Log In

Reset Password
BERMUDA | RSS PODCAST

Why we need privacy legislation

First Prev 1 2 3 Next Last
Julie McLean is a director at Conyers

In a four-part series, Conyers will be diving into different topics relating to Bermuda’s privacy legislation, including: how do we prepare for the Personal Information Protection Act, the role and requirements of privacy officers and what are our rights as individuals? In this first article, Conyers provides an introduction to Pipa, why we need it and what is its purpose

Andrew Barnes is an associate at Conyers
Sarah Blair is an associate at Conyers

In recent years, privacy and data protection are hot topics. It’s not difficult to see why: as technology has evolved, so has the way that organisations store, use and process our data and personal information. Sometimes a company’s use of personal data is straightforward and transparent: a company takes and stores a customer’s information for the purpose of processing their sales order. But what of the times when their use is more opaque? Or when the data collected is far broader than what you expect or is not proportionate to what the company actually needs? What of data breaches, when our details are accessed by a hacker? Or where it is inaccurate?

Beyond the practical issues, there is also the moral and philosophical: is the use of our data helpful or harmful? Take the use of data to improve targeted advertising as an example. Perhaps it speeds up our shopping experience and helps us find exactly what we’re looking for (helpful), or does it instead manipulate our choices, our autonomy, and serve the company’s wants rather than our own (harmful)?

It is in this context that countries around the world have developed and implemented data and privacy legislation. Bermuda is no exception: in 2016 it passed the Personal Information Protection Act — commonly referred to as Pipa — although its substantive provisions are yet to come into force.

Generally, privacy legislation — Pipa included, when it comes into force — seeks to, on the one hand, respect an organisation’s legitimate purposes for the data, while setting parameters for how companies should store, use and protect it, and, on the other hand, empower individuals to know how their data is being processed and used, by whom and why, and to take certain actions in respect of it.

To properly protect data, you need both “data privacy” and “data security”. Even though these two terms look similar, they are different. “Data privacy” focuses on the rights of individuals in respect of their personal data, including the purpose of data collection and processing, and the way organisations handle, store and use the personal data. “Data security” relates to protecting the data: implementing safeguards in order to prevent any third party from unauthorised access to the data, or any intentional or unintentional alteration, deletion or disclosure thereof. This includes preventing malicious attacks and the exploitation of stolen data — data breaches or cyberattacks such as the theft of data that led to the Paradise Papers. Pipa is primarily designed to ensure data privacy, although it does place an obligation on organisations to ensure the data they collect is kept secure.

As noted, one of the primary purposes of Pipa is to protect the privacy of individuals with respect to their personal information in the custody or control of institutions. Pipa does not define privacy explicitly, but rather defines “personal information” and sets out privacy rules for institutions to follow for the collection, use, disclosure, maintenance, retention, security and disposal of personal information. “Personal information” is broadly defined and means “any information about an identified or identifiable individual” — ie, a natural person, whether they are explicitly identified by name or where their identity is identifiable from a piece of information, such as their social insurance number. Pipa also deals with “sensitive personal information”, meaning “any personal information relating to an individual’s place of origin, race, colour, national or ethnic origin, sex, sexual orientation, sexual life, marital status, physical or mental disability, physical or mental health, family status, religious beliefs, political opinions, trade union membership, biometric information or genetic information”. Sensitive personal information is, understandably, subject to greater obligations and restrictions.

To understand how Pipa is to be used, it is helpful to think about its general underlying principles. These are that personal information shall be:

• Used fairly and lawfully

• Used for limited specified purposes

• Adequate, relevant and not excessive in relation to the purpose or purposes for which it is used

• Accurate and, where necessary, kept up to date

• Not be kept for longer than is necessary for its use

• Used in accordance with the rights of individuals

• Kept securely

• Transferred to third parties, including international transfers, only where there is a comparable level of protection

These principles are aimed at ensuring transparency, accuracy, proportionality and security in respect of an organisation’s use of personal information in Bermuda, while providing a level of personal autonomy and control to individuals in respect thereof.

Now we understand the context and purpose of Pipa, the next part in this series will consider what organisations the legislation applies to and what organisations can do to prepare for it.

Julie McLean is a director at Conyers, while Andrew Barnes and Sarah Blair are associates. This article is not intended to be a substitute for legal advice or a legal opinion. It deals in broad terms only and is intended merely to provide a brief overview and give general information. If you would like to obtain legal advice on Pipa, please contact the Conyers team

You must be Registered or to post comment or to vote.

Published January 25, 2022 at 7:58 am (Updated February 28, 2022 at 2:00 pm)

Why we need privacy legislation

What you
Need to
Know
1. For a smooth experience with our commenting system we recommend that you use Internet Explorer 10 or higher, Firefox or Chrome Browsers. Additionally please clear both your browser's cache and cookies - How do I clear my cache and cookies?
2. Please respect the use of this community forum and its users.
3. Any poster that insults, threatens or verbally abuses another member, uses defamatory language, or deliberately disrupts discussions will be banned.
4. Users who violate the Terms of Service or any commenting rules will be banned.
5. Please stay on topic. "Trolling" to incite emotional responses and disrupt conversations will be deleted.
6. To understand further what is and isn't allowed and the actions we may take, please read our Terms of Service
7. To report breaches of the Terms of Service use the flag icon