CAP Solutions
Frequently Asked Questions
Get answers to common questions about our CAP Solutions implementation and benefits
The Privacy Breach Readiness, Detection, and Response
Playbook is a structured Compliance Action Pack built for
Ontario provincial institutions under FIPPA and municipal
institutions under MFIPPA. It is not a high level policy
summary. It is an operational guide aligned with the
expectations of the Information and Privacy Commissioner
of Ontario. Its purpose is practical: to clarify who does
what, which decisions must be made, what must be recorded,
and which artifacts must exist to defend the response.
Regulators assess process as much as outcomes, so a breach
response must be documented, organized, and repeatable.
The playbook is designed for real world conditions.
Breaches rarely unfold in calm, fully staffed
environments. They occur with incomplete information, time
pressure, and public scrutiny. This framework assumes that
reality and provides a phased structure that supports fast
containment, defensible risk assessment, and regulator
aligned notification and reporting. In short, it
transforms breach response from improvised reaction into
disciplined governance.
Many breach plans fail because they are written for ideal
conditions. They assume complete facts, available staff,
and ample time for reflection. In reality, breaches often
emerge on weekends, during staffing gaps, or in the middle
of media attention. Facts are partial, systems are
unstable, and leaders need answers quickly. A common
weakness is vagueness. Plans that do not name specific
roles, alternates, and escalation paths leave teams
uncertain about authority and responsibility. Another
failure point is documentation. If institutions cannot
demonstrate how decisions were made, especially around
risk and notification, they may struggle to defend their
actions before the IPC. The playbook addresses these gaps
directly. It defines roles, escalation trees, evidence
preservation procedures, and structured decision tools. It
emphasizes opening a breach file immediately and recording
each step. By building a phased response that works with
partial information, the framework reduces decision
latency and ensures compliance even under pressure.
The IPC expects institutions to have a documented breach
plan that clearly defines governance. That means named
roles, alternates, contact methods, and escalation
procedures. A plan without assigned accountability is not
operational. The playbook centers responsibility with the
Privacy Officer or FOI and Privacy Coordinator as breach
lead. This individual activates the team, initiates
containment, oversees the real risk of significant harm
determination, manages notification timing and content,
reports to the IPC without delay, and ensures
documentation and remediation tracking. The IT and
cybersecurity lead owns containment and forensics. Program
leads provide context about the data involved and affected
individuals. Communications prepares public messaging. HR
manages workforce related incidents. Legal advises on
privilege and coordination with law enforcement. Vendor
leads ensure contractual notice obligations are enforced.
An executive sponsor confirms resources and approvals.
This defined structure ensures that each function
understands its mandate, reducing confusion and
strengthening defensibility.
The first hours are critical. The guidance is clear: do
not wait for a full investigation to begin containment.
Preliminary assessment must start as soon as possible.
Institutions should immediately open a breach file with a
unique identifier, record the time of discovery, the
reporter, the system involved, and the initial
description. Early documentation demonstrates diligence
and supports later reporting. Simultaneously, IT must
identify affected systems, stop ongoing unauthorized
access, isolate compromised environments, reset
credentials where needed, and preserve logs and evidence.
Containment and preservation occur in parallel. The team
should document what personal information is likely
involved, how many individuals may be affected, and
whether data was accessed, encrypted, exfiltrated, or
exposed. Even if facts are incomplete, recording
assumptions and updates shows disciplined process. These
early actions stabilize the situation, reduce harm, and
position the institution for a defensible risk assessment.
The determination of real risk of significant harm is
central under FIPPA and strongly recommended under MFIPPA.
The playbook provides a structured worksheet to guide this
decision. The assessment considers four core dimensions.
First, sensitivity of the personal information, including
whether the context increases risk. Second, probability of
misuse, including whether data was merely exposed or
actually accessed, exfiltrated, or posted. Third,
potential harms such as identity theft, financial loss,
humiliation, or reputational damage. Fourth, mitigation
capacity, meaning what steps individuals or the
institution can take to reduce risk. The guidance also
prompts analysis of data combinations. Multiple elements
together may elevate risk, especially if they can be
linked with public sources. Most importantly, the decision
must be documented. Regulators will expect to see
reasoning, not just conclusions. A structured, written
assessment protects the institution by demonstrating that
the determination was thoughtful, evidence based, and
aligned with regulatory expectations.
Direct notice to affected individuals is the preferred
method. It ensures clarity and supports trust. However,
indirect notice may be appropriate in specific
circumstances. These include situations where identities
cannot be determined despite reasonable efforts, contact
information is unreliable, direct notice would
unreasonably and significantly interfere with operations,
direct notice may cause harm, very large numbers make
direct notice impractical, or where voluntary notification
is being considered for low risk situations. When indirect
notice is used, it should not be minimal. The playbook
recommends multiple communication channels reasonably
expected to reach affected individuals. These may include
website notices, posters, newspapers, social media,
broadcast media, news releases, and community meetings or
webinars. Timing remains critical. Notice must be provided
as soon as feasible following confirmation of a breach
that meets the real risk threshold. Even with indirect
methods, clarity, accessibility, and completeness of
content are essential to meeting IPC expectations.
A compliant notice must be clear, plain language, and
complete. The playbook provides a checklist to ensure
consistency. The notice should include the date of the
notice and sufficient detail for individuals to understand
what happened, when it occurred, what personal information
was affected, and how it was compromised. It must explain
potential risks and what the institution has done to
contain and reduce harm. It should also outline practical
steps individuals can take to protect themselves, such as
monitoring accounts or changing credentials. Institutional
contact information for questions and assistance must be
included. Under FIPPA, the notice must state the
individual’s right to complain to the IPC, include
information on how to do so, and reference the one year
complaint window. The IPC mailing address must also be
provided. Careful attention to content protects
individuals and demonstrates compliance with statutory
obligations.
Reporting to the IPC should occur as soon as feasible
after determining that a breach involving real risk of
significant harm has occurred. The guidance emphasizes
that reporting should not be delayed simply because all
details are not yet known. Institutions are encouraged to
submit an initial report and provide updates as additional
information becomes available. This demonstrates
transparency and cooperation, both of which are regulatory
expectations. For large scale notifications, the IPC
strongly recommends reporting before public notification
so that the Commissioner’s office can help refine the
notification plan. This collaborative approach reduces the
risk of deficiencies in public messaging. The playbook
also prompts consideration of other authorities, such as
law enforcement, professional regulators, technology
suppliers, or the Canadian Centre for Cyber Security in
cyber incidents. Prompt, structured reporting signals
maturity and reinforces institutional credibility.
Regulators assess process as well as outcome.
Documentation proves that containment was timely, risk was
assessed carefully, and decisions were justified. The
playbook includes intake forms, risk worksheets,
investigation outlines, remediation trackers, and evidence
preservation procedures covering logs, emails, tickets,
and vendor notices. Remediation is equally critical.
Breaches often expose systemic weaknesses. The IPC expects
corrective action such as tightening access controls,
strengthening authentication, improving monitoring,
confirming retention schedules, and enhancing vendor
oversight. Addressing root causes demonstrates
accountability. Tabletop exercises reinforce readiness. By
simulating scenarios in real time, teams practice
escalation, documentation, and decision making under
pressure. Exercises should be treated as real, time
sensitive events, using actual tools and escalation paths.
Lessons learned must be logged and addressed. Together,
documentation, remediation, and exercises convert
compliance from theory into sustained operational
capability.
The Compliance Action Pack converts regulatory
expectations into a ready to deploy, role based, evidence
driven breach response system. Instead of drafting
procedures from scratch, institutions receive structured
templates, decision tools, reporting checklists, and
scenario exercises aligned with IPC expectations. This
reduces uncertainty during active incidents, shortens
decision cycles, and strengthens defensibility. It also
supports consistent documentation, which is essential
during IPC reviews and audits. Institutions benefit from
improved clarity around notification thresholds, indirect
notice conditions, reporting obligations, and annual
recordkeeping requirements. Most importantly, it
strengthens public trust by ensuring affected individuals
receive timely, accurate, and helpful information. For
organizations wishing to go with the lowest effort option
possible, our certified Risk Advisors are standing by to
assist with the deployment of the Compliance Action Pack,
official validation of the results and professional
project management. This managed service also includes
team and stakeholder training. A signed attestation, the
Statement of Trust™, is provided to officially demonstrate
alignment with the guidance where required by third
parties and other organizations.
Ready to Get Started?
Receive the CAP™ directly to your inbox.
Choose Your Solution
Compare our two comprehensive approaches to CAP compliance and risk management
| Features | Free CAP Guidance | Managed Compliance Verification |
|---|---|---|
| Initial Risk Assessment | Basic self-assessment tools | Comprehensive professional assessment |
| Documentation Templates | Standard templates provided | Customized documentation suite |
| Compliance Monitoring | Not included | Ongoing monitoring & alerts |
| Expert Support | Email support only | Dedicated account manager |
| Training & Workshops | Not included | Regular training sessions |
| Audit Preparation | Not included | Full audit preparation support |
| Get Started | CAP™ Self-Assessment | Pro Support & Audit |