Subsection 28(2)(k)...................................................................................................................... 201 Subsection 28(2)(l)....................................................................................................................... 206 Subsection 28(2)(m)..................................................................................................................... 210 Subsection 28(2)(n)...................................................................................................................... 212 Subsection 28(2)(n)(i) ......................................................................................................... 212 Subsection 28(2)(n)(ii) ........................................................................................................ 220 Subsection 28(2)(o)...................................................................................................................... 221 Subsection 28(2)(p)...................................................................................................................... 223 Subsection 28(2)(q)...................................................................................................................... 225 Subsection 28(2)(r) ...................................................................................................................... 226 Subsection 28(2)(s) ...................................................................................................................... 229 Section 28.1: Notification ................................................................................................................ 231 Privacy Breaches ............................................................................................................................. 234 Best Practice Steps for Breaches................................................................................................... 236 Contain the breach .............................................................................................................. 236 Notify ................................................................................................................................. 237 Investigate .......................................................................................................................... 238 Prevent ...............................................................................................................................243 How IPC Investigations are Initiated ............................................................................................243 Process for Proactively Reported Breaches ...................................................................................243 Section 29: Personal information of deceased individual...................................................................245 Subsection 29(1) .......................................................................................................................... 245 Subsection 29(2) .......................................................................................................................... 247 Section 30: Access to personal information ......................................................................................250 Subsection 30(1) .......................................................................................................................... 251 Subsection 30(2) .......................................................................................................................... 252 Subsection 30(3) .......................................................................................................................... 258 Subsection 30(3)(a) ............................................................................................................. 259 Subsection 30(3)(b)............................................................................................................. 263 Section 31: Right of correction......................................................................................................... 266 Subsection 31(1) .......................................................................................................................... 268 Subsection 31(2) .......................................................................................................................... 270 Subsection 31(2)(a) ...................................................................................................................... 272
RkJQdWJsaXNoZXIy MTgwMjYzOA==