<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Privacy Management Programs &#8211; Office of the Information and Privacy Commissioner of Alberta</title>
	<atom:link href="https://oipc.ab.ca/resources/privacy-management-programs/feed/" rel="self" type="application/rss+xml" />
	<link>https://oipc.ab.ca</link>
	<description>Office of the Information and Privacy Commissioner of Alberta</description>
	<lastBuildDate>Fri, 17 Apr 2026 15:46:52 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://oipc.ab.ca/wp-content/uploads/2022/01/cropped-OIPC-Icon-32x32.png</url>
	<title>Privacy Management Programs &#8211; Office of the Information and Privacy Commissioner of Alberta</title>
	<link>https://oipc.ab.ca</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Guidance for Public Bodies in Developing Privacy Management Programs</title>
		<link>https://oipc.ab.ca/resource/popa-guidance-pmp/</link>
		
		<dc:creator><![CDATA[Chris Stinner]]></dc:creator>
		<pubDate>Thu, 16 Apr 2026 17:13:01 +0000</pubDate>
				<guid isPermaLink="false">https://oipc.ab.ca/?post_type=resource&#038;p=17480</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<h1>Introduction</h1>
<p>In a world that increasingly depends on technology and personal information, organizational accountability is essential for maintaining public trust. This guidance explains what it means for a public body to be accountable today and how to establish a Privacy Management Program (PMP) to support that responsibility. It outlines the requirements for public bodies under Alberta’s <a href="https://www.canlii.org/en/ab/laws/stat/sa-2024-c-p-28.5/latest/sa-2024-c-p-28.5.html#sec25" target="_blank" rel="noopener"><em>Protection of Privacy Act (</em>POPA)</a> and <a href="https://canlii.ca/t/2ks77#sec6" target="_blank" rel="noopener">Protection of Privacy (Ministerial) Regulation</a> (M-Reg) and builds on earlier best-practice guidance from privacy commissioners in Alberta, British Columbia, and Canada in <a href="https://oipc.ab.ca/wp-content/uploads/2022/02/Accountability-2012.pdf" target="_blank" rel="noopener"><em>Getting Accountability Right with a Privacy Management Program</em></a>. By following the approach described in this document, public bodies will be better prepared to meet their legal responsibilities under POPA, including protecting privacy, providing appropriate access to personal information, and supporting accountability, transparency, and fairness.</p>
<p>This guidance also includes a checklist to help public bodies set up a successful Privacy Management Program (see Appendix A).</p>
<h1>Purpose and structure of this guidance</h1>
<h2>Purpose</h2>
<p>The purpose of this guidance is to help public bodies comply with the POPA requirement to establish and implement a PMP. It addresses four topic areas that are needed for a public body to build its PMP:</p>
<ol>
<li>preparing to set up and maintain a PMP,</li>
<li>legislative alignment, i.e. ensuring a public body’s PMP meets the requirements of POPA,</li>
<li>operationalizing accountability, i.e. translating legal requirements into actions a public body must take, and</li>
<li>program expectations, i.e., a comprehensive breakdown of the policies, practices, and roles required for effective internal oversight.</li>
</ol>
<h2>Structure</h2>
<p>This guidance uses a ‘building block’ approach to help public bodies develop their PMP. Part 1 introduces the core building blocks of the PMP; organizational commitment, and a layered approach to program controls. Part 2 focuses on assessing and improving the PMP. Part 3 discusses how the PMP is used to demonstrate compliance.</p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<div style="border: 1px solid #ccc; padding: 15px; border-radius: 5px;">
<p><strong>Table of Contents</strong></p>
<p><strong><a href="#developing-comprehensive-pmp">1. DEVELOPING A COMPREHENSIVE PRIVACY MANAGEMENT PROGRAM</a></strong></p>
<ul>
<li><a href="#organizational-commitment">Organizational Commitment</a></li>
<li><a href="#privacy-management-program-requirements">Privacy management program requirements based on volume and sensitivity (determination)</a></li>
<li><a href="#program-controls-all">Program controls for all public bodies</a></li>
<li><a href="#program-controls-sensitive-high-volume">Program controls for public bodies with sensitive or high volumes of personal information</a></li>
</ul>
<p><strong><a href="#ongoing-assessment-revision">2. ONGOING ASSESSMENT AND REVISION</a></strong></p>
<ul>
<li><a href="#develop-oversight-review-plan">Develop an oversight and review plan</a></li>
<li><a href="#assess-revise-program-controls">Assess and revise program controls</a></li>
</ul>
<p><strong><a href="#demonstrating-compliance">3. DEMONSTRATING COMPLIANCE</a></strong></p>
<ul>
<li><a href="#access-to-pmp">Access to the PMP by the public</a></li>
<li><a href="#reduce-administrative-burden">Using the PMP to reduce administrative burden</a></li>
<li><a href="#appendix-a">Appendix A &#8211; Checklist of POPA requirements for public bodies</a></li>
<li><a href="#appendix-b">Appendix B &#8211; Infographics</a></li>
<li><a href="#appendix-c">Appendix C &#8211; Glossary</a></li>
</ul>
</div>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="developing-comprehensive-pmp"></a></p>
<h1>1. Developing a Comprehensive Privacy Management Program</h1>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="organizational-commitment"></a></p>
<h2>Organizational Commitment</h2>
<h3>Senior management commitment and support</h3>
<p>Leadership is the cornerstone of building an organizational culture that respects privacy rights. For a PMP to be effective, senior management must take a leading role in promoting it.</p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-6"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<ul>
<li><strong>Resource allocation:</strong> the head of the public body must ensure that the designated privacy officer has the necessary financial, human, and technical resources to establish, implement, and periodically review, assess and update the PMP.</li>
<li><strong>Mandatory compliance:</strong> while public bodies face competing priorities, compliance with POPA is a legal obligation. This means that sufficient support must be given to meet the requirements under this Act.</li>
<li><strong>Public trust:</strong> the ability to collect personal information from Albertans effectively rests on public confidence. Proper funding and executive support for the public body’s PMP prevents the erosion of that trust.</li>
<li><strong>Reducing compliance overhead:</strong> a well-championed and PMP helps minimize the costly and time-intensive process of remediation by means of complaints, investigations, and court cases.</li>
</ul>

		</div>
	</div>
</div></div></div><div class="wpb_column vc_column_container vc_col-sm-6"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element  vc_custom_1775736594790" >
		<div class="wpb_wrapper">
			<p><span style="color: #ffffff;"><strong><em>head of the public body<br />
</em></strong><em>“head”, in relation to a public body, means,</em></span></p>
<p><span style="color: #ffffff;"><em>(i)    if the public body is a department, branch or office of the Government of Alberta, the member of the Executive Council who presides over it,</em></span></p>
<p><span style="color: #ffffff;"><em> (ii)    if the public body is an agency, board, commission, corporation, office or other body designated as a public body in the regulations, the person designated by the member of the Executive Council responsible for that body to act as the head of that body or, if a head is not so designated, the person who acts as the chief officer and is charged with the administration and operation of that body,</em></span></p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<h3>Designation and role of the Privacy Officer</h3>
<p>The head of a public body must designate/identify one or more individuals as the Privacy Officer for the public body. The Privacy Officer is responsible for ensuring the public body’s compliance with POPA and its regulations<a href="#_ftn1" name="_ftnref1">[1]</a>.</p>
<p><strong>Core responsibilities of the Privacy Officer:</strong></p>
<ul>
<li><strong>Liaison:</strong> Serving as the primary point of contact for privacy inquiries and concerns.</li>
<li><strong>Policy development:</strong> Supporting the creation, implementation, and maintenance of privacy policies and procedures.</li>
<li><strong>Compliance oversight:</strong> ensuring the public body adheres to POPA and overseeing the management of the PMP.</li>
</ul>
<p>Regardless of the public body’s size, the Privacy Officer is accountable for the public body’s privacy practices. The Privacy Officer is the PMP’s architect and leader. The specific duties and activities include:</p>
<ul>
<li>Establishing and regularly revising program controls (policies, procedures, etc.).</li>
<li>Developing and delivering employee training and education.</li>
<li>Documenting, monitoring, and auditing the implementation of the PMP.</li>
<li>Representing the public body during investigations by the Office of the Information and Privacy Commissioner (OIPC).</li>
</ul>
<ul>
<li>Together with senior management, champion a workplace culture that prioritizes privacy.</li>
</ul>
<h3>Ensuring a Privacy Officer can do their work well</h3>
<p><strong>Privacy Officer within the public body’s governance structure</strong></p>
<p>In many jurisdictions, a privacy officer, or equivalent official, is somewhat shielded from reprisal by executives who may have interests that conflict with those of the privacy officer’s role. Care must be taken to mitigate this potential conflict by having the Privacy Officer report directly to the head of the public body who is accountable for the overall performance and compliance of the public body.</p>
<p><strong>Adequate resourcing</strong></p>
<p>The need for resourcing is determined by the size and complexity of the public body.</p>
<ul>
<li><strong>Small public bodies:</strong> The privacy officer may be able to manage privacy duties alongside other professional responsibilities.</li>
<li><strong>Large public bodies:</strong> In organizations that handle high volumes or sensitive personal information, the Privacy Officer should typically be a full-time role supported by dedicated staff (e.g. within a Privacy Office).</li>
</ul>
<p><strong>Budgetary Integration </strong></p>
<p>Budget for the PMP and a public body’s privacy functions (e.g. Privacy Office) is required to ensure long-term sustainability of the PMP. Such funding should be established as a <strong>non-discretionary</strong> line item within the public body’s annual budget.</p>
<h3>Auditing, reporting and escalation</h3>
<p>A successful PMP must include reporting mechanisms. These tools ensure that the Privacy Officer and management remain informed about the program&#8217;s effectiveness, identify gaps, and implement solutions for improvement.</p>
<p><strong>Internal audit and assurance</strong></p>
<p>To maintain accountability, public bodies must incorporate the PMP into their internal audit program such that it is objectively evaluated for how well the PMP supports and achieves POPA compliance.</p>
<ul>
<li><strong>Methodology:</strong> Audits should collect and document metrics that can be used to evaluate the PMP’s performance (percentage of employees who have been trained or retrained, how many complaints have been filed, how many privacy incidents have occurred, etc.).</li>
<li><strong>Independent review:</strong> In case of a significant privacy incident or systemic problems, public bodies should consider using external<a href="#_ftn2" name="_ftnref2">[2]</a> auditors to provide an unbiased assessment of (parts of) their privacy compliance framework.</li>
</ul>
<p><strong>Incident escalation and management</strong></p>
<p>Prompt reporting of a breach of personal information or of privacy complaints is essential. The PMP must clearly define the responsibilities, timelines and expectations of the escalation process.</p>
<ul>
<li><strong>Duties of the head:</strong> Under POPA, the head is obligated to protect personal information in the custody or control of the public body and to make reasonable security arrangements against such risks as unauthorized access, collection, use, disclosure or destruction. If an incident involving the loss of, unauthorized access to or unauthorized disclosure of this personal information (Privacy Incident), the public body is required to notify individuals affected by the breach <u>without unreasonable delay</u> where there is a real risk of significant harm to these individuals (one or more) as required in the Act and regulations<a href="#_ftn3" name="_ftnref3">[3]</a>. As well, public bodies must have a process to receive and manage complaints about any alleged unauthorized collection, use or disclosure of personal information<a href="#_ftn4" name="_ftnref4">[4]</a>.</li>
<li><strong>The Privacy Officer’s role:</strong> All Privacy Incidents must be escalated to the Privacy Officer. The Privacy Officer acts as the central manager of the Privacy Incident, coordinating with necessary experts, e.g. IT professionals, legal counsel, and communications advisors, etc. to resolve the matter. The Privacy Officer also reports Privacy Incidents to the head. For complaints, the Privacy Officer is responsible to investigate to determine whether the complaint is substantiated and take any action as may be needed to address the complaint and mitigate the risk of recurrence, including recommending discipline of employees for snooping or other serious violations.</li>
<li><strong>Progress tracking:</strong> For privacy complaints, staff should track progress and report to the privacy officer to ensure the organization is following its documented protocols effectively and timely. Such reporting, when properly implemented, ensures early detection of systemic problems with meeting the public body’s statutory obligations.</li>
</ul>
<p><strong>Testing and validation</strong></p>
<p>Public bodies should periodically evaluate their Privacy Incident protocols. These exercises should evaluate:</p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-6"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<ul>
<li><strong>Identification:</strong> How quickly the Incident is spotted (and if it is spotted at all by staff).</li>
<li><strong>Escalation:</strong> How efficiently the right people are notified.</li>
<li><strong>Containment:</strong> How effectively the Incident is contained, e.g. any unauthorized access or disclosure is stopped.</li>
<li><strong>Compliance:</strong> how well the public body is able to fulfill its requirements regarding Privacy Incident Management under POPA<a href="#_ftn5" name="_ftnref5">[5]</a>.</li>
</ul>
<p style="font-size: 0.9em; color: grey;"><a href="#">Back to top of the page</a></p>

		</div>
	</div>
</div></div></div><div class="wpb_column vc_column_container vc_col-sm-6"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element  vc_custom_1775736676478" >
		<div class="wpb_wrapper">
			<p><span style="color: #ffffff;"><strong><em>POPA </em></strong><em>25(1) A public body must establish and implement a privacy management program consisting of documented policies and procedures that promote the public body’s compliance with its duties under this Act. </em></span></p>
<p><span style="color: #ffffff;"><em>25 (2) A privacy management program must (a) be proportional to the volume and sensitivity of the personal information in the custody or under the control of the public body, and (b) comply with the prescribed requirements.</em></span></p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="privacy-management-program-requirements"></a></p>
<h2>Privacy management program requirements based on volume and sensitivity (determination)</h2>
<p>POPA requires a tiered approach to public bodies’ PMPs. All public bodies must meet the requirements under section 6(1) of the M-Reg. Those public bodies that process high volumes or sensitive information must meet additional requirements under 6(2) of the M-Reg. The following determines if your public body needs to meet these additional requirements:</p>
<p><strong>Sensitivity of personal information</strong></p>
<p>A public body <strong>must determine</strong> if it has custody or control of highly sensitive information. Section 1 of the M-Reg defines <em>high-sensitivity information </em>as:</p>
<p><em>(a) biometric information about an individual;</em></p>
<p><em>(b) financial information about an individual;</em></p>
<p><em>(c) personal information respecting a minor, senior or vulnerable individual</em></p>
<p>Biometric information is further defined in section 1(a) of the Act as:</p>
<p><em>information derived from an individual’s unique measurable characteristics;</em></p>
<p><strong>Volume of personal information</strong></p>
<p>A public body <strong>must determine</strong> if it has custody or control of a high volume of Albertans’ personal information. High volume is not defined, as it is to be interpreted as a contextual, qualitative threshold based on risk.</p>
<p><strong>Determination</strong></p>
<p>In accordance with the determinations made, the public body must proceed with efforts to meet the requirements applicable to all public bodies, and if applicable, those imposed on public bodies that handle highly sensitive personal information, high volumes of personal information, or both. Implementing all the requirements found under section 6 of the regulation is also a matter of best practice, regardless of the handling of highly sensitive personal information or high volumes of personal information by a public body.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#">Back to top of the page</a></p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="program-controls-all"></a></p>
<h2>Program controls for all public bodies</h2>
<h3>Personal information inventory</h3>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-6"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>A comprehensive personal information inventory is an essential prerequisite for privacy compliance under POPA. If a public body does not know the nature and volume of the personal information it collects, uses, and retains, it cannot realistically meet its statutory obligations. Additionally, an inventory is indispensable for meeting transparency requirements regarding personal information holdings (e.g. see section 57 of POPA regarding personal information banks). The personal information inventory directly supports section 6(1)(c) of the M-Reg, which mandates the establishment of a security classification system for personal information and data derived from personal information. Without a comprehensive inventory, a public body cannot accurately classify its personal information holdings. It would also be unable to apply and provide transparency about the appropriate safeguards required for automated systems that process personal information under Section 6(1)(b)(iii) of the M-Reg. The creation of a personal information inventory can be part of the broader effort to create a data inventory<a href="#_ftn6" name="_ftnref6">[6]</a> for a public body.</p>
<p><strong>What is a personal information inventory?</strong></p>
<p>A personal information inventory should capture all recorded personal information that is in the custody or control of a public body, including that held by vendors. This personal information includes unique identifiers, biometrics, data, or meta-data that could, when combined with other data, reasonably identify an individual. Identifying the sensitivity and categories of this information is a prerequisite for the mandatory training of employees required by section 6(1)(d) of the M-Reg, as staff must understand the specific nature of the personal information they handle to fulfill their obligations, and specific to the way they work with personal information in the public body’s business processes. Furthermore, documenting this inventory allows the Privacy Officer to maintain effective oversight and ensure that the public body’s internal policies, including those for correcting information or managing Privacy Incidents, are grounded in an accurate map of the organization&#8217;s data landscape.</p>

		</div>
	</div>
</div></div></div><div class="wpb_column vc_column_container vc_col-sm-6"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element  vc_custom_1775737008148" >
		<div class="wpb_wrapper">
			<p><span style="color: #ffffff;"><strong><em>M-Reg 143/2025 </em></strong></span></p>
<p><span style="color: #ffffff;"><strong><em>6(1)</em></strong><em> A privacy management program established by a public body under section 25 of the Act must include</em></span></p>
<p><span style="color: #ffffff;"><strong><em>(a)</em></strong><em> the designation or identification of a privacy officer within the public body who is responsible for ensuring the public body’s compliance with the Act,</em></span><br />
<span style="color: #ffffff;"><strong><em>(b)</em></strong><em> internal policies and procedures to address the public body’s duties under the Act, including policies and procedures for <strong>(i)</strong> responding to</em></span><br />
<span style="color: #ffffff;"><strong><em>(A)</em></strong><em> requests for the correction of an individual’s personal information under section 7 of the Act,</em></span><br />
<span style="color: #ffffff;"><strong><em>(B)</em></strong><em> incidents described in section 10(2) of the Act, and</em></span><br />
<span style="color: #ffffff;"><strong><em>(C)</em></strong><em> complaints made under section 38(2) of the Act,</em></span><br />
<span style="color: #ffffff;"><strong><em>(ii)</em></strong><em> the creation, use and disclosure of non personal data, if the public body will create, use or disclose non personal data, and</em></span><br />
<span style="color: #ffffff;"><strong><em>(iii)</em></strong><em> how automated systems will use personal information, including any security or technical safeguards that will be implemented to protect personal information, if the public body will use personal information in an automated system to generate content or make decisions, recommendations or predictions,</em></span><br />
<span style="color: #ffffff;"><strong><em>(c)</em></strong><em> the establishment of a security classification system for personal information, data derived from personal information and non personal data in the custody or under the control of the public body,</em></span><br />
<span style="color: #ffffff;"><strong><em>(d)</em></strong><em> mandatory training for employees of the public body about the obligations of those employees under the Act, with specified expiry periods after which retraining is required, and</em></span><br />
<span style="color: #ffffff;"><strong><em>(e)</em></strong><em> timelines for the periodic review, assessment and update of the privacy management program.</em></span></p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p><strong>The personal information inventory role in PMPs</strong></p>
<p>As highlighted, an accurate inventory is the baseline for designing and implementing an effective PMP. It provides the necessary data to manage information-sharing agreements and personal information banks, and is fundamental to detailing the authority for collection and the parties to whom personal information is disclosed. This inventory must be frequently updated, and by doing so it supports the Min Reg section 6(1)(e) requirement for periodic review and assessment of the PMP by providing a clear benchmark for what information is currently held and how it is protected. By doing the following, the public body creates the essential foundation for privacy compliance:</p>
<ul>
<li>documenting the location (physical and logical) of storage;</li>
<li>the categories of personal information it holds;</li>
<li>the categories of individuals , such as minors, adults, or seniors, whose personal information it holds;</li>
<li>the specific purposes for data collected, used and disclosed; and by</li>
<li>asserting the sensitivity and security classification of this personal information,</li>
</ul>
<p>The personal information inventory will assist when the public body has to respond to complaints and access requests. It will assist in making determinations about when a privacy impact assessment (PIA) is required and makes completing the PIA easier. Lastly, it will help the Privacy Officer effectively establish and manage the PMP so the public body will be compliant with POPA and its regulations.</p>
<h3>Policies, procedures and Safeguards</h3>
<p>Public bodies are required to establish their internal operations through specific policies and procedures. Section 6(1)(b) of the M-Reg details these requirements and also refers back to the related sections of POPA.</p>
<p><strong>Statutory policies and procedures</strong></p>
<p>Public bodies must establish policies and procedures to handle:</p>
<p><u>Requests for Correction of personal information (section 6(1)(b)(i)(A) M-Reg, section 7 POPA)</u></p>
<ul>
<li><strong>Accuracy:</strong> Policies and procedures must outline how the public body will receive and process requests to correct errors in personal information (e.g., birth dates, contact info).</li>
<li><strong>Opinions vs. facts:</strong> Since professional opinions cannot be ‘corrected’, the policy or procedures must provide a mechanism for individuals to append a statement of disagreement to the record.</li>
<li><strong>Notification:</strong> If a correction is made, the policies or procedures must include a process to notify any third party to whom the information was disclosed.</li>
</ul>
<p><u>Privacy incidents (section 6(1)(b)(i)(B) M-Reg, section 10(2) POPA)</u></p>
<ul>
<li><strong>Privacy Incident containment:</strong> Policies and procedures must detail immediate steps to contain a Privacy Incident.</li>
<li><strong>Investigation: </strong>Policies and procedures must guide the Privacy Officer on the duty to conduct an investigation to determine the cause of the Privacy Incident and the steps to take to prevent recurrence.</li>
<li><strong>Risk assessment:</strong> Policies and procedures must guide the Privacy Officer on evaluating whether a breach creates a &#8220;real risk of significant harm&#8221; (RROSH) to individuals ensuring adherence to the requirements in section 4 of the M-Reg.</li>
<li><strong>Reporting timelines:</strong> Policies and procedures must guide the Privacy Officer on how they will carry out their duty to notify the Minister, the OIPC, and to affected individuals &#8220;without unreasonable delay&#8221; about the Privacy Incident as prescribed by section 10 (2) of POPA and section 4 of the M-Reg.</li>
</ul>
<p><u>Complaints (section 6(1)(b)(i)(C), POPA section 38(2))</u></p>
<ul>
<li><strong>Internal review first:</strong> Policies and procedures must establish a process for receiving and responding to privacy complaints, including any follow up by the OIPC. Under POPA, individuals are required to seek a response from the public body to their complaint before bringing the matter to the OIPC.</li>
<li><strong>Documentation:</strong> Procedures must be in place to systematically handle complaints, the steps taken following a complaint, and the final response provided to the complainant.</li>
</ul>
<p>For more information <a href="https://oipc.ab.ca/breach-notification/#public-bodies-popa" target="_blank" rel="noopener">see our guidance about breach notification to the OIPC.</a></p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-6"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<strong>Non-personal data management</strong><br />
If a public body creates or uses &#8220;non-personal data&#8221; (anonymized, synthetic, or de-identified data derived from personal information), Division 2 of Part 3 POPA, especially section 21, require specific oversight by the public body:</p>

		</div>
	</div>
</div></div></div><div class="wpb_column vc_column_container vc_col-sm-6"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element  vc_custom_1775737458442" >
		<div class="wpb_wrapper">
			<p><span style="color: #ffffff;"><strong>POPA</strong> 1(n): “<em>non‑personal data” means data, including data derived from personal information, that has been generated, modified or anonymized so that it does not identify any individual, and includes synthetic data and any other type of non‑personal data identified in the regulations;</em></span></p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<ul>
<li><strong>Quality assurance:</strong> Non-personal data must be created in accordance with POPA requirements and as documented in the prescribed policy (section 6(1)(b)(ii) M-Reg). This means that policies should include requirements 1) to document personal information used to create the data, 2) the purpose for creating the data, 3) the method for creating the data, 4) a data quality assurance process to verify that de-identification methods are effective and cannot be easily reversed (re-identification).</li>
<li><strong>Auditability:</strong> Methods used to create non-personal data must be documented, and replicable for auditing purposes.</li>
<li><strong>Bias mitigation:</strong> Procedures should identify and account for potential biases in the non-personal data sets to ensure they remain accurate for research or planning.</li>
</ul>
<p><strong>Automated systems and AI</strong></p>
<p>When personal information is used in automated systems<a href="#_ftn1" name="_ftnref1">[1]</a>, including those generating content (Generative AI) or making predictions/decisions, section 6(1)(b)(iii) M-Reg mandates rigorous safeguards. Policies and procedures should set out the following details:</p>
<ul>
<li><strong>Transparency:</strong> Policies and procedures must ensure, and explain how individuals are notified if their information is being processed by an automated system to make a decision about them<a href="#_ftn2" name="_ftnref2">[2]</a>.</li>
<li><strong>Automated system specific information security controls:</strong> Technical controls must be documented and implemented (e.g., encryption of communication and data at rest, access control measures such as multi-factor authentication), and administrative controls (e.g., human-in-the-loop oversight)<a href="#_ftn3" name="_ftnref3">[3]</a>.</li>
<li><strong>Risk mitigation:</strong> Procedures should address how these systems will be monitored for algorithmic bias, procedural and outcome fairness, and emerging AI privacy threats<a href="#_ftn4" name="_ftnref4">[4]</a> like unauthorized data scraping from or by AI model.</li>
</ul>
<p><strong>Periodic review of PMP</strong></p>
<ul>
<li><strong>Keeping the PMP up to date: </strong>The public body must establish timelines for the periodic review, assessment and update of the PMP as required by section 6(1)(e) of the M-Reg. Chapter 5 has more information on the steps required to do this effectively.</li>
<li><strong>Security classification:</strong> Based on the information obtained by making the personal information inventory, the public body can proceed by creating and maintaining a security classification system for personal information, data derived from personal information and non personal data (as required under section 6(1)(c) of the M-Reg). This classification can be continuously used to ensure the right controls are in place to protect personal information, e.g., based on the sensitivity or volume of information that needs to be protected.</li>
<li><strong>Mandatory training:</strong> Section 6(1)(d) of the M-Reg requires all employees (inclusive of service providers and other contractors) of the public body to undergo training about their obligations under POPA relevant to their work duties and to take mandatory retraining on a regular basis. Awareness of and training on the PMP is a core part of this training. An easy way to ensure any mandatory retraining happens, is to link it to annual performance evaluations of employees.</li>
</ul>
<p>For more information on establishing AI governance in the Public Sector, various useful publications touching on the subject have been published<a href="#_ftn11" name="_ftnref11">[11]</a>.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#">Back to top of the page</a></p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="program-controls-sensitive-high-volume"></a></p>
<h2>Program controls for public bodies with sensitive or high volumes of personal information</h2>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-6"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
For public bodies handling high volumes or highly sensitive personal information, the requirements established under section 6(1) of the M-Reg must be met in addition to those set out in section 6(2) of the M-Reg. This section lists additional privacy and accountability requirements to mitigate the elevated risks associated with large-scale and/or handling of sensitive personal information including that deemed of high sensitivity in section 1 of the M-Reg.</p>
<h3>Ensuring delegation and accountability</h3>
<p>Public bodies must document the specific roles and responsibilities of all employee roles (section 6(2)(a)(i) M-Reg), not just the Privacy Officer. This is commonly done by including privacy related tasks and obligations in policies, procedures, delegation documents (e.g. delegation matrix), job descriptions, etc. This effectively creates a chain of accountability from all staff working with personal information to senior management, and ultimately to the head of the public body. This requirement dovetails with the section 6(1)(d) M-Reg requirements for training (staff should be trained on their responsibilities as delegated).</p>
<h3>Risk management</h3>
<p><strong>PIAs:</strong> Under section 6(2)(a)(ii) of the M-Reg, the process for completing and submitting PIAs must be formalized. This also means that public bodies must know when PIAs are required and make this part of assessment of new or revised programs, activities and services. Furthermore, the personal information inventory and security classification conducted under section 6(1)(c) of the M-Reg can help identifying when a PIA is required under section 7(1)(a) of the M-Reg. Lastly the public body should be aware of when PIAs must be submitted to the Commissioner in accordance with section 7(5) of the M-Reg, and include dedicated activities in program and project management for assessing whether the submission to the Commissioner is mandatory.</p>

		</div>
	</div>
</div></div></div><div class="wpb_column vc_column_container vc_col-sm-6"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element  vc_custom_1775737556939" >
		<div class="wpb_wrapper">
			<p><span style="color: #ffffff;"><strong><em>M-reg 143/2025 </em></strong></span></p>
<p><span style="color: #ffffff;"><em>6(2)  If a public body has custody or control of a high volume of personal information or highly sensitive personal information, the public body’s privacy management program must also include the following:</em></span></p>
<p><span style="color: #ffffff;"><em> (a)    documentation of the public body’s internal privacy management structure and internal policies and procedures to address the public body’s duties under the Act, which must address </em></span></p>
<p><span style="color: #ffffff;"><em>(i)    the roles, responsibilities and accountabilities of employees of the public body in relation to the public body’s obligations under the Act,</em></span></p>
<p><span style="color: #ffffff;"><em> (ii)    the public body’s process for completing and submitting privacy impact assessments,</em></span></p>
<p><span style="color: #ffffff;"><em> (iii)    the public body’s policies and procedures for proactive monitoring of information systems that hold personal information, data derived from personal information or non-personal data, to assess security measures and mitigate risks,</em></span></p>
<p><span style="color: #ffffff;"><em> (iv)    the public body’s policies and procedures related to oral, electronic and written consent, and</em></span></p>
<p><span style="color: #ffffff;"><em> (v)    the public body’s policies related to the use of personal information in artificial intelligence systems, the creation of data derived from personal information and the creation of non personal data, if the public body is using personal information in artificial intelligence systems, the creation of non personal data or data matching activities;</em></span></p>
<p><span style="color: #ffffff;"><em>(b)    written administrative, technical and physical safeguards for managing personal information, data derived from personal information and non personal data.</em></span></p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
See our <a href="https://oipc.ab.ca/privacy-impact-assessments/#public-bodies-popa" target="_blank" rel="noopener">PIA resources to assist public bodies know when to submit a PIA to the OIPC and how to complete a PIA.</a></p>
<p><strong>Proactive monitoring of information systems:</strong> Under section 6(2)(a)(iii) of the M-Reg, the public body is required to proactively monitor information systems that hold personal information and related data, and document such efforts in policies and procedures. This obligation is important given the central role information systems play in ensuring the safety of personal information, and the significant Privacy Incidents that can occur if such monitoring fails or is not implemented at all. To be sure, monitoring may not stop all Privacy Incidents from occurring, but often helps in limiting the extent of a Privacy Incident.</p>
<p>&nbsp;</p>
<p><strong>Best practices:</strong> As a matter of best practice, the public body may as part of the PMP, consider other risk management tools at its disposal that are relevant to mitigate privacy risks. The importance of conducting Security Threat and Risks Assessments (STRA) and/or an Algorithmic Impact Assessment (AIA) increases where the use of innovative technology may form a risk to the privacy protection of Albertans or other risks that can flow from the use of automated decision making systems, such as unfairness and bias. This can be seen either from an information security risk perspective (consider using STRAs), or when the accuracy, completeness and correct interpretation of personal information may affect algorithmically (or AI) derived processes or outcomes for individuals (consider using AIA). Furthermore, STRAs can be one way to work on complying with the requirements of 6(2)(a)(iii).</p>
<h3>Consent and communication protocols</h3>
<p>While all public bodies must manage personal information, those with sensitive data must have well-defined section 6(2)(a)(iv) M-Reg policies for obtaining consent, as well as consider the requirements under <a href="https://canlii.ca/t/2ks72#sec2" target="_blank" rel="noopener">section 2 of the Protection of Privacy Regulation.</a></p>
<ul>
<li><strong>Consent:</strong> Documentation must address how consent is captured and recorded across oral, electronic, and written interactions.</li>
<li><strong>Sensitivity context:</strong> For all consent, but especially for highly sensitive information<a href="#_ftn12" name="_ftnref12">[12]</a> the policy or procedure <a href="https://oipc.ab.ca/wp-content/uploads/2022/02/Meaningful-Consent-2018.pdf" target="_blank" rel="noopener">must ensure that consent given is ‘informed and meaningful,’</a> providing clear evidence that the individual understands the implications of the data use.</li>
</ul>
<h3>AI governance and data matching</h3>
<p>Building on the automated systems requirements in section 6(1)(b)(iii) of the M-Reg, section 6(2)(a)(v) of the M-Reg introduces specific requirements for Artificial Intelligence (AI) and data matching.</p>
<ul>
<li><strong>AI policy:</strong> If the body uses AI, it must have specific policies governing its use, particularly how the AI creates derived data (data points inferred about an individual by a machine).</li>
<li><strong>Data matching policy and restrictions:</strong> Policies must strictly govern data matching activities, ensure compliance with part 3 of POPA, and ensure required PIAs are created and submitted to the OIPC as required by the regulations.</li>
<li><strong>Non-personal data and data derived from personal information:</strong> Section 6(2)(a)(v) of the M-Reg has some overlap with 6(1)(b)(ii), and requires a detailed policy or procedure on the creation of non-personal data and data derived from personal information.</li>
</ul>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-6"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<h3>Administrative, technical and physical safeguards</h3>
<p>In addition to requirements regarding safeguards that apply to all public bodies under section 10 of POPA, under section 6(2)(b) of the M-Reg, public bodies managing high volumes or highly sensitive personal information must implement and document appropriate administrative, technical, and physical safeguards for the entire personal information/data lifecycle, covering not only the original personal information but also data derived from it and non-personal data sets<a href="#_ftn13" name="_ftnref13">[13]</a>.</p>

		</div>
	</div>
</div></div></div><div class="wpb_column vc_column_container vc_col-sm-6"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element  vc_custom_1775737635952" >
		<div class="wpb_wrapper">
			<p><span style="color: #ffffff;"><strong><em>Reg 132/2025</em></strong><em> Section 1(2) (a) “administrative safeguard” means a policy, procedure or practice to manage a public body’s conduct that protects the privacy of personal information, data derived from personal information and non-personal data;</em></span><br />
<span style="color: #ffffff;"><em>(b) “physical safeguard” means a measure to protect a public body’s physical assets, including electronic information systems, from natural and environmental hazards and unauthorized intrusion;</em></span><br />
<span style="color: #ffffff;"><em>(c) “technical safeguard” means a measure to protect a public body’s electronic information and control access to it.</em></span></p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p style="font-size: 0.9em; color: grey;"><a href="#">Back to top of the page</a></p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="ongoing-assessment-revision"></a></p>
<h1>2. Ongoing assessment and revision</h1>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="develop-oversight-review-plan"></a></p>
<h2>Develop an oversight and review plan</h2>
<p>Building on the foundational requirements of section 6(1) of the M-Reg and the enhanced expectations in section 6(2), a PMP is not static and requires periodic review under section 6(1)(e). Therefore, public bodies must establish timelines for the periodic review, assessment, and update of its PMP. Vital information for this process is provided via reporting and monitoring.</p>
<p><strong>Why periodic review is important</strong></p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-6"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<ul>
<li style="list-style-type: none;">
<ul>
<li><strong>Public body initiated change:</strong> Public bodies regularly launch new (increasingly digital) services or change administrative practices. Periodic changes in organization structure may occur that merge or divest program areas from one public body to another. A review ensures that the section 6(1)(b) policies and procedures (for corrections, breaches, and complaints) stay relevant, and attuned to new or changed programs and activities, as well as when technology used in those programs and activities evolves.</li>
</ul>
</li>
</ul>

		</div>
	</div>
</div></div></div><div class="wpb_column vc_column_container vc_col-sm-6"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element  vc_custom_1775737861537" >
		<div class="wpb_wrapper">
			<p><span style="color: #ffffff;"><strong><em>M-Reg 143/2025 </em></strong></span></p>
<p><span style="color: #ffffff;"><em>6(1) A privacy management program established by a public body under section 25 of the Act must include (&#8230;)<br />
(</em><em>e) timelines for the periodic review, assessment and update of the privacy management program.</em></span></p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<ul>
<li><strong>Closing compliance gaps resulting from changes in the public bodies’ environment:</strong> A PMP needs monitoring and frequent updating due to changed or new regulations, <a href="https://oipc.ab.ca/decisions/orders/" target="_blank" rel="noopener">OIPC orders regarding POPA</a>, or emerging privacy and information security threats<a href="#_ftn14" name="_ftnref14">[14]</a>. Regular assessment allows the public body to find and fix non-compliance, introduce new best practices, and address weakness in their safeguards.</li>
<li><strong>Testing safeguards:</strong> For public bodies that process a high volume or highly sensitive personal information, periodic review is the only way to verify that the written administrative, technical, and physical safeguards (section 6(2)(b)) are actually being followed in practice. Given the dynamic nature of technology, periodic reassessment and testing is standard<a href="#_ftn15" name="_ftnref15">[15]</a>.</li>
</ul>
<p><strong>Reporting and monitoring</strong></p>
<p>The designation of a Privacy Officer under section 6(1)(a) of the M-Reg is important in establishing oversight. In high-volume or sensitive environments, the Privacy Officer’s role expands under section 6(2)(a)(iii) of the M-Reg to include responsibility for proactively monitoring information systems that contain personal information to regularly assess and mitigate security risks.</p>
<p><strong>The need for reporting</strong></p>
<p>Reporting is a mechanism that supports accountability. The Privacy Officer acts as the bridge between technical operations and senior leadership:</p>
<ul>
<li><strong>Senior management awareness:</strong> The Privacy Officer must report PMP performance and deficiencies to senior management. For example, if the mandatory training (section 6(1)(d) M-Reg) has limited effective uptake, or is not monitored and registered, leadership must be informed to authorize resources for retraining and measures such as instructing that the training form part of performance management.</li>
<li><strong>Showing due care:</strong> in some cases, the results of these internal reports and audits may be relied upon to prove that the public body is meeting its duty of care or other legal requirements. If used properly, and executed diligently, reporting and monitoring create assurance for, and proof of, due care for personal information.</li>
</ul>
<p><strong>The need for monitoring</strong></p>
<p>Monitoring is a more direct and continuous observance of the PMP&#8217;s effectiveness (compared to the periodic and structured nature of reporting).</p>
<ul>
<li><strong>Proactive monitoring:</strong> Under section 6(2)(a)(iii) of the M-Reg, the Privacy Officer can delegate and supervise the monitoring of information systems to mitigate risks before they become incidents. These activities typically involve auditing logs of access to (systems containing) personal information and to ensure the security classification system (section 6(1)(c) M-Reg) and related access controls are effective. The Privacy Officer need not be involved in depth in the day-to-day aspects of monitoring but will be accountable for the privacy-related components such as the incident thresholds of the monitoring and reporting.</li>
<li><strong>Algorithm and AI oversight:</strong> For Public Bodies using automated systems and AI, the privacy officer or any delegates must monitor automated systems to ensure they operate according to <a href="http://www.ombudsman.ab.ca/determining-fairness/administrative-fairness-guidelines/" target="_blank" rel="noopener">fairness principles</a>, maintain the safeguards established in the PMP, and that their use does not result in the public body contravening POPA.</li>
</ul>
<p style="font-size: 0.9em; color: grey;"><a href="#">Back to top of the page</a></p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="assess-revise-program-controls"></a></p>
<h2>Assess and revise program controls</h2>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-6"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
To maintain compliance with section 6(1)(e) of the M-Reg, reporting, monitoring and otherwise evaluating must be used to improve the PMP. This improvement cycle ensures that as the public body and its programs, activities and technology use evolve, its privacy controls adapt to meet emerging threats and operational changes.</p>

		</div>
	</div>
</div></div></div><div class="wpb_column vc_column_container vc_col-sm-6"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element  vc_custom_1775737739703" >
		<div class="wpb_wrapper">
			<p><span style="color: #ffffff;"><strong><em>M-Reg</em></strong><em> <strong>143/2025 </strong></em></span></p>
<p><span style="color: #ffffff;"><em>6(1) A privacy management program established by a public body under section 25 of the Act must include[…]</em></span></p>
<p><span style="color: #ffffff;"><em>(e) timelines for the periodic review, assessment and update of the privacy management program.</em></span></p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p><strong>The PMP improvement cycle</strong></p>
<p>Assessing and revising program controls involves review and adjustment across these key areas:</p>
<p><strong>a) update personal information inventories</strong></p>
<p>The inventory is the foundation of the public body’s PMP. Periodic reviews must account for new data collection points, databases, and address personal information held as part of common or integrated programs or activities. If your inventory is outdated, your security classification system (6(1)(c) M-Reg) is likely inaccurate, risking leaving sensitive data under-protected. In addition, the timeliness or quality of responses to access requests may be affected.</p>
<p><strong>b) revise policies and procedures</strong></p>
<p>Policies and procedures should be revised based on lessons learned from the Privacy Officer’s monitoring (6(2)(a)(iii) M-Reg). If a specific procedure is consistently bypassed because it is too cumbersome, it must be redesigned to ensure it remains both functional and compliant with requirements in the Act and regulations.</p>
<p><strong>c) update risk assessments</strong></p>
<p>PIAs and related types of assessments (e.g. STRAs) are not one-and-done exercises. Under section 6(2)(a)(ii) of the M-Reg, the process for completing PIAs must be periodically revisited whenever a practice, program, project or service is substantially changed, not just when it is first put in place.</p>
<p><strong>e) improve incident response protocols as they are used</strong></p>
<p>Every Privacy Incident is an opportunity to refine the policies and procedures or controls required under section 6(1)(b)(i) and 6(2)(b) of the M-Reg. Post-Privacy Incident debriefs should result in updates to response procedures, communication trees, containment strategies, and inform the enhancements of controls. Undertaking this work will minimize the risk of recurrence of harm stemming from unauthorized access to, disclosure or loss of personal information.</p>
<p><strong>f) ensure service provider management</strong></p>
<p>Public bodies remain responsible for data in the custody of service providers (e.g. third-party vendors). The improvement cycle must include regular audits of service provider contracts and security practices to ensure they align with the body&#8217;s administrative, physical or technical safeguards (6(2)(b)) and help the public body otherwise meet their obligations under POPA. Insufficient or weak service provider management can lead to privacy breaches<a href="#_ftn16" name="_ftnref16">[16]</a>.</p>
<p>For more information on this topic please see the OIPC’s <a href="/popa/providers/guide/" target="_blank" rel="noopener">Guidance for Public Bodies when Contracting Service Providers</a>.</p>
<p><strong>g) improve external communication for transparency and accountability</strong></p>
<p>Transparency and accountability are core pillars of POPA, and of <a href="https://www.coe.int/en/web/centre-of-expertise-for-multilevel-governance/12-principles" target="_blank" rel="noopener">good governance</a> in general. Public bodies should periodically review and if needed, update their public-facing privacy notices and complaint-handling procedures. Public bodies also may want to regularly review and update published information regarding the number of Privacy Incidents, access requests statistics, personal information banks, and their use of AI (e.g. an AI registry<a href="#_ftn17" name="_ftnref17">[17]</a>). Communications should be simplified and updated to ensure the public clearly understands the public body’s practices in these regards, and how to exercise their rights to correction and to make complaints. Such practices of good governance, showcasing transparency and accountability, will increase public trust in the public body.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#">Back to top of the page</a></p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="demonstrating-compliance"></a></p>
<h1>3. Demonstrating compliance</h1>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="access-to-pmp"></a></p>
<h2>Access to the PMP by the public</h2>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-6"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
Public bodies have an obligation under POPA, section 25(3), to provide the PMP to any person who requests a copy of the PMP. The regulation specifies that this may also be done by publishing the PMP, so it is readily accessible to the public. From a transparency and accessibility perspective, it is recommended that public bodies publish the PMP on their website.</p>
<p>Furthermore, the regulation cautions, and gives the public body the ability to redact or omit certain sensitive information relating to the security of personal information in the custody or under the control of the public body. Commonly, such information includes detailed descriptions of security controls, (parts of) assessments such as STRAs or penetration tests and similar documentation that may be used for adversarial purposes.</p>

		</div>
	</div>
</div></div></div><div class="wpb_column vc_column_container vc_col-sm-6"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element  vc_custom_1775737789928" >
		<div class="wpb_wrapper">
			<p><span style="color: #ffffff;"><strong><em>POPA 25(3)</em></strong><em>  Any person may request a copy of a public body’s privacy management program and the public body must provide the person with a copy, or with directions to where the person may access a copy, within 30 business days of the request.  </em></span></p>
<p><span style="color: #ffffff;"><strong>M-Reg &#8211; sections 6(3) and (4)</strong></span></p>
<p><span style="color: #ffffff;"><em>Each public body must establish a process for making the public body’s privacy management program available to the public on request or must make the public body’s privacy management program publicly available on the public body’s website.</em></span></p>
<p><span style="color: #ffffff;"><em>(4)  When making a public body’s privacy management program available to the public, a public body may withhold technical information, security related information and other information that could compromise the security of personal information in the custody or under the control of the public body.</em></span></p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p style="font-size: 0.9em; color: grey;"><a href="#">Back to top of the page</a></p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="reduce-administrative-burden"></a></p>
<h2>Using the PMP to reduce administrative burden</h2>
<p>A public body can leverage the PMP for external messaging, and to reduce re-documenting parts of the PMP for purposes that lean on its policies and other controls. By referencing the PMP as a source, or quoting from it, where programs, activities and operations include privacy aspects, administrative burden can be reduced, and only a single source needs to be corrected should external feedback prompt the public body to do so. An example is citing the security standards contained in the PMP, within a PIA, or using its content as reference in external communications and engagement projects.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#">Back to top of the page</a></p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="appendix-a"></a></p>
<h1>Appendix A &#8211; Checklist of PMP requirements for public bodies</h1>
<p>The following checklist can help public bodies assess whether they have met the requirements for PMPs as set out in this Guidance.</p>
<p><span style="color: #ff0000;"><strong>Download a standalone copy of the checklist here</strong></span>  <a href="/popa/pmp/checklist/" target="_blank" rel="noopener">[PDF]</a></p>
<p><strong>Requirements for all public bodies (see M-Reg section 6(1) and POPA section 25, 10)</strong></p>
<p>☐  <strong>Designated Privacy Officer</strong>: Identify or designate an individual responsible for ensuring the public body&#8217;s compliance with the Act and regulations. Ensure that where necessary, authority is delegated from the head of the public body, to the Privacy Officer.</p>
<p>☐  <strong>Documented internal policies &amp; procedures</strong>: Establish written rules addressing the public body’s duties, including:</p>
<p style="padding-left: 40px;">☐ <strong> Access and correction</strong>: Processes for responding to requests for personal information or requests for correction.</p>
<p style="padding-left: 40px;">☐<strong>  Privacy complaints</strong>: A defined process for receiving and responding to privacy-related complaints.</p>
<p style="padding-left: 40px;">☐  <strong>Privacy Incident response</strong>: A policy and process for responding to breaches and notifying affected individuals in accordance with the Act and regulations</p>
<p style="padding-left: 40px;">☐  <strong>Non-personal data</strong>: Policies for the creation, use, and disclosure of non-personal data (anonymized or synthetic data).</p>
<p style="padding-left: 40px;">☐<strong>  Automated systems</strong>: Procedures for the use and safeguarding of personal information within automated systems (e.g., AI or algorithms).</p>
<p>☐  <strong>Personal information inventory: </strong>Create a personal information inventory which can be used to meet the requirements of the Act and regulations.</p>
<p>☐  <strong>Security classification system</strong>: Implement a system to classify personal information, derived data, and non-personal data based on sensitivity.</p>
<p>☐  <strong>Safeguards:</strong> Establish administrative, technical and physical safeguards for safeguarding and managing personal information.</p>
<p>☐  <strong>Mandatory employee training: </strong>Ensure all employees and contractors undergo regular training to understand their obligations under the Act.</p>
<p>☐  <strong>Periodic review cycle</strong>: Establish specific timelines for the regular review and assessment of the PMP to ensure it remains effective.</p>
<p>☐  <strong>Public transparency: </strong>Establish a process to make the PMP documentation available to the public upon request or by default (e.g. published on website).</p>
<p><strong>Enhanced Requirements if public bodies process sensitive or high volumes of PI (see M-Reg section 6(2))</strong></p>
<p>The additional requirements to include policies and procedures for certain activities, and the public body’s duties regarding these activities, apply if the public body manages a high volume of personal information or highly sensitive information:</p>
<p>☐  <strong>Define accountability</strong>: Document the public body’s internal privacy management structure. Clearly document the roles, responsibilities, and accountabilities of all employees in relation to the public body’s obligations under the Act.</p>
<p>☐  <strong>Privacy Impact Assessment (PIA) process: </strong>Document policies and procedures for creation and ongoing management (updating as needed) of PIAs for new programs and activities or substantial changes to existing ones <a href="https://oipc.ab.ca/privacy-impact-assessments/#public-bodies-popa" target="_blank" rel="noopener">including for submitting the PIAs to the OIPC</a>.</p>
<p>☐  <strong>Policies and procedures for proactive monitoring of information: </strong>Document policies and procedures setting out how the public body actively monitors systems holding personal information, data derived from personal information or non-personal data, to assess security measures and mitigate risks.</p>
<p>☐  <strong>Consent documentation</strong>: Document policies and procedures to ensure consent, written, oral or electronic, is obtained in accordance with POPA and its regulations.</p>
<p>☐  <strong>Employee and third-party oversight</strong>: Define the roles, responsibilities and accountabilities of employees (which in POPA include third-party contractors and service providers) of the public body in relation to the public body’s obligations under the Act.</p>
<p>☐  <strong>Policies for high-risk uses</strong>: Establish policies and procedures related to the use of personal information in artificial intelligence systems, the creation of data derived from personal information and the creation of non-personal data.</p>
<p>☐  <strong>Safeguards:</strong> Establish written administrative, technical and physical safeguards for managing personal information, data derived from personal information and non-personal data.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#">Back to top of the page</a></p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="appendix-b"></a></p>
<h1>Appendix B &#8211; Infographics</h1>
<p><strong>Developing a Comprehensive Privacy Management Program</strong></p>
<p>&nbsp;</p>
<p><strong><img fetchpriority="high" decoding="async" class="aligncenter wp-image-17481" src="https://oipc.ab.ca/wp-content/uploads/2026/04/POPA-PMP-DD.png" alt="" width="1024" height="517" />Maintaining and Using the Privacy Management Program</strong></p>
<p><img decoding="async" class="aligncenter wp-image-17482" src="https://oipc.ab.ca/wp-content/uploads/2026/04/POPA-PMP-DC.png" alt="" width="819" height="317" /></p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="appendix-c"></a></p>
<h1>Appendix C &#8211; Glossary</h1>

<table id="tablepress-11" class="tablepress tablepress-id-11">
<thead>
<tr class="row-1">
	<th class="column-1">Term</th><th class="column-2">Definition</th>
</tr>
</thead>
<tbody class="row-striping row-hover">
<tr class="row-2">
	<td class="column-1">Privacy management program (PMP)</td><td class="column-2">A structured framework of policies, practices, responsibilities and roles designed to ensure a public body complies with, and is accountable for its privacy obligations under POPA.</td>
</tr>
<tr class="row-3">
	<td class="column-1">Automated decision-making (ADM)</td><td class="column-2">The use of technology, including Artificial Intelligence (AI), to make decisions about Albertans or otherwise profile or rank them.</td>
</tr>
<tr class="row-4">
	<td class="column-1">Privacy officer</td><td class="column-2">A mandatory role designated by the head of a public body. This individual is the architect of the PMP and is responsible for overseeing compliance and serving as a liaison for privacy concerns.</td>
</tr>
<tr class="row-5">
	<td class="column-1">Personal information inventory</td><td class="column-2">A comprehensive list of all recorded personal information held by a public body. It includes data storage locations, categories of personal information, and the purposes for collection.</td>
</tr>
<tr class="row-6">
	<td class="column-1">Security classification system</td><td class="column-2">A method of categorizing personal information based on its sensitivity to ensure appropriate levels of protection and access control.</td>
</tr>
<tr class="row-7">
	<td class="column-1">Accountability</td><td class="column-2">In the context of the PMP, this means the requirement for an organization to prove it is following privacy principles and to take responsibility for its personal information handling practices.</td>
</tr>
<tr class="row-8">
	<td class="column-1">Data matching</td><td class="column-2">The practice of linking personal information between two or more information systems.</td>
</tr>
<tr class="row-9">
	<td class="column-1">Human-in-the-loop</td><td class="column-2">An administrative control for automated systems whereby a human reviews or oversees the decisions made by AI or other ADM to ensure fairness and accuracy.</td>
</tr>
<tr class="row-10">
	<td class="column-1">Privacy impact assessment (PIA)</td><td class="column-2">An assessment to identify and address the authority to collect, use and disclose personal information of a program, activity, or service and to assess and address privacy risks of the same.</td>
</tr>
<tr class="row-11">
	<td class="column-1">Privacy incident</td><td class="column-2">Any loss of, unauthorized access to, or unauthorized disclosure of personal information. Also commonly referred to as a “privacy breach”.</td>
</tr>
<tr class="row-12">
	<td class="column-1">RROSH (Real Risk of Significant Harm)</td><td class="column-2">The legal threshold used to determine if a public body must notify individuals, the Commissioner and the Minister following a privacy incident.</td>
</tr>
<tr class="row-13">
	<td class="column-1">STRA (Security Threat and Risk Assessment)</td><td class="column-2">A technical review focused on identifying security vulnerabilities within an information system.</td>
</tr>
<tr class="row-14">
	<td class="column-1">AIA (Algorithmic Impact Assessment)</td><td class="column-2">A tool used to evaluate the risks, such as bias or unfairness, associated with using automated decision-making systems or AI.</td>
</tr>
</tbody>
</table>
<!-- #tablepress-11 from cache -->

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<h2>Footnotes</h2>
<p><a href="#_ftnref1" name="_ftn1">[1]</a> See POPA section 55 and M-Reg section 6(1)(a).</p>
<p><a href="#_ftnref2" name="_ftn2">[2]</a> The auditor should be at least ‘arms length’ from the process or program area audited. Consideration should be given to use an auditor who is external to the public body.</p>
<p><a href="#_ftnref3" name="_ftn3">[3]</a> Section 10 of POPA, section 1(1)(c) of the Protection of Privacy Regulation, and section 4 of the M-Reg.</p>
<p><a href="#_ftnref4" name="_ftn4">[4]</a> Section 38(2) of POPA and Section 6(1)(b)(i)(C) of the M-Reg.</p>
<p><a href="#_ftnref5" name="_ftn5">[5]</a> See <a href="https://oipc.ab.ca/wp-content/uploads/2022/02/Breach-Response-2018.pdf" target="_blank" rel="noopener">https://oipc.ab.ca/wp-content/uploads/2022/02/Breach-Response-2018.pdf</a> for generic breach guidance, and <a href="/popa/breach/tool/" target="_blank" rel="noopener">https://oipc.ab.ca/popa/breach/tool/</a> for the POPA breach notice assessment tool</p>
<p><a href="#_ftnref6" name="_ftn6">[6]</a> For an explanation regarding data inventory and how to create one, see <a href="https://www.dasca.org/world-of-data-science/article/what-is-data-inventory-and-how-to-create-it-effectively" target="_blank" rel="noopener">https://www.dasca.org/world-of-data-science/article/what-is-data-inventory-and-how-to-create-it-effectively</a>.</p>
<p><a href="#_ftnref7" name="_ftn7">[7]</a> Automated systems may include ‘traditional’ algorithms, as well as applications of AI.</p>
<p><a href="#_ftnref8" name="_ftn8">[8]</a> Also see sections 5 and 6 of POPA.</p>
<p><a href="#_ftnref9" name="_ftn9">[9]</a> For an introduction on the types of controls applicable to AI and many forms of automated systems that rely on it, see <a href="https://verifywise.ai/lexicon/ai-security-controls" target="_blank" rel="noopener">https://verifywise.ai/lexicon/ai-security-controls</a>.</p>
<p><a href="#_ftnref10" name="_ftn10">[10]</a> See <a href="https://owaspai.org/docs/6_privacy/" target="_blank" rel="noopener">https://owaspai.org/docs/6_privacy/</a> for a primer on this subject.</p>
<p><a href="#_ftnref11" name="_ftn11">[11]</a> <a href="https://yukonaccountability.ca/sites/default/files/resources/OMB-GettingAheadoftheCurve-v6.pdf" target="_blank" rel="noopener">https://yukonaccountability.ca/sites/default/files/resources/OMB-GettingAheadoftheCurve-v6.pdf</a> and <a href="https://oipc.ab.ca/wp-content/uploads/2025/08/AI-Comments-from-the-OIPC-Regarding-Responsible-AI-Governance-in-Alberta-July-15-2025.pdf" target="_blank" rel="noopener">https://oipc.ab.ca/wp-content/uploads/2025/08/AI-Comments-from-the-OIPC-Regarding-Responsible-AI-Governance-in-Alberta-July-15-2025.pdf</a></p>
<p><a href="#_ftnref12" name="_ftn12">[12]</a> See <a href="#privacy-management-program-requirements">chapter 4(b)</a> for details on sensitive personal information</p>
<p><a href="#_ftnref13" name="_ftn13">[13]</a> For a more comprehensive overview of the types of controls and their uses see <a href="https://purplesec.us/learn/security-controls/" target="_blank" rel="noopener">https://purplesec.us/learn/security-controls/</a>.</p>
<p><a href="#_ftnref14" name="_ftn14">[14]</a> See e.g. <a href="https://www.cyber.gc.ca/en/guidance/national-cyber-threat-assessment-2025-2026" target="_blank" rel="noopener">https://www.cyber.gc.ca/en/guidance/national-cyber-threat-assessment-2025-2026</a> and <a href="https://www.sentinelone.com/cybersecurity-101/cybersecurity/cyber-security-trends/">https://www.sentinelone.com/cybersecurity-101/cybersecurity/cyber-security-trends/</a>.</p>
<p><a href="#_ftnref15" name="_ftn15">[15]</a> See e.g. <a href="https://www.nist.gov/privacy-framework/nist-sp-800-115" target="_blank" rel="noopener">https://www.nist.gov/privacy-framework/nist-sp-800-115</a> for details on activities such as vulnerability scanning and penetration testing.</p>
<p><a href="#_ftnref16" name="_ftn16">[16]</a> See <a href="https://www.verizon.com/business/resources/reports/dbir/" target="_blank" rel="noopener">https://www.verizon.com/business/resources/reports/dbir/</a> this 2025 report states <em>‘30% of breaches were linked to third-party involvement, twice as much as last year, and </em><em> </em><em>driven in part by vulnerability exploitation and business interruptions’.</em></p>
<p><a href="#_ftnref17" name="_ftn17">[17]</a> See <a href="https://www.canada.ca/en/treasury-board-secretariat/news/2025/11/canada-launches-first-register-of-ai-uses-in-federal-government.html" target="_blank" rel="noopener">https://www.canada.ca/en/treasury-board-secretariat/news/2025/11/canada-launches-first-register-of-ai-uses-in-federal-government.html</a> for information regarding AI registry use by the Canadian federal government.</p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>April 2026<br />

<table id="tablepress-2" class="tablepress tablepress-id-2">
<tbody class="row-striping">
<tr class="row-1">
	<td class="column-1"><p><strong>Disclaimer</strong><br><br />
This document is not intended as, nor is it a substitute for, legal advice, and is not binding on the Information and Privacy Commissioner of Alberta. Responsibility for compliance with the law (and any applicable professional or trade standards or requirements) remains with each organization, custodian or public body. All examples used are provided as illustrations. The official versions of the laws <a href="https://oipc.ab.ca/legislation/" target="_blank" rel="noopener">the OIPC oversees</a> and their associated regulations should be consulted for the exact wording and for all purposes of interpreting and applying the legislation. The Acts are available on the website of <a href="https://www.alberta.ca/alberta-kings-printer.aspx" rel="noopener" target="_blank">Alberta King's Printer</a>.</p></td>
</tr>
</tbody>
</table>
<!-- #tablepress-2 from cache --></p>

		</div>
	</div>
</div></div></div></div>
</div>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Guidance for Public Bodies when Contracting Service Providers</title>
		<link>https://oipc.ab.ca/resource/popa-guidance-service-providers/</link>
		
		<dc:creator><![CDATA[Chris Stinner]]></dc:creator>
		<pubDate>Thu, 16 Apr 2026 17:12:59 +0000</pubDate>
				<guid isPermaLink="false">https://oipc.ab.ca/?post_type=resource&#038;p=17494</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<div style="border: 1px solid #ccc; padding: 15px; border-radius: 5px;">
<p><strong>Table of Contents</strong></p>
<p><a href="#introduction">Introduction</a><br />
<a href="#public-bodies-governance-and-accountability">Public bodies’ governance and accountability</a><br />
<a href="#pre-contract-planning-phase">Pre-contract/Planning Phase</a><br />
<a href="#contract">Contract</a><br />
<a href="#oversight">Oversight</a><br />
<a href="#conclusion">Conclusion</a><br />
<a href="#checklist">Appendix – Service Provider Contract Privacy Checklist </a><br />
<a href="#references">References</a><br />
<a href="#glossary">Glossary</a></p>
</div>

		</div>
	</div>


	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>
<a id="introduction"></a></p>
<h1>Introduction</h1>
<h2>Purpose of this guidance</h2>
<p>Public bodies<a href="#_ftn1" name="_ftnref1">[1]</a> in Alberta are required to comply with the <em>Protection of Privacy Act</em> (POPA) and its associated regulations the <em>Protection of Privacy (Ministerial) Regulation</em> (M-Regulation) and the <em>Protection of Privacy Regulation</em> (Regulation). POPA governs the collection, use, disclosure and management of <strong>personal information</strong><a href="#_ftn2" name="_ftnref2">[2]</a> in the custody or control of public bodies. They are also required to provide access to individuals who request access to their own personal information in accordance with the <em>Access to Information Act</em>.</p>
<p>This guidance is designed to help public bodies meet their obligations under POPA and ATIA, as described, when engaging the services of a service provider to perform services on behalf of the public body that involves the service provider collecting, using, disclosing or managing personal information on the public body’s behalf. For example, a public body may want to use a new application to support one of their programs and the program involves the collection, use or disclosure of personal information. This could involve contracting an information technology service provider to provide support for the application, hosting the application remotely and providing back-up services for the records. Another example would be a public body hiring a records management company to store paper records containing personal information at an off-site storage facility with support services until the end of the records retention period.</p>
<p>Any service provider that is, or may be, planning to provide services to public bodies will also benefit from this guidance as it will have a better understanding about public bodies’ duties under these laws.</p>
<p>This guidance is not intended for public bodies who are entering into contracts with other public bodies in the development of a <strong>common or integrated program or service.</strong><br />
<a id="what-is-a-service-provider"></a></p>
<h2>What is a “service provider”?</h2>
<p>A service provider is any organization or body that is external to the public body and that provides services to the public body under a contract.</p>
<p>Where, as part of providing services to the public body, the service provider will have access to or collect, use or disclose personal information on behalf of the public body under a contract, the service provider becomes an “<strong>employee</strong>” of the public body for the purposes of POPA and is bound as an employee to adhere to the public body’s requirements under POPA as they relate to these activities.</p>
<p>Similarly, ATIA also applies to public bodies. If a service provider under a contract for services is tasked with providing access to personal information on behalf of the public body, it will be an “employee” of that public body for that purpose and subject to the ATIA requirements regarding access to the personal information. For most service provider contracts, the service provider’s only task in regard to access or correction requests under ATIA will be to cooperate with the public body in responding to these requests.<br />
<a id="why-is-it-important-to-read-this-guidance"></a></p>
<h2>Why is it important to read this guidance?</h2>
<p>The role of service providers has grown disproportionately in the past few decades due to the development of cloud services, software as a service and other mainly technology driven developments. According to a recent survey, 80% of organizations suffered a data breach in 2022 caused by a third party. In recognition that most organizations use service providers as part of their operations, many modern privacy laws contain obligations that hold service providers directly accountable for compliance under these laws including for breach reporting.</p>
<p>When public bodies enter into a contract with a service provider, they remain accountable for any collection, use or disclosure and management of information carried out on their behalf by the service provider. This guidance will assist public bodies to develop policies and procedures for contracting with service providers that align with their privacy obligations under POPA and, as applicable, under ATIA. This guidance should not be used in isolation but rather in conjunction with other policies and procedures (e.g., procurement, information classification, cybersecurity).<br />
<a id="explanatory-note"></a></p>
<h2>Explanatory note</h2>
<p>Any reference to “POPA” that follows includes the right of access under the ATIA to one’s own personal information, unless the service provider is providing access and correction services on behalf of the public body, which will be explained.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#">Back to top of the page</a><a id="public-bodies-governance-and-accountability"></a></p>
<h1>Public bodies’ governance and accountability</h1>
<p>To meet the requirements of POPA, a public body must have a governance framework in place to facilitate compliance. This includes having appropriate policies and procedures in place when contracting service providers.<br />
<a id="roles-and-responsibilities"></a></p>
<h2>Roles and Responsibilities</h2>
<p>The <strong>head</strong> of the Public Body holds ultimate responsibility for decisions and compliance. The head may delegate others to have the authority to make decisions on behalf of the head (e.g. Privacy Officer), including entering into contracts with service providers.</p>
<p>As indicated, a service provider under a contract relationship with a public body is defined as an <strong>employee</strong> under POPA s. 1(h):</p>
<p><em>“employee”, in relation to a public body, includes a person who performs a service for the public body as an appointee, volunteer or student or under a contract or agency relationship with the public body;</em></p>
<p>While a contracted service provider is not an employee in the labor relations sense, it is included in the POPA definition of employee. This ensures it is bound by the Act. Because the types of services will vary, the public body will need to look at each situation and be sure to clearly articulate which privacy requirements must be met. Public bodies must ensure they, and by extension their service providers, are complying with POPA.</p>
<p>Public bodies are accountable for any information handled on their behalf by their service providers. Therefore, they must ensure any collection, use and disclosure is legally authorized under POPA. Having a contract in place with the appropriate terms and conditions provides the public body with assurance that it is able to maintain control of the information. Roles and responsibilities should be clear, including what activities are authorized and which ones are prohibited. Public bodies will need to ensure they are able to meet their obligations under POPA.<br />
<a id="privacy-management-program-and-service-providers"></a></p>
<h2>Privacy Management Program and Service Providers</h2>
<p>Public bodies are required to have a <strong>Privacy Management Program </strong>(PMP) inclusive of policies and procedures for service provider procurement, contracting, and management including oversight and auditing. Public bodies must develop their procurement processes to meet POPA. The processes must ensure the public body is choosing a service provider who will be able to support the public body’s legal obligations under POPA. For more information on PMPs please see the OIPC’s <a href="/popa/pmp/guide/" target="_blank" rel="noopener">Guidance for Public Bodies in Developing Privacy Management Programs</a>.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#">Back to top of the page</a><a id="pre-contract-planning-phase"></a></p>
<h1>Pre-contract/Planning Phase</h1>
<p>Public bodies should plan out their procurement strategy including spending some time thinking about what services are needed and how they will align with business needs, including compliance with POPA. This up-front planning will most likely save public bodies money in the long run and may even prevent the public body from experiencing a privacy or security breach.<br />
<a id="determining-scope-of-services-involving-personal-information"></a></p>
<h2>Determining Scope of Services Involving Personal Information</h2>
<p>Public bodies should identify:</p>
<ul>
<li>the business purpose for the activity and what service the public body is looking for.</li>
<li>how the service fits into public body’s operations.</li>
<li>the personal information that the service provider will collect, use or disclose on behalf of the public body to perform the service.</li>
<li>its legal authority for this collection, use or disclosure of the personal information.</li>
</ul>
<h2>Determining Service Level Expectations</h2>
<p>Determine the classification of personal information that the service provider will collect, use or disclose on behalf of the public body. This is necessary to establish the measures the service provider will need to implement to carry out the service for the public body in compliance with POPA.<br />
<a id="assessing-the-privacy-posture-of-a-potential-service-provider"></a></p>
<h2>Assessing the Privacy Posture of a Potential Service Provider</h2>
<p>Before engaging a service provider, a public body may wish to examine the privacy posture of a potential service provider to assess whether it has in place privacy practices that will support the public body’s duties under POPA if the public body were to contract with the service provider for the services. The following are some areas a public body may wish to examine prior to considering whether to retain the services of a particular service provider (where this is permitted). Note that these considerations are not exhaustive but rather some key considerations.</p>
<ul>
<li>Does the service provider have a privacy policy? Often service providers will have a privacy policy on their website or in their marketing material. Public bodies can review these to see if at first glance they appear to have operationalized privacy practices in what appears to be a reasonable manner as part of their business, and references a privacy law to which they are subject. Service providers with transparent privacy policies that are easy to understand may enhance trust in their ability to protect the personal information that they will have access to in performing the services.</li>
<li>Does the service provider have a privacy officer listed? Public bodies can contact the privacy officer with privacy questions they might have regarding the services and their privacy practices.</li>
<li>Does the website:
<ul>
<li>describe what personal information is collected, used or disclosed for the service and does this appear reasonable based on the service provided;</li>
<li>describe any secondary uses of personal information, such as for improving products or services or marketing, or training artificial intelligence, which may not be permitted in some circumstances;</li>
<li>mention selling personal information, which is prohibited under POPA but may be permitted under other privacy laws;</li>
<li>mention the use of other third parties that help them provide the service (e.g. cloud providers, apps that link to the main service), which can create risks when subcontractors are part of the service.</li>
</ul>
</li>
<li>Does the service provider express a commitment concerning protecting the confidentiality, availability, and integrity of personal information in its custody or control? Does it provide any details as to how it does this?</li>
<li>Does the service provider describe having security certifications?</li>
<li>Does the service provider indicate where the personal information used in its services is processed and stored? Data stored in other jurisdictions may be subject to laws in those jurisdictions. In certain jurisdictions, access to information, including personal information, may be accessible by government or law enforcement in these jurisdictions.</li>
<li>Has the service provider suffered a breach or been involved in court cases concerning its personal information processing or handling practices?</li>
</ul>
<h2>Conducting a Privacy Impact Assessment (PIA)</h2>
<p>Before contracting with a service provider, public bodies should assess whether in contracting with a particular service provider, they will be in compliance with POPA. Completing a PIA is a useful tool to assist in assessing compliance.</p>
<p>POPA requires public bodies to complete PIAs in certain circumstances. The OIPC has developed a tool to help public bodies determine if they are required to prepare a PIA and if the PIA must be submitted to the OIPC for review (see <a href="https://oipc.ab.ca/popa/pia/tool/" target="_blank" rel="noopener">POPA Privacy Impact Assessment Submission Assessment Tool</a>). Whenever a public body submits a PIA to the OIPC, it must do so using the <a href="https://oipc.ab.ca/popa/pia/template/" target="_blank" rel="noopener">OIPC PIA template</a>. Even if a PIA is not required to be prepared, when contracting with a service provider, a PIA will help a public body determine whether, in contracting the service, it will be compliance with POPA.</p>
<p>Completing a PIA will give public bodies confidence that when entering into a service provider relationship, they will be positioned to meet their obligations under POPA by identifying and mitigating any risks to privacy determined through the PIA process.</p>
<p>The public body may already have a PIA on a similar service. If so, consider reviewing that PIA to see what safeguards were put in place for the initiative. This may help with the writing of the new PIA. Be aware that PIAs are a point-in-time document and as technology evolves, the risks change too. Therefore, what was appropriate a few years ago may not be adequate today due to changes to legislation, products or services offered by service providers, technological risks, or other factors.<br />
<a id="complying-with-the-tendering-process"></a></p>
<h2>Complying with the Tendering Process</h2>
<p>Depending on the size and complexity of a project, as well as the contract value, public bodies may be required to solicit proposals for services (open competition, selective tendering, limited tendering). Public bodies should Include requirements that will support POPA compliance in the Request for Proposal (RFP) and in the evaluation criteria used to choose the preferred service provider. It will be important to identify any mandatory requirements that must be met and to mitigate any risks to an acceptable level. Prepare to have individuals on the evaluation committee who have sufficient knowledge of access to information, privacy and security.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#">Back to top of the page</a><a id="contract"></a></p>
<h1>Contract</h1>
<p>Once the public body has gathered information on the service and the service provider, the applicable privacy assessment has been completed, and the tendering process is complete if applicable, the public body will need to draft the contract for the service provider that will incorporate the requirements of POPA that the service provider will need to comply with for delivery of the service. The key areas that need to be addressed in any contract with a service provider wherein the service provider will collect, use, disclose, manage or have access to personal information are as follows.<br />
<a id="control-and-accountability"></a></p>
<h2>Control and Accountability</h2>
<p>Maintaining control means stipulating in the contract that the public body at all times retains “control” over the information that will be in the custody of the service provider for the services. This is essential to ensuring that the personal information remains subject to POPA and that the public body is able to exercise its control over how this information is used and managed by the service provider.</p>
<p>The contract must set out the roles and responsibilities of the parties as it relates to the personal information while in the custody of the service provider. The public body must ensure these roles and responsibilities support its ability to meet POPA requirements. There are risks to storing data outside of Canada, or with service providers from certain countries, due to other countries having laws that may permit access for government activities, such as national defence, or for law enforcement. The contract should clarify how the service provider would notify the public body of any requests it receives to produce personal information it has in its custody.</p>
<p>Last, the contract should specify how the public body will maintain oversight of the service provider’s duties to ensure it complies with both contractual requirements and POPA and include the right of the public body to audit for compliance.<br />
<a id="legal-authorities-for-collection-use-or-disclosure"></a></p>
<h2>Legal Authorities for Collection, Use or Disclosure</h2>
<p>The contract must define what the service provider can and cannot do with the personal information. Any collection, use or disclosure the service provider carries out on behalf of the public body must be legally authorized under <strong>POPA<a href="#_ftn3" name="_ftnref3">[3]</a></strong>. The contract provisions must clarify what activity is authorized as it relates to the personal information and what activity is prohibited and specify measures that must be taken by the service provider to ensure downstream compliance by its employees or subcontractors. Public bodies may also decide to contractually restrict service providers’ ability to subcontract altogether. Public bodies must also ensure that the contract allows them to meet all of POPA’s requirements, including for accuracy and security (more on this below) and completion of PIAs as may be required by the public body.<br />
<a id="requests-for-access-or-correction"></a></p>
<h2>Requests for Access or Correction</h2>
<p>The contract must also address requests for access to (as set out in ATIA) or correction of personal information (as set out in POPA). If the contractor is involved in this activity (i.e., by providing access or correction services on behalf of the public body), the contract should specify this and ensure the access or correction process that the contractor must follow is laid out in the contract. Who will interact with the OIPC regarding any reviews of these requests must also be clarified in the contract. While it might seem preferable that a contractor undertake these activities, there are risks of non-compliance due to the rigor in the access and correction processes laid out in the Acts with oversight by the Commissioner. Given this, a public body should generally maintain responsibility for processing access and correction requests for personal information in the custody of a contractor. In most cases, the role of a service provider as it relates to this activity will be cooperation with the public body to facilitate the public body’s response to these requests, which should be set out in the contract as a duty of cooperation by the service provider.<br />
<a id="safeguards-and-retention"></a></p>
<h2>Safeguards and Retention</h2>
<p>The contract must set out the specific security requirements that the contractor must meet, which must, at minimum, align with those of the public body and the requirements in POPA and its regulations. In addition, the contract should include wording that requires the service provider to cooperate with the public body for the preparation of PIAs or STRAs, or if the public body is under investigation by a regulatory authority.</p>
<p>The contract must also specify what the public body expects the service provider to do whenever it experiences a breach of personal information it holds on behalf of the public body, including timelines. This helps to ensure the public body can meet its requirements concerning breaches including for notification as required by POPA and its regulations.</p>
<p>The contract must also establish retention periods for the information stored by the service provider and establish a process for the service provider to certify to the public body when personal information has been destroyed at the end of its retention.<br />
<a id="complaint-handling"></a></p>
<h2>Complaint Handling</h2>
<p>The contract must also address how any complaints alleging unauthorized access, collection, use or disclosure by the contractor (or their employees or subcontractors) will be handled. For the same reason as indicated for access and correction requests, it is recommended that public bodies maintain responsibility for complaints management. Additionally, managing complaints provides insight into the personal information handling practices of the service provider and provides the public body with the opportunity to address any issues that arise through this process.<br />
<a id="termination"></a></p>
<h2>Termination</h2>
<p>In addition to the foregoing, the contract must outline clear outcomes in the event the service provider ceases to operate or the contract terminates. Public bodies must be able to terminate the contract and retrieve the records from the service provider with assurance that no records are retained by the service provider. Additionally, the contract should address compatibility between the service provider’s system of storing personal information and that of the public body’s. This is important, since the public body must be able to import the personal information into a new information system, or to archive it as dictated by applicable retention periods. The contract must include clear expectations around data format, applicable timelines and security arrangements. This will ensure the data can be moved across different information systems with minimal integration issues and it will be readable by the public body.</p>
<p>For more specific details to consider in a contract, please see the <a href="#checklist">Appendix – Service Provider Contract Privacy Checklist</a>.<br />
<a id="oversight"></a></p>
<p style="font-size: 0.9em; color: grey;"><a href="#">Back to top of the page</a></p>
<h1>Oversight</h1>
<p>The public body should develop processes that ensure their service providers are meeting the contractual obligations. The frequency of these reviews may be informed by policies of the public body, which may be part of the public body’s Privacy Management Program. When auditing a service provider to verify adherence to contract terms, the public body should have defined processes to ensure the details of the audit are clearly documented and retained and there are distinct steps on how to escalate issues of non-compliance. There may be similar processes for audits conducted on a reactive basis, such as when an incident occurs.</p>
<p>The OIPC may request information from a public body due to a complaint or a request for review under ATIA or POPA. The Commissioner may also conduct investigations. The public body and by extension, the service provider, may be required to provide information to the Commissioner to conduct the review or investigation. Where a service provider is involved, they will be part of the review or investigation and must cooperate. That said, as an employee of the public body, any non-compliance by a service provider with POPA is non-compliance by the public body. Investigations may result in Orders or in the event of an offence, charges and fines.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#">Back to top of the page</a><a id="conclusion"></a></p>
<h1>Conclusion</h1>
<p>Public bodies collect, use and disclose personal information in order to provide public services to Albertans. When entering into a contract with a service provider, public bodies remain accountable for this information and must have appropriate policies and procedures to ensure, in the use of service providers, they will meet their obligations under POPA.</p>
<p>Public bodies must ensure that contracts entered into with service providers contain clauses that will ensure the service provider, and its employees or subcontractors, comply with the public body’s duties under POPA. Having an accountability framework such as a PMP with appropriate policies and procedures regarding contracting with service providers will help guide those who are part of the processes involved in retaining the services of a service provider, including for procurement, contracting and, managing contracts to ensure legal obligations are met.</p>
<p>This guidance is meant to support the public body in developing policies and procedures for acquiring and managing service providers that will facilitate compliance with POPA and in contracting and oversight.</p>
<p>We welcome any feedback concerning this guidance. Please send the same to <a href="mailto:generalinfo@oipc.ab.ca">generalinfo@oipc.ab.ca</a>.<br />
<a id="checklist"></a></p>
<h2>Appendix – Service Provider Contract Privacy Checklist</h2>
<p>Public bodies can use this checklist whenever they seek to enter into a contract with a service provider who performs a service <u>on behalf of the public body</u> and in doing so has access to personal information subject to the <em>Protection of Privacy Act:</em></p>
<p><strong><span style="color: #ff0000;">Download the checklist here </span> <a href="/popa/providers/checklist/doc/" target="_blank" rel="noopener">[DOCX]</a>  <a href="/popa/providers/checklist/pdf/" target="_blank" rel="noopener">[PDF]</a></strong><br />
<a id="references"></a></p>
<h2><strong>References</strong></h2>
<p>Ontario IPC Guidance: <em><a href="https://www.ipc.on.ca/en/resources/privacy-and-access-public-sector-contracting-third-party-service-providers" target="_blank" rel="noopener">Privacy and Access in Public Sector Contracting with Third Party Service Providers</a></em></p>
<p>Treasury Board of Canada Secretariat <a href="https://www.canada.ca/en/treasury-board-secretariat/services/access-information-privacy/privacy/guidance-document-taking-privacy-into-account-before-making-contracting-decisions.html#_Control_and_accountability" target="_blank" rel="noopener"><em>Guidance Document: Taking Privacy into Account Before Making Contracting Decisions</em></a></p>
<p>Government of Alberta, <a href="https://open.alberta.ca/dataset/1bf254db-7f2f-4980-9264-d968a330bb67/resource/8aa91489-df75-4f8c-be7c-2193a1a2fe8d/download/contractorbrochure.pdf" target="_blank" rel="noopener"><em>Contractor&#8217;s Guide to the Freedom of Information and Protection of Privacy Act</em></a></p>
<h2>Footnotes</h2>
<p><a href="#_ftnref1" name="_ftn1">[1]</a> (t) “public body” means<br />
(i) a department, branch or office of the Government of Alberta,<br />
(ii) an agency, board, commission, corporation, office or other body designated as a public body in the regulations,<br />
(iii) the Executive Council Office,<br />
(iv) the office of a member of the Executive Council,<br />
(v) the Legislative Assembly Office,<br />
(vi) the office of the Auditor General, the Ombudsman, the Chief Electoral Officer, the Ethics Commissioner, the Information and Privacy Commissioner, the Child and Youth Advocate or the Public Interest Commissioner, or<br />
(vii) a local public body,<br />
but does not include<br />
(viii) the office of the Speaker of the Legislative Assembly and the office of a Member of the Legislative Assembly, or<br />
(ix) the Court of Appeal, the Court of King’s Bench or the Court of Justice;</p>
<p>The full definition of a public body can be found in the ATIA at <a href="https://kings-printer.alberta.ca/documents/Acts/a01p4.pdf#page=11" target="_blank" rel="noopener">Alberta King&#8217;s Printer</a>.</p>
<p><a href="#_ftnref2" name="_ftn2">[2]</a> Bolded terms can be found in the Glossary.</p>
<p><a href="#_ftnref3" name="_ftn3">[3]</a> Often, service providers that provide services nationally or internationally reference legislation that does not apply to Alberta’s public sector, such as PIPEDA, the GDPR or the public sector privacy laws of other jurisdictions<em>. </em>These laws differ from POPA and compliance with these laws does not ensure compliance with POPA.</p>
<p style="font-size: 0.9em; color: grey;"><a href="#">Back to top of the page</a></p>
<p>&nbsp;</p>
<h2><strong>Glossary</strong></h2>
<p>
<table id="tablepress-12" class="tablepress tablepress-id-12">
<thead>
<tr class="row-1">
	<th class="column-1">Term</th><th class="column-2">POPA Ref</th><th class="column-3">Definition</th>
</tr>
</thead>
<tbody class="row-striping row-hover">
<tr class="row-2">
	<td class="column-1">Common or Integrated Program or Service</td><td class="column-2">1(d)</td><td class="column-3">(d) “common or integrated program or service”, in relation to a public body, means a program or service planned, administered, delivered, managed, monitored or evaluated by<br />
  (i)    the public body working collaboratively with one or more other public bodies, or<br />
  (ii)    another public body working on behalf of<br />
    (A)    the public body, or<br />
    (B)    the public body and one or more other public bodies;</td>
</tr>
<tr class="row-3">
	<td class="column-1">Data derived from Personal Information</td><td class="column-2">1(e)</td><td class="column-3">“data derived from personal information” means data<br />
created by data matching, and<br />
that identifies any individual whose personal information was used in the data matching;</td>
</tr>
<tr class="row-4">
	<td class="column-1">Employee</td><td class="column-2">1(h)</td><td class="column-3">“employee”, in relation to a public body, includes a person who performs a service for the public body as an appointee, volunteer or student or under a contract or agency relationship with the public body;</td>
</tr>
<tr class="row-5">
	<td class="column-1">Head of the Public Body</td><td class="column-2">1(i)</td><td class="column-3">“head”, in relation to a public body, means a head as defined in the Access to Information Act</td>
</tr>
<tr class="row-6">
	<td class="column-1">Information</td><td class="column-2"></td><td class="column-3">for the purpose of this document, “information” is used to refer to any records in the control of the public body including personal information, data derived from personal information, non-personal information, and other business records.</td>
</tr>
<tr class="row-7">
	<td class="column-1">Non-Personal Data</td><td class="column-2">1(n)</td><td class="column-3">“non personal data” means data, including data derived from personal information, that has been generated, modified or anonymized so that it does not identify any individual, and includes synthetic data and any other type of non personal data identified in the regulations;</td>
</tr>
<tr class="row-8">
	<td class="column-1">Personal Information</td><td class="column-2">1(q)</td><td class="column-3">recorded information about an identifiable individual, including<br />
the individual’s name, home or business address, home or business telephone number, home or business email address, or other contact information, except where the individual has provided the information on behalf of the individual’s employer or principal in the individual’s capacity as an employee or agent,<br />
the individual’s race, national or ethnic origin, colour or religious or political beliefs or associations,<br />
the individual’s age, gender identity, sex, sexual orientation, marital status or family status,<br />
an identifying number, symbol or other particular assigned to the individual,<br />
the individual’s fingerprints, other biometric information, blood type, genetic information or inheritable characteristics,<br />
information about the individual’s health and health care history, including information about the individual’s physical or mental health,<br />
information about the individual’s educational, financial, employment or criminal history, including criminal records where a pardon has been given,<br />
anyone else’s opinions about the individual, and<br />
the individual’s personal views or opinions, except if they are about someone else;</td>
</tr>
<tr class="row-9">
	<td class="column-1">Privacy Management Program</td><td class="column-2">1(t)</td><td class="column-3">“privacy management program” means a privacy management program established and implemented under section 25</td>
</tr>
<tr class="row-10">
	<td class="column-1">Record</td><td class="column-2">1(v)</td><td class="column-3">“record” means a record as defined in the Access to Information Act;</td>
</tr>
</tbody>
</table>
<!-- #tablepress-12 from cache --><br />
April 2026</p>

		</div>
	</div>


<table id="tablepress-2-no-2" class="tablepress tablepress-id-2">
<tbody class="row-striping">
<tr class="row-1">
	<td class="column-1"><p><strong>Disclaimer</strong><br><br />
This document is not intended as, nor is it a substitute for, legal advice, and is not binding on the Information and Privacy Commissioner of Alberta. Responsibility for compliance with the law (and any applicable professional or trade standards or requirements) remains with each organization, custodian or public body. All examples used are provided as illustrations. The official versions of the laws <a href="https://oipc.ab.ca/legislation/" target="_blank" rel="noopener">the OIPC oversees</a> and their associated regulations should be consulted for the exact wording and for all purposes of interpreting and applying the legislation. The Acts are available on the website of <a href="https://www.alberta.ca/alberta-kings-printer.aspx" rel="noopener" target="_blank">Alberta King's Printer</a>.</p></td>
</tr>
</tbody>
</table>
<!-- #tablepress-2-no-2 from cache -->
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Letter from OIPC to Ministers of PPHS and HSHS regarding Bill 11 &#8211; December 1 2025</title>
		<link>https://oipc.ab.ca/resource/letter-from-oipc-to-ministers-of-pphs-and-hshs-regarding-bill-11-december-1-2025/</link>
		
		<dc:creator><![CDATA[Elaine Schiman]]></dc:creator>
		<pubDate>Mon, 01 Dec 2025 22:26:38 +0000</pubDate>
				<guid isPermaLink="false">https://oipc.ab.ca/?post_type=resource&#038;p=17186</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Health Information Act Engagement 2024</title>
		<link>https://oipc.ab.ca/resource/health-information-act-engagement-2024/</link>
		
		<dc:creator><![CDATA[Elaine Schiman]]></dc:creator>
		<pubDate>Fri, 14 Feb 2025 18:02:30 +0000</pubDate>
				<guid isPermaLink="false">https://staging.oipc.ab.ca/?post_type=resource&#038;p=16641</guid>

					<description><![CDATA[The Office of the Information and Privacy Commissioner (OIPC) of Alberta conducted an engagement project in late 2024 regarding the&#8230;]]></description>
										<content:encoded><![CDATA[<p>The Office of the Information and Privacy Commissioner (OIPC) of Alberta conducted an engagement project in late 2024 regarding the <em>Health Information Act</em> (HIA). The OIPC conducted a number of surveys asking members of the public, researchers and custodians (including members of regulated professional colleges) about their interactions with HIA.</p>
<p>The Government of Alberta had informed the OIPC in the fall of 2024 that as part of its restructuring of the health care system, it was planning to amend HIA to address any changes needed due to the restructuring and it would also consider modernizing the legislation at that time. The OIPC was invited to provide comments and recommendations on amendments to HIA.</p>
<p>To inform any comments and recommendations the OIPC might provide to government, the Commissioner initiated an engagement process with HIA stakeholders. As a result of this engagement process, the OIPC produced several reports.</p>
<p>The report that reflects the views of members of the public who were surveyed can be seen <a href="https://oipc.ab.ca/wp-content/uploads/2025/02/OIPC-HIA-Public-Engagement-Survey-Topline-Report.pdf" target="_blank" rel="noopener">here</a>.</p>
<p>The report that reflects the College of Physicians &amp; Surgeons of Alberta members&#8217; survey can be seen <a href="https://oipc.ab.ca/wp-content/uploads/2025/02/2024-HIA-engagement-CPSA-Members-Survey-Analysis-and-Summary-Final.pdf" target="_blank" rel="noopener">here</a>.</p>
<p>The report that reflects the survey of colleges of regulated health professionals in Alberta under the <em>Health Information Act</em> can be seen <a href="https://oipc.ab.ca/wp-content/uploads/2025/02/2024-HIA-engagement-Regulatory-Colleges-Survey-Analysis-and-Summary-Public-Final.pdf" target="_blank" rel="noopener">here</a>.</p>
<p>The report that summarizes the HIA engagement project can be seen <a href="https://oipc.ab.ca/wp-content/uploads/2025/02/2024-OIPC-Health-Information-Act-Surveys-Engagement-Report-Final.pdf" target="_blank" rel="noopener">here</a>.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Joint Resolution: Responsible information-sharing in situations involving intimate partner violence (2024)</title>
		<link>https://oipc.ab.ca/resource/joint-resolution-responsible-information-sharing-in-situations-involving-intimate-partner-violence-2024/</link>
		
		<dc:creator><![CDATA[Elaine Schiman]]></dc:creator>
		<pubDate>Mon, 09 Dec 2024 22:32:48 +0000</pubDate>
				<guid isPermaLink="false">https://staging.oipc.ab.ca/?post_type=resource&#038;p=16590</guid>

					<description><![CDATA[A joint resolution on responsible information-sharing in situations involving intimate partner violence was issued by Canada’s privacy authorities after their&#8230;]]></description>
										<content:encoded><![CDATA[<p>A joint resolution on responsible information-sharing in situations involving intimate partner violence was issued by Canada’s privacy authorities after their annual meeting in Toronto in October 2024.  The resolution is available on the website of the Office of the Privacy Commissioner of Canada.</p>
<p><a href="https://www.priv.gc.ca/en/about-the-opc/what-we-do/provincial-and-territorial-collaboration/joint-resolutions-with-provinces-and-territories/res_241010_ipv/">Responsible information-sharing in situations involving intimate partner violence</a></p>
<p>November 2024</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Letters from OIPC to Government of Alberta regarding Bills 33 and 34 &#8211; November 20, 2024</title>
		<link>https://oipc.ab.ca/resource/letters-from-oipc-to-government-of-alberta-regarding-bills-33-and-34-november-20-2024/</link>
		
		<dc:creator><![CDATA[Elaine Schiman]]></dc:creator>
		<pubDate>Wed, 20 Nov 2024 19:05:09 +0000</pubDate>
				<guid isPermaLink="false">https://staging.oipc.ab.ca/?post_type=resource&#038;p=16546</guid>

					<description><![CDATA[On November 20, 2024, the Office of the Information and Privacy Commissioner provided comments to the Government of Alberta regarding&#8230;]]></description>
										<content:encoded><![CDATA[<p>On November 20, 2024, the Office of the Information and Privacy Commissioner provided comments to the Government of Alberta regarding Bills 33 and 34, which were tabled in the Legislative Assembly of Alberta on November 6, 2024. The bills are designed to create two new pieces of legislation to replace the existing public sector access and privacy law, the <em>Freedom of Information and Protection of Privacy Act</em> (FOIP Act).</p>
<p>Please click <a href="https://oipc.ab.ca/wp-content/uploads/2024/11/20241120-Letter-to-Minister-Glubish-regarding-Bill-33-the-Protection-of-Privacy-Act-OIPC-comments-and-recommendations_Final-Unsigned.pdf">here</a> to read the OIPC&#8217;s letter and comments to the Minister of Technology and Innovation, Nate Glubish, on Bill 33.</p>
<p>Please click <a href="https://oipc.ab.ca/wp-content/uploads/2024/11/20241120-Letter-to-Minister-Nally-regarding-Bill-34-the-Access-to-Information-Act-OIPC-comments-and-recommendations_Final-Unsigned.pdf">here</a> to read the OIPC&#8217;s letter and comments to the Minister of Service Alberta and Red Tape Reduction, Dale Nally, on Bill 34.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Privacy Management Programs</title>
		<link>https://oipc.ab.ca/resource/privacy-management-programs/</link>
		
		<dc:creator><![CDATA[ssibbald]]></dc:creator>
		<pubDate>Fri, 25 Feb 2022 19:27:28 +0000</pubDate>
				<guid isPermaLink="false">https://staging.oipc.ab.ca?post_type=resource&#038;p=2338</guid>

					<description><![CDATA[These resources were developed with the Office of the Privacy Commissioner of Canada and Office of the Information and Privacy&#8230;]]></description>
										<content:encoded><![CDATA[<p><em>These resources were developed with the Office of the Privacy Commissioner of Canada and Office of the Information and Privacy Commissioner for British Columbia.</em></p>
<p>Getting Accountability Right with a Privacy Management Program guidelines provide useful building blocks for organizations to consider when developing privacy management programs. The guide and associated summary document offer organizations the necessary insight and guidance to develop a privacy management program that respects accountability requirements of Canadian privacy laws:</p>
<ul>
<li><a href="/wp-content/uploads/2022/02/Accountability-2012.pdf" target="_blank" rel="noopener">Getting Accountability Right with a Privacy Management Program</a></li>
<li><a href="/wp-content/uploads/2022/02/Accountability-Fact-Sheet-2012.pdf" target="_blank" rel="noopener">Getting Accountability Right with a Privacy Management Program: At a Glance</a></li>
</ul>
<p>&nbsp;</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
