Working Remotely (PDF, 395 KB)
Working Remotely: Access to Information, Protection of Privacy, and Records Management
Now more than ever before, large numbers of Queen鈥檚 employees are working remotely. Some may find difficulty in completing tasks they used to do with ease in the past, in part due to new and different work environments. The shift to a remote environment may necessitate using non-university resources such as private internet connections, personal telephones, and home computers.
The ability of the Queen鈥檚 community to adjust to this new work reality is laudable and shows employees鈥 adaptability, resourcefulness, and commitment. What may not be top of mind is employees鈥 continued recordkeeping responsibilities, ensuring that records documenting university decisions and actions are created and retained, and that information is properly managed at all times. Good recordkeeping is accomplished by being forward-thinking and by using the correct tools in an appropriate manner.
In accordance with the (FIPPA), Queen鈥檚 has a continued obligation of transparency and accountability to the Queen鈥檚 community and the general public who all have a fundamental right to access the university鈥檚 general records and their own personal information.
Employees must ensure they take adequate measures to preserve the university鈥檚 records and information by working conscientiously and following the practices below.
Avoiding a privacy breach
The change in work routines not only raises concerns about maintaining employee effectiveness and productivity, but also risks the potential of a privacy breach if physical and digital environments at home are not as secure as the ones provided to employees at their office. Queen鈥檚 University employees handle a wide array of personal, health, and other confidential information, and must do their utmost to ensure that their remote work environments offer the same level of protection as their work environments on campus.
If a breach of privacy occurs or is suspected, read and follow the privacy breach protocol and contact the Chief Privacy Officer as soon as possible.
PRIVACY BREACH PROTOCOL
If a privacy breach occurs, take immediate action.
-
CONTAIN: stop or contain the breach if you can
-
REPORT: to your immediate supervisor, the unit or department head, and the Chief Privacy Officer at access.privacy@queensu.ca who will assist with the next steps
-
INVESTIGATE: use the step-by-step Privacy Breach Report Form (to be provided by the Chief Privacy Officer) to collect information and address the breach
Maintaining privacy and confidentiality
Queen鈥檚 University is subject to various regulatory and policy-driven requirements regarding privacy and confidentiality of information, including the (FIPPA), the (PHIPA), the Electronic Information Security Policy Framework, and the Records Management Policy. These requirements must continue to be met by Queen鈥檚 employees who are working remotely.
Remote workers are required take all reasonable steps to secure and maintain the confidentiality of Queen鈥檚 University information and records while they are being transported to and from an employee鈥檚 off-site workspace, and while the documents are stored at the off-site workspace no matter if the information is in physical or digital format. Records and information must be protected from being damaged, destroyed, stolen, copied, or otherwise accessed by unauthorized individuals.
-
When remotely accessing records and information it is essential that employees use the Queen's Campus Virtual Private Network (VPN). The Queen鈥檚 VPN (Fortinet FortiClient) is a safe and easy way to ensure a secure, remote internet connection to on-campus resources.
-
Any device (such as a laptop, desktop, cellphone) used to perform university business must be encrypted. This includes personal devices such as a personal cellphone or home computer. . Ensure that 鈥淔ind my Device鈥 is enabled or that the 鈥淔ind My鈥 app is installed so that in the event of a theft, the device can be located, locked, or erased remotely.
-
Queen鈥檚 employees working remotely must not allow anyone else, such as a spouse or child, to use devices that contain work-related documents. In addition to being encrypted, devices must be password protected and those passwords are not to be shared with others, including family members. Screens should be set to lock when not in use. Employees should also be conscious of the visibility of their screen to other people in the remote workspace when accessing confidential university records and information.
-
With respect to hard-copy documents, employees must be careful about who can view them during the day, and store them away in a box or file folder when not in use. At the end of the day, lock them away in a cabinet or closet if possible.
-
When destroying transitory records, employees must take measures appropriate to the medium. Digital records may simply be deleted, while non-confidential hardcopy records may be recycled. Ensure that confidential hardcopy documents are shredded using a cross-cut shredder. If such a shredder is not available in the remote workplace, return confidential documents to campus for appropriate disposal using university vendors or facilities. Review the Data Classification Standard to ensure documents you are intending to dispose of are destroyed appropriately.
-
For disposal of official records, ensure they are eligible for disposal by referring to the Queen鈥檚 University or contact the Records Manager for assistance.
Teleconferencing and video conferencing
When taking part in a teleconference or video conference, employees should maintain an awareness of the confidentiality of those meetings, classes, or events. Consider whether it is possible for others in the remote workplace to overhear confidential conversations. Whether you are the host or a participant, take note of these tips for enhancing confidentiality.
-
Be mindful that while many devices have video capability, some individuals may prefer to participate using voice only, or to obscure the background of their meeting space.
-
Unless there is a compelling reason to do so, avoid taking screenshots or video or audio recordings of meetings, classes, or events. Such images and recordings become records and require proper management and storage. Furthermore, they may become subject to an access to information request.
-
If recording or taking a screenshot is desirable, give participants notice in advance. Some tools such as Microsoft Teams automatically notify participants when a meeting is being recorded. The notice should also be repeated at the beginning of the recording to document the notice and to state the purpose of the recording by the person who intends to record.
-
If a recording is made, it should be retained no longer than necessary and deleted after its purpose has been met (e.g., after meeting minutes have been created). Recordings leave a variety of indicators as to their creation, existence, and, depending upon the technology used, even their deletion.
If teleconferencing or video conferencing is used to facilitate student advising or other kinds of medical or counselling activities, it is essential that privacy is maintained. Employees must ensure their work environment is private, and that the use of any recording technology will be done only with consent. Consent must be documented. Furthermore, only secure platforms may be used. See the resources listed below and seek guidance from IT Services if you are unsure about which platform to use.
Privacy and Remote Teaching & Learning.
For information about confidentiality and privacy in the remote classroom, see the fact sheet onCreating and managing university records
As university employees work remotely, more university business is being handled using a variety of technologies that document our efforts, including email, chat logs, text messaging, and virtual meetings. While some records may be created with intent, some tools create ancillary records, leaving 鈥渄igital tracks鈥 of the work employees do. While some of these tracks are useful, others are transitory fragments that add up to very little. When using online tools, employees must realize that their text conversations, recordings, and even sharing of files could become matters of public record.
-
Chat messages in the Posts tab of a Teams space, or as a message in a Teams or Zoom meeting, are no different than email messages in that they are in fact records. While messaging is often less formal and more fluid than email, the messages, when they relate to university business, are university records.
-
The language and conduct of the chat should always be professional. Additionally, these messages may need to be preserved if they contain substantial decisions or other university business.
-
If messages are transitory and are deleted after they have been read there is still often evidence of this deletion, so be mindful of what is put into a chat and be aware that the deletion itself is visible and can look questionable even if the content was benign.
-
In some instances, it may be desirable to connect with your colleagues via a phone call or a video meeting rather than use messaging functions especially when dealing with the personal information of students.
-
Be mindful that some of what is communicated using these various tools may need to be produced as evidence of decisions or actions taken, or to satisfy legal inquiries or access to information requests.
FIPPA applies to records in the custody or under the control of an institution. Emails, chats, texts, and other communication sent or received for business purposes, even those sent using personal accounts, have been found by Ontario鈥檚 Information and Privacy Commissioner to be under an institution鈥檚 control for the purposes of FIPPA and therefore required to be disclosed. Accordingly, always use these tools mindfully.
When employees return to campus after a period of remote work it is crucial that the documents they removed from their office be returned and that any records created while working remotely are filed in their unit鈥檚 recordkeeping systems, both hardcopy and digital.
Access to information rights
Employees must be mindful that Queen鈥檚 University has a legal obligation to provide access to information and ensure reasonable measures are in place to document and preserve records, and that this obligation continues to apply to all employees who are working remotely.
- All work-related records continue to be subject to , regardless of whether they are retained on Queen鈥檚-issued or personal computing and storage devices.
- Employees should continue to use established records management practices and file records in Queen鈥檚 recordkeeping systems.
- When working remotely employees must digitize or transfer all business records to work-related systems and repositories as soon as possible to allow for improved access controls and security to be applied to the records.
- Employees must appropriately back up business records when using personal computing and storage devices if files are not retained in Queen鈥檚 IT Services-supported storage spaces such as the departmental shared drive or an MS 365 cloud tool like SharePoint.