Does i-Sight Comply with Global Privacy Laws?
Most jurisdictions around the world have implemented legislation to govern the handling and use of personal information. We understand that many organizations operate across multiple jurisdictions and we follow a set of procedures to ensure compliance with all of the legislation listed below.
- (HIPPA) Healthcare Insurance Portability and Accountability Act
- (GLB) Financial Modernization Act of 1999 or Gramm-Leach-Bliley
- (PIPEDA) Personal Information Protection and Electronic Documents Act of 2000
- EU Data Protection Directive
- EU E-Privacy Directive
The following is a list of principles that are built into CEC operations and the i-Sight software to ensure compliance with privacy laws.
Accountability for Personal Information – CEC is responsible for protecting all personal information under its custody or control and has designated a Privacy Officer who is responsible for CEC compliance to Privacy Principles.
Identifying Purposes for the Collection of Personal Information - At or before the time personal information is collected by CEC personnel, CEC will identify the purposes for which personal information is collected.
Consent for the Collection, Use, and Disclosure of Personal Information – The knowledge and consent of the individuals are required for the collection, use or disclosure of personal information, except where inappropriate.
Limiting Collection of Personal Information – The collection of personal information will be limited to that which is necessary for the purposes identified by CEC. Information will be collected by fair and lawful means.
Limiting Use, Disclosure and Retention of Personal Information – Personal information will not be used or disclosed for purposes other than those for which it was collected, except with the consent of the individual or as required by contract or law. Personal information will be retained only as long as necessary for the fulfillment of those purposes.
Ensuring Accuracy of Personal Information – Personal information will be as accurate, complete and up-to-date as is necessary for the purposes for which it is to be used.
Ensuring Safeguards for Personal Information – Security safeguards appropriate to the sensitivity of the information will protect personal information.
Administrative, physical, and technical safeguards are provided to ensure that all personal information is readily available at all times to those that have access rights to the information. CEC Information Technology Policy (ITP) Manual outlines those safeguards.
Openness about Personal Information Policies and Practices – CEC will make readily available to individuals upon request specific information about its policies and practices relating to the management of personal information as outlined in this manual.
Individual Access to their own Personal Information – Upon request, an individual will be informed of the existence, use and disclosure of his or her personal information and will be given access to that information. An individual will be able to challenge the accuracy and completeness of the information and have it amended as appropriate.
Challenging Compliance with the Privacy Policies and Practices – An individual will be able to address a challenge concerning compliance with the above principles to the Privacy Officer, whose contact information is available on the CEC website.
Mitigation – In the event that personal information is incorrectly disclosed (violation) by CEC ‘personnel, the Privacy Officer will advise CEC’ client of all details of the disclosure for purposes of mitigating any harm to the client’s customer. The Privacy Officer will also keep a listing of all such disclosures and subsequent corrective action (if required).