Safeguarding Canadians' Personal Information Act

An Act to amend the Personal Information Protection and Electronic Documents Act

This bill was last introduced in the 40th Parliament, 3rd Session, which ended in March 2011.

Sponsor

Tony Clement  Conservative

Status

Second reading (House), as of Oct. 26, 2010
(This bill did not become law.)

Summary

This is from the published bill. The Library of Parliament often publishes better independent summaries.

This enactment amends the Personal Information Protection and Electronic Documents Act to, among other things,
(a) exclude, in certain circumstances, business contact information from the application of Part 1 of that Act;
(b) specify the elements of valid consent for the collection, use or disclosure of personal information;
(c) permit the disclosure of personal information without the knowledge or consent of the individual for the purposes of
(i) identifying an injured, ill or deceased individual and communicating with their next of kin,
(ii) performing police services,
(iii) preventing, detecting or suppressing fraud, or
(iv) protecting victims of financial abuse;
(d) clarify the meaning of lawful authority for the purpose of disclosures to government institutions of personal information without the knowledge or consent of the individual;
(e) permit organizations, for certain purposes, to collect, use and disclose, without the knowledge or consent of the individual, personal information
(i) contained in witness statements related to insurance claims, or
(ii) produced by the individual in the course of their employment, business or profession;
(f) permit organizations, for certain purposes, to use and disclose, without the knowledge or consent of the individual, personal information related to prospective or completed business transactions;
(g) permit federal works, undertakings and businesses to collect, use and disclose personal information without the knowledge or consent of the individual to establish, manage or terminate employment relationships;
(h) provide a framework for organizations to notify individuals proactively about disclosures of their personal information made in certain circumstances to government institutions; and
(i) require organizations to report material breaches of security safeguards to the Privacy Commissioner and to notify certain individuals and organizations of breaches that create a real risk of significant harm.

Elsewhere

All sorts of information on this bill is available at LEGISinfo, an excellent resource from the Library of Parliament. You can also read the full text of the bill.

April 21st, 2015 / noon
See context

Green

Bruce Hyer Green Thunder Bay—Superior North, ON

This amendment reverts back to the proposed language for notifying the Privacy Commissioner about security breaches, which is found in the previous PIPEDA reform bills C-12 and C-29, but it is stronger and clearer. Why? It creates a mandatory security breach disclosure requirement at the federal level, and that is long overdue. Geist at the Senate said that Bill S-4 establishes the same standard of “a real risk of significant harm” for both notifying the commissioner and the individuals, but also said this is very puzzling. It means that there is no notification for systemic security problems within an organization. This is very likely to result in significant under-reporting of breaches. Our amendment creates incentives for organizations to better protect that information and allows Canadians to take action to avoid risks including identity theft.

March 10th, 2015 / 12:35 p.m.
See context

Canada Research Chair, Internet and E-commerce Law, University of Ottawa, As an Individual

Dr. Michael Geist

I think that if every time a USB key went missing, there were requirements to disclose, then yes, you would find that organizations would be spending a lot of time disclosing. However, if we look back at the Bill C-12 and Bill C-29 standard, that's not the standard we talked about. It set a material breach as the standard.

You can debate whether or not that's the appropriate standard, but at a minimum it gets us at a number of breaches that this law will not. Moreover, it does so in a way that I think was good for companies too, because rather than companies being faced with this either/or of going to the expense and potential embarrassment of simply disclosing or not, it said as an intermediary step, let's discuss this on a confidential basis with the Privacy Commissioner's office and determine whether or not it warrants that broader disclosure.

Frankly, that was a good thing for organizations to potentially avoid having to make those broader disclosures, in some circumstances, and it provided the comfort of ensuring that users knew that, at a minimum, we had an advocate, the Privacy Commissioner, who was going to be made aware of these circumstances.

It's puzzling to me why this was removed in favour of a process that, frankly, does less to protect Canadians and, ultimately, actually can create larger costs for companies as well.

March 10th, 2015 / 12:30 p.m.
See context

Canada Research Chair, Internet and E-commerce Law, University of Ottawa, As an Individual

Dr. Michael Geist

Thanks for raising that. It's worth noting that this whole notion of security breach disclosure actually originated out of California, with the idea of creating sort of the perfect world of incentives for companies to do a better job of securing the information, because they don't want to have to go through the cost and potential embarrassment of disclosure. At the same time, it creates incentives or protection for users because they become aware of these disclosures when they happen.

What we've got under Bill S-4 is such a high threshold, and I think Ms. Lawson referenced this as well, that if the standard is only a real risk of significant harm and we don't have big penalties associated with non-disclosure to begin with, at least if you're a larger organization, in many instances, I think it's going to be quite rational, frankly, for an organization not to disclose. They're going to ask, first, what's the risk that anyone will ever find out about this? Second, if they do happen to find out about it and someone shows that there was a real risk of significant harm, then we will face a penalty. But even there, the penalties are relative low.

So what the California law does is to say that we want to ensure that if we're going to err on one side or the other, it's will be to err on the side of trying to mitigate against identify theft, to err on the side of ensuring that there is better security, and by lowering the threshold. We tried to do that a little bit in Bill C-12 and Bill C-29 with the two-step process, so that at least you are made sure that the Privacy Commissioner would be aware of the circumstances where there's a material breach. But in doing away with all of that, I don't think it's just a fear that breaches will occur in Canada. I think these should be expected. And if you asked many Canadians, they would tell you, “Boy, I should have been told about that”. And yet they won't be because companies are going to err rationally, based on the way this law is drafted, on the side of not disclosing it.

March 10th, 2015 / 12:10 p.m.
See context

Canada Research Chair, Internet and E-commerce Law, University of Ottawa, As an Individual

Dr. Michael Geist

Sure. I'll do that. I'd also like to just note a couple of things. The commissioner did not appear before the Senate committee on Bill S-4. Because of the long delays in getting a commissioner appointed at that time, there was no commissioner, but people from that office were in a position to appear because it had been studied. So the commissioner actually didn't appear on Bill S-4.

In terms of lengthy study, with respect, let's be clear. The committee began a review of this bill in November 2006, and by May of 2007 it released its report.

We got first reading of Bill C-29 in May 2010. A second reading took until October. There were never any hearings held on Bill C-29.

The next bill that was introduced was Bill C-12, which was the second attempt at this bill. It sat at second reading for two years without moving forward. There were no committee hearings held on it.

We finally now have Bill S-4, on which there were two sets of hearings. Four days were allocated to this piece of legislation within the Senate: one day for the minister to appear; another day for clause-by-clause; two days for hearings. So if we're going to talk to witnesses about not having appeared, frankly, there were very, very few witnesses who had the opportunity to appear at all. This is, with all respect, not a well-studied bill. It is a bill that has now come through three times, and in most instances there has been no study whatsoever. When the Senate had the chance to hear on this bill, there was not even a privacy commissioner in place to deal with it, due to the long delay in finding a new commissioner to replace Commissioner Stoddart and later acting commissioner Chantal Bernier.

With respect to the commissioner's support, yes, I too can cherry-pick particular comments from the Privacy Commissioner about where the commissioner supports the legislation, but I can also note that the commissioner's office has been consistent in saying that it finds it problematic with respect to voluntary disclosure, and yet that hasn't changed, and in identifying a number of other improvements.

So the question is this. Is this a well-studied bill that we ought to get on with? With respect, it is both not well studied and ought to be fixed. Canadians deserve better.

March 10th, 2015 / 11:45 a.m.
See context

Canada Research Chair, Internet and E-commerce Law, University of Ottawa, As an Individual

Dr. Michael Geist

My concern with the security breach disclosure provisions, which I think quite clearly are long overdue—we've been passed by by so many other countries and jurisdictions on this—is frankly that we had it better in the earlier iterations of this bill, in Bill C-12 and Bill C-29, which, as I'm sure you know, created a two-step process.

The first step is notification to the Privacy Commissioner of a material breach, and that, of course, didn't include the necessity of the real risk of significant harm. It was more a matter of the breach itself.

Then you get into the secondary question of under what circumstances you go down the much more challenging avenue of having to disclose this breach to everyone who's affected, recognizing that there may be circumstances in which that's appropriate and others in which it's not.

What we've done here, by removing that and creating a higher threshold for all disclosures, I think means that systemic breaches don't get disclosed. It means that, many times, important material breaches simply don't get disclosed, and organizations that have underlying problems don't have to fess up at all.

I think we recognize that in some circumstances we have the incentives for organizations not to disclose because of the costs and the embarrassment factor. We also want to ensure that we don't have so many disclosures that consumers are receiving notifications on a daily basis, and they simply tune all of that out.

There is a balance to be struck, but I think we did a much better job, the government did a much better job, of striking that balance, particularly for things like systemic breaches within an organization, by saying, “Surely that's the sort of thing that we would want the Privacy Commissioner's office to know about”, and yet we've effectively removed that in this bill. It's hard to understand why.

May 1st, 2014 / 11:45 a.m.
See context

Dr. Éloïse Gratton Partner and Co-Chair, Privacy, McMillan LLP, As an Individual

I will start. Thank you for the invitation.

I'll give the first part of my presentation in French and the second, in English.

I'd like to start by discussing the legal framework governing privacy protection and the response of business. Despite the legislation that exists, the Personal Information Protection and Electronic Documents Act, or PIPEDA, companies and organizations have no real incentive to comply with the act and implement appropriate security measures. What's the worst that could happen from a company's perspective? What are the risks if they don't comply with the act? Not much. The worst case scenario is that their reputation might be tarnished. For example, if a complaint is made, and at the end of the investigation, the commissioner decides to release the company's name, then obviously, the company's reputation might be sullied. That very seldom happens, though.

There is another potential risk. When an individual is notified by the commissioner that the act was in fact breached, that person can take the company to Federal Court for damages. The court has made a few such rulings in the past decade. In five to ten cases, the Federal Court awarded small amounts. In some cases, it awarded no damages, and in others, $5,000.

Last fall, in its ruling on Chitrakar v. Bell TV, the Federal Court awarded $20,000 in damages, and that was a first. Is this the beginning of a new trend? Perhaps. Only time will tell. One thing is for sure: not everyone has the means to take legal action against a company to obtain small amounts in damages. In privacy violation cases, the amounts often range between $5,000 and $10,000. Engaging in a court battle is a complicated and painstaking process.

Furthermore, at the federal level, no incentives exist with respect to class action lawsuits over privacy violations, which have the potential to improve compliance. Incentives do exist in other jurisdictions. And in many cases, companies comply with privacy legislation as a result. Just think of the recent security breaches. Last January, a security breach occurred at Human Resources and Skills Development Canada. In April, a security breach occurred at the Investment Industry Regulatory Organization of Canada, or IIROC. And class action suits were launched in relation to both of those breaches.

In the case of IIROC, a portable drive containing the financial information of 52,000 brokerage firm clients was lost. The damages sought were $1,000 per individual. That has the potential to motivate companies to comply, but under PIPEDA, that isn't an option. The legislation contains no such provision to motivate companies. And even if it did, a class action lawsuit isn't necessarily appealing because authorization to proceed isn't always granted.

In the Quebec case of Larose c. Banque Nationale du Canada, the Superior Court made a ruling in 2010. A typical breach, it involved a lost laptop containing the financial information of many clients. One of the clients was not very happy and took the National Bank to court. At the authorization stage, counsel for the complainant had to show that, as a result of the security breach on the bank's part, actual identity theft had occurred. The court stipulated that the fear of identity theft alone did not entitle someone to compensation. Had there been no evidence of actual identity theft, the court would not have granted authorization for a class action.

That tells you just how high the bar has been set. Proceedings of this nature are not straightforward. And the damages aren't very high. So what's left? If you can't seek compensation because you're afraid you were the victim of identity theft as a result of a security breach, there is little else you can do.

Let's come back to the legislation concerning security measures. Companies are advised to adopt security measures based on the level of sensitivity of the information. Even when companies contract out services to a third party, the legislation says they are still responsible for the information and must ensure its protection through the contract. In reality, what we often see is companies using cloud services or third-party contracts. They contract the service out and then turn a blind eye to what goes on.

I would like you to consider a provision in a piece of Quebec legislation that I see as very useful. It imposes an additional obligation on companies preparing to give or transfer personal information to a third party via a contract. I am referring to section 26 of An Act to Establish a Legal Framework for Information Technology. It reads as follows:

Anyone who places a technology-based document in the custody of a service provider is required to inform the service provider beforehand as to the privacy protection required by the document according to the confidentiality of the information it contains, and as to the persons who are authorized to access the document.

The person who entrusts the function to a service provider and transfers the data to the provider, whether via cloud computing or some other means, has an obligation to tell the service provider how to protect the information in question. I think incorporating a similar provision in our legislation could be useful.

I am active in the protection of privacy and personal information. There is a prevention component to my work. That entails advisory services, compliance, training, policy development and so forth. I am also involved in crisis management. I help with the management of security breaches, provide assistance when complaints are made to privacy commissioners in various jurisdictions and give advice related to privacy class action lawsuits. Clients rarely ask me to do any prevention work for them unless they have had some sort of crisis first. That shows that companies aren't very tuned in to the issue. And yet, the legislation exists. Are they motivated to comply with the act? Not especially, because they wait until a security breach has occurred before taking action. Not until a crisis arises do they realize how costly it can be and that they might do well to invest in prevention.

It's also interesting to see just how many resources are being deployed to compliance and prevention around the coming into force of Canada's new anti-spam legislation. That piece of legislation is being taken seriously. It includes liability provisions that apply to administrators, executives and employers. And since the penalties it sets out are quite stiff, companies take it seriously. Ever since its coming into force was announced, the legislation has monopolized my practice almost full time. Is spam a bigger problem or greater evil than security breaches or identity theft? I doubt it. Why, then, is the situation the way it is? What are we waiting for to motivate companies to invest in prevention?

I have one last point. My second part will be very short.

Some studies show that most security breaches are the result of human error. I am referring to two studies, in particular, that were conducted two years after the requirement to report a security breach was imposed on companies. The first was done by Alberta in 2012-13 and lists all the notifications and security breaches. According to that report, human error was at fault in many of the cases. The second study was done by the Ponemon Institute in 2013 and says that in 33% of cases, employee error was to blame.

That, too, shows that companies aren't taking employee training around privacy protection seriously. Very often, the security breach resulted from a laptop being left in a car. Was the employee aware that behaviour posed a risk? Was a relevant policy in place? Was appropriate training available? The jury is out.

I know time is running. The second part is going to be quick.

I want to raise the fact that currently under PIPEDA we don't have mandatory breach notification, and I believe that this may well play an important role in addressing some of the financial harm that may be triggered in the case of identity theft following a security breach.

If individuals, whether they be consumers, employees, are notified, it will help them to better protect themselves against harm, such as identity theft, because once they're notified they're going to pay special attention to their financial statements every month, every day, tracking down any suspicious or unauthorized transactions. They're going to monitor their credit through credit-rating agencies, such as Equifax and TransUnion. It will also provide businesses with an incentive to establish better data security practices in the first place.

What's the status on mandatory breach notification outside of Canada? We have it in Europe and in the United States. Most of the states in the U.S. have breach notification laws. In Canada, Alberta so far is the only private sector jurisdiction that has this law, and they prescribe fines up to $100,000 for businesses. They have realized that this breach notification obligation in their law has increased the reporting of security breaches, and it has also increased the privacy training. Businesses are more inclined and are more motivated to spend, because they realize that it's going to be an obligation to disclose the breach if there is such a breach.

In Quebec there is a consensus that it is needed. In 2011, la Commission d'accès à l'information du Québec published a report in which they said that this is needed. It's a matter of time. It's in the hands right now of the legislature, but we will have also this obligation in Quebec shortly, hopefully.

At the federal level, we've had various bills that have been introduced: Bill C-29, BillC-12, Bill S-4 recently, and Bill C-475. The latest one is Bill S-4. Will Bill S-4 do the job if it becomes law? It's better than having nothing, that's for sure. Maybe it's not perfect, but it's better than having nothing.

I guess it would create the incentive for businesses to disclose, and I think we need to trigger that incentive. In an ideal situation there should be clear monetary penalties for not reporting security breaches to individuals and to the privacy commissioners. There should be a duty to report a breach as soon as possible. I'm cautious with providing fixed delays, because I've been on the other side. Sometimes there's a breach and you need to do the investigation before you start notifying individuals and privacy commissioners, because you need to know exactly what happened and what needs to be told or not told.

The Privacy Commissioner, I believe, should be given the power to order an organization to report a breach to customers. These orders should be made public and the organization should be named. I think that would create the necessary incentive for them to invest in preventive measures, which would be beneficial to address a financial harm resulting form identity theft.

This is my last point. It would not be a bad idea to have a uniform breach notification law in Canada. Various systems could become problematic when there's a breach. I know that a few years ago, the Uniform Law Conference of Canada drafted a breach notification act. Maybe it could be used as a tool.

Thank you. I think my time is up.

May 29th, 2012 / noon
See context

Conservative

Dean Del Mastro Conservative Peterborough, ON

Bill C-29, which was in the former Parliament, made some changes to PIPEDA, and Bill C-12, which was reintroduced on September 29, 2011, had a key amendment that required organizations to report data breaches—referred to in the bill as breaches of security safeguards involving personal information—to the Privacy Commissioner and notify affected individuals when there is real significant harm, such as identity theft or fraud.

I have a lot of folks in my community who are concerned about identity theft. It seems that every once in a while we'll hear about a significant security breach. In fact, your office has reported on some of them. This reporting requirement for security breaches, is it something you would support, these changes that are suggested in Bill C-12?

December 2nd, 2010 / 4:10 p.m.
See context

Privacy Commissioner, Office of the Privacy Commissioner of Canada

Jennifer Stoddart

I think that work has to continue to progress. It may look like we spent a lot of time on international issues, which may perhaps seem glamorous and so on, but it wasn't that kind of choice. Because of the way the Internet functions, because of Canada's economic position, with so much on the Internet.... First of all, we're big users of the Internet and we're big users of the social network. A lot of our content comes from the United States or from France—even the United States for French-speaking Canadians. We have no choice but to engage internationally.

If you want to enforce our law against somebody who's sitting on the other side of the world, you need to have the ties with the enforcement agency on the other side, and you must have the credibility and have built up a relationship ahead of time. That's why another bill that is currently before the House of Commons.... Well, actually it is in Bill C-29, which went to the Senate, that I have extended power to share information and to enter into working relationships with other agencies and other organizations that do similar work in order to further Canadian law.

That's basically what we're trying to do, ideally: to better global protection for Canadians as their personal information circles around the globe.

Business of the HouseOral Questions

November 25th, 2010 / 3:05 p.m.
See context

Ottawa West—Nepean Ontario

Conservative

John Baird ConservativeLeader of the Government in the House of Commons and Minister of the Environment

Mr. Speaker, before I respond to the hon. member's question, I want to say that at our House leaders meeting just two weeks ago, the government raised the issue of one of the Liberal members calling a minister of the Crown a “slime” five times.

The House leader for the Liberal Party is seeking to raise the decorum and the quality level of debate in this place. The member is a senior member of the Liberal shadow cabinet. Before I answer the normal Thursday question, I wonder if the member could update us on where we are on that.

The House leader of the official opposition has also been very passionate in wanting to reduce the amount of heckling in this place and yet we was rather egregiously heckling the Minister of Finance yesterday on Walkerton. I spoke with the member who represents that constituency and that community takes great offence at the continuing vilification of the name of their town. Maybe we will get that next week with the slime comment.

Today we will continue the opposition motion from the Bloc Québécois.

Friday we will debate Bill C-41, strengthening military justice, and Bill C-43, the RCMP labour modernization.

On Monday, Tuesday, Wednesday and Friday of next week we will call Bill C-49, action on human smuggling; Bill C-47, sustaining Canada's economic recovery; Bill C-22, protecting children from online sexual exploitation; Bill C-29, safeguarding Canadians' personal information; Bill C-41, strengthening military justice; Bill C-43, the RCMP labour modernization; Bill C-54, child sexual offences; Bill C-33, safer railways act; Bill C-8, Canada-Jordan free trade agreement; and, Bill C-20, an action plan for the National Capital Commission.

Thursday will be an allotted day for our friends in the New Democratic Party.

Business of the HouseOral Questions

November 18th, 2010 / 3:05 p.m.
See context

Ottawa West—Nepean Ontario

Conservative

John Baird ConservativeLeader of the Government in the House of Commons and Minister of the Environment

Mr. Speaker, let me make an undertaking to my colleague, the House leader of the official opposition, to make enquiries into that and respond to him in short order.

The House will continue today with the opposition motion.

Tomorrow we will continue debate, and I know the NDP will be excited about this, on Bill C-10, Senate term limits; Bill C-19, regarding political loans; followed by Bill S-3, tax conventions implementation.

On Monday and Tuesday of next week, we will call Bill S-3, tax conventions implementation; Bill C-3, gender equity in Indian registration; Bill C-28, fighting Internet and wireless spam; Bill C-22, protecting children; Bill C-29, safeguarding personal information; and Bill C-30, response to the Supreme Court of Canada decision in R. v. Shoker.

On Wednesday and Friday we will call Bill C-41, strengthening military justice; and Bill C-43, RCMP labour modernization.

Thursday will be an allotted day. I believe this allotted day will go to the Bloc Québécois.

With respect to a take note debate, there have been discussions amongst the parties. There have not been a lot of take note debates. Two weeks ago we had one on veterans issues. I believe next week we will be having one on the issue of pensions, which I know is a concern for all of us, but particularly this was brought forward by the House leader for the official opposition. I believe we are looking at Tuesday night for that.

I appreciate the co-operation we have had from all parties. This gives members an opportunity to bring issues relevant to their constituents forward in the House.

October 28th, 2010 / 4:20 p.m.
See context

Conservative

Harold Albrecht Conservative Kitchener—Conestoga, ON

Thank you. I wasn't intending to ask the question, but you opened that door on Bill C-28 and Bill C-29.

I'd be the first to acknowledge that I'm not an IT expert, and my questions will probably show that quickly enough.

If Google can inadvertently capture this Wi-Fi payload data while a car is driving down the street, how can I be assured as a private citizen that some IT expert with malicious intent could not go down my street, do a personal investigation on my data, and use it for something other than proper purposes?

October 28th, 2010 / 4:20 p.m.
See context

Conservative

Harold Albrecht Conservative Kitchener—Conestoga, ON

Thank you, Mr. Chair.

Thank you for being here today.

I wanted to follow up Bill C-28 and Bill C-29. I take it from your comments that you are very supportive of the measures in those bills that are before Parliament right now.

October 28th, 2010 / 4:15 p.m.
See context

General Counsel, Office of the Privacy Commissioner of Canada

Patricia Kosseim

That's a very nice question. Thank you.

We may take you up on that on further reflection and send those recommendations back to you. I'm sure our office would be pleased to do so, but let me offer a few suggestions right off the bat, if I may.

The first thing I could say is to echo what has been the key message of the commissioner and her international counterparts, which is to impress upon all organizations--but especially model organizations and world trendsetters like Google--that they must take proactive measures to avert risks before the deployment of products and services occurs. This is a key message; if you were to echo it, I think it would be very helpful.

There are other things being contemplated by Parliament right now that would go a long way in assisting in where we go from here. One of those is to afford the commissioner with the powers and the authority necessary to share information about ongoing investigations with her international counterparts, so that she can compare notes with her German and U.K. and Irish and Australian colleagues and discuss what we have found, what they have found, and what we need to do collectively to stop something in its tracks.

Currently, she cannot do that, but Bill C-28 would afford her with the powers to share and exchange information and collaborate even more meaningfully than she can now with her international counterparts to deal with these global issues.

Another change going from here currently to Parliament would be to give her discretion to choose which complaints she goes forward with. Right now she must investigate all complaints, which takes an awful lot of resources, as you know. If she were afforded with the discretion to set priorities and decide where the real risks are, to take some complaints or not investigate other complaints, then she could afford and allocate resources much more meaningfully to get at the big risks--such as Google, in this example--and allocate her resources accordingly. That discretion would help.

Finally, another change before Parliament is Bill C-29, the amendments to PIPEDA. As you know, these amendments would make it mandatory for organizations to notify of breach. This would go a long way towards bringing these instances out into the open to be able to deal with them.

Business of the HouseOral Questions

October 28th, 2010 / 3:05 p.m.
See context

Ottawa West—Nepean Ontario

Conservative

John Baird ConservativeLeader of the Government in the House of Commons

Mr. Speaker, certainly in the course of my comments I will answer both of those questions. We will continue debate today on Bill C-49, the preventing human smugglers from abusing Canada's immigration system act.

Tomorrow we will call Bill C-36, the consumer product safety bill. Since it was only reported back from committee today, we will need to adopt a special order, which I will propose after my statement. This is a bill that will help protect children, help protect families, and I think it speaks incredibly well of all four political parties that they put politics aside and are seeking speedy passage of the bill. So I would like to thank everyone in all parties for their support on this important initiative. It is a good day for Parliament.

On Monday, we will continue debate on Bill C-47, the second budget implementation bill. I know the member opposite has been waiting for this and I hope he will have the opportunity to speak to this important piece of legislation.

That would be followed by Bill C-49, the preventing human smugglers from abusing Canada's immigration system act; Bill S-2, regarding the sex offenders registry; Bill S-3, the tax conventions; Bill C-41, strengthening military justice; Bill C-48, the protecting Canadians by ending sentence discounts for multiple murders act; Bill C-29, safeguarding Canadians' personal information; and Bill C-30, on the Supreme Court of Canada decision in R. v. Shoker.

On Tuesday, we will call Bill C-32, copyright modernization. At the conclusion of debate on the bill, we will call Bill C-48, protecting Canadians by ending sentence discounts for multiple murders. Following Bill C-48, we will return to the list for Monday, starting with the budget implementation act, which again speaks to one of the member's questions.

On Tuesday evening we will have a take note debate on honouring our veterans and I will be moving the appropriate motion in a few minutes. I think it again speaks well that we are having a take note debate. I know the member for Vancouver East joined members of the Liberal Party, the Bloc Québécois and the Conservative Party in supporting this.

Thursday shall be an allotted day for the New Democratic Party, an opposition day as requested by the House leader for the official opposition.

Therefore, consultations have taken place among the parties and I am pleased to move:

That a take-note debate on the subject of the courageous contribution and service to Canada by Canada's Veterans take place pursuant to Standing Order 53.1, on Tuesday, November 2, 2010.

Safeguarding Canadians' Personal Information ActGovernment Orders

October 26th, 2010 / 5:25 p.m.
See context

NDP

Bill Siksay NDP Burnaby—Douglas, BC

Mr. Speaker, I will try again with another angle because I suspect there are things that we can learn from the experience of Quebec when it comes to passing legislation in this area and administering that legislation.

I know the member is not supporting Bill C-29 and that she sees it as an intrusion into the jurisdiction of Quebec, but the bill exempts business contact information from the provisions of PIPEDA, which means that any information an organization or business collects, uses or discloses solely for the purposes of communicating or facilitating communication with the individual in relation to their employment, business or profession is exempt.

I am just wondering if there is a similar exemption for business contact information in the Quebec legislation, which is now being contemplated in the bill that we have before us today here in the House.