Hostname: page-component-7bb8b95d7b-fmk2r Total loading time: 0 Render date: 2024-09-22T18:07:53.885Z Has data issue: false hasContentIssue false

The Legal Control of Personal Data in the Private Sectors of Quebec and Canada*

Published online by Cambridge University Press:  18 July 2014

René Laperrière
Affiliation:
Computer Science and Law Research Group, Université du Québec à Montréal
Jean-Pierre Lemasson
Affiliation:
Computer Science and Law Research Group, Université du Québec à Montréal
Pierrôt Péladeau
Affiliation:
Computer Science and Law Research Group, Université du Québec à Montréal
Robert D. Bureau
Affiliation:
Computer Science and Law Research Group, Université du Québec à Montréal
Jean Martin
Affiliation:
Computer Science and Law Research Group, Université du Québec à Montréal

Extract

From 1984 to 1986, the Computer Science and Law Research Group at The University of Quebec at Montreal conducted a socio-legal survey for the Government of Quebec on personal data banks in the private sector of Quebec's economy. The study flowed from a concern for the defence and promotion of individual rights and freedoms, which appeared to be threatened by the growth of relatively unregulated data banks. By furnishing an often confidential computerized double, sophisticated data bases can often give a better picture of individuals than they themselves could provide. Ultimately, decisions affecting individuals and social choices could be taken without any control over their conformity to rules of natural justice and democracy. With these concerns in mind, we studied both the current state of development of such data banks and the state of the law regulating them.

Type
Comments/Commentaires
Copyright
Copyright © Canadian Law and Society Association 1988

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Notes

1. On the broad subject of the threats of computerization to fundamental rights and liberties, including privacy, see: Vitalis, André, Informatique, pouvoir et libertés (Paris: Economica, 1981)Google Scholar; Cordell, Arthur J., The Uneasy Eighties: The Transition to an Information Society (Ottawa: Science Council of Canada, Background Study No. 53, 1985)Google Scholar; and more recently: Simitis, Spiros, “Reviewing Privacy in an Information Society,” University of Pennsylvania Law Review 135 (1987), 707746CrossRefGoogle Scholar and David Flaherty, “Privacy at the Dawn of the XXth Century,” Opening Conference at the Annual Meeting of Privacy Commissioners, Québec, September 1987.

2. In preceding inquiries by Westin and the Canadian Government, no classification of firms was undertaken. By contrast, we distinguished between suppliers and users of information and related services. Thus some firms, such as consumer reporting agencies, only gather information and supply it to other firms, often the more important users such as banks, insurance companies and credit institutions. The latter also collect data directly for their own use, as well as resorting to other intermediaries, such as debt collection agencies or employment agencies. This categorization also takes into account the legal pattern in North America, where existing laws apply to particular economic sectors, not to the whole economy. Our survey strategy thus integrated the diversity of economic activities of private firms. The sectors analyzed were credit card issuers, banks, other credit institutions, insurance companies, stock exchange brokers, collection agents, insurance claims adjusters, investigation bureaus and poll firms, employment agencies and computer consultants. Since these companies specialize in various service sectors, or belong to sectors of great economic concentration (e.g., the banks), their small number precluded a quantitative approach based on representative sampling. Taking into account the diverse configurations of the sectors and our financial limits, we solicited interviews from those firms which appeared the most significant in information processing or the most typical in their sector; in sectors with a very few small firms, we could only interview those who agreed to participate.

3. The questionnaire contained ten main questions and numerous sub-questions, some of which were closed and some open.

4. For further details on the survey, the state of the law and a selected bibliography, see the four titles published by the Société québécoise d'information juridique (SOQUIJ) in autumn 1986: L'identité piratée (363 p.); Les renseignements personnels et l'ordinateur, Enquête sur la situation des bases de données à caractère personnel dans le secteur privé québécois (200 p.); Le droit de protection des renseignements personnels, Étude sur les bases privées de données à caractère personel en droit canadien, comparé et international (456 p.) and Droit, informatique et vie privée, Bibliographie sélective, canadienne et Internationale (144 p.).

5. The rate of micro-computer acquisition has grown rapidly from eighteen percent in 1983 to more than forty-one percent in 1984.

6. These attitudes contrast with those taken by employers' organizations, which oppose as a matter of principle any further legislative or public intervention and which deny the very existence of a serious problem or corporate abuse of information banks.

7. For an extensive bibliography on the subject, see: P. Mackay, Pierrôt Péladeau, et René Laperrière, Droit, ordinateur et vie privée. A discussion of the concept of privacy relies mainly on the work of André Vitalis, Informatique, pouvoirs et libertés; Herbert Maisl et André Vitalis, Les libertés, enjeu d'une société informatisée (Études, avril 1985), 472; Cordell, Arthur J., The Uneasy Eighties, 155Google Scholar; Flaherty, David H., Protecting Privacy in Two-way Electronic Services (White Plains, New York: Knowledge Industry Publications, 1985)Google Scholar.

8. It should be noted, in this context, that although it is more developed, European law also lags behind technological developments. For example, some European laws apply only to computerized files as such rather than to their transmissibility; those files not considered damaging to the persons involved are generally not subject to the application of standards, without regard for the fact that they may become damaging when circulated through the networks.

9. The relevance of these recommendations is confirmed by the analysis of Flaherty, David H., “Government Surveillance and Bureaucratic Accountability: Data Protection Agencies in Western Societies,” Science, Technology and Human Values 11 (1986), 718CrossRefGoogle Scholar.