Respecting the supplementary assessment required for sensitive personal information disclosed to be stored outside of Canada.
Use this guidance to understand the requirements for storing sensitive personal information outside Canada. This guidance is for ministry and non-ministry public bodies in B.C.
There are privacy impact assessment (PIA) templates available for ministry and non-ministry public bodies. Non-ministry public bodies may choose the format for completing the assessment that is appropriate for their organization.
You must complete the Assessment for Disclosures Outside Canada in the PIA if your program, project or system involves sensitive personal information disclosed to be stored outside Canada.
The PIA directs you to identify if your initiative involves sensitive personal information. Sensitivity depends on the type of personal information involved, the context and how it is handled.
The next question is concerned with whether you’re disclosing the sensitive personal information to be stored outside of Canada.
If the disclosure results in sensitive personal information being stored outside of Canada, then you’ll need to complete the supplementary assessment in your PIA.
You do not need to complete the assessment if FOIPPA section 33(2)(f) applies. This section authorizes a public body to disclose personal information if the information is made available to the public under an enactment that authorizes or requires the information to be made public. Complete the rest of the PIA, but you can skip Part 4.
Sensitive personal information is not defined in FOIPPA. Some types of personal information can be considered sensitive because there is a higher risk of harm to individuals if the information is improperly collected, used or disclosed.
Personal information may be considered sensitive depending on:
Context is a key factor in determining whether personal information is sensitive. Information that, on its own, may seem harmless in one context can become more sensitive when connected to services that may expose the personal activities or preferences of its users. For example, a home address may not be considered sensitive on its own. However, in some situations, a home address paired with an individual’s name may be considered sensitive because of the potential negative impact to the individual if the home address is disclosed to the wrong person (e.g., in situations that may impact an individual’s personal safety).
The following is a non-exhaustive list of types of personal information that are commonly considered sensitive (note that the collection, use and disclosure of personal information should still be limited to what is necessary for the project, program or system):
Understanding the sensitivity of the personal information will help inform if the additional assessment is required. It will also help you complete the additional assessment.
The assessment for sensitive personal information disclosed to be stored outside of Canada must be completed in a PIA. You’ll need to identify any privacy risks as well as the level of the privacy risks associated with storing sensitive personal information outside Canada.
In your assessment, consider the following factors:
This is not an exhaustive list. There may be other factors relevant to your assessment that you may need to consider.
Determine if the sensitive personal information is stored by a service provider. This could increase the privacy risk depending on where the service provider’s headquarters are located and what laws apply to them.
For example, a cloud service provider that is based outside of Canada may be subject to laws that require the disclosure of information held by the cloud service provider.
Consider where the sensitive personal information is stored. If a service provider is storing the sensitive personal information on the public body’s behalf (e.g. a cloud service provider), you will need to consider where and how that data is stored and if that increases the risk of unauthorized collection, use, disclosure or storage.
When you answer this question, include the location and method of storing the personal information (e.g. location of data: Atlanta, GA, USA). The method of storing personal information would include details about the data storage facility (e.g. in Atlanta, GA, USA: the information is stored in a data storage facility).
The likelihood refers to the probability that an identified privacy risk will happen. The likelihood may be low, medium or high depending on the context and the risk responses in place.
For example, consider a risk of unauthorized access to personal information in a system. If your system does not use role-based access to limit what personal information users can see, the likelihood that a user can access information they don’t need to do their job is high. Technical controls that enforce role-based access will likely decrease the chance that this type of unauthorized access will occur.
To consider impact, think of the harm to individuals if their sensitive personal information is collected, used, disclosed or stored improperly or inappropriately.
When determining impact, consider the sensitivity of the personal information and refer to Determining if Personal Information is Sensitive. For example, the impact to an individual may be high if their sensitive health information or financial information is disclosed to the wrong person because it could result in identity theft or financial loss. As financial personal information often includes detailed information about individuals' credit worthiness, a breach of this data could also result in reputational harm.
You may use these examples of privacy risks to help identify risks in your program, project or system:
This list is not exhaustive.
For each privacy risk you identify, include a risk response that is proportionate to the level of risk. The higher the risk, the more robust the risk responses should be.
Risk responses can include measures that are contractual, technical, administrative and/or policy-based to manage access to the sensitive personal information. Examples include but are not limited to:
When you take measures to respond to privacy risks, it may be less likely that risks will occur. For example, if you have strong technical controls preventing unauthorized access to sensitive personal information, the likelihood such access will occur may be lowered.
At this point you’ve identified privacy risks and the level of privacy risk by examining the factors in Completing the Supplementary Assessment.
The outcome of the assessment will be a risk-based decision made by the head of the public body on whether to proceed with the project, taking the following into account:
The risk-based decision captures the public body’s reasoning for accepting the privacy risks in their project, program or system that discloses sensitive personal information to be stored outside of Canada.
If your public body is a ministry, you must document the decision in the PIA.
If your public body is not a ministry, you may document the decision in the PIA template or in an appropriate format as determined by the head of your public body.
For more information, contact your Ministry Privacy Officer, Privacy Officer or Information Security Officer.
Can't find what you're looking for? Contact the Privacy and Access Helpline.