PIPEDA — the Personal Information Protection and Electronic Documents Act — is Canada’s federal privacy law. It applies to most businesses in BC that collect, use, or disclose personal information in the course of commercial activities. For small businesses, the requirements are often misunderstood: too many think it doesn’t apply to them, and others over-comply because they don’t know what’s actually required.
Here’s a practical breakdown of what PIPEDA requires of BC small businesses, what your IT provider should handle, and how to demonstrate compliance if questioned.
Does PIPEDA apply to your business?
PIPEDA applies to your business if you collect, use, or disclose personal information in the course of commercial activities, except where a substantially similar provincial law applies. In BC, the Personal Information Protection Act (PIPA) applies to most provincially-regulated businesses, but PIPEDA still applies to:
- Federally-regulated businesses (banks, telecom, transportation, broadcasting)
- Personal information that crosses provincial or international borders
- Personal information from outside BC
For practical purposes, most BC small businesses should treat themselves as subject to BC PIPA, with PIPEDA applying to specific data flows. The compliance requirements are similar.
The 10 fair information principles
Both PIPEDA and BC PIPA are built around 10 fair information principles. Your business needs to:
- Be accountable for personal information under your control
- Identify the purposes for collecting personal information
- Obtain consent before collecting, using, or disclosing personal information
- Limit collection to what’s necessary
- Limit use, disclosure, and retention
- Keep personal information accurate
- Apply security safeguards proportionate to sensitivity
- Be open about your privacy policies and practices
- Allow individuals access to their personal information on request
- Provide a way for individuals to challenge compliance
What your IT provider should handle (technical safeguards)
Principle 7 — security safeguards — is where IT providers carry most of the responsibility. Specifically:
- Access controls: Personal information should only be accessible to staff who need it for their role. Implemented via Active Directory groups, M365 sensitivity labels, or similar.
- Encryption at rest and in transit: Disk encryption on all devices (BitLocker, FileVault), encrypted email for sensitive communications, TLS for all web traffic.
- Audit logging: Track who accessed what data and when. Required for breach investigation and demonstrating control.
- Backup and recovery: Personal information must be retained per your retention policy and recoverable in case of disaster.
- Secure disposal: When personal information reaches end-of-retention, it must be securely deleted (not just sent to the recycle bin).
- Breach detection: Modern endpoint detection and email security tools to identify potential data breaches before they become reportable incidents.
- Multi-factor authentication: On all systems containing personal information.
- Documented incident response procedures: A written plan for what happens during a suspected data breach.
What you (the business owner) need to handle
- Privacy Policy: A written privacy policy describing what data you collect, why, who you share it with, and how individuals can access it. Published on your website.
- Privacy Officer designation: Someone in your business is responsible for compliance. For most small businesses, this is the owner.
- Consent: Get appropriate consent for collecting personal information. The required level depends on the sensitivity.
- Staff training: Ensure your team understands their privacy obligations.
- Breach notification readiness: Under PIPEDA, you must report breaches that pose “real risk of significant harm.” Know your obligations.
How to demonstrate compliance
If a privacy complaint or audit happens, you’ll need to demonstrate that you have appropriate safeguards. The documentation that helps:
- Written privacy policy (public)
- Internal privacy procedures document
- Documentation of your IT security controls (your IT provider can produce this)
- Audit logs from your systems showing access controls in place
- Records of staff privacy training
- Incident response plan
This documentation should be reviewed annually.
The bottom line
Most BC small businesses can be PIPEDA/PIPA-compliant with a moderate amount of effort, primarily on the IT and policy side. The technical safeguards are not exotic — they’re largely the same security controls every business should have anyway.
If you’d like to assess your current PIPEDA compliance posture, our free 30-minute consultation covers this. We’ll review your current controls and identify gaps relative to PIPEDA/PIPA requirements.