{"id":489,"date":"2023-08-28T09:10:00","date_gmt":"2023-08-28T09:10:00","guid":{"rendered":"https:\/\/privacyand.com\/?p=489"},"modified":"2023-08-27T21:11:09","modified_gmt":"2023-08-27T21:11:09","slug":"the-privacy-police","status":"publish","type":"post","link":"https:\/\/privacyand.com\/?p=489","title":{"rendered":"The Privacy &#8216;Police&#8217;"},"content":{"rendered":"\n<p>Countries with privacy legislation use a variety of enforcement mechanisms that are constantly evolving.\u00a0\u00a0For some, a Privacy Regulator is appointed.\u00a0\u00a0For others, there are civil and \/ or criminal penalties\u00a0(Baker &amp; McKenzie &amp; International Association of Privacy Professionals, 2012).\u00a0\u00a0For example, in Canada the Office of the Privacy Commissioner \/ Ontario was enacted under the provincial privacy legislation.\u00a0\u00a0In Hong Kong, there are criminal penalties for direct marketing.\u00a0\u00a0\u00a0\u00a0<\/p>\n\n\n\n<p>In order to comply with legislation, named organizations create a variety of policies, standards and procedures.\u00a0\u00a0In some countries, the legislation specifies the need for a Chief Privacy Officer (CPO) role such as Canada\u2019s\u00a0<em>Personal Information Protection and Electronic Documents Act\u00a0<\/em>(PIPEDA) section 4.1.\u00a0\u00a0<\/p>\n\n\n\n<p>In other organizations, privacy is part of another group (security, compliance or legal for example).\u00a0\u00a0Organizational policies are typically managed through traditional program management procedures that are not specific to privacy; for example, accountable person, budget assigned, a program of regular training and awareness (American Institute of Certified Public Accountants, Generally Accepted Privacy Principles).\u00a0\u00a0\u00a0<\/p>\n\n\n\n<p>Together, these activities make up a privacy management program run by the CPO (or equivalent).\u00a0\u00a0Once the program is up and running, there are several mechanisms that may be used to evaluate not only the efficacy of the day-to-day operations but also identify any new potential privacy impacts to data subjects (as required under legislation).\u00a0\u00a0<\/p>\n\n\n\n<p>Typically, a data subject would have no visibility or transparency to organizational privacy practices unless required by legislation.  Data subjects face an increasingly complex computational environment that they must negotiate in order to adequately protect themselves.\u00a0 In parallel, both Government and private sector organizations face increased external scrutiny from the press and regulatory bodies around the world.  \u00a0<\/p>\n\n\n\n<p>While there are some technical and policy solutions, to date there is no codified and \/ or institutionalized mechanism for representing privacy to a data subject.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Countries with privacy legislation use a variety of enforcement mechanisms that are constantly evolving.\u00a0\u00a0For some, a Privacy Regulator is appointed.\u00a0\u00a0For others, there are civil and \/ or criminal penalties\u00a0(Baker &amp; McKenzie &amp; International Association of Privacy Professionals, 2012).\u00a0\u00a0For example, in Canada the Office of the Privacy Commissioner \/ Ontario was enacted under the provincial privacy &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/privacyand.com\/?p=489\" class=\"more-link\">Read more<span class=\"screen-reader-text\"> &#8220;The Privacy &#8216;Police&#8217;&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[1],"tags":[],"class_list":["post-489","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7IDr7-7T","_links":{"self":[{"href":"https:\/\/privacyand.com\/index.php?rest_route=\/wp\/v2\/posts\/489","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/privacyand.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/privacyand.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/privacyand.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/privacyand.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=489"}],"version-history":[{"count":1,"href":"https:\/\/privacyand.com\/index.php?rest_route=\/wp\/v2\/posts\/489\/revisions"}],"predecessor-version":[{"id":490,"href":"https:\/\/privacyand.com\/index.php?rest_route=\/wp\/v2\/posts\/489\/revisions\/490"}],"wp:attachment":[{"href":"https:\/\/privacyand.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=489"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/privacyand.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=489"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/privacyand.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=489"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}