Robert Hawkins
Statements in Debates
Thank you, Madam Speaker. The Minister said he’s not aware of any breaches. That said, can the Minister confidently say it also means that he may not be aware of any breaches? Thank you.
This is not the answer I’ve received on the two other occasions. Finally I’m getting a decent answer, I’ll give it that.
I want to know how this administrator of this particular program is informed, and what type of timely way are they informed to ensure there is some type of quality assurance and certainly some protection for those people whose files may be snooped upon.
What type of automatic process is involved? Will the Minister inform this house what type of process there is? Thank you, Madam Speaker.
Madam Speaker, I don’t think it’s worth it.
The Minister is in possession of the same letter I am that they wrote to me on February 6th. They basically say they’re not going to meet with them. The only way they meet with them is when they bump into them at the store or on the street, if they run across them in another meeting. There is no formal commitment. If anything, there is a commitment saying we’re not interested.
So, the Minister is saying he is going to meet with them. What exactly is he going to tell the college that they’re going to do and how are they going to do it?
Thank you, Madam Speaker. Before I begin I want to make note that I am certainly sorry that my passion and frustration got ahead of me earlier. I acknowledge that and I never intended to use “vexatious” as a particular word. I didn’t plan that in any way.
What that does, though, is further stress my frustration about this whole problem. There’s an apparent wall between the board of governors at Aurora College and the students, if I may describe it as a protective barrier. The letter clearly states about process, process, process.
I guess I will say this to the Minister of Education, Culture and...
Thank you, Madam Speaker. I rise today on a point of order under Section 23(m), where a Member introduces any matter in debate that offends practice and precedents of the Assembly, and further, under Section 23(i), where a Member imputes false or hidden motives to another Member.
Madam Speaker, I waited until today to review Hansard to ensure that I brought this matter forward in a timely way, as I am doing now. On Thursday, February 13, 2014, during debate of the point of order, in Hansard on page 4, I quote Premier McLeod, who made the following remarks which were referring to me: “…the...
Sorry, Madam Speaker, I stood up on the wrong orders of the day item number. Once again, and even more importantly, for the record, Madam Speaker, I wish to report to the Assembly that the Standing Committee on Economic Development and Infrastructure has reviewed Bill 5, An Act to Amend the Motor Vehicle Act, and wishes to report that Bill 5 is ready for consideration in Committee of the Whole. Thank you, Madam Speaker.
Thank you, Madam Speaker. I wish to report to the Assembly that the Standing Committee on Economic Development and Infrastructure has reviewed Bill 5, An Act to Amend the Motor Vehicle Act, and wishes to report that Bill 5 is ready for consideration in Committee of the Whole. Thank you, Madam Speaker.
I would like to now sort of package this under the concept of quality assurance. To understand quality assurance, how often has this happened and how is it particularly evaluated, maybe the Minister can enlighten us. I would like to know how often breaches happen, how often are files investigated, even if it’s not a technical or formal breach. Sometimes they need to be evaluated. So let’s put it on the record about quality assurance. Thank you.
Thank you, Madam Speaker. On February 6th I asked a question and I didn’t get a response, then I asked the same question on February 13th. Now I’m going to try a third occasion to ask the same type of question. What question is that? I’ve asked about the protocols to protect people’s privacy under our electronic medical records. Each time I’ve asked about what type of automatic protocol we have in place that informs the administrator of these programs that someone is cybersurfing or sometimes referred to as cyberstalking individuals.
Do we have any automatic protocols that notify the...