SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
ROGERS COMMUNICATIONS
REQUESTS FOR CUSTOMER INFORMATION |
2013
TRANSPARENCY
REPORT
ROGERS COMMUNICATIONS2013 TRANSPARENCYREPORT| 1
As a communicationscompany, governmentandlaw enforcementagenciesapproachRogerslookingfor
informationaboutourcustomers.Thisreportisdesignedtoprovide more detailsonthe numberandtypesof
requestswe receivedin2013.
We fullycomplywithCanadianprivacylaw andtake active stepstosafeguardourcustomers’information. Atthe
same time we are compelledbylaw torespondtofederal,provincialandmunicipal governmentandlaw
enforcementagencieswhentheyhave alegallyvalidrequest–like asearch warrantor court order.
The requestswe receive are torespondtowarrantsand ordersfrom law enforcementagencies. Inaddition,we
receive requestsfromgovernmentdepartmentswhoare authorizedtorequestinformationtoenforce lawslike
the Income Tax Act.We alsoassistpolice servicesinemergencylife threateningsituations.
Abouthalf of the requestswe receive are toconfirma customer’sname andaddress,whichwe respondtoso
police donotissue a warrant to the wrongperson.Otherwise,we onlyprovide customerinformationwhen
forcedby law or inemergenciesafterthe requesthasbeenthoroughlyvetted.If we consideranorderto be too
broad,we push back and,if necessary,goto court to oppose the request.
Our customers’privacyisimportanttous andthat is whywe are issuingthisreport.We believe more
transparencyishelpful andencourage the Governmentof Canadatoissue itsownreporton these requests.
Sincerely,
KenEngelhart
Chief PrivacyOfficer
Canadianlaw governshow we protectprivate customerinformationandhow governmentandlaw enforcement
agenciescancompel usto provide itto them:
> The Criminal Codeand otherlawsallow governmentandlaw enforcementagenciestorequire usto
provide customerinformation.
> The PersonalInformation Protection and ElectronicDocumentsAct(PIPEDA) coversbothhow we
protectcustomers’informationandhow we discloseit.
> The CRTC ConfidentialCustomerInformationRules(CRTCRules) setoutcircumstancesunderwhich
customerinformation–otherthanname,addressand listednumbers,whichcanalwaysbe
provided–may be disclosedtothirdpartiesincludinglaw enforcementagencies.
Our PrivacyPolicyandTermsof Service outline how we safeguardcustomers’informationundertheselawsand
rules.We onlygive outprivate customerinformationwhenrequiredbylaw orin emergenciesandafterthe
requesthasbeenthoroughlyvetted.See Type of Requestsbelow andourFrequentlyAskedQuestions(FAQs) for
more information.
INTRODUCTION
WHY AND HOW WE RESPOND
ROGERS COMMUNICATIONS2013 TRANSPARENCYREPORT| 2
The statisticsbelow representthe total numberof requestswe receivedlastyear.If we consideranorderto be
too broad,we pushback and, if necessary,gotocourt to oppose the request.
Customername/addresschecks 87,856
Court order/ warrant 74,415
Governmentrequirementletter(compelledtoprovide underafederal/provinciallaw) 2,556
Emergencyrequestsfrompolice inlife threateningsituations 9,339
Childsexual exploitationemergencyassistance requests 711
Court orderto complywithaninternational Mutual Legal Assistance Treatyrequest 40
Total 174,917
Notes:
1. These statistics include the following scenarios: (a) The information requested was provided; (b) Partial information was provided; (c) No information was provided
because it doesn’t exist or the person is not a Rogers customer; and (d) We rejected the request or successfully fought it in court.
2. These statistics do not include informal requests such as phone calls from law enforcement looking for information they would require a warrant for. These requests are
rejected because there is no legal authority and no formal response is provided
1. Customername/address checks:
Legal authority: PIPEDA and CRTC Rulespermitconfirmingbasicinformationlike name,addressandlisted
phone number. Details:These requestsare toconfirma customer’sname andaddress,whichwe respondtoso
police donotissue a warrant to the wrongperson. Examplesofinfo provided:Whenprovidedwithaname and
addresswe will confirmwhetherornotthe personisa Rogerscustomerandwhenprovidedwithalistedphone
numberwe’ll provide the name andaddressof a customer.IPaddressisnotprovided.
2. Court order/warrant:
Legal authority: Issuedunderthe CriminalCodeor otherlaws.Details:A court order or warrantincludes
productionorders,summons,subpoenasandsearchwarrantsissuedbyajudge or otherjudicial officer.It
compelsusto provide customerinformationtopolice orotherauthoritiesortoattendcourt to provide
evidence/testimonyaboutcustomerinformation. Examplesofinfoprovided:Customeraccountinformationlike
name and address, paymenthistory,billingrecords,orcall records.
3. Governmentrequirementorder:
Legal authority: Issuedunderlawssuchas the CustomsAct or Income Tax Act. Details:An orderthat compelsus
to provide customerinformationtothe requestingagency. Examplesofinfoprovided:Customeraccount
informationlikepaymenthistory,billingrecords,orcall records.
4. Emergencyrequestsfrom police in life threateningsituations:
Legal authority: The Criminal Codeand PIPEDA.Details:We assistpolice servicesinemergencylife threatening
situationssuchasmissingpersonscasesandindividualsindistress.Examplesofinfoprovided:Helpinglocate
someone withacell phone andprovidingcontactdetailsforsomeone whohascontactedemergencyservices
and maybe unable tocommunicate.
5. Childsexual exploitationemergencyassistance requests:
Legal authority: The Criminal CodeandPIPEDA.Details:We assistpolice duringchildexploitation
investigations.Examplesofinfoprovided:Confirmingacustomer’sname andaddresswhenprovidedwithanIP
addresssothat police can geta search or arrest warrantto stop the sexual exploitationof achild.
BREAKDOWN OF 2013 REQUESTS
WE RECEIVED SIX TYPES OF REQUESTS
ROGERS COMMUNICATIONS2013 TRANSPARENCYREPORT| 3
6. Court order to comply with a Mutual Legal Assistance Treaty request:
Legal authority: IssuedunderMutualLegalAssistancein Criminal MattersAct. Details:We don’trespondto
requestsfromforeignagencies,butwe doadvise themtohave theircountry’sjustice authoritycontactthe
Departmentof Justice Canada.If that countryhas a treatyor conventionwithCanada,the requestisprocessed
by Canadianauthoritiesandanordermaybe issuedbya Canadiancourtto gather evidence.We’re compelledto
provide customerinformationtothe police orotherauthorityinCanadaconductingthe investigation.Examples
of infoprovided:Customeraccountinformationlike paymenthistory,billingrecords,orcall records.
1. Whichagencieshave requestedinformation?
We getrequestsfrommanydifferentagencies,including:
> Federal agencieslike the Royal CanadianMountedPolice,CanadianSecurityIntelligence Service, Canada
BorderServicesAgency,andCanadaRevenue Agency
> Provincial andmunicipal agencieslike police forcesandcoroners
2. Do you provide metadata or direct access to customer databases?
No,we do not provide metadatawithoutawarrant,or directaccessto our customerdatabases.We only
provide the informationwe are requiredtoprovide andthisinformationisretrievedbyourstaff.
3. How many timesdid you provide info?Do you ever rejectlaw enforcementrequests?
Our statisticsrepresentthe total numberof requestswe receivedlastyear.If we consideranorderto be too
broad,we push back and,if necessary,goto court to oppose the request.
4. How much do you charge for requests?
For mostcourt-orderedresponsesforcustomerinformation,we assumeall costsassociatedwithprovidinga
response. Insome cases,we charge a minimal fee torecoverourcostsbasedon the work requiredtocomply
withrequests.
5. Do you fight for customers’privacy rights?
Absolutely, if we consideranorderto be too broad,we pushback and, if necessary,goto court to oppose the
request. Ourcustomers’privacyisimportanttous andthat’s whywe’re issuingthisreport. We believe more
transparencyishelpful andencourage the Governmentof Canadatoissue itsownreporton these requests.
6. How long do you keepcustomer information?
We onlykeepinformationforaslongas it’srequiredforbusinesspurposesoras requiredbylaw.Forexample,
we are requiredbylaw tokeepcustomerbillsforsevenyears. We don’tkeepourcustomers’communications
like textmessagesandemailsbecause ourcustomers’privacyisimportantandwe don’tneedthisinformation.
> Canada’s PersonalInformation Protection and ElectronicDocumentsAct
> Rogers’ Termsof Service andPrivacyPolicy
> PublicSafety Canada’s Annual Reportonthe Use of ElectronicSurveillance
FREQUENTLY ASKED QUESTIONS
HELPFUL LINKS

Weitere ähnliche Inhalte

Was ist angesagt?

The california consumer privacy act (ccpa) is in effect starting on january 1...
The california consumer privacy act (ccpa) is in effect starting on january 1...The california consumer privacy act (ccpa) is in effect starting on january 1...
The california consumer privacy act (ccpa) is in effect starting on january 1...RominaMariaBaltariu
 
Recognition:Colorado attorney general
Recognition:Colorado attorney generalRecognition:Colorado attorney general
Recognition:Colorado attorney generalHENRI & PARTNERS
 
Labor and Employment Roundtable Privacy Rights and Other Onboarding Issues
Labor and Employment Roundtable Privacy Rights and Other Onboarding IssuesLabor and Employment Roundtable Privacy Rights and Other Onboarding Issues
Labor and Employment Roundtable Privacy Rights and Other Onboarding IssuesPolsinelli PC
 
A Summary of Your Rights Under the Fair Credit Reporting Act
A Summary of Your Rights Under the Fair Credit Reporting ActA Summary of Your Rights Under the Fair Credit Reporting Act
A Summary of Your Rights Under the Fair Credit Reporting Act- Mark - Fullbright
 
Statement of Rights for Identity Theft Victims
Statement of Rights for Identity Theft Victims Statement of Rights for Identity Theft Victims
Statement of Rights for Identity Theft Victims - Mark - Fullbright
 
New TCPA Requirements for "Prior Express Written Consent" Effective October 16
New TCPA Requirements for "Prior Express Written Consent" Effective October 16New TCPA Requirements for "Prior Express Written Consent" Effective October 16
New TCPA Requirements for "Prior Express Written Consent" Effective October 16Patton Boggs LLP
 
Understanding SPAM Law Guidelines
Understanding SPAM Law GuidelinesUnderstanding SPAM Law Guidelines
Understanding SPAM Law GuidelinesBlueBird Strategies
 
Bark & Co Solicitors London: Deferred Prosecution Agreements
Bark & Co Solicitors London: Deferred Prosecution AgreementsBark & Co Solicitors London: Deferred Prosecution Agreements
Bark & Co Solicitors London: Deferred Prosecution Agreementshersfranklin
 
Identity theft- Horowitz Law
Identity theft- Horowitz LawIdentity theft- Horowitz Law
Identity theft- Horowitz LawSanford Horowitz
 
Identity Theft: Protecting Our Seniors
Identity Theft: Protecting Our SeniorsIdentity Theft: Protecting Our Seniors
Identity Theft: Protecting Our SeniorsGlennerCenters
 
62628156 affidavit againts bush family, sap, oracle, indian origen it companies
62628156 affidavit againts bush family, sap, oracle, indian origen it companies62628156 affidavit againts bush family, sap, oracle, indian origen it companies
62628156 affidavit againts bush family, sap, oracle, indian origen it companiesAdalberto Cervantes Rodriguez
 
Your rights-under-the-fcra
Your rights-under-the-fcraYour rights-under-the-fcra
Your rights-under-the-fcraResolvly LLC
 
Post,tweet, or chat! triple play handout
Post,tweet, or chat! triple play handoutPost,tweet, or chat! triple play handout
Post,tweet, or chat! triple play handoutJody O'Brien
 
Sj credit guide-and-privacy-consent-manual-docs-v2-dec-2020
Sj credit guide-and-privacy-consent-manual-docs-v2-dec-2020Sj credit guide-and-privacy-consent-manual-docs-v2-dec-2020
Sj credit guide-and-privacy-consent-manual-docs-v2-dec-2020GineeshJoseph1
 
The Bribery Act 2010 comes into force Bark & Co Solicitors - Specialist Fraud...
The Bribery Act 2010 comes into force Bark & Co Solicitors - Specialist Fraud...The Bribery Act 2010 comes into force Bark & Co Solicitors - Specialist Fraud...
The Bribery Act 2010 comes into force Bark & Co Solicitors - Specialist Fraud...Ascencion Axelquist
 
Instructions For Law Enforcement Submitting Request Under FCRA Section 609
Instructions For Law Enforcement Submitting Request Under FCRA Section 609Instructions For Law Enforcement Submitting Request Under FCRA Section 609
Instructions For Law Enforcement Submitting Request Under FCRA Section 609- Mark - Fullbright
 
Electronic Transactions Law - Lecture 5 : advertising and marketing
Electronic Transactions Law - Lecture 5 : advertising and marketingElectronic Transactions Law - Lecture 5 : advertising and marketing
Electronic Transactions Law - Lecture 5 : advertising and marketingCaroline B Ncube
 

Was ist angesagt? (20)

The california consumer privacy act (ccpa) is in effect starting on january 1...
The california consumer privacy act (ccpa) is in effect starting on january 1...The california consumer privacy act (ccpa) is in effect starting on january 1...
The california consumer privacy act (ccpa) is in effect starting on january 1...
 
Learn More About Canada's New Anti-Spam Law
Learn More About Canada's New Anti-Spam LawLearn More About Canada's New Anti-Spam Law
Learn More About Canada's New Anti-Spam Law
 
Recognition:Colorado attorney general
Recognition:Colorado attorney generalRecognition:Colorado attorney general
Recognition:Colorado attorney general
 
Labor and Employment Roundtable Privacy Rights and Other Onboarding Issues
Labor and Employment Roundtable Privacy Rights and Other Onboarding IssuesLabor and Employment Roundtable Privacy Rights and Other Onboarding Issues
Labor and Employment Roundtable Privacy Rights and Other Onboarding Issues
 
A Summary of Your Rights Under the Fair Credit Reporting Act
A Summary of Your Rights Under the Fair Credit Reporting ActA Summary of Your Rights Under the Fair Credit Reporting Act
A Summary of Your Rights Under the Fair Credit Reporting Act
 
Statement of Rights for Identity Theft Victims
Statement of Rights for Identity Theft Victims Statement of Rights for Identity Theft Victims
Statement of Rights for Identity Theft Victims
 
New TCPA Requirements for "Prior Express Written Consent" Effective October 16
New TCPA Requirements for "Prior Express Written Consent" Effective October 16New TCPA Requirements for "Prior Express Written Consent" Effective October 16
New TCPA Requirements for "Prior Express Written Consent" Effective October 16
 
Understanding SPAM Law Guidelines
Understanding SPAM Law GuidelinesUnderstanding SPAM Law Guidelines
Understanding SPAM Law Guidelines
 
CAN-SPAM at 4
CAN-SPAM at 4CAN-SPAM at 4
CAN-SPAM at 4
 
Bark & Co Solicitors London: Deferred Prosecution Agreements
Bark & Co Solicitors London: Deferred Prosecution AgreementsBark & Co Solicitors London: Deferred Prosecution Agreements
Bark & Co Solicitors London: Deferred Prosecution Agreements
 
Identity theft- Horowitz Law
Identity theft- Horowitz LawIdentity theft- Horowitz Law
Identity theft- Horowitz Law
 
Identity Theft: Protecting Our Seniors
Identity Theft: Protecting Our SeniorsIdentity Theft: Protecting Our Seniors
Identity Theft: Protecting Our Seniors
 
62628156 affidavit againts bush family, sap, oracle, indian origen it companies
62628156 affidavit againts bush family, sap, oracle, indian origen it companies62628156 affidavit againts bush family, sap, oracle, indian origen it companies
62628156 affidavit againts bush family, sap, oracle, indian origen it companies
 
Your rights-under-the-fcra
Your rights-under-the-fcraYour rights-under-the-fcra
Your rights-under-the-fcra
 
Post,tweet, or chat! triple play handout
Post,tweet, or chat! triple play handoutPost,tweet, or chat! triple play handout
Post,tweet, or chat! triple play handout
 
Sj credit guide-and-privacy-consent-manual-docs-v2-dec-2020
Sj credit guide-and-privacy-consent-manual-docs-v2-dec-2020Sj credit guide-and-privacy-consent-manual-docs-v2-dec-2020
Sj credit guide-and-privacy-consent-manual-docs-v2-dec-2020
 
E36 m3 bumper
E36 m3 bumperE36 m3 bumper
E36 m3 bumper
 
The Bribery Act 2010 comes into force Bark & Co Solicitors - Specialist Fraud...
The Bribery Act 2010 comes into force Bark & Co Solicitors - Specialist Fraud...The Bribery Act 2010 comes into force Bark & Co Solicitors - Specialist Fraud...
The Bribery Act 2010 comes into force Bark & Co Solicitors - Specialist Fraud...
 
Instructions For Law Enforcement Submitting Request Under FCRA Section 609
Instructions For Law Enforcement Submitting Request Under FCRA Section 609Instructions For Law Enforcement Submitting Request Under FCRA Section 609
Instructions For Law Enforcement Submitting Request Under FCRA Section 609
 
Electronic Transactions Law - Lecture 5 : advertising and marketing
Electronic Transactions Law - Lecture 5 : advertising and marketingElectronic Transactions Law - Lecture 5 : advertising and marketing
Electronic Transactions Law - Lecture 5 : advertising and marketing
 

Andere mochten auch

Multiple Channel Marketing Process Map - Sue Bell
Multiple Channel Marketing Process Map  - Sue BellMultiple Channel Marketing Process Map  - Sue Bell
Multiple Channel Marketing Process Map - Sue BellSue Bell
 
DESIGNING MARKETING PROGRAMS TO BUILD BRAND EQUITY
 DESIGNING MARKETING PROGRAMS TO BUILD BRAND EQUITY DESIGNING MARKETING PROGRAMS TO BUILD BRAND EQUITY
DESIGNING MARKETING PROGRAMS TO BUILD BRAND EQUITYAvinash Singh
 
DESINGING MARKETING PROGRAMS
DESINGING MARKETING PROGRAMSDESINGING MARKETING PROGRAMS
DESINGING MARKETING PROGRAMSYIGIT ACIKAY
 
Chap 5, designing marketing programme to build brand equity
Chap 5, designing marketing programme to build brand equityChap 5, designing marketing programme to build brand equity
Chap 5, designing marketing programme to build brand equityRajesh Kumar
 
The marketing mix of service industry
The marketing mix of service industryThe marketing mix of service industry
The marketing mix of service industryAsif Saifi
 

Andere mochten auch (7)

Rogers Business Solutions
Rogers Business SolutionsRogers Business Solutions
Rogers Business Solutions
 
Multiple Channel Marketing Process Map - Sue Bell
Multiple Channel Marketing Process Map  - Sue BellMultiple Channel Marketing Process Map  - Sue Bell
Multiple Channel Marketing Process Map - Sue Bell
 
DESIGNING MARKETING PROGRAMS TO BUILD BRAND EQUITY
 DESIGNING MARKETING PROGRAMS TO BUILD BRAND EQUITY DESIGNING MARKETING PROGRAMS TO BUILD BRAND EQUITY
DESIGNING MARKETING PROGRAMS TO BUILD BRAND EQUITY
 
DESINGING MARKETING PROGRAMS
DESINGING MARKETING PROGRAMSDESINGING MARKETING PROGRAMS
DESINGING MARKETING PROGRAMS
 
Chap 5, designing marketing programme to build brand equity
Chap 5, designing marketing programme to build brand equityChap 5, designing marketing programme to build brand equity
Chap 5, designing marketing programme to build brand equity
 
The marketing mix of service industry
The marketing mix of service industryThe marketing mix of service industry
The marketing mix of service industry
 
Service marketing mix
Service marketing mixService marketing mix
Service marketing mix
 

Ähnlich wie Rogers 2013 transparency report

Individual Rights Under the Fair Credit Reporting Act
Individual Rights Under the Fair Credit Reporting ActIndividual Rights Under the Fair Credit Reporting Act
Individual Rights Under the Fair Credit Reporting Actbeenverified
 
How to Properly Screen Your Tenant
How to Properly Screen Your TenantHow to Properly Screen Your Tenant
How to Properly Screen Your TenantMichael Brant
 
The gold standard
The gold standardThe gold standard
The gold standardGreg Wilson
 
Top of FormConstruction LicensingNevada’s ResponseBy GEORG.docx
Top of FormConstruction LicensingNevada’s ResponseBy GEORG.docxTop of FormConstruction LicensingNevada’s ResponseBy GEORG.docx
Top of FormConstruction LicensingNevada’s ResponseBy GEORG.docxjuliennehar
 
National Security Authorities Transparency Report 2013
National Security Authorities Transparency Report 2013National Security Authorities Transparency Report 2013
National Security Authorities Transparency Report 2013The Hacker News
 
Information Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your BusinessInformation Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your Business- Mark - Fullbright
 
Identity theft to do list
Identity theft to do listIdentity theft to do list
Identity theft to do listSandy Kleinhenz
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report- Mark - Fullbright
 
Getting The Deal Through: Litigation Funding 2017
Getting The Deal Through: Litigation Funding 2017Getting The Deal Through: Litigation Funding 2017
Getting The Deal Through: Litigation Funding 2017Matheson Law Firm
 
Comodo Extended Validation (EV) SSL Documents
Comodo Extended Validation (EV) SSL DocumentsComodo Extended Validation (EV) SSL Documents
Comodo Extended Validation (EV) SSL DocumentsCheapSSLsecurity
 

Ähnlich wie Rogers 2013 transparency report (20)

Training for Bank Employees
Training for Bank EmployeesTraining for Bank Employees
Training for Bank Employees
 
Watch Your Step on the Internet!
Watch Your Step on the Internet! Watch Your Step on the Internet!
Watch Your Step on the Internet!
 
Individual Rights Under the Fair Credit Reporting Act
Individual Rights Under the Fair Credit Reporting ActIndividual Rights Under the Fair Credit Reporting Act
Individual Rights Under the Fair Credit Reporting Act
 
How to Properly Screen Your Tenant
How to Properly Screen Your TenantHow to Properly Screen Your Tenant
How to Properly Screen Your Tenant
 
Training For Bank Employees
Training For Bank EmployeesTraining For Bank Employees
Training For Bank Employees
 
The gold standard
The gold standardThe gold standard
The gold standard
 
Top of FormConstruction LicensingNevada’s ResponseBy GEORG.docx
Top of FormConstruction LicensingNevada’s ResponseBy GEORG.docxTop of FormConstruction LicensingNevada’s ResponseBy GEORG.docx
Top of FormConstruction LicensingNevada’s ResponseBy GEORG.docx
 
Legal pro
Legal proLegal pro
Legal pro
 
National Security Authorities Transparency Report 2013
National Security Authorities Transparency Report 2013National Security Authorities Transparency Report 2013
National Security Authorities Transparency Report 2013
 
Credit Dispute Letters
Credit Dispute LettersCredit Dispute Letters
Credit Dispute Letters
 
Fighting Telephone Trickery Using Consumer Protection Laws
Fighting Telephone Trickery Using Consumer Protection Laws Fighting Telephone Trickery Using Consumer Protection Laws
Fighting Telephone Trickery Using Consumer Protection Laws
 
Information Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your BusinessInformation Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your Business
 
Identity theft to do list
Identity theft to do listIdentity theft to do list
Identity theft to do list
 
HML-Andertons-Complaints-Procedure-July-2016
HML-Andertons-Complaints-Procedure-July-2016HML-Andertons-Complaints-Procedure-July-2016
HML-Andertons-Complaints-Procedure-July-2016
 
It's a Crime
It's a CrimeIt's a Crime
It's a Crime
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
 
Getting The Deal Through: Litigation Funding 2017
Getting The Deal Through: Litigation Funding 2017Getting The Deal Through: Litigation Funding 2017
Getting The Deal Through: Litigation Funding 2017
 
Comodo Extended Validation (EV) SSL Documents
Comodo Extended Validation (EV) SSL DocumentsComodo Extended Validation (EV) SSL Documents
Comodo Extended Validation (EV) SSL Documents
 
LS IDT 2014
LS IDT 2014LS IDT 2014
LS IDT 2014
 
Business law case_study
Business law case_studyBusiness law case_study
Business law case_study
 

Mehr von Rogers Communications

Rogers - Canadian Business Leaders Survey 2015
Rogers - Canadian Business Leaders Survey 2015Rogers - Canadian Business Leaders Survey 2015
Rogers - Canadian Business Leaders Survey 2015Rogers Communications
 
Rogers Innovation Report: Tech Trends 2013
Rogers Innovation Report: Tech Trends 2013Rogers Innovation Report: Tech Trends 2013
Rogers Innovation Report: Tech Trends 2013Rogers Communications
 
Rogers Connected Workplace report 2013
Rogers Connected Workplace report 2013Rogers Connected Workplace report 2013
Rogers Connected Workplace report 2013Rogers Communications
 
Rogers Innovation Report tackles Canadian video viewing habits
Rogers Innovation Report tackles Canadian video viewing habitsRogers Innovation Report tackles Canadian video viewing habits
Rogers Innovation Report tackles Canadian video viewing habitsRogers Communications
 
Data roaming: The mobile habits of Canadians travelling in the U.S.
Data roaming: The mobile habits of Canadians travelling in the U.S.Data roaming: The mobile habits of Canadians travelling in the U.S.
Data roaming: The mobile habits of Canadians travelling in the U.S.Rogers Communications
 
Rogers Innovation Report: 2012 trend watch
Rogers Innovation Report: 2012 trend watchRogers Innovation Report: 2012 trend watch
Rogers Innovation Report: 2012 trend watchRogers Communications
 
White Paper: Enabling the Mobile Workforce
White Paper: Enabling the Mobile WorkforceWhite Paper: Enabling the Mobile Workforce
White Paper: Enabling the Mobile WorkforceRogers Communications
 
Tech Tips for Small Business - Travel
Tech Tips for Small Business - TravelTech Tips for Small Business - Travel
Tech Tips for Small Business - TravelRogers Communications
 
Rogers 2011- Rapport annuel sur la responsabilité sociale d'entreprise
Rogers 2011- Rapport annuel sur la responsabilité sociale d'entrepriseRogers 2011- Rapport annuel sur la responsabilité sociale d'entreprise
Rogers 2011- Rapport annuel sur la responsabilité sociale d'entrepriseRogers Communications
 
Rogers 2011 Corporate Social Responsibility Report
Rogers 2011 Corporate Social Responsibility ReportRogers 2011 Corporate Social Responsibility Report
Rogers 2011 Corporate Social Responsibility ReportRogers Communications
 

Mehr von Rogers Communications (20)

Rogers - Canadian Business Leaders Survey 2015
Rogers - Canadian Business Leaders Survey 2015Rogers - Canadian Business Leaders Survey 2015
Rogers - Canadian Business Leaders Survey 2015
 
Rogers Innovation Report: Tech Trends 2013
Rogers Innovation Report: Tech Trends 2013Rogers Innovation Report: Tech Trends 2013
Rogers Innovation Report: Tech Trends 2013
 
Rogers Connected Workplace report 2013
Rogers Connected Workplace report 2013Rogers Connected Workplace report 2013
Rogers Connected Workplace report 2013
 
Rogers Innovation Report tackles Canadian video viewing habits
Rogers Innovation Report tackles Canadian video viewing habitsRogers Innovation Report tackles Canadian video viewing habits
Rogers Innovation Report tackles Canadian video viewing habits
 
Data roaming: The mobile habits of Canadians travelling in the U.S.
Data roaming: The mobile habits of Canadians travelling in the U.S.Data roaming: The mobile habits of Canadians travelling in the U.S.
Data roaming: The mobile habits of Canadians travelling in the U.S.
 
Rogers Innovation Report: 2012 trend watch
Rogers Innovation Report: 2012 trend watchRogers Innovation Report: 2012 trend watch
Rogers Innovation Report: 2012 trend watch
 
White Paper: Enabling the Mobile Workforce
White Paper: Enabling the Mobile WorkforceWhite Paper: Enabling the Mobile Workforce
White Paper: Enabling the Mobile Workforce
 
White Paper: Mobile Security
White Paper: Mobile SecurityWhite Paper: Mobile Security
White Paper: Mobile Security
 
Tech Tips for Small Business - Travel
Tech Tips for Small Business - TravelTech Tips for Small Business - Travel
Tech Tips for Small Business - Travel
 
Tech Tips: M2N - what is it?
Tech Tips: M2N - what is it?Tech Tips: M2N - what is it?
Tech Tips: M2N - what is it?
 
Tech Tips: Blackberry
Tech Tips: BlackberryTech Tips: Blackberry
Tech Tips: Blackberry
 
Rogers 2011- Rapport annuel sur la responsabilité sociale d'entreprise
Rogers 2011- Rapport annuel sur la responsabilité sociale d'entrepriseRogers 2011- Rapport annuel sur la responsabilité sociale d'entreprise
Rogers 2011- Rapport annuel sur la responsabilité sociale d'entreprise
 
Rogers 2011 Corporate Social Responsibility Report
Rogers 2011 Corporate Social Responsibility ReportRogers 2011 Corporate Social Responsibility Report
Rogers 2011 Corporate Social Responsibility Report
 
Rogers solutions fleet diagnostics
Rogers solutions fleet diagnosticsRogers solutions fleet diagnostics
Rogers solutions fleet diagnostics
 
Rogers Ecosystem - Transportation
Rogers Ecosystem - TransportationRogers Ecosystem - Transportation
Rogers Ecosystem - Transportation
 
Rogers Solutions - Digital Signage
Rogers Solutions - Digital SignageRogers Solutions - Digital Signage
Rogers Solutions - Digital Signage
 
Rogers ecosystem retail
Rogers ecosystem retailRogers ecosystem retail
Rogers ecosystem retail
 
FLEET OPTIMIZATION HANDBOOK
FLEET OPTIMIZATION HANDBOOKFLEET OPTIMIZATION HANDBOOK
FLEET OPTIMIZATION HANDBOOK
 
Rogers Ecosystem Healthcare
Rogers Ecosystem HealthcareRogers Ecosystem Healthcare
Rogers Ecosystem Healthcare
 
Rogers eBook Security
Rogers eBook SecurityRogers eBook Security
Rogers eBook Security
 

Kürzlich hochgeladen

The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 

Kürzlich hochgeladen (20)

The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 

Rogers 2013 transparency report

  • 1. ROGERS COMMUNICATIONS REQUESTS FOR CUSTOMER INFORMATION | 2013 TRANSPARENCY REPORT
  • 2. ROGERS COMMUNICATIONS2013 TRANSPARENCYREPORT| 1 As a communicationscompany, governmentandlaw enforcementagenciesapproachRogerslookingfor informationaboutourcustomers.Thisreportisdesignedtoprovide more detailsonthe numberandtypesof requestswe receivedin2013. We fullycomplywithCanadianprivacylaw andtake active stepstosafeguardourcustomers’information. Atthe same time we are compelledbylaw torespondtofederal,provincialandmunicipal governmentandlaw enforcementagencieswhentheyhave alegallyvalidrequest–like asearch warrantor court order. The requestswe receive are torespondtowarrantsand ordersfrom law enforcementagencies. Inaddition,we receive requestsfromgovernmentdepartmentswhoare authorizedtorequestinformationtoenforce lawslike the Income Tax Act.We alsoassistpolice servicesinemergencylife threateningsituations. Abouthalf of the requestswe receive are toconfirma customer’sname andaddress,whichwe respondtoso police donotissue a warrant to the wrongperson.Otherwise,we onlyprovide customerinformationwhen forcedby law or inemergenciesafterthe requesthasbeenthoroughlyvetted.If we consideranorderto be too broad,we push back and,if necessary,goto court to oppose the request. Our customers’privacyisimportanttous andthat is whywe are issuingthisreport.We believe more transparencyishelpful andencourage the Governmentof Canadatoissue itsownreporton these requests. Sincerely, KenEngelhart Chief PrivacyOfficer Canadianlaw governshow we protectprivate customerinformationandhow governmentandlaw enforcement agenciescancompel usto provide itto them: > The Criminal Codeand otherlawsallow governmentandlaw enforcementagenciestorequire usto provide customerinformation. > The PersonalInformation Protection and ElectronicDocumentsAct(PIPEDA) coversbothhow we protectcustomers’informationandhow we discloseit. > The CRTC ConfidentialCustomerInformationRules(CRTCRules) setoutcircumstancesunderwhich customerinformation–otherthanname,addressand listednumbers,whichcanalwaysbe provided–may be disclosedtothirdpartiesincludinglaw enforcementagencies. Our PrivacyPolicyandTermsof Service outline how we safeguardcustomers’informationundertheselawsand rules.We onlygive outprivate customerinformationwhenrequiredbylaw orin emergenciesandafterthe requesthasbeenthoroughlyvetted.See Type of Requestsbelow andourFrequentlyAskedQuestions(FAQs) for more information. INTRODUCTION WHY AND HOW WE RESPOND
  • 3. ROGERS COMMUNICATIONS2013 TRANSPARENCYREPORT| 2 The statisticsbelow representthe total numberof requestswe receivedlastyear.If we consideranorderto be too broad,we pushback and, if necessary,gotocourt to oppose the request. Customername/addresschecks 87,856 Court order/ warrant 74,415 Governmentrequirementletter(compelledtoprovide underafederal/provinciallaw) 2,556 Emergencyrequestsfrompolice inlife threateningsituations 9,339 Childsexual exploitationemergencyassistance requests 711 Court orderto complywithaninternational Mutual Legal Assistance Treatyrequest 40 Total 174,917 Notes: 1. These statistics include the following scenarios: (a) The information requested was provided; (b) Partial information was provided; (c) No information was provided because it doesn’t exist or the person is not a Rogers customer; and (d) We rejected the request or successfully fought it in court. 2. These statistics do not include informal requests such as phone calls from law enforcement looking for information they would require a warrant for. These requests are rejected because there is no legal authority and no formal response is provided 1. Customername/address checks: Legal authority: PIPEDA and CRTC Rulespermitconfirmingbasicinformationlike name,addressandlisted phone number. Details:These requestsare toconfirma customer’sname andaddress,whichwe respondtoso police donotissue a warrant to the wrongperson. Examplesofinfo provided:Whenprovidedwithaname and addresswe will confirmwhetherornotthe personisa Rogerscustomerandwhenprovidedwithalistedphone numberwe’ll provide the name andaddressof a customer.IPaddressisnotprovided. 2. Court order/warrant: Legal authority: Issuedunderthe CriminalCodeor otherlaws.Details:A court order or warrantincludes productionorders,summons,subpoenasandsearchwarrantsissuedbyajudge or otherjudicial officer.It compelsusto provide customerinformationtopolice orotherauthoritiesortoattendcourt to provide evidence/testimonyaboutcustomerinformation. Examplesofinfoprovided:Customeraccountinformationlike name and address, paymenthistory,billingrecords,orcall records. 3. Governmentrequirementorder: Legal authority: Issuedunderlawssuchas the CustomsAct or Income Tax Act. Details:An orderthat compelsus to provide customerinformationtothe requestingagency. Examplesofinfoprovided:Customeraccount informationlikepaymenthistory,billingrecords,orcall records. 4. Emergencyrequestsfrom police in life threateningsituations: Legal authority: The Criminal Codeand PIPEDA.Details:We assistpolice servicesinemergencylife threatening situationssuchasmissingpersonscasesandindividualsindistress.Examplesofinfoprovided:Helpinglocate someone withacell phone andprovidingcontactdetailsforsomeone whohascontactedemergencyservices and maybe unable tocommunicate. 5. Childsexual exploitationemergencyassistance requests: Legal authority: The Criminal CodeandPIPEDA.Details:We assistpolice duringchildexploitation investigations.Examplesofinfoprovided:Confirmingacustomer’sname andaddresswhenprovidedwithanIP addresssothat police can geta search or arrest warrantto stop the sexual exploitationof achild. BREAKDOWN OF 2013 REQUESTS WE RECEIVED SIX TYPES OF REQUESTS
  • 4. ROGERS COMMUNICATIONS2013 TRANSPARENCYREPORT| 3 6. Court order to comply with a Mutual Legal Assistance Treaty request: Legal authority: IssuedunderMutualLegalAssistancein Criminal MattersAct. Details:We don’trespondto requestsfromforeignagencies,butwe doadvise themtohave theircountry’sjustice authoritycontactthe Departmentof Justice Canada.If that countryhas a treatyor conventionwithCanada,the requestisprocessed by Canadianauthoritiesandanordermaybe issuedbya Canadiancourtto gather evidence.We’re compelledto provide customerinformationtothe police orotherauthorityinCanadaconductingthe investigation.Examples of infoprovided:Customeraccountinformationlike paymenthistory,billingrecords,orcall records. 1. Whichagencieshave requestedinformation? We getrequestsfrommanydifferentagencies,including: > Federal agencieslike the Royal CanadianMountedPolice,CanadianSecurityIntelligence Service, Canada BorderServicesAgency,andCanadaRevenue Agency > Provincial andmunicipal agencieslike police forcesandcoroners 2. Do you provide metadata or direct access to customer databases? No,we do not provide metadatawithoutawarrant,or directaccessto our customerdatabases.We only provide the informationwe are requiredtoprovide andthisinformationisretrievedbyourstaff. 3. How many timesdid you provide info?Do you ever rejectlaw enforcementrequests? Our statisticsrepresentthe total numberof requestswe receivedlastyear.If we consideranorderto be too broad,we push back and,if necessary,goto court to oppose the request. 4. How much do you charge for requests? For mostcourt-orderedresponsesforcustomerinformation,we assumeall costsassociatedwithprovidinga response. Insome cases,we charge a minimal fee torecoverourcostsbasedon the work requiredtocomply withrequests. 5. Do you fight for customers’privacy rights? Absolutely, if we consideranorderto be too broad,we pushback and, if necessary,goto court to oppose the request. Ourcustomers’privacyisimportanttous andthat’s whywe’re issuingthisreport. We believe more transparencyishelpful andencourage the Governmentof Canadatoissue itsownreporton these requests. 6. How long do you keepcustomer information? We onlykeepinformationforaslongas it’srequiredforbusinesspurposesoras requiredbylaw.Forexample, we are requiredbylaw tokeepcustomerbillsforsevenyears. We don’tkeepourcustomers’communications like textmessagesandemailsbecause ourcustomers’privacyisimportantandwe don’tneedthisinformation. > Canada’s PersonalInformation Protection and ElectronicDocumentsAct > Rogers’ Termsof Service andPrivacyPolicy > PublicSafety Canada’s Annual Reportonthe Use of ElectronicSurveillance FREQUENTLY ASKED QUESTIONS HELPFUL LINKS