Tag: Technology and Security

Showing 11 - 20 of 53 results

Reported Breach HR23-00282

A prescribed person under the Personal Health Information Protection Act reported a breach to the IPC regarding a cyberattack that involved the unauthorized copying of approximately 3.4 million individuals’ personal health information from the prescribed person’s secure file transfer server. The

Resource

- Published on Aug 14, 2024

Ransomware reality: Case study in health care cybersecurity and recovery

Case of Note: PHIPA Decision 249 Introduction Unfortunately, ransomware attacks are not an uncommon occurrence, especially in this era of rapidly advancing technologies. Bad actors use ransomware attacks to extract money and cause harm to others. As these types of attacks become increasingly common

Published on Jul 18, 2024

Ransomware reality: Case study in health care cybersecurity and recovery

Case of Note: PHIPA Decision 249 Introduction Unfortunately, ransomware attacks are not an uncommon occurrence, especially in this era of rapidly advancing technologies. Bad actors use ransomware attacks to extract money and cause harm to others. As these types of attacks become increasingly common

Resource

- Published on Jul 18, 2024

S4-Episode 2: At face value: Facial recognition technologies and privacy

From unlocking smartphones to solving crimes, facial recognition technologies are re-shaping identification as we know it. In this episode, we peer into the privacy and human rights implications of facial recognition systems with technology and human rights lawyer Cynthia Khoo.

Multimedia

- Published on Apr 4, 2024

Submission for the Five-Year Review of the Police Record Checks Reform Act, 2015

On September 11, 2023, the IPC provided a submission to the Ministry of the Solicitor General as part of the Five-Year Review of the Police Record Checks Reform Act, 2015. The submission includes eight recommendations on how the police record check regime can be improved to better balance the

Resource

- Published on Sep 12, 2023

Protect Yourself Against Phishing

Almost everyone with an email or instant messaging account has become used to receiving a seemingly never-ending stream of unsolicited messages. Commonly known as spam, some of these messages are “phishing attempts” where the intended goal is to get the recipient to do something that compromises

Blog

- Published on Jul 4, 2019