Subsection 31(2)(b)...................................................................................................................... 276 Subsection 31(2)(c) ...................................................................................................................... 278 Subsection 31(3) .......................................................................................................................... 279 Section 38: Application for review...................................................................................................280 Subsection 38(1)(a.4): Privacy complaints ....................................................................................280 Subsection 38(1)(c): Correction reviews .......................................................................................283 Subsection 38(2): 1 Year Deadline ............................................................................................... 284 Section 39: Review or refusal to review ...........................................................................................284 Subsection 39(2)(a.6): Insufficient evidence .................................................................................285 Validity Test ....................................................................................................................... 285 Privacy Impact Assessments (PIAs) .................................................................................................286 Records & Information Management (RIM) .....................................................................................290 Basic RIM Concepts ....................................................................................................................290 RIM Best Practices ......................................................................................................................292 Record Retention .........................................................................................................................303 Record Disposal...........................................................................................................................306 Best Practices for the Secure Destruction of Personal Information ........................................308 Preserving Records ......................................................................................................................319 Focus on Issues in Privacy ...............................................................................................................321 Big Data and Predictive Analytics ................................................................................................321 Biometrics and Facial Recognition ...............................................................................................324 Body Worn Cameras.................................................................................................................... 325 Data Brokers................................................................................................................................ 327 Personal Email Use for Business ..................................................................................................329 Snooping ..................................................................................................................................... 334 Surveillance ................................................................................................................................. 337
RkJQdWJsaXNoZXIy MTgwMjYzOA==