Information Privacy

Privacy 2

Canadians are moving quickly to adopt some of the more modern technologies and applications and are currently using the computer and smartphones for more personal tasks. In 2009, 74% of Canadian’s has a paid internet service and 59% of Canadian’s used electronic tax filings. Also 67% of Canadian’s banked online and spent $62.7 billion on online sales.

Each year more attackers are found and caught. Cyber security is a huge part of the government’s roll to keep people safe from Cyber attacks and fraud. Canada has what they call “Canada’s Cyber Security Strategy.” This is Canada’s plan for keeping it internet users safe from being attacked. It is a plan the government has set fourth as their responsibility to catch criminals before they can steal information that may harm an individual of company.

Canada has a very comprehensive privacy legislation and policies set up in the world. The Canadian Charter of Rights and Freedoms is the protection that is set forth to help individuals and businesses secure their information. This entitles everyone the right to be secured against unreasonable search and seizure.” This will point back to the criminal code that will involve invasion of privacy.

The privacy of Canadians is also protected by various provincial laws of general application that govern the collection, use, disclosure and retention of personal information by public bodies and in some cases by the private sector, as well as by other privacy provisions in other provincial statutes.



The Government is continuing its efforts to help secure Canada’s cyber systems and protect Canadians online. This Strategy is but one element in a series of initiatives designed to protect Canadians. The Government has established the Canadian Cyber Incident Response Center to monitor and provide mitigation advice on cyber threats, and coordinate the national response to any cyber security incident. The Government will soon introduce legislation to modernize law enforcement’s investigative powers, and ensure that technological innovations are not used to evade lawful interceptions of communications supporting criminal activity.



Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s