Subsection 32(2)(c) ................................................................................................................ 307 Subsection 32(3) .................................................................................................................... 308 Section 49: Application for review.............................................................................................. 309 Subsection 49(1)(a.4): Privacy complaints................................................................................ 309 Subsection 49(1)(c): Correction reviews................................................................................... 312 Subsection 49(2): 1 Year Deadline........................................................................................... 313 Section 50: Review or refusal to review....................................................................................... 313 Subsection 50(2)(a.6): Insufficient evidence ............................................................................. 314 Validity Test.................................................................................................................. 314 Privacy Impact Assessments (PIAs) ............................................................................................ 315 Records & Information Management (RIM)................................................................................. 319 Basic RIM Concepts............................................................................................................... 319 RIM Best Practices................................................................................................................. 321 Record Retention.................................................................................................................... 333 Record Disposal..................................................................................................................... 336 Best Practices for the Secure Destruction of Personal Information ..................................... 338 Preserving Records................................................................................................................. 349 Focus on Issues in Privacy.......................................................................................................... 351 Big Data and Predictive Analytics............................................................................................ 351 Biometrics and Facial Recognition........................................................................................... 354 Body Worn Cameras .............................................................................................................. 355 Data Brokers.......................................................................................................................... 357 Personal Email Use for Business.............................................................................................. 359 Snooping............................................................................................................................... 365 Surveillance........................................................................................................................... 367
RkJQdWJsaXNoZXIy MTgwMjYzOA==