extent necessary</strong> to enable the public body to carry out its identified purposes in <strong>a reasonable manner</strong>. Personal information means recorded information about an identifiable individual. Some examples of personal information include an individual’s name, home or business address, home or business email address, race, gender identity, fingerprints and financial history. For a complete listing of what is considered personal information, please see <strong>section 1(q) of POPA.</strong></p>
<p><strong>Question 17</strong><br />
Section 5 of POPA provides for the manner of collection of personal information. It is important that the collection of personal information for this project meets the requirements of section 5 of POPA. In this question, the public body needs to consider and explain how section 5(2) of POPA is complied with in this project if personal information is collected directly from the individuals who are the subjects of the information, including when and how a collection notice is provided to those individuals. In particular, the public body needs to explain whether section 5(2) of POPA applies to its project and how the public body complies with it.</p>
<p><strong>Question 18 </strong><br />
While there are legal authorities for public bodies in POPA to use or disclose personal information, there are situations where a public body may rely on individuals’ consent to use or disclose their personal information. Such consent must meet the prescribed requirements of section 2 of the Protection of Privacy Regulation (“the Regulation”). That is, the consent process for the project needs to clearly explain whether consent is obtained electronically or manually. Where consent is collected electronically, the public body should state how individuals give their consent. While a consent form is the implementation of the above consent requirements, public bodies need to have policies and procedures in place to collect and manage consent.</p>
<p><strong>Question 19 </strong><br />
There are circumstances where personal information can be collected indirectly, which means the collection comes from a source that is not the person whom the information is about. If that is the case in this project, this question gives the public body the opportunity to describe why, and how personal information is collected indirectly.</p>
<p><strong>Question 20</strong> – An information flow diagram is not the same as a business flow or a network diagram. An information flow diagram identifies the flow of specific pieces of information from one entity to another and when the entities involved are collecting, using or disclosing the information in question. It has arrows indicating the direction of flow of information between the entities. In some cases, information flow could be bi-directional between two entities. The information flows help in identifying the legal authority for collecting, using or disclosing personal information by each entity involved in the flow of the information. A network diagram depicts an IT network infrastructure or network segment and its associated components which may include, servers, routers, firewalls, databases, etc. A business flow diagram is a step-by-step process on how a specific business task is accomplished.</p>
<p><strong>Question 21 </strong><br />
No additional explanation needed.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#">Back to top of the page</a></p>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="access-correction-accuracy-retention-disposition"></a></p>
<h3>E. Access, Correction, Accuracy, Retention, Disposition*</h3>
<p><strong>Question 22</strong></p>
<p>This question is asked to remind a public body to ensure it takes steps to make individuals aware of their rights to request access to their personal information that is in the custody or under the control of the public body. Usually, public bodies should be transparent by making their access to information request processes public, with specific contact information of a person or business unit that handles access to information requests. In certain circumstances, public bodies should make proactive disclosure to minimize the number of access requests they get.</p>
<p><strong>Question 23</strong><br />
While this may be addressed as part of the PMP, public bodies are required to have access request policies in place to ensure that Albertans can exercise their rights to access their information. Such a policy governs how a public body implements its access to personal information processes to ensure consistency in processing such requests.</p>
<p><strong>Question 24</strong></p>
<p>This question is asked to ensure a public body has established a process to make individuals aware of their right to request correction to their personal information involved in the project. Usually, public bodies should be transparent by making their correction to personal information request processes public with specific contact information of a person or business unit that handles correction requests.</p>
<p><strong>Question 25</strong></p>
<p>While this may be addressed as part of the PMP, public bodies are required to have correction request policies in place that govern how Albertans can exercise their rights to correct their personal information and to ensure consistency in processing such requests.</p>
<p><strong>Question 26</strong></p>
<p>Public bodies have an obligation to make every reasonable effort to ensure that information about individuals that the public body relies on to make decisions that affect those individuals is accurate and complete.</p>
<p><strong>Question 27</strong></p>
<p>It is important to understand how the public body complies with section 6(b) of POPA for this project by ensuring that there exists a retention and disposition policy for information used in this project to govern how long personal information must be retained.</p>
<p><strong>Question 28</strong></p>
<p>Implementing record retention and disposition policies into information systems ensures that information that has reached its retention period is automatically flagged by the system for disposition instead of it being a manual process that is prone to inconsistencies and human errors resulting in information being retained past its retention period. Information held longer than its retention period poses a risk of loss, unauthorized access, or unauthorized disclosure.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#">Back to top of the page</a></p>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="protection-of-information"></a></p>
<h3>F. Protection of Information*</h3>
<p><strong>Question 29 </strong><br />
Information security classification means assigning security levels to information that are based on the sensitivity of the information in question. Classifying the information based on the public body’s information classification standard assists the public body to protect the information by implementing security controls that are proportionate to the classification levels of the information. Each public body is required to implement an information security classification system to assist the public body to classify information that it collects, uses or discloses as required under section 2(1) of the M-Regulation.<span style="color: #ff0000;"> Public bodies must meet this requirement before submitting their PIAs to the Commissioner for review.</span></p>
<p><strong>Question 30</strong><br />
The “reasonable security arrangements” standard set out in section 10(1) of POPA are determined by the security classification of the personal information involved in the project. If the security classification is high, then the security measures, i.e., the administrative, technical and physical safeguards, must be correspondingly high. Whereas, if the security classification is low, then fewer measures may suffice to meet the standard. <span style="color: #ff0000;">Section 6(2(b) of the M-Regulation requires public bodies having custody or control of a high volume of personal information or highly sensitive personal information to have documented safeguards</span>. POPA does not stipulate a threshold for “high volume” or “significant percentage of the population”. The interpretation of this section of the M-Regulation is contextual in relation to the project. Although Section 1 of the M-Regulation deems certain personal information to be highly sensitive (biometric and financial information, and personal information of minors and seniors), this list is not an exhaustive or exclusive list. Other types of personal information may be deemed to be highly sensitive in specific contexts.</p>
<ol>
<li>Administrative safeguards govern the implementation of other protective measures and ensures that such measures are implemented consistently during the life cycle of the project. Consistent implementation of protective measures reduces vulnerabilities usually caused by lack of good security governance.</li>
<li>No additional explanation needed.</li>
<li>The technical safeguards should directly protect the information involved in the project, not just the general technical safeguards implemented by the public body. For instance, access controls should be specific for the project and describe how such controls ensure only authorized individuals have the right level of access to information involved in the project. In addition, any security assessments results such as vulnerability assessment and penetration tests conducted specific to the project should be included as part of the public body’s PIA submission, as such results provide additional information on risks that were identified and how they were resolved as part of the project implementation.</li>
</ol>
<p><strong>Question 31</strong><br />
Continuous assessment and monitoring of safeguards assists the public body in ensuring that the safeguards are working as expected. For instance, employees should be required to take refresher trainings on privacy and security. Also, monitoring controls such as intrusion detection and prevention systems should be implemented.</p>
<p><strong>Question 32 </strong><br />
Section 6(1)(b) of the M-Regulation requires public bodies to establish policies and procedures that ensures they comply with the public body’s obligations under POPA such as responding to incidents (unauthorized access to, unauthorized disclosure of or loss of personal information). Section 6(1)(d) of the M-Regulation also requires public bodies to train their employees about the employee’s obligations under POPA. As part of that training, public bodies should make their employees aware of their obligations under POPA, which includes notifying the public body of incidents under section 10(2) of POPA.</p>
<p><strong>Question 33 </strong><br />
Access control policies ensure that access to the Electronic Information System (EIS) is consistently managed, including requests to access the EIS, account provisioning and revocation of account when an employee no longer needs access to the EIS. Through enforceable access control policies, a public body will be able to ensure that an employee only gains access to the information they require to perform their job functions.</p>
<p><span style="color: #ff0000;">If the project involves a high volume of personal information or highly sensitive personal information, a documented access control policy must be attached to the PIA submission.</span> POPA does not stipulate a threshold for “high volume” or “significant percentage of the population”. The interpretation of this section of the M-Regulation is contextual in relation to the project. Although Section 1 of the M-Regulation deems certain personal information to be highly sensitive (biometric and financial information, and personal information of minors and seniors), this list is not an exhaustive or exclusive list. Other types of personal information may be deemed to be highly sensitive in specific contexts.</p>
<p><strong>Question 34</strong><br />
Having an access requests process for the EIS ensures access requests are submitted by appropriate business heads for approval by the appropriate authority prior to processing and account provisioning. Each request should identify the permission level for employees requiring access and ensure the permission level gives the employee only the right access required for the specific job tasks.</p>
<p><strong>Question 35</strong><br />
All access requests to the EIS must be approved by the appropriate level of management, to ensure that employees who access the EIS are authorized to do so.</p>
<p><strong>Question 36 </strong><br />
It is important to ensure that access to the EIS is revoked in a timely manner when employees no longer need such access, to prevent potential unauthorized access to personal information. It is also to ensure dormant accounts are removed from the system, as such accounts pose security risks.</p>
<p><strong>Question 37</strong><br />
The access control table provides clarification on the access privileges of the users of the system including the kind of actions each user can take and what information the user can access, and how the permission limits users only to the information they need to perform their job tasks or functions. The public body’s information technology (IT) department plays a significant role in implementing access controls in systems and will be a good resource for assisting in completing this table.</p>
<p><strong>Question 38</strong><br />
Logging and auditing policies ensure that information systems are built and implemented to capture audit logs of activities that are occurring within the system, including unauthorized activities listed under section 10(2) of POPA. Such a policy also ensures proactive auditing of information systems to detect and manage incidents defined under section 10(2) of POPA.</p>
<p><span style="color: #ff0000;">If the project involves a high volume of personal information or highly sensitive personal information, a documented auditing and logging policy must be attached to the PIA submission.</span> POPA does not stipulate a threshold for “high volume” or “significant percentage of the population”. The interpretation of this section of the M-Regulation is contextual in relation to the project. Although Section 1 of the M-Regulation deems certain personal information to be highly sensitive (biometric and financial information, and personal information of minors and seniors), this list is not an exhaustive or exclusive list. Other types of personal information may be deemed to be highly sensitive in specific contexts.</p>
<p><strong>Question 39</strong><br />
Being able to capture and maintain audit logs of personal information means that the public body can identify and investigate unauthorized access to, unauthorized disclosure of, or loss of personal information in order to meet its obligations under section 10(2) and (3) of POPA and sections 4(3), (4) and (5) of the M-Regulation.</p>
<p><strong>Question 40</strong><br />
Proactive auditing is a way of monitoring access to an EIS to detect and respond to potential unauthorized access to, unauthorized disclosure of, or loss of personal information.</p>
<p><strong>Question 41</strong><br />
No additional explanation needed.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#">Back to top of the page</a></p>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="service-providers"></a></p>
<h3>G. Service Providers*</h3>
<p><strong>Question 42 </strong><br />
Given that service providers, which includes corporations, are considered employees under section 1(h) of POPA, a public body is accountable for the service provider’s compliance with POPA. Therefore, it is important for the public body to consider privacy issues that may involve the service provider’s role in relation to any personal information it may collect, use, disclose or access as an “employee” of the public body.</p>
<p><strong>Question 43</strong><br />
If a service provider will have access to personal information as part of providing its services to the public body or if it will collect, use or disclose personal information on behalf of the public body, the public body must ensure it complies with POPA as it relates to these activities. Therefore, the contract with the public body must address all related compliance issues such that through the implementation of the terms of the contract agreed to between the public body and the service provider, the public body has confidence that the service provider will comply with POPA in providing its services concerning any personal information involved in service delivery. A service provider must also protect the personal information it has in its custody, or that it is otherwise responsible for, according to the terms of the contract which must ensure compliance with section 10(1) of POPA, i.e., the security of the personal information must at minimum align with the public body’s security safeguards for this type of information. The agreement must also set out how the service provider interacts with the public body’s privacy management program. Without an agreement that addresses all these compliance related issues, there is a risk of non-compliance by the public body as a result of the activities of its service provider. Consequently, as part of the PIA review, any agreement entered into with a service provider must be reviewed by our office as part of the PIA review process. This is because the service provider agreement plays a central role in determining whether the service provider-employee is positioned within the terms of the contract to comply with POPA.<span style="color: #ff0000;"> <strong>Submitting a copy of the agreement with your PIA is a mandatory requirement</strong>.</span></p>
<p>Section 7(6) of the M-Regulation provides that where a public body is required under POPA or the Regulation, to enter into an agreement relating to the practice, program, project or service the PIA relates to, the portions of the agreement relating to the protection of privacy must be submitted to the Commissioner together with the PIA. Under section 1(1)(h) of POPA, an “employee” includes those providing a service to the public body “under contract.” The contract with the service provider would demonstrate the public body’s authority under POPA to share personal information with the service provider or otherwise permit it to collect, use or disclose personal information on its behalf. Therefore, it is an essential part of the PIA submission.</p>
<p><strong>Question 44</strong><br />
A public body may delegate responding to access to information request responsibility to its service provider. However, the public body must ensure that its contractual agreement with the service provider adequately addresses access to information request processing and describe how the service will be provided to the public body.</p>
<p><strong>Question 45<br />
</strong>To ensure the public body is able to meet its obligations under POPA the public body must ensure it maintains control of the personal information involved in the project where this information is collected or accessible by the service provider. This is required to ensure the personal information remains subject to POPA and the <em>Access to Information Act</em> (ATIA) to preserve the rights of individuals concerning their personal information under these Acts. Failure to retain control of the personal information amounts to a disclosure, which is prohibited under POPA without authority for said disclosure. This means, that there is a high likelihood of a breach if a public body fails to retain control of personal information in an agreement and provides personal information to the service provider for the services. For this question, if the public body’s answer is yes, the public body must identify specific sections of its contract with the service provider that ensures the public body maintains control of the information for the project. <span style="color: #ff0000;"><strong>Public</strong> <strong>bodies must meet this requirement before submitting their PIAs to the Commissioner for review.</strong></span></p>
<p><strong>Question 46</strong><br />
For this question, refer to the information set out in the commentary above for Question 43.</p>
<p><strong>Question 47</strong><br />
Service providers are considered employees of the public body and should have appropriate training prior to accessing personal information and continue to have refresher training for the duration of their contract. Section 6(1)(d) of the M-Regulation.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#">Back to top of the page</a></p>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="project-risk-assessment-mitigation"></a></p>
<h3>H. Project Risk Assessment and Mitigation*</h3>
<p>This section of the PIA template requires public bodies to identify the project’s privacy and security risks and associated administrative, technical and physical safeguards that address these risks. This completion guide provides some <strong>example descriptions</strong> of the types of risks identified in the POPA PIA Template risk table.</p>
<p><strong>Question 48</strong><br />
Conducting security vulnerability assessments (VA) during the implementation of an information system that processes identifying information ensures exploitable security vulnerabilities or weaknesses are identified, prioritized and addressed in a timely manner<strong>.</strong> A penetration test (pentest) is performed to test if security controls are working as expected. VA and pentest are part of an overall risk management strategy and should be conducted periodically. Other security assessments can also be conducted and included in the PIA. Providing copies of these assessments with your PIA goes on to demonstrate the public body’s commitment to protect personal information pursuant to section 10 of POPA.</p>
<p><strong>H1. General Risks (to be completed for all PIA submissions) *</strong></p>
<p><strong>Risk 1</strong><br />
E.g., personal information is collected by the public body and/or the information system is configured to accept personal information that does not relate directly to and is necessary for the project. Systems built for the global market have default configurations that allow for the collection of vast amounts of personal information. Such systems should be hardened by disabling data fields that are not required for specific project implementations to manage the risk of over collection.</p>
<p><strong>Risk 2</strong><br />
E.g., information that was collected for this project is used for a purpose not directly related to the project, contrary to section 12 of POPA.</p>
<p><strong>Risk 3</strong><br />
E.g., information that was collected for this project is disclosed contrary to section 13 of POPA. Personal information could be intercepted while in transit due to lack of appropriate security control, leading to unauthorized disclosure. There are also situations where the public body or its employees disclose personal information for secondary purposes without legal authority. Unauthorized disclosure could also be via insecure disposal of information processing media.</p>
<p><strong>Risk 4</strong><br />
E.g., information collected for this project is accessed by unauthorized users or malicious software due to lack of reasonable safeguards, contrary to section 10(1) of POPA.</p>
<p><strong>Risk 5</strong><br />
E.g., information collected for this project is lost as a result of human error or malicious software attacks, such as ransomware, which renders information inaccessible. This may lead to the inability of the public body to perform its business functions or respond to requests from individuals to access their information. Disgruntled employees can also deliberately destroy personal information. Also, changes to IT systems without proper IT change management process and lack of disaster recovery strategy could lead to loss of information.</p>
<p><strong>Risk 6</strong><br />
E.g., A public body loses control of electronic and/or paper-based information as a result of insufficient or absence of contractual agreements with a third-party service provider. Loss of custody may involve the theft of paper records or a server that contains personal information in the public body’s premises.</p>
<p><strong>Risk 7</strong><br />
E.g., information collected for this project is inadvertently or maliciously destroyed contrary to POPA and the policies of the public body, such that the public body is unable to respond to access to information requests or carry out its business functions. Lack of an enforceable record retention and disposition policy could also lead to unauthorized destruction.</p>
<p><strong>Risk 8</strong><br />
E.g., information collected for this project is rendered inaccurate, or incomplete, contrary to section 6(a) of POPA. This may occur if employees are not adequately trained on good data entry practices or if system changes do not follow industry standard change management processes or information is not reasonably protected from unauthorized modification.</p>
<p><strong>Risk 9</strong><br />
E.g., personal information collected for this project is retained contrary to section 6(b) of POPA or the project retention procedures as established by the public body (section 7(2)(f) of the M-Regulation). In some cases, this may be a consequence of the absence of a record retention policy or lack of enforcement of an existing record retention policy.</p>
<p><strong>Risk 10</strong><br />
E.g., individuals’ information is collected for this project without providing proper notice at the time of collection, contrary to section 5(2) of POPA. Notice fails to align with the manner of collection and the requirement of POPA such as collecting personal information directly from individuals by telephone but providing notice via the public body’s website.</p>
<p><strong>Risk 11</strong><br />
E.g., the public body fails to make individuals aware of their rights to request access to or correction of their personal information, and how to make such requests.</p>
<p><strong>Risk 12</strong><br />
E.g., lack of or inadequate privacy breach management means that privacy breaches will not be consistently detected and managed. In addition, affected individuals of privacy breaches/incidents, the Commissioner and the Minister will not be notified in a timely manner as required under section 10(2) of POPA.</p>
<p><strong>Risk 13</strong><br />
E.g. without assessing third parties’ controls, the public body is unable to attest whether the third party reasonably protects personal information in respect of the services provided to the public body in compliance with POPA and its regulations. As a result, the public body could fail to meet its obligations to protect personal information under section 10 of POPA.</p>
<p><strong>Risk 14</strong><br />
E.g. personal information collected for this project for purposes under section 12 of POPA is being used for secondary purposes (e.g. to train artificial intelligence (AI) or by the third party for quality improvement purposes) without authority.</p>
<p><strong>Risk 15 </strong><br />
E.g., inadequate or absence of logging capabilities of systems limits the ability of the public body to identify and manage privacy breaches of personal information. In addition, it limits the Commissioner’s ability to investigate access to personal information violations including investigating potential offences under section 60 of POPA.</p>
<p><strong>Risk 16</strong><br />
E.g., failure to have human oversight and validation measures for information systems could potentially lead to data accuracy and reliability issues.</p>
<p><strong>Risk 17</strong><br />
Failing to conduct a security vulnerability assessment means that the public body may not be aware of exploitable security vulnerabilities that exists in its environment and as a result, would not take steps to address those security vulnerabilities in a timely manner thereby exposing personal information to potential compromise.</p>
<p><strong>H2. Risks Associated with Cloud Computing</strong></p>
<p><strong>Risk 1</strong><br />
E.g. In a multitenant cloud environment, compromise of one environment could lead to the compromise of other environments due to inappropriate segregation and isolation of cloud resources. In addition, there could potentially be information leakage between environments leading to unauthorized disclosure of personal information.</p>
<p><strong>Risk 2 </strong><br />
E.g., lack of formalized contractual arrangements that specifically consider POPA requirements could lead to loss of custody and/or control of personal information stored in the cloud environment as well as gaps in security management and non-compliance with POPA.</p>
<p><strong>Risk 3</strong><br />
E.g. the absence of clear and good governance on privacy and security of personal information could result in gaps in privacy and security management leading to non-compliance with POPA.</p>
<p><strong>Risk 4</strong><br />
E.g., POPA requirements including privacy breach management is not addressed in the contractual agreement between the public body and the cloud provider, which could lead to non-compliance with section 10(2) of POPA.</p>
<p><strong>Risk 5</strong><br />
E.g. a cloud provider goes out of business or declares bankruptcy, making it impossible for the public body to access personal information in the provider’s environment.</p>
<p><strong>Risk 6</strong><br />
E.g., a cloud provider uses proprietary technologies, making it difficult for the public body to migrate services to another provider, locking-in the public body. A public body may want to change provider if the existing provider suffers multiple security incidents that have caused privacy breaches.</p>
<p><strong>Risk 7</strong><br />
E.g., the USA PATRIOT Act and Cloud Act allow the US government to access personal information held by US-based companies in the US (USA PATRIOT Act) and anywhere in the world (Cloud Act).</p>
<p><strong>Risk 8</strong><br />
E.g., a cloud provider uses personal information for their own purposes, such as de-identifying personal information and/or using the personal information for training their AI models.</p>
<p><strong>Risk 9</strong><br />
E.g., the cloud provider sells personal information or fails to securely sanitize information processing media prior to re-use or disposition leading to unauthorized disclosure of the personal information.</p>
<p><strong>Risk 10</strong><br />
E.g. lack of reasonable authentication and authorization controls such as failures to implement and enforce multifactor authentication could potentially lead to unauthorized access to personal information.</p>
<p><strong>Risk 11</strong><br />
E.g. weak or lack of encryption could lead to unauthorized access to and disclosure of personal information in transit and at rest.</p>
<p><strong>H3. </strong><strong>Risks Associated with Research</strong></p>
<p><strong>Risk 1</strong><br />
E.g., the public body fails to assess whether non-identifying data can be used to accomplish the research purpose prior to disclosing individually identifying personal information or has not obtained the Commissioner’s approval for such disclosure as required under section 15(a) of POPA.</p>
<p><strong>Risk 2 </strong><br />
E.g., the public body fails to perform a public interest analysis prior to disclosing personal information for research or statistical purposes where the information is involved in data matching.</p>
<p><strong>Risk 3</strong><br />
E.g. the public body fails to conduct an assessment of risk of harm prior to disclosing personal information for research or statistical purposes where the information is involved in data matching.</p>
<p><strong>Risk 4</strong><br />
E.g., the public body has not approved conditions relating to security and confidentiality, the removal or destruction of individual identifiers and prohibition of subsequent use or disclosure of the information without express authorization of the public body.</p>
<p><strong>Risk 5 </strong><br />
E.g., a research agreement has not been signed prior to the public body disclosing personal information or the research agreement in place does not meet the requirements of section 15(d) of POPA and section 4 of the Regulation.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#">Back to top of the page</a></p>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="appendix-a-data-matching"></a></p>
<h3>Appendix A. Data Matching</h3>
<p><em>Only complete this section if the project involves data matching as defined under section 1(f) of POPA.</em></p>
<p><strong>Question 1</strong><br />
No additional explanation needed.</p>
<p><strong>Question 2</strong><br />
There are specific circumstances in which a public body may <em>c</em>arry out data matching as listed in section 17(1) of POPA. Any prescribed purposes will be found in the regulation otherwise such a purpose does not exist.</p>
<p><strong>Question 3</strong><br />
No additional explanation needed.</p>
<p><strong>Question 4</strong><br />
Prior to collecting personal information from another public body for the purpose of data matching, a public body must first create a governance structure that clearly identifies the responsibilities and accountability of each public body involved in carrying out the data matching to ensure access and privacy rights of Albertans are protected. The governance structure must clearly identify the responsibilities and accountability of each public body as it relates to:</p>
<ol>
<li>the custody and control of personal information,</li>
<li>the correction of errors or omissions in an individual’s personal information,</li>
<li>breach notifications, and</li>
<li>other duties imposed by the Act.</li>
</ol>
<p><span style="color: #ff0000;">Public bodies must meet this requirement before submitting their PIAs to the Commissioner for review.</span></p>
<p><strong>Question 5</strong> – The data matching agreement is required to ensure clarity regarding the roles and responsibilities of each public body involved in the data matching project as well as legislative compliance. The minimum requirements of the agreement are as follows:</p>
<p>the agreement must:</p>
<ol>
<li>identify</li>
</ol>
<p>(i) the authority under which the public body will carry out data matching, and</p>
<p>(ii) the purpose for which the public body will carry out data matching,</p>
<ol>
<li>identify each public body’s role and how each public body’s role relates to the purpose of the data matching to which the addendum relates,</li>
<li>describe how the personal information will be securely transmitted, matched or linked by the public bodies,</li>
<li>identify whether the data derived from the personal information used for data matching will be disclosed to the public body from whom the personal information was collected,</li>
<li>identify each public body’s responsibilities respecting reasonable security arrangements, including respecting administrative safeguards, physical safeguards and technical safeguards, for the protection of personal information against such risks as unauthorized access, collection, use, disclosure or destruction, and</li>
<li>establish a clear governance structure respecting the responsibilities and accountability of each public body.</li>
</ol>
<p><strong>Question 6</strong></p>
<p>This question requires that a public body participating in data matching identifies collections, uses or disclosures of personal information that only apply to that public body. In doing so, the public body is required, by law, to have an addendum for the unique collections, uses or disclosures to accompany the join PIA submitted for the project.</p>
<p><strong>Question 7 </strong><br />
No additional explanation needed.</p>
<p><strong>Question 8</strong></p>
<p><strong>Risk Assessment and Mitigation &#8211; Risks Associated with Data Matching. </strong></p>
<p><em>This Completion Guide will provide some examples of the description of the types of risks identified in the Risk Assessment and Mitigation table for risks related to data matching. </em></p>
<p><strong>Risk 1</strong></p>
<p>E.g. section 7(2)(g) of the M-Regulation requires the establishment of a <span style="color: #ff0000;">clear governance structure respecting the responsibilities and accountability</span> of two public bodies involved in data matching if one public body is collecting personal information from another public body for the purpose of data matching.</p>
<p><strong>Risk 2</strong></p>
<p>E.g., this risk assessment is to ensure that section 17 of POPA is complied with, given that this section prohibits public bodies, except for the Office of Statistics and Information, from collecting personal information directly from an individual for the purpose of data matching.</p>
<p><strong>Risk 3</strong><br />
E.g., section 6 of POPA requires a public body to make every reasonable effort to ensure that an individual’s personal information is accurate and complete before using such information to make a decision that directly affects that individual.</p>
<p><strong>Risk 4</strong><br />
E.g., as required by section 6 of POPA, the quality of the source data will play a significant part in the quality of the resulting data from data matching, so it is important for public bodies to ensure that the quality of the source is validated prior to conducting the data matching.</p>
<p><strong>Risk 5</strong><br />
E.g., data matching activities normally take place in a test environment. The resulting data is then migrated to the production environment. Therefore, the test environment security controls should be proportionate to the security classification of the data involved in data matching. Failure to implement reasonable and proportionate security arrangements to protect personal information within the public body’s data matching environment, exposes it to potential incidents under section 10 (2) of POPA especially given that a single test environment may be used for multiple projects and thus accessed by various users.</p>
<p><strong>Risk 6</strong><br />
E.g. this is about validating the final product. The public body should ensure that the final product is the desired outcome, and that no data errors are in the resulting data set, or if errors are identified, that they are addressed. (section 6 of POPA).</p>
<p><strong>Risk 7</strong><br />
E.g., this is about securely cleaning the test environment that was used for data matching by securely deleting personal information from that environment before it is used for other purposes or used by other users to prevent potential unauthorized access to personal information.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#">Back to top of the page</a></p>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="appendix-b-common-integrated-program-service"></a></p>
<h3>Appendix B. Common or Integrated Program or Service</h3>
<p><strong>Question 1</strong><br />
A common or integrated program or service must comply with specific requirements under POPA and the M-Regulation. It is therefore important for the public body to carefully consider those requirements prior to implementing new common or integrated program or service or making changes to an existing common or integrated program or service.</p>
<p><strong>Question 2</strong></p>
<p>Since common or integrated program or services requires each public body to identify its responsibilities and accountabilities identifying each public body assist in determining the areas of responsibility and accountability for each public body.</p>
<p>For question 2c, if the PIA is for a change in an existing common or integrated program or service, providing an existing PIA file number assists the OIPC in making reference to relevant information in that file during the review of the current PIA as the public body focuses on addressing privacy and security risks associated with the change. The public body may also choose to use the existing Microsoft Word copy of the existing PIA to identify areas that have changed by striking the outdated information and entering updated or new information in a different-colour text.</p>
<p><strong>Question 3</strong></p>
<p>This question is about making sure that there is a governance structure in place for the common or integrated program or services. This governance structure <em>(a documented set of rules and processes that identify the roles, responsibilities and accountability for each public body participating in the integrated program or service), </em>that clearly identifies responsibilities and accountabilities <span style="color: #ff0000;">must be in place prior to the PIA being submitted to the Commissioner for review.</span></p>
<p>The governance structure must clearly identify the responsibilities and accountability of each public body as it relates to:</p>
<ol>
<li>the custody and control of personal information,</li>
<li>the correction of errors or omissions in an individual’s personal information,</li>
<li>breach notifications, and</li>
<li>other duties imposed by the Act.</li>
</ol>
<p><strong>Question 4</strong></p>
<p>This agreement is required to ensure each public body involved in a common or integrated program or service independently comply with POPA<strong>. </strong>The minimum requirements for such an agreement include:</p>
<ol>
<li>identify the purpose of the common or integrated program or service,</li>
<li>identify each public body’s roles and responsibilities respecting the common or integrated program or service and how the roles and responsibilities of each public body relate to the purpose of the common or integrated program or service, identify each public body’s responsibilities under the Act,</li>
<li>establish rules respecting reasonable security arrangements, including respecting administrative safeguards, physical safeguards and technical safeguards, for the protection of personal information against such risks as unauthorized access, collection, use, disclosure or destruction, and</li>
<li>establish a clear governance structure respecting the responsibilities and accountability of each public body.</li>
</ol>
<p><strong>Question 5</strong></p>
<p>This question requires that a public body participating in a common or integrated program or service identifies collections, uses or disclosures of personal information that only apply to that public body. In doing so, the public body is required, by law, to have an addendum PIA for the unique collections, uses or disclosures to accompany the joint PIA submitted for the project.</p>
<p><strong>Question 6</strong></p>
<p><strong>Risk Assessment and Mitigation &#8211; Common or Integrated Program or Service Risks</strong></p>
<p><em>This completion guide will provide some examples of the description of the types of risks identified in the Risk Assessment and Mitigation table for common or integrated program or service risks</em></p>
<p><strong>Risk 1</strong><br />
E.g., governance structure including policies are not in place or are inadequate leading to inconsistencies in the management of the program that creates exploitable privacy and security vulnerabilities.</p>
<p><strong>Risk 2</strong><br />
E.g., policies are not in place or are not clear on accountability for different aspects of the program including accountability for privacy.</p>
<p><strong>Risk 3</strong></p>
<p>E.g., the responsibilities of each public body involved in the common or integrated program including for privacy management are not clearly defined.</p>
<p><strong>Risk 4</strong></p>
<p>E.g., the information security classification for one or more public bodies do not align with the sensitivity of information, leading to gaps in the protection of personal information.</p>
<p><strong>Risk 5</strong><br />
E.g., the public bodies involved fail to make individuals aware of how they can exercise their access and privacy rights under applicable POPA and ATIA.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#">Back to top of the page</a></p>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="appendix-c-automated-systems-innovative-technology"></a></p>
<h3>Appendix C. Use of Automated Systems or Other Forms of Innovative Technology</h3>
<p><strong>Question 1</strong></p>
<p>An Algorithm Impact Assessment (AIA), is a risk assessment or evaluation process that determines the impact of an automated system on individuals whose personal information is collected, used or disclosed in the use of automated systems such as artificial intelligence or other forms of innovative technology. Section 7(3) of the M-Regulation requires that a PIA contains a level of detail commensurate with the complexity of the practice, program, project or service the PIA relates to. As such, the public body is required to also complete an AIA. The OIPC is in the process of developing an AIA tool, which will be published on the OIPC website and a link included in the POPA PIA template and this document. In the interim, the OIPC recommends that where a project involves automated systems, public bodies consult industry standard algorithm impact assessment guidelines in preparing and submitting their AIAs with their PIAs.</p>
<p><strong>Question 2</strong></p>
<p><strong>Risks Associated with the use of Automated Systems or </strong><strong>other forms of innovative technology.</strong></p>
<p><strong>Risk 1</strong><br />
E.g. failure to maintain custody or control of personal information ingested by an automated system due to lack of controls to securely and automatically delete information from the automated system.</p>
<p><strong>Risk 2 </strong><br />
E.g. lack of or insufficient automated systems governance policies and procedures leads to inconsistent implementation and use of automated systems, resulting in automated systems-related vulnerabilities and privacy compliance issues.</p>
<p><strong>Risk 3</strong><br />
E.g. automated systems such as artificial intelligence, are known to hallucinate by fabricating results or outputs. Lack of monitoring including lack of oversight of AI systems leads to failures to detect and address hallucination issues.</p>
<p><strong>Risk 4</strong><br />
E.g. Using poor quality and unreliable training data leads to issues with automated systems results including hallucination. In addition, using training data that is not an accurate representation of the population where the automated systems will be deployed could potentially lead to inaccurate results and bias.</p>
<p><strong>Risk 5</strong><br />
E.g. if inputs in automated systems are not validated and protected, such inputs can be manipulated prior to processing by the automated system. This makes input vulnerable to tampering and the automated system vulnerable to faulty results.</p>
<p><strong>Risk 6</strong><br />
E.g., understanding whether the automated system model is static or dynamic, it may be difficult to implement the right monitoring mechanism for the models. For instance, while dynamic models continuously learn from new data sets in process, a static model is as good as its last update.</p>
<p><strong>Risk 7</strong><br />
E.g., Underfitting an automated system model with its training data means that the automated system model is trained to be too broad in its generalization making the model prone to false positives when processing new data.</p>
<p><strong>Risk 8</strong><br />
E.g., Overfitting an automated system model with its training data means that the automated system model is trained too closely aligned with its training data, leading to lack of generalization by the model and making the model prone to false negatives when it processes new data.</p>
<p><strong>Risk 9</strong><br />
E.g., misconfiguration of an automated system is a security vulnerability that could be exploitable, leading potential to unauthorized access to or disclosure of personal information.</p>
<p><strong>Risk 10</strong><br />
E.g., lack of processes for individuals to be made aware of and appeal decisions made by automated systems could infringe on individuals’ access and privacy rights.</p>
<p><strong>Risk 11</strong> – E.g., insufficient logging and auditing means that the activities of the automated system cannot be reasonably monitored to ensure it is working as expected or to detect potential compromise of the system.</p>
<p><strong>Risk 12 </strong><br />
E.g., lack of monitoring of the automated system based on established policies and processes means that issues with the functioning of the automated system cannot be detected and addressed in a timely manner.</p>
<p><strong>Risk 13</strong><br />
E.g., without conducting a vulnerability assessment means that exploitable vulnerabilities associated with an automated system cannot be identified and addressed. A copy of the results of the assessment should form part of the PIA to demonstrate the public body’s commitment to protect personal information pursuant to section 10 of POPA.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#">Back to top of the page</a></p>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="appendix-d-pia-cover-letter"></a></p>
<h3>Appendix D. PIA Cover Letter *</h3>
<p>While the head of a public body may assign privacy responsibilities to other individuals within the public body, the head of the public body is ultimately accountable for meeting the public body’s obligations under POPA. To this end, the PIA must include a cover letter signed by the head of the public body.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#">Back to top of the page</a></p>

		</div>
	</div>

<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="appendix-e-pia-submission-checklist"></a></p>
<h3>Appendix E. PIA Submission Checklist *</h3>
<p>This checklist is there to ensure the public body reviews its PIA and ensures all sections of the PIA have been considered, relevant sections completed, and all supporting document included in the PIA submission.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#">Back to top of the page</a></p>

		</div>
	</div>
<br />

	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
March 2026</p>

		</div>
	</div>
<br />

<table id="tablepress-2" class="tablepress tablepress-id-2">
<tbody class="row-striping">
<tr class="row-1">
	<td class="column-1"><p><strong>Disclaimer</strong><br><br />
This document is not intended as, nor is it a substitute for, legal advice, and is not binding on the Information and Privacy Commissioner of Alberta. Responsibility for compliance with the law (and any applicable professional or trade standards or requirements) remains with each organization, custodian or public body. All examples used are provided as illustrations. The official versions of the laws <a href="https://oipc.ab.ca/legislation/" target="_blank" rel="noopener">the OIPC oversees</a> and their associated regulations should be consulted for the exact wording and for all purposes of interpreting and applying the legislation. The Acts are available on the website of <a href="https://www.alberta.ca/alberta-kings-printer.aspx" rel="noopener" target="_blank">Alberta King's Printer</a>.</p></td>
</tr>
</tbody>
</table>
<!-- #tablepress-2 from cache --></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Practice Note &#8211; Returning/Destroying Records</title>
		<link>https://oipc.ab.ca/resource/practice-note-returning-destroying-records/</link>
		
		<dc:creator><![CDATA[Chris Stinner]]></dc:creator>
		<pubDate>Fri, 23 Jan 2026 16:43:27 +0000</pubDate>
				<guid isPermaLink="false">https://oipc.ab.ca/?post_type=resource&#038;p=17278</guid>

					<description><![CDATA[January 2026]]></description>
										<content:encoded><![CDATA[
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<h2><strong>Overview</strong></h2>
<p>Since taking office in August 2022, Commissioner Diane McLeod has been reviewing the practices of the Office of the Information and Privacy Commissioner (OIPC) when it comes to returning/destroying records that parties provide to the Commissioner when she is performing her legislative functions. From this review, it has become apparent that there are varying interpretations of in what circumstances records must be returned/destroyed, and therefore various practices under which some records have not been returned from files dating as far back as 15+ years.</p>
<p>Under section 56 of the <em>Freedom of Information and Protection of Privacy Act </em>(the FOIP Act), section 50 of the <em>Access to Information Act </em>(ATIA), section 29 of the <em>Protection of Privacy Act </em>POPA), section 88 of the <em>Health Information Act </em>(HIA) and section 38 of the <em>Personal Information Protection Act </em>(PIPA), the Commissioner may require that any record be produced to the Commissioner in conducting a Commissioner-led investigation or an inquiry and, except for PIPA, in giving advice and recommendations. Records pertaining to investigations, inquiries and giving advice and recommendations are case file records of the OIPC.</p>
<p>Section 56(5) of the FOIP Act, section 88(5) of the HIA and section 38(5) of PIPA require that the Commissioner return any record or any copy of any record produced. Section 50(5) of ATIA and section 29(5) of POPA require that the Commissioner return any original paper record produced and destroy any copy of any record, including any electronic record, produced.</p>
<p>This Practice Note sets out how the Commissioner now intends to deal with the statutory requirement to return/destroy records that are required to be produced to the Commissioner.</p>
<p>&nbsp;</p>
<h2><strong>Records that the Commissioner will return</strong></h2>
<p>The Commissioner has determined that the following requirements must be met for returning records:</p>
<ul>
<li>There must have been a Commissioner-led investigation or inquiry or a request to give advice and recommendations.</li>
<li>The Commissioner must have required the records to be produced.</li>
<li>The Public Body, Custodian or Organization that produced the records must still be in existence.</li>
</ul>
<p>If the foregoing requirements are met, the Commissioner will return the following records:</p>
<ul>
<li>original paper records produced by a Public Body under ATIA and POPA</li>
<li>records that were produced to the Commissioner in an electronic medium such as a CD or USB key</li>
</ul>
<p>&nbsp;</p>
<h2><strong>Records that the Commissioner will not return</strong></h2>
<p>The Commissioner has determined that records provided in settlement will not be returned, as there is no authority to require records to be produced.</p>
<p>The Commissioner has also determined that records that the Commissioner required to be produced in a Commissioner-led investigation or an inquiry or in giving advice and recommendations will also not be returned if any of the following circumstances are met:</p>
<ul>
<li>The records that were produced are paper records that are not original paper records.</li>
<li>The Public Body, Custodian or Organization that produced the records no longer exists.</li>
<li>The records are a copy that the Commissioner made for the investigation or inquiry.</li>
<li>The records are a copy that the Commissioner made and provided to the Court.</li>
<li>The records were produced in an electronic form and provided to the Commissioner by email or by electronic document drop box.</li>
</ul>
<p>Any records set out above that are not returned will be destroyed according to the <em>Records Retention and Disposition Schedule </em>(the <em>Schedule</em>) of the OIPC. The current <em>Schedule </em>of the OIPC requires that case file records be retained for 20 years and then destroyed.</p>

		</div>
	</div>

<p>January 2026</p>

<table id="tablepress-2-no-2" class="tablepress tablepress-id-2">
<tbody class="row-striping">
<tr class="row-1">
	<td class="column-1"><p><strong>Disclaimer</strong><br><br />
This document is not intended as, nor is it a substitute for, legal advice, and is not binding on the Information and Privacy Commissioner of Alberta. Responsibility for compliance with the law (and any applicable professional or trade standards or requirements) remains with each organization, custodian or public body. All examples used are provided as illustrations. The official versions of the laws <a href="https://oipc.ab.ca/legislation/" target="_blank" rel="noopener">the OIPC oversees</a> and their associated regulations should be consulted for the exact wording and for all purposes of interpreting and applying the legislation. The Acts are available on the website of <a href="https://www.alberta.ca/alberta-kings-printer.aspx" rel="noopener" target="_blank">Alberta King's Printer</a>.</p></td>
</tr>
</tbody>
</table>
<!-- #tablepress-2-no-2 from cache -->
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>OIPC Secure File Transfer System</title>
		<link>https://oipc.ab.ca/resource/oipc-secure-file-transfer-system/</link>
		
		<dc:creator><![CDATA[Chris Stinner]]></dc:creator>
		<pubDate>Fri, 08 Aug 2025 14:42:30 +0000</pubDate>
				<guid isPermaLink="false">https://oipc.ab.ca/?post_type=resource&#038;p=16985</guid>

					<description><![CDATA[The Office of the Information and Privacy Commissioner (OIPC) has implemented a new system to facilitate the safe exchange of&#8230;]]></description>
										<content:encoded><![CDATA[<p>The Office of the Information and Privacy Commissioner (OIPC) has implemented a new system to facilitate the safe exchange of electronic records between the OIPC and stakeholders across Alberta. The LiquidFiles system allows files to be sent and received through a web-based portal without requiring special software, and avoids the lack of protections from email and file-sharing tools. It is designed with encryption, malware scanning, automated patching, and other technical safeguards to protect sensitive, business confidential, or high-volume records. The OIPC’s implementation of LiquidFiles is hosted locally on our servers rather than the cloud. Files sent using LiquidFiles are stored within the OIPC’s internal network.</p>
<p>Stakeholders such as public bodies, health custodians, private sector organizations and members of the public may be invited to use LiquidFiles when sharing records with the OIPC. The recipient will receive an email from the OIPC with a link and instructions. Stakeholders wishing to send files must first contact the OIPC to obtain a unique link to upload their files.</p>
<p>&nbsp;</p>
<h3>Frequently-Asked Questions</h3>
<p><strong><strong>Is this system secure?</strong></strong></p>
<p><strong>Answer</strong>: The OIPC is committed to ensuring that information is handled in accordance with Alberta’s access and privacy laws. The use of LiquidFiles supports this goal by helping protect the confidentiality, integrity, and availability of records shared with the office. A security assessment was completed as part of the LiquidFiles implementation.</p>
<p>For more information about how LiquidFiles works and the security measures it uses, please consult the information available on the <a href="https://docs.liquidfiles.com/security/overview.html" target="_blank" rel="noopener">LiquidFiles Security Overview</a> page.</p>
<p>&nbsp;</p>
<p><strong>What if the records I need to send are too large for the system?</strong></p>
<p><strong>Answer</strong>: In this case, please contact the manager assigned to your file directly and they will assist you.</p>
<p>&nbsp;</p>
<p><strong>What is the retention period of records sent or received through that system?</strong></p>
<p><strong>Answer</strong>: Messages and files sent through the LiquidFiles system generally remain in this system for 30 days. Upon receiving information or records from submitters through the LiquidFiles system, OIPC employees will transfer them to our case management system.</p>
<p>&nbsp;</p>
<p>If you have any other questions not listed above about using LiquidFiles to share records with the OIPC, please <a href="https://oipc.ab.ca/about-us/contact-us/" target="_blank" rel="noopener">contact us</a>.</p>
<p>August 2025</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Procedures for Reviews and Privacy Complaints &#8211; Settlement Phase &#8211; ATIA and POPA</title>
		<link>https://oipc.ab.ca/resource/procedures-reviews-privacy-complaints-settlement-atia-popa/</link>
		
		<dc:creator><![CDATA[Chris Stinner]]></dc:creator>
		<pubDate>Wed, 11 Jun 2025 22:54:03 +0000</pubDate>
				<guid isPermaLink="false">https://oipc.ab.ca/?post_type=resource&#038;p=16877</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="top-of-page"></a></p>
<p>This document provides parties with a summary of the procedures under which reviews and privacy complaints are conducted under the new <em>Access to Information Act </em>(ATIA) and the <em>Protection of Privacy Act </em>(POPA) at the settlement phase.</p>
<p>In June of 2025, the <em>Freedom Information and Protection of Privacy Act </em>(FOIP Act) was repealed and replaced with the ATIA and POPA.  Please see below under the heading “Transition from FOIP to ATIA and POPA” for more information about whether your review falls under ATIA, POPA or the FOIP Act.</p>
<p>For information about the procedures for reviews and privacy complaints under the FOIP Act, HIA and PIPA see: <a href="/resource/procedures-reviews-privacy-complaints-settlement-foip-hia-pipa/" target="_blank" rel="noopener">Procedures for Reviews and Privacy Complaints &#8211; Settlement Phase &#8211; FOIP, PIPA, HIA</a>.</p>
<div style="border: 1px solid #ccc; padding: 15px; border-radius: 5px;">
<p><strong>Table of Contents</strong></p>
<ul>
<li><a href="#what-is-review">What is a review?</a></li>
<li><a href="#what-is-investigation">What is an investigation?</a></li>
<li><a href="#settlement-phase">What is the settlement phase?</a></li>
<li><a href="#commissioner-mandate">Commissioner’s Mandate</a></li>
<li><a href="#transition">Transition from FOIP to ATIA and POPA</a></li>
<li><a href="#what-we-do">What We Do…</a></li>
<li><a href="#what-we-do-not-do">What We Do Not Do…</a></li>
<li><a href="#making-request">Making a Request for Review or Complaint to the Commissioner</a></li>
<li><a href="#time-limits">Time Limits to Request a Review</a></li>
<li><a href="#overview-proceedings">Overview of Proceedings</a></li>
<li><a href="#review-investigation">Review and Investigation</a></li>
<li><a href="#inquiries">Inquiries</a></li>
<li><a href="#timelines-completion">Timelines to complete a review</a></li>
<li><a href="#definitions">Definitions</a></li>
</ul>
</div>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="what-is-review"></a></p>
<h2>What is a review?</h2>
<p>Under ATIA, the Commissioner has authority to review any decision, act or failure to act by the head related to requests for access to information.  The Commissioner also has authority to review a decision by the head of a public body to give access to information of a third party.</p>
<p>Under POPA, the Commissioner has authority to review the collection, use or disclosure of an individual’s own personal information if the individual believes that the collection, use or disclosure was in contravention of POPA.  The Commissioner also has authority to review any decision, act or failure to act of the head related to a correction request.</p>
<p>Reviews generally have two phases.  A settlement phase, which involves the Case Resolution Team attempting to settle the matter under review, and an inquiry phase, which is a formal adjudicative hearing conducted by the Adjudication Team from which an order is issued.  An inquiry may occur if settlement is not achieved.</p>
<p>Reviews under ATIA and POPA are subject to specified time limits.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#top-of-page">Back to top of the page</a></p>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="what-is-investigation"></a></p>
<h2>What is an investigation?</h2>
<p>Under POPA, the Commissioner is authorized to investigate privacy complaints about the following:</p>
<ul>
<li>That personal information about any person has been collected, used or disclosed by a public body contrary to POPA</li>
<li>That data derived from personal information or non-personal data has been created, used or disclosed by a public body contrary to POPA</li>
<li>Respecting the actual or attempted re-identification by any person of non-personal data created under section 21(1) of POPA</li>
</ul>
<p>Privacy complaints will generally try to be settled by the Case Resolution Team.  However, the Commissioner may decide to have the complaint formally investigated by the Investigation Team.  At the conclusion of a formal investigation, an order may be issued.</p>
<p>Investigations into complaints are not subject to specified time limits in POPA.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#top-of-page">Back to top of the page</a></p>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="settlement-phase"></a></p>
<h2>What is the settlement phase?</h2>
<p>The settlement phase is the first phase of a review or complaint investigation.  It is a process authorized by the Commissioner to explore opportunities to settle issues with the parties.  It may also be referred to as a mediation or investigation.  The majority of files are resolved at the settlement phase.</p>
<p>Please note that our office made some adjustments to our settlement procedures in 2024 and 2025 in the interest of creating greater efficiencies in our work. This page has been updated to reflect those changes.</p>
<p>Forms referenced in this document are available on our office’s website at <a href="https://oipc.ab.ca/forms/" target="_blank" rel="noopener">https://oipc.ab.ca/forms/</a>.</p>
<p>Please note that some important definitions are provided at the bottom of this page.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#top-of-page">Back to top of the page</a></p>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="commissioner-mandate"></a></p>
<h2>Commissioner’s Mandate</h2>
<p>The Commissioner is not a part of the Government of Alberta. The Commissioner is an independent Officer of the Legislature and reports directly to the Alberta Legislative Assembly.</p>
<p>The Commissioner, through the Office of the Information and Privacy Commissioner (OIPC), carries out the legislative and regulatory responsibilities related to Alberta public bodies set out in the following laws:</p>
<ul>
<li><em>Access to Information Act </em>(ATIA) [in force June 2025]</li>
<li><em>Protection of Privacy Act</em> (POPA) [in force June 2025]</li>
<li><em>Freedom of Information and Protection of Privacy Act</em> [repealed June 2025] (FOIP Act)</li>
</ul>
<p><strong> </strong></p>
<h3>Transition from FOIP to ATIA and POPA</h3>
<p>Public bodies were subject to the FOIP Act until mid-June of 2025.  When ATIA and POPA are brought into force, these Acts will repeal the FOIP Act.  The ATIA applies to access to information requests.  POPA applies to review responses to correction requests made after POPA comes into force. It also applies to review complaints regarding the collection, use or disclosure of an individual’s own personal information by a public body where the individual first makes a complaint to the public body concerned.</p>
<p>The FOIP Act continues to apply to review responses to access or correction requests made or third parties notification decisions prior to June 2025. It also applies to complaints about the collection, use or disclosure of personal information by a public body which occurred prior to the repeal of the FOIP Act.   For more information, please see the <a href="https://oipc.ab.ca/resource/practice-note-transitional-foip-to-atia-popa/" target="_blank" rel="noopener">Practice Note-Transitional- FOIP Act to ATIA and POPA</a>.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#top-of-page">Back to top of the page</a></p>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="what-we-do"></a></p>
<h2>What We Do…</h2>
<ul>
<li>Review the decisions of public bodies in regard to requests for access to information or correction of personal information made under the Acts</li>
<li>Review complaints regarding the collection, use or disclosure of personal information</li>
<li>Under POPA, investigate complaints about whether an organization is in compliance with the Act, such as enquiries into an organization’s general practices</li>
<li>Try and settle reviews and complaints</li>
<li>Where settlement cannot be achieved or as instructed by the Commissioner, conduct inquiries and issue binding orders</li>
</ul>
<p style="font-size: 0.9em; color: grey;"><a href="#top-of-page">Back to top of the page</a></p>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="what-we-do-not-do"></a></p>
<h2>What We Do Not Do…</h2>
<ul>
<li>Act as an advocate on behalf of any party to a review or investigation</li>
<li>Release records that are the subject of a review</li>
<li>Store records on behalf of the Government of Alberta or any other party</li>
<li>Impose fines or award damages</li>
<li>Hear appeals of claims, benefits or decisions that do not fall under the Acts</li>
<li>Discipline, terminate or reinstate employees</li>
<li>Regulate the actions of individuals as private citizens</li>
<li>Regulate the constituency offices of members of the legislative assembly (but we do regulate certain access and privacy issues involving actions of cabinet members and ministries)</li>
</ul>
<p style="font-size: 0.9em; color: grey;"><a href="#top-of-page">Back to top of the page</a></p>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="making-request"></a></p>
<h2>Making a Request for Review or Complaint to the Commissioner</h2>
<p>Under the Acts:</p>
<ul>
<li>Using the <a href="/wp-content/uploads/2025/06/Form_ATIA-Request_for_Review_202506.pdf" target="_blank" rel="noopener">ATIA Request for Review form</a>, an applicant may ask the Commissioner to review any decision, act or failure to act by the public body that relates to an applicant’s access to information request</li>
<li>Using the <a href="/wp-content/uploads/2025/06/Form_ATIA-Third-Party_Request_for_Review_202506.pdf" target="_blank" rel="noopener">ATIA Third-Party Request for Review form</a>, a third party who has been notified by a public body under ATIA that its information will be given to an applicant may ask the Commissioner to review that decision</li>
<li>Using the <a href="/wp-content/uploads/2025/06/Form_POPA-Privacy_Correction_Request_for_Review_202506.pdf" target="_blank" rel="noopener">POPA Privacy/Correction Request form</a>, an individual may ask the Commissioner to investigate if they believe that their own personal information has been collected, used or disclosed in contravention of POPA</li>
<li>Any person may ask the Commissioner to investigate whether an organization or public body is in compliance with POPA, such as enquiries into an organization’s general practices.</li>
</ul>
<p style="font-size: 0.9em; color: grey;"><a href="#top-of-page">Back to top of the page</a></p>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="time-limits"></a></p>
<h2>Time Limits to Request a Review</h2>
<p>A review may be requested by completing and submitting the applicable request for review form (see “Making a Request for Review or Complaint to the Commissioner” above) to the OIPC within the following timelines:</p>
<p><strong>Note</strong>: for the interpretation of “business day” please see <a href="/resource/practice-note-business-day-atia-popa/" target="_blank" rel="noopener">Practice Note &#8211; Business Day &#8211; ATIA and POPA</a></p>
<h3>ATIA</h3>
<p>For reviews of access requests, within 60 business days after an applicant is notified of the decision, act or failure to act that is the subject to the request.</p>
<h3>POPA</h3>
<p>For correction requests, within 60 business days after the individual is notified of the decision, act or failure to act that is the subject to the request.</p>
<p>For reviews concerning the collection, use or disclosure of one’s own personal information that may be contrary to POPA, no sooner than the expiry of the 30 business days that the public body has to respond to the privacy complaint AND within 60 business days after receiving a response to the privacy complaint from the public body &#8211; or in the case of non response, within 60 business days after the 30 business days the public body had to respond.</p>
<p><strong> </strong></p>
<h3>ATIA and Third Parties</h3>
<p>For third party reviews, within 20 business days after being notified by a public body of its decision to give an applicant access to third party information. The Commissioner has no power to allow a third party a longer period to submit a request for review.</p>
<p><em>Note this important process change for public bodies and third parties: </em></p>
<p><em>As of <strong>February 1, 2024</strong>, the OIPC no longer conducts courtesy searches on behalf of public bodies to determine if a third party request for review has been received by this office.  ATIA now requires that a third party deliver a written request to the Commissioner <u>and </u>the head of the Public Body.   </em></p>
<p style="font-size: 0.9em; color: grey;"><a href="#top-of-page">Back to top of the page</a></p>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="overview-proceedings"></a></p>
<h2>Overview of Proceedings</h2>
<h3>Intake</h3>
<p>To initiate a review or make privacy complaint, the applicable form must be completed (see “Making a Request for Review or Complaint to the Commissioner” above) AND submitted together with all supporting documents <u>in one submission</u>. Otherwise, the submission will be returned. We also enforce a 15-page limit for submissions.</p>
<p>Every submitted form is checked for:</p>
<ul>
<li>Jurisdiction &#8211; is it something the OIPC can do under one of the Acts?</li>
<li>Whether it was received by the OIPC within the required time limits</li>
<li>Whether there is evidence that substantiates the request for review or complaint</li>
</ul>
<p>Any person who submits a form for making a review or complaint will be contacted at the intake stage to discuss their submission and obtain clarification. They must be available to participate in our process and respond to requests in a timely manner, usually by phone and/or email. Otherwise, a file may not be opened. Any person who cannot meet this requirement, may name an agent to represent them.</p>
<p>The responding public body may also be contacted at this stage, as required.</p>
<p>Please note our refer-back process for privacy complaints and adequacy of search reviews.</p>
<p><strong>Refer-back for privacy complaints</strong></p>
<p>For complaints regarding the collection, use or disclosure of personal information under POPA about one’s own personal information, individuals must first make the complaint to the public body as required by POPA.</p>
<p><strong>Refer-back for adequacy of search reviews</strong><strong>  </strong></p>
<p>For reviews under ATIA where the only concern is that an applicant believes the public body holds more responsive records than what were processed in the request (an ‘adequate search concern’), the applicant must first submit the concern directly to the public body, along with supporting evidence as to why they believe additional records exist.</p>
<p>We require that the public body be given at least 30 business days to respond.  After attempting to resolve the matter directly with the public body, if the applicant still has reason to believe the response does not comply with the relevant law they can bring the concern back to our office. At that point, our office will consider whether further investigation by the OIPC is warranted.</p>
<p><strong>Issue identification</strong></p>
<p>At the intake phase, the Intake Team will work with the person who submitted a form for making a request for review or privacy complaint to identify the issues for review or investigation.  Only those issues that (a) have enough evidence; and, (b) are within our jurisdiction will move forward. The identified issues will be communicated to the person to confirm their understanding and, if applicable, to advise on the limits of our jurisdiction.</p>
<p>If the OIPC proceeds with a review or investigation, a file is opened, and an acknowledgment letter (containing the confirmed issues) is sent to the person and the public body. A copy of any request for review form submitted is included with the letter. Forms submitted containing general privacy complaints made under POPA are not provided to the public body.</p>
<p>In the letter to the public body, it will be asked to provide a contact person who will be responsible for working with the assigned investigator to settle the matter. The contact person must have the ability to settle the issues. This means that they must have timely access to the decision-maker or directly involve the decision-maker in the conversations.</p>
<p><strong>New records requirements and timelines</strong><strong>  </strong></p>
<p>For access request reviews, the public body will also be asked to provide a copy of the records to the OIPC with the inclusion of a records index within 7 business days of a notification letter, in accordance with the <a href="/resource/practice-note-preparing-records-at-issue-and-index-of-records/" target="_blank" rel="noopener">Practice Note &#8211; Preparing Records at Issue and Index of Records</a>.  It may also be asked to provide the OIPC with a copy of the access request and any correspondence concerning the request with the applicant.  The OIPC will provide a link to securely send records and any other sensitive documentation to the OIPC.</p>
<p>The requirement to provide records or information at issue does not apply to records or information over which solicitor-client privilege, litigation privilege, or informer privilege is being claimed, or information withheld under sections 4(1)(a), (s), (t), (w), 27, 32(1)(a) or 32(2) of the ATIA. Public bodies (Respondents) will be required to provide a submission that contains the page numbers and an explanation that supports the application of the sections to the records.  The <a href="/resource/practice-note-providing-affidavits-and-other-evidence/" target="_blank" rel="noopener">Practice Note &#8211; Providing Affidavits and other Evidence</a> provides an explanation as to the expected content of the submission, even though it is not usually in affidavit form at the settlement stage.</p>
<p>&nbsp;</p>
<p><strong>Request for Review Forms and Attachments Are Disclosed</strong></p>
<p>A copy of any request for review form and any attachments submitted along with the form must be disclosed to the public body under section 60(1)(a) of ATIA and section 39(1)(a) of POPA As a result, any person submitting one of these forms should specify to the OIPC if there is information in the form or accompanying attachments that they want the Commissioner to consider removing before sharing with the public body.  In considering these requests, consideration will be given to whether the information should be disclosed for fairness purposes or if it is necessary to conduct the review.</p>
<p><strong>Address for Service</strong></p>
<p>Each party to a review or investigation must provide an address for service to which all official communications will be sent for the purposes of the review or investigation.</p>
<p>As noted above, we must have an effective and timely means of communication with the parties.  As such, each party is to provide us with an email address for this purpose.  We also require a mailing address which may be used to deliver certain correspondence related to the file.  We will use secure email or other forms of secure electronic transmission to send communications containing sensitive information.</p>
<p><strong>Person making the request for review or complaint</strong></p>
<p>The address for service is to be identified on the applicable form.</p>
<p><strong>Public Body</strong></p>
<p>The address for service of the public body will be identified in the acknowledgement letter that the OIPC sends to each party as part of the initial notification process.</p>
<p><strong>Changes or Updates</strong></p>
<p>A party must use the Change of Contact and/or Address for Service Form on the OIPC website to update contact information or the address for service at any time during the review/investigation.</p>
<p>The address for service of each party will be circulated to all other parties.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#top-of-page">Back to top of the page</a></p>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="review-investigation"></a></p>
<h2>Review and Investigation</h2>
<p>An OIPC investigator, known as a Senior Information and Privacy Manager (SIPM) will be assigned to try to settle your request for review or privacy complaint.</p>
<p>The office receives a high volume of requests for reviews and complaints. As such, your file may be inactive until the SIPM has the capacity to begin to work on it.  The parties will be notified when the SIPM starts actively working on the file.  While the parties wait to hear from the SIPM, we encourage the parties to try to resolve the matter directly with one another.</p>
<p>Our new case resolution process involves us trying to settle matters under review or investigation in as short a time as is possible.  That is why we try to settle matters verbally over the phone.  As such, once a file is activated, we must be able to reach the parties, usually by phone, in a timely manner in order to participate in our settlement process.  If we cannot reach the party who requested the review or made the complaint, we may discontinue the review or investigation.  If this occurs, the parties will be notified.</p>
<p>The OIPC has shorter timelines to complete reviews under ATIA and POPA.  Therefore, it is imperative that all parties to a review provide requested information and be available for discussions about the matter in a timely fashion.  Requests to extend deadlines for providing information or discussing settlement must be reasonable with consideration for the shortened timelines.</p>
<p>The SIPM begins the review or investigation by examining the confirmed issues, the submissions received, and in the case of a review of an access request the records provided by the public body.  The SIPM also reviews the relevant law and any past cases that have interpreted the law against the issues to be determined.</p>
<p>The SIPM will contact the Respondent to gather any relevant evidence necessary to form an opinion about whether the law was complied with by the Respondent.</p>
<p>The SIPM may also need to contact the person who made the request or complaint for additional information.  Please note that we will not accept documented evidence from any party unless it is requested by the SIPM.  Any unsolicited evidence will be returned or deleted.</p>
<p>The SIPM will form an opinion about whether the Respondent has complied with the law as it relates to the issues under review or investigation.  The SIPM will discuss the opinion with the parties in an effort to settle the issues.  The Respondent may agree to take certain actions in order to remedy any non-compliance.</p>
<p>Any resolution reached will be documented in writing and sent to the parties.  As applicable, the SIPM will ensure that any agreed-upon terms are followed by the Respondent.</p>
<p><strong>New rules respecting late raising of discretionary exceptions to access</strong><strong> reviews</strong></p>
<p>The OIPC will not consider any late raising of discretionary exceptions under ATIA at the settlement phase after the acknowledgement letter is issued.  This is because, at that time, we have confirmed the issues with the applicant.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#top-of-page">Back to top of the page</a></p>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="inquiries"></a></p>
<h2>Inquiries</h2>
<p>If any or all of the issues are not settled during the settlement phase of a review, and the person who made the request for review wants to proceed further in the review process to inquiry, the SIPM will work with the parties to determine any agreed-upon facts.  The file will then be brought to the Commissioner to determine whether an inquiry will proceed, <em>only </em>on those unsettled issues.</p>
<p>Once the file is transferred to the Commissioner, the SIPM will close the file at the settlement stage.</p>
<p>Inquiries are formal adjudicative proceedings.  The inquiry process is not an examination of the process or an evaluation of the findings and recommendations made during the settlement phase. The inquiry gives the parties an opportunity to present their evidence “de novo” (from the beginning) and to rebut or support evidence presented by the other party.</p>
<p>The Commissioner may refuse to conduct an inquiry in certain circumstances:</p>
<ul>
<li>The subject matter has been dealt with in an order or investigation report of the Commissioner</li>
<li>The circumstances warrant refusing to conduct an inquiry (for instance, if there is no meaningful remedy)</li>
<li>Under ATIA, the applicant has not attempted to resolve the matter directly with the public body concerned.  The Commissioner currently considers this factor in relation to single-issue adequacy of search concerns.</li>
<li>Under POPA, a person who believes that their own personal information has been collected used or disclosed in contravention of the Act did not make a complaint to the public body concerned before delivering a request for review to the Commissioner</li>
</ul>
<p>A decision by the Commissioner to refuse to conduct an inquiry will be issued to the parties in writing.</p>
<p>If any unsettled issues proceed to inquiry, a Confirmation of Inquiry letter will be issued to the parties, which will confirm the issues for the inquiry.  A Notice of Inquiry will be issued at a later date which includes a copy of the applicable request for review form and attachments and sets out a schedule of dates for the written submissions of the parties.</p>
<p><strong>Note: Under POPA, only reviews of an allegation of collecting, using or disclosing one’s own personal information and related to correction requests may proceed to inquiry; general privacy complaints cannot.</strong></p>
<p><strong>Affected Parties and Intervenors</strong></p>
<p>Some inquiries may include “affected parties”.  An affected party is any other party who, in the opinion of the Commissioner, is affected by the request for review.  A copy of the request for review form and attachments may be provided to the affected party.</p>
<p>An affected party may make representations to the Commissioner at inquiry, but is not required to participate.</p>
<p>In certain cases, the Commissioner may give intervenor status to parties, if the Commissioner determines it is appropriate.  An intervenor can be useful in bringing a broader perspective to issues than the parties involved.</p>
<h3>Order</h3>
<p>On completing an inquiry, the Commissioner or delegated adjudicator must issue an Order disposing of the matter.</p>
<p>An Order made by the Commissioner or delegated adjudicator is final.  However, a party may apply to the Court of King’s Bench of Alberta for judicial review of an Order.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#top-of-page">Back to top of the page</a></p>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="timelines-completion"></a></p>
<h2>Timelines to complete a review</h2>
<p>ATIA and POPA set out 180 business days to complete a review and may extend up to another 180 business days if needed to complete an inquiry.  These timelines apply to the time taken when the Commissioner authorizes a staff member to try and settle the matter under review.  A maximum of 180 business days will be allotted to the settlement phase prior to inquiry.</p>
<p>How will the OIPC count the 180 business days timeline for completion under ATIA/POPA?</p>
<p>The OIPC considers a review to be “received” under section 60(1) of ATIA and section 39(1) of POPA and the 180 business days timeline starts once we have determined that:</p>
<ul>
<li>we have jurisdiction to conduct the review, and</li>
<li>the OIPC has confirmed the issues for review in writing with the person who asked for the review.</li>
</ul>
<p>Parties will be notified as to the anticipated date for completion and any extensions to the anticipated date for completion.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#top-of-page">Back to top of the page</a></p>

		</div>
	</div>

<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="definitions"></a></p>
<h2>Definitions</h2>
<ul>
<li>Applicant &#8211; a person who makes an access to information request under ATIA or a request for correction under POPA concerning their own personal information</li>
<li>Complainant &#8211; a person who makes a general complaint about the privacy practices of a public body under POPA</li>
<li>Public Bodies &#8211; public sector entities subject to ATIA and POPA</li>
<li>Senior Information and Privacy Manager (SIPM) &#8211; the person that the Commissioner has authorized to investigate and try to settle the confirmed issues at the settlement phase.  May also be referred to as an investigator</li>
<li>Settlement &#8211; a process authorized by the Commissioner to explore opportunities to settle issues with the parties.  May also be referred to as a mediation or investigation</li>
<li>Third Party &#8211; a person, a group of persons, or an organization other than an applicant or other person who requests a review under POPA and the public body that is involved in the review</li>
</ul>
<p>If you have any questions with respect to the OIPC review or investigation process, please <a href="/about-us/contact-us/" target="_blank" rel="noopener">contact the OIPC</a>.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#top-of-page">Back to top of the page</a></p>

		</div>
	</div>
<br />

	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
June 2025</p>

		</div>
	</div>
<br />

<table id="tablepress-2-no-3" class="tablepress tablepress-id-2">
<tbody class="row-striping">
<tr class="row-1">
	<td class="column-1"><p><strong>Disclaimer</strong><br><br />
This document is not intended as, nor is it a substitute for, legal advice, and is not binding on the Information and Privacy Commissioner of Alberta. Responsibility for compliance with the law (and any applicable professional or trade standards or requirements) remains with each organization, custodian or public body. All examples used are provided as illustrations. The official versions of the laws <a href="https://oipc.ab.ca/legislation/" target="_blank" rel="noopener">the OIPC oversees</a> and their associated regulations should be consulted for the exact wording and for all purposes of interpreting and applying the legislation. The Acts are available on the website of <a href="https://www.alberta.ca/alberta-kings-printer.aspx" rel="noopener" target="_blank">Alberta King's Printer</a>.</p></td>
</tr>
</tbody>
</table>
<!-- #tablepress-2-no-3 from cache --></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Procedures for Reviews and Privacy Complaints &#8211; Settlement Phase &#8211; FOIP, HIA, PIPA</title>
		<link>https://oipc.ab.ca/resource/procedures-reviews-privacy-complaints-settlement-foip-hia-pipa/</link>
		
		<dc:creator><![CDATA[Chris Stinner]]></dc:creator>
		<pubDate>Wed, 11 Jun 2025 21:55:49 +0000</pubDate>
				<guid isPermaLink="false">https://oipc.ab.ca/?post_type=resource&#038;p=16873</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="top-of-page"></a></p>
<p>This document provides parties with a summary of the procedures under which reviews and investigations into privacy complaints are conducted under the <em>Freedom of Information and Protection of Privacy Act </em>(FOIP Act), the <em>Health Information Act </em>(HIA) and the <em>Personal Information Protection Act </em>(PIPA) at the settlement phase.  FOIP Act applies to public bodies, such as government departments, municipalities and police services.  HIA applies to health custodians including hospitals, physicians and dentists.  PIPA applies to organizations operating in the private sector.</p>
<p>In June of 2025, the FOIP Act was repealed and replaced with the <em>Access to Information Act </em>(ATIA) and the <em>Protection of Privacy Act</em> (POPA).  Please see below under the heading “Transition from FOIP to ATIA and POPA” for more information about whether your review falls under ATIA, POPA or the FOIP Act.</p>
<p>For information about the procedures for reviews and privacy complaints under the new <strong>ATIA and POPA</strong>, see:  <a href="https://oipc.ab.ca/resource/procedures-reviews-privacy-complaints-settlement-atia-popa/" target="_blank" rel="noopener">Procedures for Reviews and Privacy Complaints &#8211; Settlement Phase &#8211; ATIA and POPA</a>.</p>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<div style="border: 1px solid #ccc; padding: 15px; border-radius: 5px;">
<p><strong>Table of Contents</strong></p>
<ul>
<li><a href="#what-is-review">What is a review?</a></li>
<li><a href="#what-is-investigation">What is an investigation?</a></li>
<li><a href="#settlement-phase">What is the settlement phase?</a></li>
<li><a href="#commissioner-mandate">Commissioner’s Mandate</a></li>
<li><a href="#transition-foip-atia-popa">Transition from FOIP to ATIA and POPA</a></li>
<li><a href="#what-we-do">What We Do…</a></li>
<li><a href="#what-we-do-not-do">What We Do Not Do…</a></li>
<li><a href="#making-request">Making a Request for Review or Complaint to the Commissioner</a></li>
<li><a href="#time-limits">Time Limits to Request a Review</a></li>
<li><a href="#overview-proceedings">Overview of Proceedings</a></li>
<li><a href="#definitions">Definitions</a></li>
</ul>
</div>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="what-is-review"></a></p>
<h2>What is a review?</h2>
<p>The Commissioner has authority under the FOIP Act, HIA and PIPA to review certain matters.</p>
<p>Under the FOIP Act, the Commissioner has authority to review the following matters:</p>
<ul>
<li>any decision, act or failure to act by the head of a public body related to requests for access to information,</li>
<li>a decision by the head of a public body to give access to information of a third party,</li>
<li>whether a public body has collected, use or disclosed an individual’s own personal information contrary to the Act, and</li>
<li>any decision, act or failure to act of the head related to a correction request.</li>
</ul>
<p>Under the HIA, the Commissioner has authority to review the following matters:</p>
<ul>
<li>any decision, act or failure to act of a custodian related to a request for access or correction concerning one’s own health information,</li>
<li>where an individual believes that their own health information has been collected, used or disclosed by a custodian contrary to HIA, and</li>
<li>the refusal of a health custodian to disclose health information pursuant to s.47(2).</li>
</ul>
<p>Under PIPA the Commissioner has authority to review any decision, act or failure to act of an organization related to a request for access by an individual to their own personal information.</p>
<p>Reviews generally have two phases.  A settlement phase, which involves the Case Resolution Team attempting to settle the matter under review, and an inquiry phase, which is a formal adjudicative hearing conducted by the Adjudication Team from which an order is issued.  An inquiry may occur if settlement is not achieved.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#top-of-page">Back to top of the page</a></p>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="what-is-investigation"></a></p>
<h2>What is an investigation?</h2>
<p>Under PIPA, the Commissioner is authorized to investigate privacy complaints about the following:</p>
<ul>
<li>personal information has been collected, used or disclosed by an organization in contravention of this Act or in circumstances that are not in compliance with this Act,</li>
<li>notification of an incident described in section 34.1 has not been provided in accordance with this Act, and</li>
<li>an organization is not in compliance with this Act.</li>
</ul>
<p>Privacy complaints will also generally try to be settled by the Case Resolution Team.  If settlement cannot be achieved, the matter may move to inquiry, like in the case of reviews.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#top-of-page">Back to top of the page</a></p>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="settlement-phase"></a></p>
<h2>What is the settlement phase?</h2>
<p>The settlement phase is the first phase of a review or complaint investigation.  It is a process authorized by the Commissioner to explore opportunities to settle issues with the parties.  It may also be referred to as a mediation or investigation.  The majority of files are resolved at the settlement phase.</p>
<p>Please note that our office made some adjustments to our procedures in 2024 and 2025, in the interest of creating greater efficiencies in our work. This page has been updated to reflect those changes.</p>
<p>Forms referenced in this document are available on our office’s website at <a href="https://oipc.ab.ca/forms/" target="_blank" rel="noopener">https://oipc.ab.ca/forms/</a>.</p>
<p>Also, please note that some important definitions are provided at the bottom of this page.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#top-of-page">Back to top of the page</a></p>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="commissioner-mandate"></a></p>
<h2>Commissioner’s Mandate</h2>
<p>The Commissioner is not a part of the Government of Alberta. The Commissioner is an independent Officer of the Legislature and reports directly to the Alberta Legislative Assembly.</p>
<p>Through the Office of the Information and Privacy Commissioner (OIPC), the Commissioner performs the legislative and regulatory responsibilities set out in the following laws:</p>
<ul>
<li><em>Freedom of Information and Protection of Privacy Act</em> (FOIP Act) [repealed June 11, 2025]</li>
<li><em>Access to Information Act </em>(ATIA) [in force June 11, 2025]</li>
<li><em>Protection of Privacy Act</em> (POPA) [in force June 11, 2025]</li>
<li><em>Health Information Act </em>(HIA)</li>
<li><em>Personal Information Protection Act</em> (PIPA)</li>
</ul>
<p><strong> </strong></p>
<p style="font-size: 0.9em; color: grey;"><a href="#top-of-page">Back to top of the page</a></p>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="transition-foip-atia-popa"></a></p>
<h3>Transition from FOIP to ATIA and POPA</h3>
<p>Public bodies were subject to the FOIP Act until June 11, 2025.  When ATIA and POPA are brought into force, these Acts will repeal the FOIP Act.  The ATIA applies to access to information requests.  POPA applies to review responses to correction requests made after June 2025. It also applies to review complaints regarding the collection, use or disclosure of an individual’s own personal information by a public body where the individual first makes a complaint to the public body concerned after June 2025.</p>
<p>The FOIP Act continues to apply to review responses to access or correction requests made or third parties notification decisions prior to June 2025. It also applies to complaints about the collection, use or disclosure of personal information by a public body which occurred prior to the repeal of the FOIP Act.</p>
<p>For more information, please see the <a href="https://oipc.ab.ca/resource/practice-note-transitional-foip-to-atia-popa/" target="_blank" rel="noopener">Practice Note-Transitional- FOIP Act to ATIA and POPA</a>.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#top-of-page">Back to top of the page</a></p>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="what-we-do"></a></p>
<h2>What We Do…</h2>
<ul>
<li>Review the decisions of public bodies, health custodians, and private sector organizations in regards to requests for access to information or correction of personal or health information made under the Acts</li>
<li>Review or investigate complaints regarding the collection, use or disclosure of personal or health information</li>
<li>Under PIPA, investigate complaints about whether an organization is in compliance with the Act, such as enquiries into an organization’s general practices, and in relation the duty to notify the Commissioner about a privacy breach under section 34.1</li>
<li>Try and settle reviews and complaints</li>
<li>Where settlement cannot be achieved or as instructed by the Commissioner, conduct inquiries and issue binding orders</li>
</ul>
<p style="font-size: 0.9em; color: grey;"><a href="#top-of-page">Back to top of the page</a></p>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="what-we-do-not-do"></a></p>
<h2>What We Do Not Do…</h2>
<ul>
<li>Act as an advocate on behalf of any party to a review or investigation</li>
<li>Release records that are the subject of a review</li>
<li>Store records on behalf of the Government of Alberta or any other party</li>
<li>Impose fines or award damages</li>
<li>Hear appeals of claims, benefits or decisions that do not fall under the Acts</li>
<li>Discipline, terminate or reinstate employees</li>
<li>Regulate the actions of individuals as private citizens</li>
<li>Regulate the constituency offices of members of the legislative assembly (but we do regulate access and privacy issues involving actions of cabinet members and ministries)</li>
</ul>
<p style="font-size: 0.9em; color: grey;"><a href="#top-of-page">Back to top of the page</a></p>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="making-request"></a></p>
<h2>Making a Request for Review or Complaint to the Commissioner</h2>
<p><strong>Under the FOIP Act:</strong></p>
<ul>
<li>an applicant may ask the Commissioner to review any decision, act or failure to act by the public body that relates to an applicant’s access to information request or request for correction, and</li>
<li>a third party who has been notified by a public body that its information will be given to an applicant may ask the Commissioner to review that decision</li>
</ul>
<p>Complete the <a href="https://oipc.ab.ca/wp-content/uploads/2025/06/Form_ATIA-Request_for_Review_202506.pdf" target="_blank" rel="noopener">ATIA Request for Review form</a> to request any of these reviews under FOIP Act.</p>
<ul>
<li>Under FOIP Act, a complainant may ask the Commissioner to review an individual’s belief that their own personal information has been collected, used or disclosed by a public body in contravention of this Act or any decision, act or failure to act in relation to a request to correct personal information.</li>
</ul>
<p>Complete the <a href="https://oipc.ab.ca/wp-content/uploads/2025/06/Form_POPA-Privacy_Correction_Request_for_Review_202506.pdf" target="_blank" rel="noopener">POPA Request for Review Form</a> to request any of these reviews under FOIP Act</p>
<p><strong>Under HIA and PIPA:</strong></p>
<ul>
<li style="list-style-type: none;">
<ul>
<li>an applicant may ask the Commissioner to review or investigate any act, decision or failure to act by a custodian or organization related to an access or correction request,</li>
<li>a complainant may ask the Commissioner to review or investigate their belief that their own personal or health information has been collected, used or disclosed contrary to this Act</li>
</ul>
</li>
</ul>
<ul>
<li>Under PIPA, an individual may also ask the Commissioner to investigate whether an organization is in compliance with this Act, such as enquiries into an organization’s general practices.</li>
</ul>
<p>Complete the <a href="https://oipc.ab.ca/wp-content/uploads/2025/06/Form_PIPA-Request_for_Review_Complaint_202506.pdf" target="_blank" rel="noopener">PIPA Request for Review/Privacy Complaint and Correction Form</a> for reviews or complaints under this Act</p>
<p>Complete the <a href="https://oipc.ab.ca/wp-content/uploads/2025/06/Form_HIA_Request_for_Review_Complaint_202506.pdf" target="_blank" rel="noopener">HIA Request for Review/Privacy Complaint and Correction Form</a> for reviews or complaints under this Act</p>
<p style="font-size: 0.9em; color: grey;"><a href="#top-of-page">Back to top of the page</a></p>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="time-limits"></a></p>
<h2>Time Limits to Request a Review</h2>
<p>A review or investigation may be requested by completing the applicable form to the OIPC within the following timelines:</p>
<h3>FOIP Act and HIA</h3>
<p>Within 60 days after they are notified of the decision by the public body or custodian or become aware of an incident involving the collection, use and disclosure of personal or health information.</p>
<h3>PIPA</h3>
<p><strong>Within 30 days</strong> from the day that they are notified of the decision by the organization. Incidents involving the collection, use and disclosure of personal information under PIPA must be delivered to the Commissioner within a reasonable time period.</p>
<p>The Commissioner may allow for reviews or complaints to be submitted outside of the time limits above, based on the circumstances and where the law permits.</p>
<h3>Third Parties under FOIP</h3>
<p>A third party must complete and submit the relevant form (see “Making a Request for Review or Complaint to the Commissioner” above) to the OIPC within 20 days after being notified by a public body of its decision to give an applicant access to third party information. The Commissioner has no power to allow a third party a longer period to submit a request for review.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#top-of-page">Back to top of the page</a></p>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="overview-proceedings"></a></p>
<h2>Overview of Proceedings</h2>
<h3>Intake</h3>
<p>To initiate a review or make privacy complaint, the applicable form must be completed (see “Making a Request for Review or Complaint to the Commissioner” above) AND submitted together with all supporting documents <strong><u>in one submission</u></strong>. Otherwise, the submission will be returned. We also enforce a 15-page limit for submissions.</p>
<p>Every submitted form is checked for:</p>
<ul>
<li>Jurisdiction &#8211; is it something the OIPC can do under one of the Acts?</li>
<li>Whether it was received by the OIPC within the required time limits</li>
<li>Whether there is evidence that substantiates the request for review or complaint</li>
</ul>
<p>Any person who submits a form for making a review or complaint will be contacted at the intake stage to discuss their submission and obtain clarification. They must be available to participate in our process and respond to requests in a timely manner, usually by phone and/or email. Otherwise, a file may not be opened. Any person who cannot meet this requirement, may name an agent to represent them.</p>
<p>The responding public body may also be contacted at this stage, as required.</p>
<p>Please note our refer-back process for privacy complaints and adequacy of search reviews.</p>
<p><strong>Refer-back for privacy complaints</strong></p>
<p>For complaints regarding the collection, use or disclosure of personal or health information, it is a requirement under OIPC processes to make the complaint first to the public body, custodian or organization, if the complainant has not already given the entity an opportunity to resolve the complaint.</p>
<p><strong>Refer-back for adequacy of search reviews</strong><strong>  </strong></p>
<p>For reviews where the only concern is that an applicant believes the public body, organization or custodian holds more responsive records than what were processed in the request (an ‘adequate search concern’), the applicant must first submit the concern directly to the entity, along with supporting evidence as to why they believe additional records exist.</p>
<p>We require that the entity be given at least 30 business days to respond.  After attempting to resolve the matter directly with the entity, if the applicant still has reason to believe the response does not comply with the relevant law they can bring the concern back to our office. At that point, our office will consider whether further investigation by the OIPC is warranted.</p>
<p><strong>Issue identification</strong></p>
<p>Working with the applicant/complainant, the OIPC will identify the review or complaint issues at the intake phase. Only those issues that (a) have enough evidence; and, (b) are within our jurisdiction will move forward. Those issues will be communicated to the applicant/complainant to confirm their understanding and, if applicable, to advise on the limits of our jurisdiction.</p>
<p>If the OIPC proceeds with a review or investigation, a file is opened, and an acknowledgment letter (containing the confirmed issues) is issued to the applicant/complainant and the public body/custodian/organization. A copy of the request for review form and any attachments to the request are included with the letter. General privacy complaint forms or related materials will not generally be provided to an organization.</p>
<p>In the letter to the public body/custodian/organization, it will be asked to provide a contact person who will be responsible for working with the assigned investigator to settle the matter. The contact person must have the ability to settle the issues. This means that they must have timely access to the decision-maker or directly involve the decision-maker in the conversations.</p>
<p><strong>New records requirements and timelines</strong><strong>  </strong></p>
<p>For access request reviews, the public body/custodian/organization will also be asked to provide a copy of the records to the OIPC with the inclusion of a records index, within 7 business days of a notification letter, in accordance with the <a href="https://oipc.ab.ca/resource/practice-note-preparing-records-at-issue-and-index-of-records/" target="_blank" rel="noopener">Practice Note &#8211; Preparing Records at Issue and Index of Records</a>.  It may also be asked to provide the OIPC with a copy of the access request and any correspondence concerning the request with the applicant.  The OIPC will provide a link to securely send records and any other sensitive documentation to the OIPC.</p>
<p>The requirement to provide records or information at issue does not apply to records or information over which solicitor-client privilege, litigation privilege, or informer privilege is being claimed.  The <a href="https://oipc.ab.ca/resource/practice-note-providing-affidavits-and-other-evidence/" target="_blank" rel="noopener">Practice Note &#8211; Providing Affidavits and other Evidence</a> provides an explanation as to the expected content of the submission, even though it is not usually in affidavit form at the settlement stage.</p>
<p>&nbsp;</p>
<p><strong>Request for Review Forms and Attachments Are Disclosed</strong></p>
<p>A copy of any request for review form and any attachments submitted along with the form must be disclosed to the public body, custodian or organization.  This is a requirement in these Acts.  As a result, any person submitting a request for review form under any of these Acts should specify to the OIPC if there is information in the form or accompanying attachments that they want the Commissioner to consider removing before sharing with the public body, custodian or organization.  In considering these requests, consideration will be given to whether the information should be disclosed for fairness purposes or if it is necessary to conduct the review.</p>
<p><strong>Address for Service</strong></p>
<p>Each party must provide an address for service to which all official communications will be sent for the purposes of the review/investigation.</p>
<p>As noted above, we must have an effective and timely means of communication with the parties. As such, each party is to provide us with an email address for this purpose. We also require a mailing address which may be used to deliver certain correspondence related to the file. We will use secure email or other forms of secure electronic transmission to send communications containing sensitive information.</p>
<p><strong>Applicant/Complainant</strong></p>
<p>The address for service is to be identified on the applicable form (see “Making a Request for Review or Complaint to the Commissioner” above).</p>
<p><strong>Public Body/Custodian/Organization</strong></p>
<p>The address for service of the public body/custodian/organization will be identified in the acknowledgement letter that the OIPC sends to each party as part of the initial notification process.</p>
<p><strong>Changes or Updates</strong></p>
<p>A party must use the Change of Contact and/or Address for Service Form on the OIPC website to update contact information or the address for service at any time during the review/investigation.</p>
<p>The address for service of each party will be circulated to all other parties.</p>
<h3>Review and Investigation</h3>
<p>An OIPC investigator, known as a Senior Information and Privacy Manager (SIPM) will be assigned to try to settle your request for review or privacy complaint.</p>
<p>The office receives a high volume of requests for reviews and complaints. As such, your file may be inactive until the SIPM has the capacity to begin to work on it. The parties will be notified when the SIPM starts actively working on the file. While the parties wait to hear from the SIPM, we encourage the parties to try to resolve the matter directly with one another.</p>
<p>Our new case resolution process involves us trying to settle matters under review or investigation in as short a time as is possible. That is why we try to settle matters verbally over the phone. As such, once a file is activated, we must be able to reach the parties, usually by phone, in a timely manner in order to participate in our case resolution process. If we cannot reach the applicant/complainant, we may discontinue the review or investigation. If this occurs, the parties will be notified.</p>
<p>The SIPM begins the review or investigation by examining the confirmed issues, the submission of the applicant/complainant and, in the case of a review of an access request, the records provided by the public body/custodian/organization. The SIPM also reviews the relevant law and any past cases that have interpreted the law against the issues to be determined.</p>
<p>The SIPM will contact the public body/custodian/organization (Respondent) to gather any relevant evidence necessary to form an opinion about whether the law was complied with by the respondent.</p>
<p>The SIPM may also need to contact the applicant/complainant for additional information. Please note that we will not accept documented evidence from an applicant/complainant unless it is requested by the SIPM. Any unsolicited evidence will be returned or deleted.</p>
<p>The SIPM will form an opinion about whether the Respondent has complied with the law as it relates to the issues under review or investigation. The SIPM will discuss the opinion with the parties in an effort to settle the issues. The Respondent may agree to take certain actions in order to remedy any non-compliance.</p>
<p>Any resolution reached will be documented in writing and sent to the parties. As applicable, the SIPM will ensure that any agreed-upon terms are followed by the Respondent.</p>
<h3>Inquiries</h3>
<p>If any or all of the issues are not settled and the applicant/complainant wants to proceed further in our process, the SIPM will work with the parties to determine any agreed-upon facts. The file will then be brought to the Commissioner to determine whether an inquiry will proceed, <em>only </em>on those unsettled issues.</p>
<p>Once the file is transferred to the Commissioner, the SIPM will close the file at the settlement stage.</p>
<p>Inquiries are formal adjudicative proceedings. The inquiry process is not an examination of the process or an evaluation of the findings and recommendations made during the review and investigation process. The inquiry gives the parties an opportunity to present their evidence “de novo” (from the beginning) and to rebut or support evidence presented by the other party.</p>
<p>The Commissioner may refuse to conduct an inquiry in certain circumstances:</p>
<ul>
<li>The subject matter has been dealt with, in an order or investigation report of the Commissioner</li>
<li>The circumstances warrant refusing to conduct an inquiry (for instance, if there is no meaningful remedy)</li>
</ul>
<p>A decision to refuse to conduct an inquiry will be issued to the parties in writing.</p>
<p>If any unsettled issues proceed to inquiry, a Confirmation of Inquiry letter will be issued to the parties, which will confirm the issues for the inquiry. A Notice of Inquiry will be issued at a later date which includes a copy of the Request for Review/Complaint Form and attachments and sets out a schedule of dates for the written submissions of the parties.</p>
<p><strong>Affected Parties and Intervenors</strong></p>
<p>Some inquiries may include “affected parties”. An affected party is any other party who, in the opinion of the Commissioner, is affected by the request for review or complaint. A copy of the relevant form (see “Making a Request for Review or Complaint to the Commissioner” above) and attachments may be provided to the affected party.</p>
<p>An affected party may make representation to the Commissioner at inquiry, but is not required to participate.</p>
<p>In certain cases, the Commissioner may give intervenor status to parties, if the Commissioner determines it is appropriate. An intervenor can be useful in bringing a broader perspective to issues than the parties involved.</p>
<h3>Order</h3>
<p>On completing an inquiry, the Commissioner or delegated adjudicator must issue an Order disposing of the matter.</p>
<p>An Order made by the Commissioner or delegated adjudicator is final. However, a party may apply to the Court of King’s Bench of Alberta for judicial review of an Order.</p>
<h2>Timelines to complete a review</h2>
<p>Under FOIP and HIA, the Commissioner is to complete a review within 90 days after the OIPC received the request for review or complaint unless that period is extended by the Commissioner.  PIPA allows the Commissioner to complete a review or investigation within one year from the day that the request for review/complaint was received by the OIPC. PIPA also allows the Commissioner to extend that period.</p>
<p>Parties will be notified as to the anticipated date for completion and any extensions to the anticipated date for completion.</p>
<p>For estimated timelines for the settlement phase of a review, see “How long will a review take” on the OIPC website at: <a href="https://oipc.ab.ca/information-access-review" target="_blank" rel="noopener">https://oipc.ab.ca/information-access-review</a> and <a href="https://oipc.ab.ca/privacy-correction-complaint" target="_blank" rel="noopener">https://oipc.ab.ca/privacy-correction-complaint</a></p>
<p style="font-size: 0.9em; color: grey;"><a href="#top-of-page">Back to top of the page</a></p>

		</div>
	</div>

<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="definitions"></a></p>
<h2>Definitions</h2>
<ul>
<li>Applicant &#8211; a person who makes an access to information request or a request for correction of their personal or health information under the FOIP Act, HIA or PIPA</li>
<li>Complainant &#8211; a person who believes their personal or health information has been collected, used or disclosed in contravention of one of the Acts</li>
<li>Custodians &#8211; health care providers and other identified entities subject to HIA</li>
<li>Organizations &#8211; private sector entities subject to PIPA</li>
<li>Public Bodies &#8211; public sector entities subject to FOIP Act</li>
<li>Senior Information and Privacy Manager (SIPM) &#8211; the person that the Commissioner has authorized to investigate and try to settle the confirmed issues at the settlement phase. May also be referred to as an investigator</li>
<li>Settlement &#8211; a process authorized by the Commissioner to explore opportunities to settle issues with the parties. May also be referred to as a mediation or investigation</li>
<li>Third Party &#8211; a person, a group of persons, or an organization other than an applicant or a Respondent (public body/custodian/organization)</li>
</ul>
<p>If you have any questions with respect to the OIPC review/investigation process, please <a href="https://oipc.ab.ca/about-us/contact-us/" target="_blank" rel="noopener">contact the OIPC</a>.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#top-of-page">Back to top of the page</a></p>

		</div>
	</div>
<br />

	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
June 2025</p>

		</div>
	</div>
<br />

<table id="tablepress-2-no-4" class="tablepress tablepress-id-2">
<tbody class="row-striping">
<tr class="row-1">
	<td class="column-1"><p><strong>Disclaimer</strong><br><br />
This document is not intended as, nor is it a substitute for, legal advice, and is not binding on the Information and Privacy Commissioner of Alberta. Responsibility for compliance with the law (and any applicable professional or trade standards or requirements) remains with each organization, custodian or public body. All examples used are provided as illustrations. The official versions of the laws <a href="https://oipc.ab.ca/legislation/" target="_blank" rel="noopener">the OIPC oversees</a> and their associated regulations should be consulted for the exact wording and for all purposes of interpreting and applying the legislation. The Acts are available on the website of <a href="https://www.alberta.ca/alberta-kings-printer.aspx" rel="noopener" target="_blank">Alberta King's Printer</a>.</p></td>
</tr>
</tbody>
</table>
<!-- #tablepress-2-no-4 from cache --></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Practice Note &#8211; Inquiry Procedures</title>
		<link>https://oipc.ab.ca/resource/practice-note-inquiry-procedures/</link>
		
		<dc:creator><![CDATA[Chris Stinner]]></dc:creator>
		<pubDate>Wed, 04 Jun 2025 23:25:24 +0000</pubDate>
				<guid isPermaLink="false">https://oipc.ab.ca/?post_type=resource&#038;p=16790</guid>

					<description><![CDATA[June 4, 2025]]></description>
										<content:encoded><![CDATA[
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="top-of-page"></a><br />
This Practice Note relates to inquiries under the <em>Freedom of Information and Protection of Privacy Act</em> (FOIP Act), <em>Access to Information Act</em> (ATIA), and <em>Protection of Privacy Act</em> (POPA), which apply to public bodies. It also relates to inquiries under the <em>Health Information Act</em> (HIA), which applies to custodians, and the <em>Personal Information Protection Act</em> (PIPA), which applies to organizations</p>
<p>In this document, “Commissioner” means the Commissioner or the Commissioner’s delegated Adjudicator. Public bodies, custodians and organizations are referred to as &#8220;respondents&#8221; for the remainder of this publication.</p>
<p>The inquiry process is a formal process that ends with a final written decision. Most inquiries are conducted in writing. The applicant or complainant who requested the review, and the respondent will be given an opportunity to provide a submission.</p>
<p>The Commissioner may identify and invite other individuals or organizations to participate in the inquiry if the Commissioner determines that they are affected by the inquiry.</p>
<p>The inquiry process begins with a Notice of Inquiry sent to the parties. This Notice sets out the issues for the inquiry and deadlines for parties to make submissions.</p>
<p>This Practice Note sets out the requirements for providing submissions, including timelines and page limits. Submissions not adhering to the requirements set out in this Practice Note may not be accepted.</p>
<p><!-- Table of Contents --></p>
<div style="border: 1px solid #ccc; padding: 15px; border-radius: 5px; margin-top: 20px;">
<p><strong>Table of Contents</strong></p>
<ul>
<li><a href="#preparing-submissions">Preparing submissions</a></li>
<li><a href="#page-limits-for-submissions">Page limits for submissions</a></li>
<li><a href="#submissions-are-exchanged">Submissions are exchanged</a></li>
<li><a href="#timelines-for-submissions">Timelines for submissions</a></li>
<li><a href="#decision-following-completion-of-inquiry">Decision following completion of inquiry</a></li>
<li><a href="#address-for-servicecontact-information">Address for Service/Contact information</a></li>
<li><a href="#correspondence-with-the-oipc">Correspondence with the OIPC</a></li>
<li><a href="#expedited-inquiries">Expedited Inquiries</a></li>
<li><a href="#glossary-of-terms">Glossary of Terms</a></li>
</ul>
</div>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="preparing-submissions"></a></p>
<h2>Preparing submissions</h2>
<p>For inquiries relating to access requests under the FOIP Act, ATIA, PIPA and HIA, the respondent usually has the burden of proof, to show that the claimed exception applies. Where an applicant is requesting personal information about <em>other</em> individuals (third parties) under the FOIP Act or ATIA, the applicant has the burden of proof to show that the information ought to be provided to the applicant. Where third party organizations are objecting to the disclosure of their confidential business information under the FOIP Act or ATIA, the organization has the burden of proof. For additional guidance on preparing submissions for an inquiry into the application of exceptions to access, see <a href="https://oipc.ab.ca/resource/practice-note-directions-respondent-submissions-inquiry/" target="_blank" rel="noopener">Practice Note &#8211; Directions to Respondents When Making Submissions</a></p>
<p>For inquiries relating to <span class="shortcode-tooltip">privacy complaints<span class="tooltip-c"><em>privacy complaints</em> includes complaints about the accuracy of an individual’s personal information and requests for reviews of decisions regarding a request to correct personal information</span></span> under the FOIP Act, HIA, PIPA and POPA, the complainant has to provide some reason for the Commissioner to find that the event complained about occurred as alleged. The respondent must then show that it had authority to take the action it did.</p>
<p>The purpose of a submission is for the party to make their case as it relates to the issues in the inquiry. For example, in an inquiry relating to an access request, an applicant might explain why they believe an exception applied to information in a record does not apply. The Respondent must explain why the exception does apply. In an inquiry relating to a complaint about the collection, use, or disclosure of personal information, the complainant should show what collection, use, or disclosure of their personal information occurred, and explain why they believe the collection, use, or disclosure was not permitted. The Respondent explains how the collection, use or disclosure was authorized.</p>
<p>Unless otherwise specified in the Notice of Inquiry, where an applicant or complainant does not bear the burden of proof, the applicant or complainant can rely on their request for review an any attachments instead of providing a submission to the inquiry. The applicant or complainant must inform the Commissioner in writing that they are relying on these documents, following the instructions set out in the Notice of Inquiry.</p>
<p>Parties should ensure they address each issue set out in the Notice of Inquiry. Parties are also encouraged to review relevant Orders, case law, and OIPC Practice Notes. Orders and other OIPC decisions are available <a href="https://oipc.ab.ca/decisions/" target="_blank" rel="noopener">here</a> and on <a href="https://www.canlii.org/" target="_blank" rel="noopener">CanLII.org</a>. The parties may also review other Practice Notes that address specific issues, available on the OIPC website.</p>
<p>Information that may be useful for parties to provide to the Commissioner for an inquiry includes:</p>
<ul>
<li>Excerpts from relevant legislation or regulations that apply to the operations of the public body, custodian or organization, and that relate to the issues in the inquiry;</li>
<li>Excerpts from policy manuals that set out relevant practices or policies of the public body, custodian or organization;</li>
<li>Excerpts and pinpoint citations of relevant orders and relevant court decisions; and</li>
<li>Excerpts and pinpoint citations of decisions made by Information and Privacy Commissioners in other jurisdictions that may be of assistance to the Commissioner when considering the issues.</li>
</ul>
<p>It is important to identify how the above information relates to the issues set out for the inquiry.</p>
<p>Do not provide entire copies of statutes, regulations, court decisions or Orders.</p>
<p>Upon receipt of the parties’ submissions, the Commissioner may request additional information or arguments from one or more parties. Deadlines for responses will be provided.</p>
<p>Parties should be aware that submissions previously provided for the settlement phase are generally not carried forward to the inquiry. All materials provided to the Commissioner for the inquiry will be attached to the Notice of Inquiry; parties are responsible for ensuring that any additional information they want the Commissioner to consider in the inquiry is included in their inquiry submission.</p>
<p>&nbsp;</p>
<p style="font-size: 0.9em; color: grey;"><a href="#top-of-page">Back to top of the page</a></p>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="page-limits-for-submissions"></a></p>
<h2>Page limits for submissions</h2>
<p>The maximum length for a submission is 20 pages. The Commissioner may decline to consider lengthy submissions. This limit does not include supporting evidence such as affidavits or excerpts of authorities.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#top-of-page">Back to top of the page</a></p>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="submissions-are-exchanged"></a></p>
<h2>Submissions are exchanged</h2>
<p>Parties must provide a copy of their submissions and related documents to each of the other parties listed in the Notice of Inquiry. Submissions and other documents that are not exchanged with the other parties will not be provided to the adjudicator for the inquiry.</p>
<p>The exception is where a party has sought and received permission to provide a portion of their submission or other document <em>in camera</em>. Parties wanting to request that part of their submission be accepted <em>in camera</em> must make the request in accordance with the process set out in the <a href="https://oipc.ab.ca/wp-content/uploads/2025/06/Form-Inquiry_In_Camera-2025.docx" target="_blank" rel="noopener">Request to Provide an <em>In Camera</em> Submission form</a>. Generally, the party must provide a proposed redacted version of the submission and provide detailed reasons for not exchanging the identified portions. Submissions will be accepted <em>in camera</em> only in specific circumstances set out in form.</p>
<p>Requests to provide part of a submission <em>in camera</em> may be rejected if they do not follow the process set out in the form.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#top-of-page">Back to top of the page</a></p>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="timelines-for-submissions"></a></p>
<h2>Timelines for submissions</h2>
<p>Each Act sets out specific time limits for completing inquiries under those Acts. While the OIPC considers these time limits to be directory &#8211; see<em> Peters v East 3rd Street North Vancouver Limited Partnership</em>, <a href="https://canlii.ca/t/jxbrl" target="_blank" rel="noopener">2023 BCSC 879 (CanLII)</a>, at paragraph 27, or  <em>Rahman v. Alberta College and Association of Respiratory Therapy</em>, <a href="https://canlii.ca/t/5mbt" target="_blank" rel="noopener">2001 ABQB 222 (CanLII)</a> &#8211; the inquiry process has been designed to meet those timelines in all possible cases.</p>
<p>Parties will be expected to provide their submissions and other requested information by the deadline provided in the Notice of Inquiry or correspondence from the adjudicator. A party may request a short time extension to provide a submission or response where necessary. Such requests must</p>
<ul>
<li>be made <em>before</em> the party’s deadline;</li>
<li>be made in writing;</li>
<li>include the additional time requested;</li>
<li>include reasons for the request;</li>
<li>be provided to the other parties listed in the Notice of Inquiry.</li>
</ul>
<p>Decisions to grant extensions are at the discretion of the Commissioner and may be constrained by the time limits for completing the inquiry.</p>
<p>Parties are encouraged to submit their extension requests using the <a href="https://oipc.ab.ca/wp-content/uploads/2025/06/Form-Submission_Deadline_Extension_Request-2025.docx" target="_blank" rel="noopener">Request to Extend the Submission Deadline form</a>, available on the OIPC website.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#top-of-page">Back to top of the page</a></p>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="decision-following-completion-of-inquiry"></a></p>
<h2>Decision following completion of inquiry</h2>
<p>Once the above inquiry process is complete, the Commissioner will review the submissions and other materials provided for the inquiry, and make a determination on the issues. The Commissioner’s decision will be provided to the parties in writing.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#top-of-page">Back to top of the page</a></p>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="address-for-servicecontact-information"></a></p>
<h2>Address for Service/Contact information</h2>
<p>Written inquiries are conducted by email or other electronic means as determined by the Commissioner. Parties are required to provide an email address for service to be used for the exchange of written inquiry submissions and other correspondence.</p>
<p>Parties unable to participate electronically may request permission to participate by mail. A formal request must be made to the adjudication team to participate by mail.</p>
<p>All parties must also provide written notice, as outlined above, of any changes to their address for service. The form for change of contact or address for service is available on <a href="https://oipc.ab.ca/forms/" target="_blank" rel="noopener">this page</a>.</p>
<p>If the applicant or complainant who asked for the inquiry fails to provide a current address for service or fails to give notice of changes to the address for service, the Commissioner may discontinue the inquiry.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#top-of-page">Back to top of the page</a></p>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="correspondence-with-the-oipc"></a></p>
<h2>Correspondence with the OIPC</h2>
<p>All inquiry materials must be provided in writing. During an inquiry, parties are asked to send all correspondence to the Adjudication Case Manager or Registrar of Expedited Inquiries, as directed. Do not contact or send correspondence directly to the Commissioner or adjudicator.</p>
<p>Parties with questions about the inquiry process can call or email the Adjudication Case Manager or Registrar of Expedited Inquiries; contact information will be provided in the correspondence sent to parties.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#top-of-page">Back to top of the page</a></p>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="expedited-inquiries"></a></p>
<h2>Expedited Inquiries</h2>
<p>In some circumstances, a request for a review may be streamlined to an expedited inquiry process. In general, the following requests for review may proceed to an expedited inquiry:</p>
<ul>
<li>a public body’s failure to respond to an access request under the ATIA;</li>
<li>a public body’s decision to extend its time to respond;</li>
<li>a public body’s decision to disregard a request; or</li>
<li>a public body’s decision that a request was abandoned.</li>
</ul>
<p>An organization’s or custodian’s failure to respond to an access request under PIPA or the HIA may be streamlined directly to an expedited inquiry process.</p>
<p>The expedited inquiry process generally involves condensing the usual inquiry process, including shortening submission schedules, and a strict adherence to timelines. Where available, respondents are encouraged to provide their submission using the relevant form, available on the OIPC website at <a href="https://oipc.ab.ca/forms/" target="_blank" rel="noopener">https://oipc.ab.ca/forms/</a>.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#top-of-page">Back to top of the page</a></p>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p><a id="glossary-of-terms"></a></p>
<h2>Glossary of Terms</h2>

<table id="tablepress-10" class="tablepress tablepress-id-10">
<thead>
<tr class="row-1">
	<th class="column-1">Term</th><th class="column-2">Definition</th>
</tr>
</thead>
<tbody class="row-striping row-hover">
<tr class="row-2">
	<td class="column-1">Adjudication</td><td class="column-2">The team that manages the inquiry phase.</td>
</tr>
<tr class="row-3">
	<td class="column-1">Adjudicator</td><td class="column-2">The person that the Commissioner has delegated to be the decision-maker in the inquiry.</td>
</tr>
<tr class="row-4">
	<td class="column-1">Affected parties</td><td class="column-2">Individuals or other organizations that could be affected by the decision made in the inquiry. May also be referred to as third parties.</td>
</tr>
<tr class="row-5">
	<td class="column-1">Applicant</td><td class="column-2">The individual who formally requested access to information or requested correction of their personal or health information under the ATIA, FOIP Act, HIA or PIPA.</td>
</tr>
<tr class="row-6">
	<td class="column-1">Arguments</td><td class="column-2">The reasons why a party believes the evidence shows certain facts to be true, and why the Commissioner should interpret the law a certain way.</td>
</tr>
<tr class="row-7">
	<td class="column-1">Case Resolution</td><td class="column-2">The team that conducts the settlement phase of a review.</td>
</tr>
<tr class="row-8">
	<td class="column-1">Complainant</td><td class="column-2">The individual who made a formal complaint that personal information was collected, used or disclosed in contravention of the FOIP Act, HIA or PIPA.</td>
</tr>
<tr class="row-9">
	<td class="column-1">Custodian</td><td class="column-2">The health service provider, whether an individual or an organization, from which the information was requested or against which the complaint was made (also called “respondent”).</td>
</tr>
<tr class="row-10">
	<td class="column-1">Evidence</td><td class="column-2">Information/material that establishes the facts on which a party is relying.</td>
</tr>
<tr class="row-11">
	<td class="column-1">In camera</td><td class="column-2">A portion of a submission provided only to the Commissioner in an inquiry.</td>
</tr>
<tr class="row-12">
	<td class="column-1">Inquiry</td><td class="column-2">A formal adjudicative process, usually conducted in writing.</td>
</tr>
<tr class="row-13">
	<td class="column-1">Interveners</td><td class="column-2">Individuals or organizations whose opinions or specialized knowledge can provide a broader understanding of the issues at inquiry.</td>
</tr>
<tr class="row-14">
	<td class="column-1">Mediation/investigation</td><td class="column-2">A process authorized by the Commissioner to explore opportunities to settle issues with the parties. May also be referred to as the settlement phase.</td>
</tr>
<tr class="row-15">
	<td class="column-1">Notice of Inquiry</td><td class="column-2">Identifies the parties involved in the inquiry and their contact information, the issues that will be addressed, and a schedule for submissions.</td>
</tr>
<tr class="row-16">
	<td class="column-1">Organization</td><td class="column-2">The business, corporation, union or partnership from which the information was requested or against which the complaint was made (also called “respondent”).</td>
</tr>
<tr class="row-17">
	<td class="column-1">Parties</td><td class="column-2">The respondent (public body, custodian or organization), applicant/complainant, or other affected parties who are part of the inquiry.</td>
</tr>
<tr class="row-18">
	<td class="column-1">Public body</td><td class="column-2">The government department or other public entity from which the information was requested or against which the complaint was made (also called “respondent”).</td>
</tr>
<tr class="row-19">
	<td class="column-1">Respondent</td><td class="column-2">The public body, custodian or organization that has duties under the legislation.</td>
</tr>
<tr class="row-20">
	<td class="column-1">Senior Information and Privacy Manager</td><td class="column-2">The person that the Commissioner has authorized to investigate and try to settle the confirmed issues at the Case Resolution phase. May also be referred to as an investigator.</td>
</tr>
<tr class="row-21">
	<td class="column-1">Settlement</td><td class="column-2">A process authorized by the Commissioner to explore opportunities to settle issues with the parties. May also be referred to as a mediation or investigation.</td>
</tr>
<tr class="row-22">
	<td class="column-1">Submissions</td><td class="column-2">Informs the Commissioner and the other parties about what a party thinks are the central issues in a case, and provides evidence and makes arguments about how those issues should be decided.</td>
</tr>
<tr class="row-23">
	<td class="column-1">Third Parties</td><td class="column-2">Parties, other than the respondent or applicant/complainant, who are part of the inquiry. For example, organizations and individuals whose information is the subject of an applicant’s access request. May also be referred to as affected parties.</td>
</tr>
</tbody>
</table>
<!-- #tablepress-10 from cache -->
<p style="font-size: 0.9em; color: grey;"><a href="#top-of-page">Back to top of the page</a></p>

		</div>
	</div>

<p>June 4, 2025</p>

<table id="tablepress-2-no-5" class="tablepress tablepress-id-2">
<tbody class="row-striping">
<tr class="row-1">
	<td class="column-1"><p><strong>Disclaimer</strong><br><br />
This document is not intended as, nor is it a substitute for, legal advice, and is not binding on the Information and Privacy Commissioner of Alberta. Responsibility for compliance with the law (and any applicable professional or trade standards or requirements) remains with each organization, custodian or public body. All examples used are provided as illustrations. The official versions of the laws <a href="https://oipc.ab.ca/legislation/" target="_blank" rel="noopener">the OIPC oversees</a> and their associated regulations should be consulted for the exact wording and for all purposes of interpreting and applying the legislation. The Acts are available on the website of <a href="https://www.alberta.ca/alberta-kings-printer.aspx" rel="noopener" target="_blank">Alberta King's Printer</a>.</p></td>
</tr>
</tbody>
</table>
<!-- #tablepress-2-no-5 from cache -->
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Practice Note &#8211; Late Raising of Discretionary Exceptions &#8211; ATIA</title>
		<link>https://oipc.ab.ca/resource/practice-note-late-raising-discretionary-exceptions-atia/</link>
		
		<dc:creator><![CDATA[Chris Stinner]]></dc:creator>
		<pubDate>Wed, 04 Jun 2025 23:25:14 +0000</pubDate>
				<guid isPermaLink="false">https://oipc.ab.ca/?post_type=resource&#038;p=16782</guid>

					<description><![CDATA[June 4, 2025]]></description>
										<content:encoded><![CDATA[<p><a id="top-of-page"></a><br />

	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
In this document, “Commissioner” means the Commissioner or the Commissioner’s delegated Adjudicator or authorized Senior Information and Privacy Manager.</p>
<p>This Practice Note clarifies whether and when the Office of the Information and Privacy Commissioner (OIPC) will consider a new discretionary exception to access raised by a public body after an applicant has requested a review.</p>

		</div>
	</div>

	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<div style="border: 1px solid #ccc; padding: 15px; border-radius: 5px;">
<p><strong>Table of Contents</strong></p>
<ul>
<li><a href="#rationale">Rationale for the clarification</a></li>
<li><a href="#oipc-approach">OIPC approach to late-raising discretionary exceptions to access under the ATIA</a></li>
</ul>
</div>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="rationale"></a></p>
<h2>Rationale for the clarification</h2>
<p>Past Orders of this office have found that in an inquiry, public bodies cannot raise the application of discretionary exceptions under the <em>Freedom of Information and Protection of Privacy Act</em> (FOIP Act) that were not originally applied in the public body’s decision to the applicant, where raising the new exception would result in delay or prejudice to other parties.</p>
<p>It has become increasingly common for public bodies to raise new exceptions to access during the review or inquiry processes. At times, public bodies have wholly reprocessed responsive records following the review, resulting in new decisions that bear little resemblance to those originally communicated to the applicant that were subject to the review.</p>
<p>It is the head of the public body, or the delegate of the head, that is assigned the responsibility of determining whether to withhold information in response to an access request. When the head of a public body, or the head’s delegate, makes a decision regarding access, that decision must be communicated to the applicant. The applicant is given 60 business days under the <em>Access to Information Act</em> (ATIA) to assess the response and decide whether to request a review. It is unfair to the applicant for the public body’s response to become a moving target.</p>
<p>Further, the ATIA imposes new limits on the time for the OIPC to complete the review process under that Act. In order to meet those time limits, the office has taken steps to identify and minimize delays in the review process. The late-raising of new discretionary exceptions reduces the timeliness and effectiveness of the settlement phase of the review, during which the parties are contacted by this office to attempt to settle the issues, or narrow and confirm the issues for a subsequent inquiry.</p>
<p>That said, from time to time a public body’s response to an applicant may contain an error or omission that the public body later corrects. The OIPC may accept such corrections, where it is appropriate to do so.</p>
<p>Given the above, the OIPC is clarifying when and whether the OIPC will consider a public body’s decision to apply a new discretionary exception to access that was communicated to the applicant after the applicant has delivered a request for review to the public body and OIPC.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#top-of-page">Back to top of the page</a></p>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="oipc-approach"></a></p>
<h2>OIPC approach to late-raising discretionary exceptions to access under the ATIA</h2>
<p>Under the ATIA, applicants seeking a review of a public body’s decisions regarding access must deliver a copy of their request for review to the OIPC and the head of the Public Body. Once the OIPC has confirmed the issues for the review, the OIPC will send an acknowledgement letter; this letter will set out the issues to be addressed in the settlement phase of the review.</p>
<p>If the public body has amended its response to the applicant’s access request after the applicant delivered their request for review, the public body must ensure that the new response was communicated to the applicant as required under the Act. A copy of this response must also be provided to the OIPC, quoting the file number provided in the acknowledgement letter.</p>
<p>Any amended response that includes a new application of a discretionary exception, that is communicated to the applicant and OIPC <u>before</u> the acknowledgement letter is issued will generally be considered in that phase of the review if the applicant is interested in pursuing it. Any amended response that includes a new application of a discretionary exception that is communicated to the applicant and OIPC <u>after</u> the acknowledgement letter is issued might not be considered.</p>
<p>If an inquiry is subsequently conducted into the matter, the adjudicator will consider whether to permit a public body to raise a new discretionary exception to access.</p>
<p>In determining whether to permit a public body to apply a new discretionary exception to access, the Commissioner will consider:</p>
<ul>
<li>the impact of the new claim on the integrity of the review process;</li>
<li>the prejudice to the parties in either permitting or refusing to consider the new discretionary exception;</li>
<li>the public interest in either permitting or refusing to consider the new discretionary exception; and</li>
<li>any other extenuating circumstance.</li>
</ul>
<p style="font-size: 0.9em; color: grey;"><a href="#top-of-page">Back to top of the page</a></p>

		</div>
	</div>

<p>June 4, 2025</p>

<table id="tablepress-2-no-6" class="tablepress tablepress-id-2">
<tbody class="row-striping">
<tr class="row-1">
	<td class="column-1"><p><strong>Disclaimer</strong><br><br />
This document is not intended as, nor is it a substitute for, legal advice, and is not binding on the Information and Privacy Commissioner of Alberta. Responsibility for compliance with the law (and any applicable professional or trade standards or requirements) remains with each organization, custodian or public body. All examples used are provided as illustrations. The official versions of the laws <a href="https://oipc.ab.ca/legislation/" target="_blank" rel="noopener">the OIPC oversees</a> and their associated regulations should be consulted for the exact wording and for all purposes of interpreting and applying the legislation. The Acts are available on the website of <a href="https://www.alberta.ca/alberta-kings-printer.aspx" rel="noopener" target="_blank">Alberta King's Printer</a>.</p></td>
</tr>
</tbody>
</table>

]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Practice Note &#8211; Directions to Respondents when making submissions in support of claimed exceptions to access during inquiry</title>
		<link>https://oipc.ab.ca/resource/practice-note-directions-respondent-submissions-inquiry/</link>
		
		<dc:creator><![CDATA[Chris Stinner]]></dc:creator>
		<pubDate>Wed, 04 Jun 2025 23:25:13 +0000</pubDate>
				<guid isPermaLink="false">https://oipc.ab.ca/?post_type=resource&#038;p=16783</guid>

					<description><![CDATA[June 4, 2025]]></description>
										<content:encoded><![CDATA[
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
This Practice Note provides direction to</p>
<ul>
<li>public bodies under the <em>Freedom of Information and Protection of Privacy Act</em> (FOIP Act) and <em>Access to Information Act</em> (ATIA);</li>
<li>organizations under the <em>Personal Information Protection Act</em> (PIPA); and</li>
<li>custodians under the <em>Health Information Act</em> (HIA)</li>
</ul>
<p>when making submission to an inquiry addressing a response to an access request under the relevant Act.</p>
<p>In this document, “Commissioner” means the Commissioner or the Commissioner’s delegated Adjudicator. Public bodies, custodians and organizations are referred to as &#8220;respondents&#8221; for the remainder of this publication.</p>
<p>Following an inquiry into respondent’s decision to apply exceptions to access in responding to an access request under the FOIP Act, ATIA, PIPA or HIA, the Commissioner will determine whether:</p>
<ul>
<li>The mandatory exceptions cited by the respondent apply to the relevant information;</li>
<li>The discretionary exceptions cited by the respondent apply to the relevant information;</li>
<li>If any discretionary exceptions apply, whether the respondent properly exercised its discretion to apply that exception.</li>
</ul>
<p>Respondents may not be permitted to raise the application of new discretionary exceptions at the inquiry phase.</p>
<p>Exceptions to access under the Acts each have specific requirements that must be met in order to be applied. Respondents applying exceptions to access should ensure that their submission addresses each component of these requirements. Each application of an exception must be justified. Submissions that fail to address each component, or that do not address how the specific information at issue satisfies each component will not establish that the exception applies.</p>
<p>Submissions should include two main aspects: arguments and information about the law, and arguments and information about the factual context of the information at issue.</p>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="top-of-page"></a></p>
<div style="border: 1px solid #ccc; padding: 15px; border-radius: 5px;">
<p><strong>Table of Contents</strong></p>
<ul>
<li><a href="#law-arguments">Arguments and information about the law</a></li>
<li><a href="#factual-context">Arguments and information about the factual context of the records</a></li>
<li><a href="#submission-points">Points to address in drafting a submission</a></li>
</ul>
</div>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="law-arguments"></a></p>
<h2>Arguments and information about the law</h2>
<p>Arguments and information about the law include citing the applicable tests for applying an exception, as set out in past Orders and court decisions. This part of the submission may be brief for each exception applied, especially where the interpretation of the exception and tests to be applied are settled.</p>
<p>Where an exception has not been considered in past Orders or court decisions, the respondent should explain how it believes the exception applies. Similarly, if a respondent disagrees with how an exception has been applied in past Orders, the respondent should explain how it believes the exception should be applied and why. Respondent should provide support for such arguments, such as case law.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#top-of-page">Back to top of the page</a></p>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="factual-context"></a></p>
<h2>Arguments and information about the factual context of the records</h2>
<p>Arguments and information about the factual context of the records includes information that shows why an exception applies to the particular information at issue.</p>
<p>Many exceptions to access can be applied only in particular circumstances. For example,</p>
<ul>
<li>Under the FOIP Act and the ATIA, some exceptions to access apply only where the relevant information is created by or for individuals holding specific positions or is in correspondence between individuals holding specific positions<a href="#_ftn1" name="_ftnref1">[1]</a>.</li>
<li>Under PIPA, some exceptions apply to personal information that was collected in specific circumstances, such as for an investigation<a href="#_ftn2" name="_ftnref2">[2]</a> or information collected by mediators in the course of conducting a mediation<a href="#_ftn3" name="_ftnref3">[3]</a>.</li>
<li>Under the FOIP Act, ATIA, HIA, and PIPA, several exceptions apply where the disclosure of the relevant information <em>could reasonably be expected to</em> result in a specified outcome<a href="#_ftn4" name="_ftnref4">[4]</a>. The Supreme Court of Canada has set out the evidentiary standard to be used in access-to-information legislation wherever the phrase “could reasonably be expected to” appears: there must be a reasonable expectation of probable harm, and the party claiming the exception must provide sufficient evidence to show that the likelihood of the specified outcome is considerably above a mere possibility<a href="#_ftn5" name="_ftnref5">[5]</a>.</li>
</ul>
<p>It is important for respondents to provide sufficient factual information to show that the circumstances set out in each exception being applied are present in each case. Relevant information may include the position titles and responsibilities of individuals involved in creating and receiving the information, and details of the circumstance in which the records were created.</p>
<p>Respondents applying exceptions that include the phrase “could reasonably be expected to” must provide sufficient evidence to meet this evidentiary standard. Respondents should clearly explain <em>how</em> the information being withheld could lead to the stated outcome; merely assertions are generally insufficient.</p>
<p>Parties may not succeed in an inquiry if they do not provide evidence to support their arguments. It is not sufficient to provide the Commissioner with records and leave it up to the Commissioner to try to draw from the records the facts on which the decisions will be based. The Commissioner requires that persons representing the public body, custodian or organization provide evidence speaking to the contents of the records, for example by explaining how each part of a record for which an exception to disclosure is claimed falls within the exception.</p>
<p>If the success of an argument depends on underlying facts, providing the argument alone is not sufficient. The underlying facts must be established by evidence. As well, evidence should not be provided in the form of unattributed assertions made in the context of an argument. If a fact is being put forward, it must be shown how this fact is known to be true (e.g., by way of a statement, preferably sworn, of someone who knows the fact, or by other objective evidence, such as documents).</p>
<p style="font-size: 0.9em; color: grey;"><a href="#top-of-page">Back to top of the page</a></p>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="submission-points"></a></p>
<h2>Points to address in drafting a submission</h2>
<ul>
<li>Clearly identify each part of a record that has been withheld from disclosure and address each exception applied.</li>
<li>Review previous Orders [or relevant Interpretation Bulletins] to determine how the exceptions have been applied, and how those interpretations apply to the information being withheld.</li>
<li>Clearly state how each provision, and the relevant tests for each provision, apply to the information being withheld.
<ul>
<li>This should be done on a record-by-record, page-by-page, or line-by-line basis, as appropriate.</li>
<li>Respondents may identify and group similar information in the pages in their arguments.</li>
</ul>
</li>
<li>Where the exception applied is a discretionary exception, the respondent should include a discussion of the exercise of discretion in applying that exception to withhold information.
<ul>
<li>The exercise of discretion should be addressed on a record-by-record, page-by-page, or line-by-line basis, as appropriate.</li>
<li>The respondent should ensure it addresses all relevant factors, and explain why they do or do not apply in the specific circumstances of the information/record.</li>
</ul>
</li>
<li>Where the exception applied requires proof that a record was created for a particular purpose, or was created by or for particular positions, provide the relevant facts to support the application of that exception.</li>
<li>Where the respondent is providing an affidavit in support of its factual or legal claims, ensure that the affidavit includes the requirements set out in <a href="https://oipc.ab.ca/resource/practice-note-providing-affidavits-and-other-evidence" target="_blank" rel="noopener">Practice Note: Providing Affidavits and Other Evidence</a>.</li>
<li>Ensure each issue set out in the Notice of Inquiry is addressed.</li>
</ul>
<p style="font-size: 0.9em; color: grey;"><a href="#top-of-page">Back to top of the page</a></p>
<p><a href="#_ftnref1" name="_ftn1">[1]</a> For example, sections 27(1)(b) and (c) of the FOIP Act and 32(1)(b) and (c) of the ATIA<br />
<a href="#_ftnref2" name="_ftn2">[2]</a> For example, section 24(2)(c)<br />
<a href="#_ftnref3" name="_ftn3">[3]</a> For example, section 24(2)(e)<br />
<a href="#_ftnref4" name="_ftn4">[4]</a> For example, sections 20(1) of the FOIP Act and 21(1) of the ATIA; section 11(1)(a) of the HIA; section 24(3)(a) of PIPA<br />
<a href="#_ftnref5" name="_ftn5">[5]</a> <a href="https://www.canlii.org/en/ca/scc/doc/2012/2012scc3/2012scc3.html" target="_blank" rel="noopener"><em>Merck Frosst Canada Ltd. v. Canada (Health)</em>, 2012 SCC 3 (CanLII)</a>, [2012] 1 SCR 23</p>

		</div>
	</div>

<p>June 4, 2025</p>

<table id="tablepress-2-no-7" class="tablepress tablepress-id-2">
<tbody class="row-striping">
<tr class="row-1">
	<td class="column-1"><p><strong>Disclaimer</strong><br><br />
This document is not intended as, nor is it a substitute for, legal advice, and is not binding on the Information and Privacy Commissioner of Alberta. Responsibility for compliance with the law (and any applicable professional or trade standards or requirements) remains with each organization, custodian or public body. All examples used are provided as illustrations. The official versions of the laws <a href="https://oipc.ab.ca/legislation/" target="_blank" rel="noopener">the OIPC oversees</a> and their associated regulations should be consulted for the exact wording and for all purposes of interpreting and applying the legislation. The Acts are available on the website of <a href="https://www.alberta.ca/alberta-kings-printer.aspx" rel="noopener" target="_blank">Alberta King's Printer</a>.</p></td>
</tr>
</tbody>
</table>

]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Practice Note &#8211; Providing Affidavits and Other Evidence</title>
		<link>https://oipc.ab.ca/resource/practice-note-providing-affidavits-and-other-evidence/</link>
		
		<dc:creator><![CDATA[Chris Stinner]]></dc:creator>
		<pubDate>Wed, 04 Jun 2025 23:25:09 +0000</pubDate>
				<guid isPermaLink="false">https://oipc.ab.ca/?post_type=resource&#038;p=16789</guid>

					<description><![CDATA[June 4, 2025]]></description>
										<content:encoded><![CDATA[<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="top-of-page"></a><br />
In a review or inquiry under the <em>Freedom of Information and Protection of Privacy Act</em> (FOIP Act), <em>Access to Information Act</em> (ATIA), <em>Protection of Privacy Act</em> (POPA), <em>Personal information Protection Act</em> (PIPA) or <em>Health Information Act</em> (HIA), evidence is often required to support factual and legal claims. In some cases, evidence must be provided in the form of a sworn affidavit. Affidavits should also be provided to support the application of exceptions or exclusions under the Acts where the public body/organization/custodian (respondent) is not required to provide the records for the Commissioner’s review.</p>
<p>Respondents are also encouraged to provide affidavit evidence in support of their efforts to search for records responsive to an access request. Parties may also consider providing affidavit evidence in situations where factual issues may be contentious.</p>
<p>This Practice Note sets out guidelines for providing affidavits and other evidence for an inquiry, including specific considerations when providing affidavits and other evidence in support of</p>
<ul>
<li>A respondent’s search for records in response to an access request</li>
<li>A public body’s application of sections 4(1)(a), (s), (t) or (w) of the ATIA</li>
<li>A public body’s application of section 27 of the ATIA (cabinet confidences)</li>
<li>A public body’s/organization’s claim of solicitor-client privilege, litigation privilege, or informer privilege under the FOIP Act or PIPA, or legal privilege under the ATIA.</li>
</ul>
<p>These guidelines also apply to affidavits provided as evidence in situations other than those listed above.</p>
<div style="border: 1px solid #ccc; padding: 15px; border-radius: 5px;">
<p><strong>Table of Contents</strong></p>
<ul>
<li><a href="#general-guidelines-when-providing-affidavits">General Guidelines when providing affidavits</a></li>
<li><a href="#affidavits-search">Affidavits in support of a Respondent’s search for records</a></li>
<li><a href="#affidavits-atia-sections">Affidavits in support of an application of sections 4(1)(a), (s), (t), or (w) of the ATIA</a></li>
<li><a href="#affidavits-cabinet">Affidavits and other evidence in support of a claim of cabinet confidences under section 27 of the ATIA</a></li>
<li><a href="#affidavits-privilege">Affidavits in support of a claim of legal privilege</a></li>
<li><a href="#sample-affidavit">Sample Affidavit</a></li>
</ul>
</div>

		</div>
	</div>
<br />

	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="general-guidelines-when-providing-affidavits"></a></p>
<h2>General Guidelines when providing affidavits</h2>
<p>In an inquiry, affidavits are to be <strong>exchanged</strong> with the other parties to the inquiry.</p>
<p>An affidavit must contain information about the person swearing the affidavit, including the individual’s name and an explanation of how they have knowledge of the evidence being presented in the affidavit.</p>
<p>An affidavit should, wherever possible, be sworn by a person having <strong>personal knowledge</strong> of the facts being sworn to.</p>
<p>Affidavit evidence should be <strong>sufficiently detailed</strong> to allow the Commissioner and parties to an inquiry to fully understand its contents, and should, wherever possible, <strong>be confined to facts</strong> within the personal knowledge of the person swearing the affidavit.</p>
<p>Parties shall ensure that all affidavits provided to the Commissioner are truthful, complete, and accurate.</p>
<p>It is an offence under the Acts for anyone to willfully make a false statement to, mislead, or attempt to mislead the Commissioner in the performance of their functions.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#top-of-page">Back to top of the page</a></p>

		</div>
	</div>
<br />

	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="affidavits-search"></a></p>
<h2>Affidavits in support of a Respondent’s search for records</h2>
<p>The duty to assist under section 10 of the FOIP Act, section 12 of the ATIA, section 27 of PIPA and section 10 of the HIA includes a duty to conduct an adequate search for records.  The respondent has the burden of proving that it conducted an adequate search for records responsive to an access request.</p>
<p>In an inquiry addressing a respondent’s search for records, it is helpful for the respondent to provide the Commissioner with an affidavit regarding the search conducted for records responsive to the applicant’s access request. <strong>In addition to the elements set out in the general guidelines above</strong>, the respondent may wish to consider addressing the following:</p>
<p><em> </em>The specific steps taken by the respondent to identify and locate records responsive to the applicant’s access request.</p>
<ul>
<li>The scope of the search conducted, such as physical sites, program areas, specific databases, off-site storage areas, etc.</li>
<li>The steps taken to identify and locate all possible repositories where there may be records relevant to the access request: keyword searches, records retention and disposition schedules, etc.</li>
<li>Who did the search? (Note:  that person or persons is the best person to provide the direct evidence).</li>
<li>Why the respondent believes no more responsive records exist other than what has been found or produced.</li>
<li>Any other relevant information.</li>
</ul>
<p style="font-size: 0.9em; color: grey;"><a href="#top-of-page">Back to top of the page</a></p>

		</div>
	</div>
<br />

	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="affidavits-atia-sections"></a></p>
<h2>Affidavits in support of an application of sections 4(1)(a), (s), (t), or (w) of the ATIA</h2>
<p>Where a public body has refused access to records or information for the reason that the records or information are excluded from the scope of the ATIA under sections 4(1)(a), (s), (t), or (w) of that Act, the public body has the burden of proving that there is no right of access (section 63(1)).</p>
<p>In an inquiry addressing a public body’s claim that section 4(1)(a), (s), (t), or (w) of the ATIA applies, it is helpful for the respondent to provide the Commissioner with an affidavit setting out the relevant facts. <strong>In addition to the elements set out in the general guidelines above</strong>, the affidavit should include a schedule in which the public body lists the records to which it has applied sections 4(1)(a), (s), (t), or (w) of the ATIA, along with the description for each record. The description for each record should include sufficient detail to satisfy the public body’s burden of proof. Certain subsections may require specific information, for example:</p>
<ul>
<li>whether the public body has custody or control of the record and if not, why not (sections 4(1)(a), (s));</li>
<li>who created the record (section 4(1)(t), (w));</li>
<li>the position titles of the individuals involved in the communications (section 4(1)(w));</li>
<li>Any other information relevant to the particular exclusion being claimed.</li>
</ul>
<p>If the public body wishes to provide additional information regarding its application of these provisions <em>in camera</em>, it may request permission to do so following the process set out in Request to Provide an <em>In Camera</em> Submission form.</p>
<p>A public body is not precluded from providing the relevant records to the Commissioner as evidence.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#top-of-page">Back to top of the page</a></p>

		</div>
	</div>
<br />

	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="affidavits-cabinet"></a></p>
<h2>Affidavits and other evidence in support of a claim of cabinet confidences under section 27 of the ATIA</h2>
<p>Where a public body withholds information under section 27 of the ATIA in response to an access request, the public body has the burden of proving that there is no right of access (section 63(1)).</p>
<p>If a public body does not provide records or information to the Commissioner on the basis that section 27 applies to that record or information, the Commissioner may require the public body to attest that this provision applies to the information or record over which it is claimed (section 50(7)). Section 11 of the ATIA Regulation states that a public body may provide this attestation by way of a letter:</p>
<ul>
<li>signed or approved by the head of the public body; and</li>
<li>containing a description of the record or information explaining how section 27 applies to the record or information.</li>
</ul>
<p>A description must be provided for each record containing information to which section 27 is applied. Therefore, an attestation should include a schedule in which the public body lists the records to which it has applied sections 27(1)( or (2) of the ATIA, along with the description for each record. The description for each record should include sufficient detail to satisfy the public body’s burden of proof. The public body should address the particular elements set out in the subsection being claimed.</p>
<p>As the public body bears the burden of proof, a public body may also consider providing an affidavit in support of its claim.</p>
<p>If the public body wishes to provide additional information regarding its application of section 27 <em>in camera</em>, it may request permission to do so following the process set out in the Request to Provide an <em>In Camera</em> Submission form.</p>
<p>A public body is not precluded from providing the relevant records to the Commissioner as evidence.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#top-of-page">Back to top of the page</a></p>

		</div>
	</div>
<br />

	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="affidavits-privilege"></a></p>
<h2>Affidavits in support of a claim of legal privilege</h2>
<p>A respondent is not required to provide the Commissioner with records or information over which solicitor-client privilege, litigation privilege, or informer privilege is being claimed under the FOIP Act or PIPA, or to which section 32(1)(a) or (2) of the ATIA has been applied<a href="#_ftn1" name="_ftnref1">[1]</a>. This part of the Practice Note applies to legal privilege under the ATIA, and solicitor-client, litigation and informer privilege under the FOIP Act and PIPA.</p>
<p>Where a respondent withholds information in response to an access request claiming a relevant privilege, the respondent has the burden of proving that there is no right of access<a href="#_ftn2" name="_ftnref2">[2]</a>. The respondent is not precluded from providing the relevant records to the Commissioner as evidence.</p>
<p>As stated in <em>Edmonton (City) Police Service</em> <em>v Alberta (Information and Privacy Commissioner</em>,<em> </em>2020 ABQB 10 (<em>EPS</em>), when a respondent does not provide records that it asserts are subject to privilege for review, it is required to establish its claim by meeting the civil litigation standard for refusing to produce such records, set out in <em>Canadian Natural Resources Ltd v ShawCor Ltd</em>, 2014 ABCA 289 (CanLII), 580 A.R. 265 (<em>ShawCor</em>).</p>
<p>Following <em>Alberta (Information and Privacy Commissioner) v. University of Calgary</em>, 2016 SCC 53 (CanLII) and <em>ShawCor</em>, affidavits of records provided in support of claims of legal privilege must comply with Rules 5.7 and 5.8 of the Alberta Rules of Court (producible records, and records for which there is an objection to produce). In <em>ShawCor</em>, the Alberta Court of Appeal discussed the application of Rules 5.7 and 5.8 of the Rules of Court (producible records, and records for which there is an objection to produce). The Court stated (at para. 42-43):</p>
<blockquote><p>
… Therefore, in explaining the grounds for claiming privilege over a specific record, a party will necessarily need to provide sufficient information about that record that, short of disclosing privileged information, shows why the claimed privilege is applicable to it. Depending on the circumstances, this may require more or less than the “brief description” contemplated under Rule 5.7(1)(b) although we expect that oftentimes the brief description will suffice.</p>
<p>Accordingly, under either interpretation of the relevant Rules, a party must provide a sufficient description of a record claimed to be privileged to assist other parties in assessing the validity of that claim. From this, it follows that all relevant and material records must be numbered and, at a minimum, briefly described, including those records for which privilege is claimed. As noted, though, this is subject to the proviso that the description need not reveal any information that is privileged.
</p></blockquote>
<p><strong>In addition to the elements set out in the general guidelines above</strong>, the affidavit should include a schedule in which the respondent lists the records (or bundle of records) for which privilege is claimed, along with the description for each record or bundle. A group of records may be numbered and treated as a single record if the records are all of the same nature, and the bundle is described in sufficient detail to enable the Commissioner to understand what it contains. The description for each record (or each bundle) must be sufficient to meet that test, without revealing the privileged information.</p>
<p>For claims of solicitor-client privilege, the Respondent should provide:</p>
<ul>
<li>Information about the relationship between the Respondent and the lawyer <em>in the context of the relevant communication</em></li>
<li>Information about the circumstances to establish that the record was created in the course of requesting or providing legal advice or is a record revealing such a request or advice</li>
<li>Information about the confidentiality of the communication</li>
</ul>
<p>For claims of litigation privilege, the Respondent should provide:</p>
<ul>
<li>Information establishing that the record was created for the dominant purpose of litigation</li>
<li>Information establishing that the litigation has not ended</li>
</ul>
<p>In <em>Pritchard v. Ontario (Human Rights Commission) </em>[2004] 1 SCR 809, the SCC determined that more evidence to support the application of solicitor-client privilege is required when advice sought from or given by an in-house or government lawyer is at issue. This is because such lawyers may be called upon to give policy advice, which is not legal advice. The Court said:</p>
<p>Owing to the nature of the work of in-house counsel, often having both legal and non-legal responsibilities, each situation must be assessed on a case-by-case basis to determine if the circumstances were such that the privilege arose. Whether or not the privilege will attach depends on the nature of the relationship, the subject matter of the advice, and the circumstances in which it is sought and rendered.</p>
<p>Therefore, a respondent that is claiming solicitor-client privilege over the advice of an in-house or government lawyer must provide sufficient information about the relationship between the lawyer and the respondent and about the circumstances in which the advice is being requested and provided, to establish that the subject-matter is legal advice rather than policy or other advice.</p>
<p>If the respondent wishes to provide additional information regarding its claim of privilege <em>in camera</em>, it may request permission to do so following the process set out in the Request to Provide an <em>In Camera</em> Submission form.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#top-of-page">Back to top of the page</a></p>

		</div>
	</div>
<br />

	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="sample-affidavit"></a></p>
<h2>Sample Affidavit</h2>
<p>&nbsp;</p>
<p>OIPC File Number  _____________________</p>
<p>Applicant  __________________________________________</p>
<p>Respondent Public Body/Organization/Custodian __________________________________________</p>
<p>Affidavit of (name and status) Sworn (or Affirmed) by _____________________ on _______________, 20__</p>
<p>&nbsp;</p>
<p>I, ______________________ of (municipality, province), have personal knowledge of the following (or, where applicable, I am informed and do believe that):</p>
<p>I am an authorized representative of (name of Respondent).</p>
<p>I have reviewed the records.</p>
<p>The records listed in Schedule 1 are in the custody or under the control of (name of Respondent).</p>
<p>(Name of Respondent) objects to produce the records listed in Schedule 1 on the grounds of privilege identified in that Schedule.</p>
<p>&nbsp;</p>
<p>SWORN (OR AFFIRMED) BEFORE ME</p>
<p>at ___________________________, Alberta, this _____ day of _______________, 20___.</p>
<p>Commissioner for Oaths in and for the Province of Alberta</p>
<p>____________________________________</p>
<p>(Signature of Representative)</p>
<p>_____________________________________</p>
<p>&nbsp;</p>
<p><strong>Schedule 1</strong></p>
<p>Records in the custody or under the control of (name of Respondent) for which there is an objection to produce on the ground of [cite relevant exception or legal privilege]:</p>
<table>
<tbody>
<tr>
<td width="59"></td>
<td width="264"><strong>Exception or Privilege Claimed</strong></td>
<td width="319"><strong>Description</strong></td>
</tr>
<tr>
<td width="59">1.</td>
<td width="264"></td>
<td width="319"></td>
</tr>
<tr>
<td width="59">2.</td>
<td width="264"></td>
<td width="319"></td>
</tr>
<tr>
<td width="59">3.</td>
<td width="264"></td>
<td width="319"></td>
</tr>
</tbody>
</table>
<p>&nbsp;</p>
<p style="font-size: 0.9em; color: grey;"><a href="#top-of-page">Back to top of the page</a></p>
<p>&nbsp;</p>
<p><a href="#_ftnref1" name="_ftn1">[1]</a> Sections 27(1)(a) of the FOIP Act, 32(1)(a) and (2) of the ATIA, 24(2)(a) of PIPA</p>
<p><a href="#_ftnref2" name="_ftn2">[2]</a> Section 63(1) of ATIA, section 71(1) of the FOIP Act, and section 51 of PIPA</p>

		</div>
	</div>
<p>June 4, 2025</p>

<table id="tablepress-2-no-8" class="tablepress tablepress-id-2">
<tbody class="row-striping">
<tr class="row-1">
	<td class="column-1"><p><strong>Disclaimer</strong><br><br />
This document is not intended as, nor is it a substitute for, legal advice, and is not binding on the Information and Privacy Commissioner of Alberta. Responsibility for compliance with the law (and any applicable professional or trade standards or requirements) remains with each organization, custodian or public body. All examples used are provided as illustrations. The official versions of the laws <a href="https://oipc.ab.ca/legislation/" target="_blank" rel="noopener">the OIPC oversees</a> and their associated regulations should be consulted for the exact wording and for all purposes of interpreting and applying the legislation. The Acts are available on the website of <a href="https://www.alberta.ca/alberta-kings-printer.aspx" rel="noopener" target="_blank">Alberta King's Printer</a>.</p></td>
</tr>
</tbody>
</table>

]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Practice Note &#8211; Preparing Records at Issue and Index of Records</title>
		<link>https://oipc.ab.ca/resource/practice-note-preparing-records-at-issue-and-index-of-records/</link>
		
		<dc:creator><![CDATA[Chris Stinner]]></dc:creator>
		<pubDate>Wed, 04 Jun 2025 23:25:01 +0000</pubDate>
				<guid isPermaLink="false">https://oipc.ab.ca/?post_type=resource&#038;p=16784</guid>

					<description><![CDATA[When a public body, custodian or organization (respondent) withholds entire pages of records or severs information from records in responding&#8230;]]></description>
										<content:encoded><![CDATA[
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
In this document, “Commissioner” means the Commissioner or the Commissioner’s delegated Adjudicator or authorized Senior Information and Privacy Manager.</p>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="top-of-page"></a></p>
<div style="border: 1px solid #ccc; padding: 15px; border-radius: 5px;">
<p><strong>Table of Contents</strong></p>
<ul>
<li><a href="#records">Records at Issue</a></li>
<li><a href="#inquiry-records">Additional requirements for records provided for an inquiry</a></li>
<li><a href="#index">Index of Records</a></li>
<li><a href="#checklist">Preparing Records at Issue Checklist</a></li>
<li><a href="#glossary">Glossary of Terms</a></li>
</ul>
</div>

		</div>
	</div>

<p>When a public body, custodian or organization (respondent) withholds entire pages of records or severs information from records in responding to an applicant’s access request, the applicant can ask the Commissioner to review those decisions. The respondent must provide the records at issue, including the severed information, for the Commissioner to review. This Practice Note sets out instructions for providing records at issue for both the settlement and inquiry phases. As explained below, there may be different requirements for different phases of the review.</p>
<p>“Records at issue” are the entire records in response to an access request. “Information at issue” is the information severed from pages that were provided to the applicant. The “records at issue” are not exchanged with other parties.</p>
<p>The requirement to provide records or information at issue does not apply to records or information over which solicitor-client privilege, litigation privilege, or informer privilege is being claimed, or information withheld under sections 4(1)(a), (s), (t), (w), 27, 32(1)(a) or 32(2) of the ATIA. Respondents will be required to provide information supporting those claims, and affidavits may be requested in an inquiry (please see <a href="https://oipc.ab.ca/resource/practice-note-providing-affidavits-and-other-evidence/" target="_blank" rel="noopener">Practice Note: Providing Affidavits and Other Evidence</a>)</p>
<p>The respondent must also provide an index of records for the review. An “index of records” helps to organize the records at issue. The requirements of an index of records provided for the settlement phase of the review are different from the requirements of an index of records provided for the inquiry phase. The requirements for each are discussed below.</p>
<p>At the inquiry stage, the respondent will be asked to provide a new copy of the records at issue and a new index of records. The new copies will reflect any new decisions made by the public body to disclose additional information. Where no new decisions have been made, the new copy of the records will be identical to those previously provided.</p>
<p>Where the records at inquiry are different from those previously provided for the review, the Commissioner may also rely on both the new records and those previously provided to decide the issues in the inquiry.<br />

	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="records"></a></p>
<h2>Records at Issue</h2>
<p>When the Commissioner requests records at issue for a review, respondents must:</p>
<h5><strong>Document all redacting decisions made regarding the records.</strong></h5>
<p>If the respondent decides to release more information following the settlement phase, the records and information at issue will consist only of records and information still being withheld.</p>
<h5><strong>Provide a copy of the records in electronic format.</strong></h5>
<p>The Commissioner may specify the method and format respondents must use to provide the records.</p>
<h5><strong>Provide copies of the records at issue, not originals.</strong></h5>
<p>A respondent must keep its own set of records at issue so that it can make arguments or respond to questions.</p>
<h5><strong>Indicate the information that has been withheld or severed, and cite under what provision.</strong></h5>
<p>With respect to severed information, the preferred format is one copy of an unredacted version that identifies the severing decisions (e.g. by highlighting or outlining). Where this is not practicable, the Commissioner may accept both a severed and unredacted version of the records.</p>
<p>The section numbers of the applicable legislation (i.e. exceptions to disclosure) that are being relied on to withhold records or information are to be noted on the page adjacent to each redaction. Where multiple exceptions are applied to information in a page, it must be clear which exception applies to what information. For example, in some cases one exception is applied to only to one sentence in a paragraph, and another exception is applied to the whole paragraph. The records must clearly show which exception was applied to only the sentence <u>and</u> which sentence it was applied to, as well as which exception was applied to the whole paragraph.</p>
<p>Blank pages of records withheld in their entirety need not be provided where there are large numbers of such pages, or where all the records are withheld, but it must be made clear in an index</p>
<p>of records stating how many such records there are, and which section of the applicable legislation is being applied to each page.</p>
<p>If a respondent is proposing to disclose information but a third party objects to its disclosure, then this information should be labeled in the records as “third party objection”.</p>
<h5><strong>Document only those redaction decisions that have been or are being communicated in a response to an applicant.</strong></h5>
<p>If a respondent has made a decision to apply a particular provision (i.e. exception to disclosure) and has communicated this decision to the applicant, then the notation in the records as to which exception was applied should refer to only that provision.</p>
<p>The records should not refer to, or indicate, any severing decisions that are not current or that have not been communicated to the applicant.</p>
<h5><strong>Number the records, with the numbering also on records provided to third parties and the applicant.</strong></h5>
<p>The page numbers of the records provided to the Commissioner must be consistent with the page numbers of the records provided to the applicant and third parties. If severed or blank pages provided to a third party or applicant have different numbers than those provided to the Commissioner, it becomes difficult, and in some cases impossible, to identify the records to which the parties are referring in their submission.</p>
<p>If there are multiple packages of records, the page numbering must be consecutive from the first package to the last, unless this is not practicable. For example, with two binders of different documents, each one may already have pages numbered in sequence. In that case, the binders may be described as “Record A” and “Record B” and the pages do not need to be renumbered; identification such as “Record A, page 2” is sufficient. A loose collection of diverse records, however, should always be numbered in sequence.</p>
<h5><strong>Be legible.</strong></h5>
<p>The records should be reviewed to make sure that the copies can be read, to the fullest extent possible.</p>
<p>The deadline for providing the records to the Commissioner for the settlement phase is set out in the acknowledgement letter issued when a review is opened.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#top-of-page">Back to top of the page</a></p>

		</div>
	</div>

	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="inquiry-records"></a></p>
<h2>Additional requirements for records provided for an inquiry</h2>
<p><strong>Records provided for an inquiry must not contain notations or explanations other than to note the provision applied.</strong></p>
<p>Respondents are to provide reasons for applying a provision in their submission to the inquiry and not in the records at issue (see <a href="https://oipc.ab.ca/resource/practice-note-inquiry-procedures/" target="_blank" rel="noopener">Practice Note: Inquiry Procedures</a>). Additional notations or explanations appearing in the records at issue are not properly before the Commissioner in an inquiry and will not be reviewed or relied on in the inquiry.</p>
<p>This limitation does not apply to the records provided for the settlement phase of the review.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#top-of-page">Back to top of the page</a></p>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="index"></a></p>
<h2>Index of Records</h2>
<p>When there are more than three (3) pages of records at issue, the respondent must provide an index of records to the Commissioner for the review. The index of records is to be provided in a table format. The index of records required for the review at the settlement phase must include the following:</p>
<ul>
<li>All of the pages numbered in sequence, unless this is not practical (see above).</li>
<li>For withheld or severed pages, a column identifying the section number(s) of the applicable legislation under which the information has been withheld.</li>
</ul>
<p>Indexes of records provided at the settlement phase may also include a column containing a description of the nature of the records or information being withheld but is not required.</p>
<p>A deadline for providing the index of records for the settlement phase will be provided to the respondent in writing.</p>
<p>Indexes of records provided for an inquiry <strong>must also include </strong>a column containing a description of the nature of the records or information being withheld (e.g. “email”, “letter”, “briefing note”, “report”, etc.). It is helpful to include titles and dates of documents if that information is not at issue.</p>
<p>In an inquiry, a copy of the index of records must be provided to the applicant and/or third party with the respondent’s submission (see <a href="https://oipc.ab.ca/resource/practice-note-inquiry-procedures/" target="_blank" rel="noopener">Practice Note: Inquiry Procedures</a>)</p>
<p>The index of records is to be sent by the respondent to the Commissioner and all other parties named on the Notice of Inquiry with the respondent’s submission. It should be labelled “Index of Records (Provided to the Parties)”.</p>
<p>Because the index of records must be provided to the other parties in an inquiry, <strong>it should not itself reveal any information that the party preparing it seeks to withhold from the other parties</strong>.</p>
<h5>Index of Records Example</h5>
<p>The index of records should account for each of the withheld or redacted pages, and every section of the applicable legislation applied. As a result, the index of records should be comprised of two tables:</p>
<ul>
<li>Table 1 according to page numbers, with descriptions of the records or information if the index is provided for an inquiry.</li>
<li>Table 2 according to the sections of the applicable legislation in which the descriptions need not be</li>
</ul>
<p>The two tables ensure the person conducting the review can quickly identify and locate the information and exceptions at issue in the records.</p>
<h5><em>Table 1 Example</em></h5>

<table id="tablepress-5" class="tablepress tablepress-id-5">
<thead>
<tr class="row-1">
	<th class="column-1">Page Number</th><th class="column-2">Description</th><th class="column-3">Section(s) of the Act</th>
</tr>
</thead>
<tbody class="row-striping">
<tr class="row-2">
	<td class="column-1">1-17</td><td class="column-2">Cabinet minutes</td><td class="column-3">22(1)</td>
</tr>
<tr class="row-3">
	<td class="column-1">18-19</td><td class="column-2">Minister’s report to Cabinet </td><td class="column-3">22(1), 16(1)(a)(ii),(b), (c)(i), 25(1)(c) </td>
</tr>
<tr class="row-4">
	<td class="column-1">20-22</td><td class="column-2">Third party report to Treasurer</td><td class="column-3">22(1), 16(1)(a)(ii), (b), (c)(i) </td>
</tr>
<tr class="row-5">
	<td class="column-1">23</td><td class="column-2">Public Body X’s letter to Minister of Public Body Y re: development in City Y</td><td class="column-3">21(1)(a)(ii), 25(1)(c)</td>
</tr>
<tr class="row-6">
	<td class="column-1">24-30</td><td class="column-2">Memo re: Policy Options for Public Body Y</td><td class="column-3">Disclosed</td>
</tr>
<tr class="row-7">
	<td class="column-1">Record A</td><td class="column-2">Treasury’s financial analysis for Cabinet</td><td class="column-3">22(1)</td>
</tr>
<tr class="row-8">
	<td class="column-1">Record B</td><td class="column-2">Third Party’s report to Public Body X </td><td class="column-3">16(1)(a)(ii),(b),(c)(i) </td>
</tr>
</tbody>
</table>
<!-- #tablepress-5 from cache -->
<h5><em>Table 2 Example</em></h5>

<table id="tablepress-6" class="tablepress tablepress-id-6">
<thead>
<tr class="row-1">
	<th class="column-1">Section(s) of the Act</th><th class="column-2">Page Number(s)</th>
</tr>
</thead>
<tbody class="row-striping">
<tr class="row-2">
	<td class="column-1">Section 16(1)(a)(ii),(b), (c)(i)</td><td class="column-2">18-19, 20-22; Record B </td>
</tr>
<tr class="row-3">
	<td class="column-1">Section 21(1)(a)(ii) </td><td class="column-2">23</td>
</tr>
<tr class="row-4">
	<td class="column-1">Section 22(1)</td><td class="column-2">1-17, 18-22; Record A: 1-5 </td>
</tr>
<tr class="row-5">
	<td class="column-1">Section 25(1)(c)</td><td class="column-2">18-19, 23</td>
</tr>
</tbody>
</table>
<!-- #tablepress-6 from cache -->
<p style="font-size: 0.9em; color: grey;"><a href="#top-of-page">Back to top of the page</a></p>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="checklist"></a></p>
<h2>Preparing Records at Issue Checklist</h2>
<table>
<tbody>
<tr>
<td width="29"></td>
<td width="571">Are the records numbered?</td>
</tr>
<tr>
<td width="29"></td>
<td width="571">Is the numbering consistent, such that the numbers on the records are the same as those on records provided previously to the applicant or a third party?</td>
</tr>
<tr>
<td width="29"></td>
<td width="571">Are the records legible? If the records are in electronic form, can they be opened?</td>
</tr>
<tr>
<td width="29"></td>
<td width="571">Are all redaction decisions current and clearly indicated on the records?</td>
</tr>
<tr>
<td width="29"></td>
<td width="571">Has the requestor been told about all the redaction decisions documented on the records?</td>
</tr>
<tr>
<td width="29"></td>
<td width="571">Has a set of records been kept for the respondent’s use in the inquiry?</td>
</tr>
<tr>
<td width="29"></td>
<td width="571">If the records are for an inquiry, have all extraneous comments been removed from the records?</td>
</tr>
<tr>
<td width="29"></td>
<td width="571">Should an index of records be provided? If so, has an index of records been prepared?</td>
</tr>
</tbody>
</table>
<p style="font-size: 0.9em; color: grey;"><a href="#top-of-page">Back to top of the page</a></p>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="glossary"></a></p>
<h2>Glossary of Terms</h2>

<table id="tablepress-10-no-2" class="tablepress tablepress-id-10">
<thead>
<tr class="row-1">
	<th class="column-1">Term</th><th class="column-2">Definition</th>
</tr>
</thead>
<tbody class="row-striping row-hover">
<tr class="row-2">
	<td class="column-1">Adjudication</td><td class="column-2">The team that manages the inquiry phase.</td>
</tr>
<tr class="row-3">
	<td class="column-1">Adjudicator</td><td class="column-2">The person that the Commissioner has delegated to be the decision-maker in the inquiry.</td>
</tr>
<tr class="row-4">
	<td class="column-1">Affected parties</td><td class="column-2">Individuals or other organizations that could be affected by the decision made in the inquiry. May also be referred to as third parties.</td>
</tr>
<tr class="row-5">
	<td class="column-1">Applicant</td><td class="column-2">The individual who formally requested access to information or requested correction of their personal or health information under the ATIA, FOIP Act, HIA or PIPA.</td>
</tr>
<tr class="row-6">
	<td class="column-1">Arguments</td><td class="column-2">The reasons why a party believes the evidence shows certain facts to be true, and why the Commissioner should interpret the law a certain way.</td>
</tr>
<tr class="row-7">
	<td class="column-1">Case Resolution</td><td class="column-2">The team that conducts the settlement phase of a review.</td>
</tr>
<tr class="row-8">
	<td class="column-1">Complainant</td><td class="column-2">The individual who made a formal complaint that personal information was collected, used or disclosed in contravention of the FOIP Act, HIA or PIPA.</td>
</tr>
<tr class="row-9">
	<td class="column-1">Custodian</td><td class="column-2">The health service provider, whether an individual or an organization, from which the information was requested or against which the complaint was made (also called “respondent”).</td>
</tr>
<tr class="row-10">
	<td class="column-1">Evidence</td><td class="column-2">Information/material that establishes the facts on which a party is relying.</td>
</tr>
<tr class="row-11">
	<td class="column-1">In camera</td><td class="column-2">A portion of a submission provided only to the Commissioner in an inquiry.</td>
</tr>
<tr class="row-12">
	<td class="column-1">Inquiry</td><td class="column-2">A formal adjudicative process, usually conducted in writing.</td>
</tr>
<tr class="row-13">
	<td class="column-1">Interveners</td><td class="column-2">Individuals or organizations whose opinions or specialized knowledge can provide a broader understanding of the issues at inquiry.</td>
</tr>
<tr class="row-14">
	<td class="column-1">Mediation/investigation</td><td class="column-2">A process authorized by the Commissioner to explore opportunities to settle issues with the parties. May also be referred to as the settlement phase.</td>
</tr>
<tr class="row-15">
	<td class="column-1">Notice of Inquiry</td><td class="column-2">Identifies the parties involved in the inquiry and their contact information, the issues that will be addressed, and a schedule for submissions.</td>
</tr>
<tr class="row-16">
	<td class="column-1">Organization</td><td class="column-2">The business, corporation, union or partnership from which the information was requested or against which the complaint was made (also called “respondent”).</td>
</tr>
<tr class="row-17">
	<td class="column-1">Parties</td><td class="column-2">The respondent (public body, custodian or organization), applicant/complainant, or other affected parties who are part of the inquiry.</td>
</tr>
<tr class="row-18">
	<td class="column-1">Public body</td><td class="column-2">The government department or other public entity from which the information was requested or against which the complaint was made (also called “respondent”).</td>
</tr>
<tr class="row-19">
	<td class="column-1">Respondent</td><td class="column-2">The public body, custodian or organization that has duties under the legislation.</td>
</tr>
<tr class="row-20">
	<td class="column-1">Senior Information and Privacy Manager</td><td class="column-2">The person that the Commissioner has authorized to investigate and try to settle the confirmed issues at the Case Resolution phase. May also be referred to as an investigator.</td>
</tr>
<tr class="row-21">
	<td class="column-1">Settlement</td><td class="column-2">A process authorized by the Commissioner to explore opportunities to settle issues with the parties. May also be referred to as a mediation or investigation.</td>
</tr>
<tr class="row-22">
	<td class="column-1">Submissions</td><td class="column-2">Informs the Commissioner and the other parties about what a party thinks are the central issues in a case, and provides evidence and makes arguments about how those issues should be decided.</td>
</tr>
<tr class="row-23">
	<td class="column-1">Third Parties</td><td class="column-2">Parties, other than the respondent or applicant/complainant, who are part of the inquiry. For example, organizations and individuals whose information is the subject of an applicant’s access request. May also be referred to as affected parties.</td>
</tr>
</tbody>
</table>

<p style="font-size: 0.9em; color: grey;"><a href="#top-of-page">Back to top of the page</a></p>

		</div>
	</div>

<p>June 4, 2025</p>

<table id="tablepress-2-no-9" class="tablepress tablepress-id-2">
<tbody class="row-striping">
<tr class="row-1">
	<td class="column-1"><p><strong>Disclaimer</strong><br><br />
This document is not intended as, nor is it a substitute for, legal advice, and is not binding on the Information and Privacy Commissioner of Alberta. Responsibility for compliance with the law (and any applicable professional or trade standards or requirements) remains with each organization, custodian or public body. All examples used are provided as illustrations. The official versions of the laws <a href="https://oipc.ab.ca/legislation/" target="_blank" rel="noopener">the OIPC oversees</a> and their associated regulations should be consulted for the exact wording and for all purposes of interpreting and applying the legislation. The Acts are available on the website of <a href="https://www.alberta.ca/alberta-kings-printer.aspx" rel="noopener" target="_blank">Alberta King's Printer</a>.</p></td>
</tr>
</tbody>
</table>

]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
