Published on March 11, 2024

Receiving a notice of complaint from the Office of the Privacy Commissioner (OPC) is the start of a formal legal proceeding, not an informal inquiry.

  • Your primary objective is not cooperation, but to control the narrative and limit the scope of the investigation from the outset.
  • Every action, from record-keeping to handling access requests, must be executed with procedural precision to build a defensible case file.

Recommendation: Immediately shift from a business-as-usual mindset to a defensive legal posture. Treat every request for information as a formal discovery process and engage legal counsel to manage all communications with the OPC.

The arrival of a formal notice of complaint from the Office of the Privacy Commissioner of Canada (OPC) marks a critical inflection point for any compliance officer. It is a mistake to view this as a collaborative inquiry or a customer service issue. It is the initiation of a regulatory investigation with significant legal and financial consequences. The common advice to “cooperate fully” is dangerously simplistic. While obstruction is not an option, your immediate objective is to manage and contain the process. A PIPEDA investigation can be a lengthy and resource-intensive ordeal, often expanding beyond the initial complaint if not properly managed.

The conventional wisdom focuses on reviewing your public-facing privacy policy or understanding the complainant’s grievance. While necessary, these are reactive steps. A defensive strategy begins with a more fundamental premise: from this moment forward, you are building a legal record. Every document you provide, every statement you make, and every deadline you meet (or miss) will form the basis of the OPC’s findings and any subsequent enforcement action. The key is not to simply provide information, but to control the flow and context of that information.

This approach requires a shift in thinking. Instead of asking “How can we resolve this complaint?”, the primary question must be “How do we build a defensible, procedurally sound file that demonstrates compliance and limits the scope of the investigation?” This involves a meticulous, lawyer-led process of reviewing jurisdiction, justifying past decisions based on documented rationale, protecting privileged information, and proactively auditing your systems against both current and future legal standards.

This guide will not re-state the basics of cooperation. Instead, it provides a procedural framework for navigating the investigation from a defensive posture. It will detail how to handle the critical aspects of the process, from jurisdictional challenges and breach reporting to managing cross-border data transfers and preparing for the possibility of an appeal, all through the lens of a federal privacy lawyer tasked with protecting the organization’s interests.

Does PIPEDA Apply to Your Non-Profit Organization’s Fundraising Activities?

Before dedicating resources to a substantive response, the first procedural step is to confirm jurisdiction. For many non-profit organizations (NPOs), this is not straightforward. PIPEDA applies to organizations that collect, use, or disclose personal information in the course of “commercial activities.” The question is what constitutes a commercial activity in a fundraising context. The Act is specific on this point; it is not a blanket exemption. Your internal review must immediately determine if your NPO’s activities cross this threshold.

According to the OPC’s interpretation, PIPEDA defines commercial activity to include ‘selling, bartering or leasing of donor, membership or other fundraising lists’. If your organization has ever engaged in these practices, it is unequivocally subject to PIPEDA for those activities. However, the analysis does not end there. Many standard NPO operations, such as charging membership fees or running events to support a cause, are generally not considered commercial.

Case Study: The Line Between Fundraising and Commercial Activity

A crucial distinction exists between soliciting existing donors and acquiring new ones. At the federal level, fundraising appeals directed at an NPO’s established donor base are typically not viewed as a commercial activity and may be exempt. However, the moment an NPO rents or purchases a list to run an acquisition campaign, it has entered the commercial realm. These acquisition campaigns are subject to the full force of PIPEDA and provincial laws, making them a high-risk activity that requires strict compliance protocols.

It is also critical to consider provincial legislation. In British Columbia, for instance, the provincial PIPA applies to all NPO activities, including fundraising, not just commercial ones. Your initial legal analysis must therefore include a provincial-level review. Documenting that your fundraising is non-commercial is a powerful first step in potentially narrowing the scope of the OPC’s investigation or challenging its jurisdiction entirely. This documentation should form the first chapter of your response file.

The Form for Reporting: What Exactly Must You Tell the Privacy Commissioner?

If the complaint stems from a data breach, your initial report to the OPC—or your decision not to report—is a primary focus of the investigation. The central legal standard is whether the breach created a “real risk of significant harm” (RROSH). This is not a numbers game. As stated in the OPC’s mandatory breach reporting guidance, the RROSH threshold applies whether a breach affects one person or thousands. Your task is to prove that your RROSH assessment was reasonable, documented, and made in good faith at the time.

Your submission to the OPC must be a carefully constructed narrative supported by contemporaneous evidence. It should include the timeline of events, the nature of the personal information involved, the cause and extent of the breach, and, most importantly, the detailed rationale behind your RROSH assessment. If you determined the risk was not significant and therefore did not report, your file must contain a robust analysis explaining why. This analysis should consider factors like the sensitivity of the data and the probability of its misuse.

The goal is to present the OPC investigator with a complete, logical, and defensible record of your decision-making process. This proactive documentation demonstrates procedural diligence and can prevent the investigation from devolving into a debate over your organization’s competence.

Close-up of professional hands organizing privacy breach documentation

As this image suggests, the process is one of careful organization and procedural formality. Every document, from internal investigation notes to the final report form, should be treated as a legal submission. Avoid speculative language, admissions of fault, or incomplete information. The report is not a confession; it is a statement of facts as determined by your internal investigation, structured to demonstrate compliance with your legal obligations under PIPEDA.

How to Handle a Customer Access Request Without Revealing Trade Secrets?

A significant number of PIPEDA complaints are triggered by an organization’s response, or lack thereof, to an individual’s request for access to their personal information. While the right of access is a cornerstone of PIPEDA, it is not absolute. Your legal obligation is to provide the requested information while simultaneously protecting your organization’s confidential and proprietary assets. This requires a delicate but firm hand.

PIPEDA explicitly allows for the refusal of access in specific circumstances. The most critical exemption for businesses is found in Section 9(3), which permits the withholding of confidential commercial information. If providing access to a piece of information would reveal trade secrets, proprietary algorithms, or strategic business plans that have economic value and are treated as confidential, you are entitled to refuse. However, you cannot simply issue a blanket denial.

The proper procedure is to sever the protected information from the record and provide the individual with the remainder. For every piece of information that is withheld, you must inform the individual of the refusal, the reasons for it, and the specific provision of PIPEDA you are relying on. This is where meticulous documentation becomes your shield. You must maintain an internal exemption log that details each redaction and its legal justification. This log will be a crucial piece of evidence to provide to the OPC investigator, demonstrating that your refusals were not arbitrary but were based on a careful application of the law.

This process is about demonstrating a reasoned and compliant balancing of rights. You are not obstructing access; you are complying with your dual obligations to respect individual privacy and protect the intellectual property that is vital to your business operations. A well-documented file showing this careful, piece-by-piece analysis is a powerful defense against a complaint of improper denial of access.

The 2-Year Rule: Why You Must Keep Records of All Breaches (Even Minor Ones)?

One of the most frequently overlooked procedural requirements of PIPEDA is the mandatory record-keeping for all privacy breaches. Section 10.1(1) of the Act is unequivocal: every organization must keep and maintain a record of every breach of security safeguards involving personal information under its control. This obligation is not tied to the RROSH assessment. It applies to all breaches, no matter how minor or seemingly insignificant.

These records must be maintained for a minimum of 24 months from the day the breach was determined to have occurred. During an investigation, one of the first things an OPC investigator may request is your breach register. An incomplete or non-existent register is a clear statutory violation and immediately undermines your credibility. It suggests a systemic failure in your privacy management program, which can broaden the scope of the investigation and lead to stronger recommendations or penalties.

Conversely, presenting a comprehensive, detailed breach register is a powerful demonstration of diligence and control. It shows that your organization has robust internal processes for identifying, assessing, and documenting incidents. It provides a defensible record that can be used to justify why certain incidents were not reported to the OPC (because they did not meet the RROSH threshold). This register is not just an administrative task; it is a core component of your legal defense strategy. It is the evidentiary foundation upon which your entire response to a breach-related complaint is built.

Action Plan: Auditing Your Privacy Policy for Gaps

  1. Compliance Principles: Review your current privacy policies against all 10 of PIPEDA’s Fair Information Principles to identify foundational gaps.
  2. Document Inventory: Collect and assess all third-party vendor contracts and internal employee handbooks to ensure they contain updated processor accountability and breach procedure clauses.
  3. Procedural Coherence: Confront your incident response and consent management plans with PIPEDA’s mandatory timelines and ‘meaningful consent’ standards to check for inconsistencies.
  4. Retention & Risk Assessment: Audit your data retention schedules against legal requirements and document the rationale for your RROSH assessment process.
  5. Integration & Remediation: Develop a prioritized plan to update key documents, such as cross-border data transfer agreements, to address all identified compliance gaps.

Ensuring your breach register is complete and up-to-date is not something to be done after a complaint is filed. It must be a continuous, real-time process. If it is not, rectifying this gap is an immediate priority.

Comparable Protection: How to Transfer PIPEDA-Protected Data to Europe?

When personal information is transferred across borders, particularly to a different legal jurisdiction like the European Union, your organization’s responsibilities under PIPEDA do not end. A common misconception is that transferring data to a processor in a GDPR-compliant country automatically satisfies Canadian requirements. This is incorrect. PIPEDA’s accountability principle is clear: the organization that collects the information remains responsible for it, regardless of where it is processed.

This means if your European service provider suffers a breach involving the data of Canadians, your organization is the one held accountable by the OPC. To defend against a complaint in this scenario, you must demonstrate that you have used contractual or other means to provide a “comparable level of protection” for the information while it is in the hands of the third party. This is a non-delegable duty.

Accountability in Cross-Border Data Transfers

Under PIPEDA, your organization remains legally responsible for personal information transferred to a third party for processing. In the event of an investigation, you must prove that sufficient contractual arrangements were in place. These contracts must explicitly bind the foreign processor to comply with the breach notification, reporting, and record-keeping provisions set out in PIPEDA. Simply relying on the processor’s general compliance with their local laws, such as GDPR, is insufficient evidence of comparable protection.

Your defense file must contain copies of all data processing agreements with your European (or other foreign) vendors. An investigator will scrutinize these contracts to ensure they include specific clauses that: mandate the processor to notify you of any breach, require them to assist in your investigation, and outline their security safeguard obligations. Without these explicit contractual controls, you will be unable to demonstrate that you have met your accountability obligations, leaving your organization exposed.

Abstract visualization of secure data transfer between Canada and Europe

The flow of data across borders must be governed by an equally robust flow of legal responsibility. Your contracts are the conduits for this responsibility, ensuring that your compliance posture is maintained no matter where the data resides.

When is a Privacy Impact Assessment (PIA) Mandatory for New Projects?

A Privacy Impact Assessment (PIA) is a formal risk management process used to identify, assess, and mitigate privacy risks associated with a new project, system, or technology. While the OPC has long encouraged PIAs as a best practice, their mandatory implementation is becoming a hard legal requirement in certain contexts. Demonstrating that you have conducted a PIA can be a critical element in defending against a complaint, as it provides clear evidence of due diligence.

As noted by compliance experts at Enzuzo, “Per the regulations of PIPEDA, organizations are expected to perform Privacy Impact Assessments (PIAs) to determine potential security risks”. This expectation means that in the event of an investigation, the OPC will likely ask if a PIA was conducted, especially for any project involving sensitive information or new, potentially intrusive technologies. The absence of a PIA for a high-risk project can be interpreted as a failure of due diligence under the accountability principle.

Furthermore, provincial laws are making PIAs explicitly mandatory. For example, as mandated by Quebec’s privacy legislation (Law 25), any transfer of personal information outside of Quebec now requires a PIA to be completed beforehand. This sets a clear legal standard that is likely to influence the OPC’s expectations in other jurisdictions. If your project involves data flows outside of Quebec, or any new technology that systematically monitors or profiles individuals, conducting a PIA is no longer optional; it is a procedural necessity.

In the context of an investigation, a well-documented PIA serves as a powerful defensive tool. It is a contemporaneous record showing that you proactively considered the privacy implications of your actions, identified potential harms, and implemented specific measures to mitigate those risks. It moves the conversation from “Were you careless?” to “Here is the documented, systematic process we followed to protect privacy.”

The Gap Analysis: How to Check Your Current Policies Against a New Act?

A robust privacy management program is not static. It must evolve with the legal landscape. A common vulnerability exposed during an OPC investigation is outdated policies that have not kept pace with legislative changes or new interpretations of the law. As a defensive measure, conducting a regular gap analysis is essential, particularly with major reforms like the proposed Bill C-27 (the Consumer Privacy Protection Act or CPPA) on the horizon.

A gap analysis involves a systematic, side-by-side comparison of your current policies, procedures, and contracts against the requirements of a new or upcoming law. This allows you to identify deficiencies and create a remediation plan. Bill C-27, for instance, maintains many core PIPEDA principles but introduces a significantly more punitive enforcement regime, including substantial administrative monetary penalties. Your analysis should focus on areas where the risk profile has changed, even if the underlying principle has not.

The following table illustrates how a gap analysis can map current standards against proposed changes, highlighting where your procedural focus needs to be.

PIPEDA vs. Bill C-27 (CPPA): Key Enforcement Changes
Element Current PIPEDA Proposed CPPA (Bill C-27)
RROSH Definition Real Risk of Significant Harm Same threshold maintained
Significant Harm Open-ended list including bodily harm, humiliation, financial loss Same open-ended list retained
Reporting Threshold Reasonable to believe RROSH exists Same standard
Enforcement Limited monetary penalties Enhanced penalties framework

While the substantive thresholds like RROSH may remain the same, the shift in the enforcement column from “Limited monetary penalties” to “Enhanced penalties framework” under the proposed CPPA is the critical takeaway. This means that existing procedural weaknesses carry a much higher financial risk. A gap analysis, conducted under legal privilege, allows you to identify and rectify these weaknesses before they become the subject of an investigation under a much harsher regime. It is a proactive step that demonstrates a forward-looking and serious approach to compliance.

Key Takeaways

  • Treat any OPC notice as a formal legal proceeding, not an informal inquiry.
  • Your primary goal is to control the narrative and scope of the investigation through meticulous, defensive documentation.
  • Accountability is non-delegable; you remain responsible for data transferred to third parties, requiring strong contractual safeguards.

How to Appeal an Administrative Monetary Penalty (AMP) from a Regulator?

While preparing a defense for the current investigation is the immediate priority, a strategic legal approach also involves understanding the endgame. This includes knowing the potential penalties and the process for an appeal. Under the current regime, PIPEDA’s enforcement powers are limited. As per current PIPEDA enforcement provisions, businesses can be fined up to $100,000 CAD for specific violations, such as failing to report a breach, but the OPC cannot issue these fines directly for general non-compliance.

However, the legal landscape is on the verge of a dramatic shift. As outlined in a recent analysis by Harris & Co., proposed reforms would create administrative monetary penalties up to $10 million or 3% of global revenue. This transforms the financial risk of non-compliance from significant to existential for many organizations. This future state must inform your present-day strategy. The rigour you apply to your current investigation file is not just about resolving the complaint; it is about building a record that could withstand scrutiny in a future, higher-stakes appeal process.

The process for appealing an Administrative Monetary Penalty (AMP), once implemented, will be a formal legal proceeding. It will likely involve a review by a designated tribunal or court. The success of such an appeal will hinge entirely on the quality of the administrative record created during the initial investigation.

Professional legal team preparing appeal documentation in law office

Every procedural step you take now—documenting your RROSH assessment, justifying access request refusals, maintaining your breach log—contributes to this future appeal record. An appeal is not an opportunity to introduce new evidence or arguments. It is typically a review of whether the regulator’s decision was reasonable based on the information before them at the time. Your job, starting today, is to ensure that the record the OPC builds is one that you have shaped, controlled, and populated with a robust, defensible rationale for your actions.

Understanding the consequences is paramount. Reviewing the mechanics of the appeal process provides a complete strategic picture.

The most effective way to manage a regulatory investigation is to prepare for it before the notice arrives. A thorough, privileged review of your current privacy management framework is the critical next step to ensure you are not just compliant, but defensible.

Frequently Asked Questions on PIPEDA Compliance

Can organizations withhold some information in access requests?

Yes, PIPEDA Section 9(3) allows withholding confidential commercial information, trade secrets, and information that could harm another individual’s privacy. However, the refusal must be justified, documented, and communicated to the requestor.

What constitutes ‘confidential commercial information’ under PIPEDA?

This refers to information with economic value that is derived from it not being generally known. Examples include proprietary processes, confidential customer lists, and strategic business plans. The information must also be consistently treated as confidential by the organization.

How should organizations document withheld information?

It is a best practice to maintain an internal exemption log. For each piece of information withheld from an access request, this log should document the specific PIPEDA provision relied upon for the exemption and the rationale for its application.

Written by Evelyn Chen, Technology, Privacy, and Intellectual Property Counsel operating out of the Waterloo Region tech hub. Specialises in digital law, SaaS contracts, and data protection compliance under PIPEDA and Bill C-25.