Privacy Brief - Summer 2008


In This Issue

Identity Theft and Technology

– How Bill C-27 Responds . . . . . . . . . . . . . 1

Security of Electronic Records

– Does Current Legislation Adequately

Protect? . . . . . . . . . . . . . . . . . . . . . 4

Technology has had an effect on crime – a prime example

being identity theft. In “Identity Theft and Technology

– How Bill C-27 Responds”, Howard Simkevitz looks at

Bill C-27,An Act to Amend the Criminal Code and examines

what the federal government has proposed to combat identity theft in the digital age.

Security and privacy are key prerequisites for successful adoption of a healthcare system based on the single electronic health record. However, comprehensive

legislative standards currently do not exist. In “Security of Electronic Records – Does Current Legislation Adequately Protect?”, David Young provides an overview of how existing laws respond.

LOADING PDF: If there are any problems, click here to download the file.

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.

© Lang Michener LLP | Attorney Advertising

Written by:


Lang Michener LLP on:

Readers' Choice 2017
Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.