Policies & Guidelines

Employee awareness training

The Mount Royal University Information Management & Privacy (FOIP) Office provides training to University Faculty and Staff on various FOIP, CASL and Records Management topics.

These 45 minute sessions advise employees on best practices, which help the University fulfill its legal obligations.

To inquire about training sessions listed below (individually or for your team) - use the online sign-up form or contact:

Jeremy Duffin
Information Management & Privacy Advisor

E-mail: jgduffin@mtroyal.ca
Phone: 403.440.7288

A record of training is maintained by the MRU FOIP Office and sessions can also be customized to the unique needs of the business unit.
Awareness training - program guide

Freedom of Information and Protection of Privacy Act - FOIP 101:

Learn the basics! This session provides a 45 minute overview of the FOIP Act and its requirements on how MRU staff must collect, use, disclose and protect identifiable personal information. Best practices concerning the protection of privacy, access-to-information requests and disclosing personal information appropriately are discussed in this session.

Records and information management - RIM 101:

This 45 minute session reviews the following records management processes and principles at Mount Royal University.

  • The definition of a record
  • Transitory records
  • Filing and managing records
  • Electronic records
  • Offsite records storage
  • The University Records Retention Schedule
  • Destroying records

Cloud Computing and Protecting Privacy (FOIP) - Cloud Computing 101:

Learn about protecting privacy when implementing "the cloud" or "software-as-a-service" third party vendor solutions at the University. This session summarizes the key security controls recommended by the Government of Alberta to ensure public bodies still fulfill their obligations protecting privacy under the FOIP Act.

Digital Citizenship and Protecting Privacy (FOIP) - Digital Citizenship 101:

This session looks at the current methods typically utilized to protect the privacy of individuals when using email, computers, mobile devices and social networking sites.

Back to top