Skip to content
Case studiesPricingSecurityCompareBlog

Europe

Americas

Oceania

Compliance12 min read

PIPEDA and Identity Documents: Compliance Guide

PIPEDA compliance for identity documents: collection rules, retention periods and data protection.

CheckFile Team
CheckFile Teamยท
Illustration for PIPEDA and Identity Documents: Compliance Guide โ€” Compliance

Summarize this article with

Collecting a copy of an identity document is routine for most businesses. It is also one of the highest-risk processing activities under PIPEDA and provincial privacy legislation. An identity document contains sensitive personal information -- a unique number, photograph, signature, and potentially biometric data -- whose non-compliant processing exposes the business to regulatory findings by the Office of the Privacy Commissioner of Canada (OPC) and potential court-ordered damages. This guide covers the applicable rules, regulatory guidance, and the concrete measures required to process identity documents in full compliance.

This article is for informational purposes only and does not constitute legal, financial, or regulatory advice. Regulatory references are accurate as of the publication date. Consult a qualified professional for guidance specific to your situation.

This article is provided for informational purposes and does not constitute legal advice. Consult a qualified legal professional for situation-specific guidance.

PIPEDA (S.C. 2000, c. 5) does not contain specific provisions for identity documents. Their processing falls under the Act's general fair information principles, supplemented by OPC guidance, findings, and provincial privacy legislation.

The Core Principles That Apply

Five PIPEDA principles apply directly to the collection and processing of identity documents:

Consent (Principle 4.3). Collecting an identity document must be based on meaningful consent. The individual must understand what is being collected, why, and how it will be used. Depending on the context, implied consent may suffice for necessary business purposes, but express consent is recommended for sensitive information like identity documents.

Limiting Collection (Principle 4.4). The business must collect only the information strictly necessary for the stated purpose. This principle has major practical consequences for identity document processing, detailed below.

Limiting Use, Disclosure, and Retention (Principle 4.5). Identity documents cannot be retained indefinitely. The retention period must be defined in advance and justified by the processing purpose. Documents must not be used for purposes other than those identified at collection.

Safeguards (Principle 4.7). Identity documents must be protected against unauthorized access, loss, destruction, or alteration through appropriate technical and organizational measures.

Openness (Principle 4.8). The individual whose identity is being verified must be informed clearly and completely: who processes their information, why, for how long, and what their rights are.

Provincial Privacy Legislation

Provinces with substantially similar legislation to PIPEDA add important specifics. Alberta's Personal Information Protection Act (PIPA), British Columbia's Personal Information Protection Act, and Quebec's Act respecting the protection of personal information in the private sector each impose specific obligations that may be stricter than PIPEDA in certain areas.

OPC Guidance: Practical Rules

The OPC publishes guidance and findings on identity document processing that organizations should treat as the standard of compliance.

When Can You Collect an Identity Document?

Privacy regulators distinguish levels of identity verification based on the purpose:

Level Description Examples Document Required
1 - Declarative Simple collection of name and contact details Newsletter signup, basic account creation No identity document
2 - Simple verification Confirming the person is who they claim to be Property rental, subscription signup Presentation of document (no copy) or partial copy
3 - Enhanced verification Legal obligation to verify identity Bank account opening (KYC), hiring, legal transactions Full copy of identity document

Critical point. Many businesses systematically collect full copies of identity documents when Level 2 verification would suffice. This commonly occurs with property managers demanding full ID copies for simple property viewings, or companies photocopying visitor IDs at reception.

Data Minimization Applied to Identity Documents

Data minimization (Principle 4.4 -- Limiting Collection) is the most frequently overlooked principle in identity document processing. The OPC provides clear guidance:

Redaction of unnecessary data. When a document copy is required, data not relevant to the stated purpose must be redacted. For example, when verifying a tenant's identity, the ID document number is unnecessary and should be obscured.

Data to redact by purpose:

Purpose Necessary Data Data to Redact
Property rental Name, date of birth, validity Photo, document number, signature
Bank account opening (KYC) All document data None (legal obligation under PCMLTFA)
Employment contract Name, work authorization status Photo (unless for badge), signature
Age verification Date of birth Everything else

Retention Periods

PIPEDA and sector-specific legislation impose retention periods that vary by processing purpose and legal basis.

Context Retention Period Legal Basis
Banking/insurance KYC 5 years after end of business relationship PCMLTFA
Employment contract 5 years after departure of employee Provincial employment standards
Property rental (accepted application) Duration of lease + applicable limitation period Provincial tenancy legislation
Property rental (rejected application) Immediate deletion, 1 month maximum OPC guidance
One-time identity verification Duration of the verification only, no retention OPC guidance
AML/ATF compliance 5 years after execution of the transaction PCMLTFA

Common mistake. Retaining identity documents of rejected rental applicants beyond what is necessary is a privacy violation that the OPC has addressed in findings.

Technical Measures to Protect Identity Documents

Identity documents carry a high risk of identity theft in the event of a data breach. PIPEDA Principle 4.7 requires safeguards commensurate with the sensitivity of the information.

Mandatory Measures

Encryption at rest and in transit. Digital copies of identity documents must be encrypted with a recognized algorithm (AES-256 minimum). Transmissions must use TLS 1.2 or higher.

Strict access controls. Access to identity documents must be limited to individuals with a justified operational need. Access rights must be reviewed regularly. Every access must be logged in an audit trail.

Canadian data hosting. Identity documents should be hosted on servers located within Canada, with a hosting provider offering sufficient guarantees. Certifications such as SOC 2 are recommended. Our security page details the standards we meet.

Secure deletion. At the end of the retention period, documents must be deleted irreversibly (cryptographic erasure or physical destruction of the storage medium). Moving a file to the recycle bin does not constitute compliant deletion.

For businesses processing more than 1,000 identity documents per month, additional measures are recommended:

  • Privacy Impact Assessment (PIA). Recommended when processing creates a real risk of significant harm to individuals. Large-scale processing of identity documents falls into this category.
  • De-identification of extracted data. Data extracted from documents (name, number) should be de-identified in production databases.
  • Environment segregation. Production, testing, and development environments must be strictly separated. No real identity documents should be present in test environments.

Explore further

Discover our practical guides and resources to master document compliance.

Explore our guides

Individual Rights

PIPEDA grants individuals rights applicable to identity documents, each with a mandatory 30-day response deadline.

Rights Summary Table

Right Response Deadline Applicable to Identity Documents? Specifics
Access (Principle 4.9) 30 days Yes The business must provide a copy of all information held, including the document copy
Correction (Principle 4.9.5) 30 days Yes In case of identity change (marriage, etc.)
Withdrawal of consent Reasonable time Partially Not possible if retention is a legal obligation (KYC)

Deletion Requests: Practical Scenarios

Scenario 1: A customer requests deletion of their ID copy after cancelling their insurance policy. The insurer can decline if the legal retention period (5 years under PCMLTFA) has not elapsed. However, it must inform the customer of the legal basis justifying continued retention and the scheduled deletion date.

Scenario 2: A rejected rental applicant requests deletion of their documents. The property manager must delete all documents promptly. Refusal is not consistent with PIPEDA requirements.

Scenario 3: A former employee requests deletion of their ID copy 6 years after leaving. The company must proceed with deletion, as the retention period has expired.

PIPEDA and Automated Document Verification

Using automated document validation solutions raises specific privacy questions, particularly regarding automated decision-making and data processing agreements.

The Automated Decision-Making Question

PIPEDA does not have a specific equivalent to GDPR Article 22 on automated decision-making, but the OPC has indicated that organizations using automated systems to make decisions about individuals must ensure transparency and provide meaningful recourse. An automatic file rejection based on identity document non-compliance should:

  • Inform the individual that an automated system is being used.
  • Guarantee access to human review upon request.
  • Explain the logic behind the decision (reason for rejection, unmet criterion).

The Data Processing Agreement

When a business uses an external provider for document verification, a contract or agreement should specify the nature and purpose of the processing, the types of personal information processed, the security measures implemented by the provider, and the terms for data return and deletion at contract end.

Data Transfers Outside Canada

The choice of document verification provider must factor in data transfer implications. Transferring identity documents to servers outside Canada may create privacy risks. The OPC recommends that organizations ensure comparable privacy protection in any jurisdiction where personal information is transferred. Canadian hosting is the safest approach.

PIPEDA Compliance Checklist for Identity Documents

Here are the actions to verify to ensure your identity document processing is compliant.

Before Collection

  • Verify that collecting the identity document is justified by an identified purpose.
  • Confirm that the required verification level (declarative, simple, enhanced) matches the stated purpose.
  • Draft or update the privacy notice including: identity of the organization, purpose, retention period, and individual rights.
  • Conduct a Privacy Impact Assessment if processing is large-scale.

During Processing

  • Apply data minimization: redact data not necessary for the stated purpose.
  • Encrypt collected documents (at rest and in transit).
  • Restrict access to authorized personnel only, with access logging.
  • If using an external KYC compliance provider, verify the existence of a data processing agreement and confirm Canadian data hosting.

After Processing

  • Schedule automatic deletion of documents at the end of the retention period.
  • Implement a process for responding to individual access and correction requests within 30 days.
  • Maintain records of processing activities for accountability purposes.
  • Audit process compliance annually.

Balancing PIPEDA Compliance and Operational Efficiency

PIPEDA compliance and operational efficiency are not contradictory. The most advanced automated document verification solutions build privacy requirements in natively: automatic data minimization, end-to-end encryption, scheduled deletion, full audit trails, and access to human review.

CheckFile designed its document validation platform with native privacy compliance. Documents are processed and hosted in Canada, encrypted end-to-end, and automatically deleted at the expiration of the retention period you define. Every processing action is logged and auditable. Our platform processes over 180,000 documents per month with a 94.8% fraud detection rate and an average verification time of 4.2 seconds. Explore our pricing to find the plan that fits your document volume, or contact our team for a demo and a compliance audit of your current document workflows.

For a comprehensive overview, see our document compliance complete guide.

Go further

To dive deeper into this topic, explore our complete guide on document verification.


Frequently Asked Questions

When can a business legally collect a copy of an identity document under PIPEDA?

Collecting a full copy of an identity document is only justified when enhanced verification is required by law or for a clearly identified and documented purpose. Most everyday business interactions require only simple verification (viewing the document without retaining a copy). Full document collection is appropriate for banking KYC under the PCMLTFA, employment contracts, and legal transactions. Many businesses systematically collect full document copies when a lower level of verification would suffice, which violates PIPEDA's Limiting Collection principle.

What data must be redacted from an identity document copy when it is collected?

The data that must be redacted depends on the purpose of collection. For property rental, only the name, date of birth, and validity period are necessary; the photo, document number, and signature should be obscured. For age verification, only the date of birth is required. Banking KYC under the PCMLTFA is one of the few contexts where all data fields on the document may legitimately be retained.

How long can a business retain identity document copies under PIPEDA?

Retention periods depend on the purpose of collection and any applicable legal obligations. Banking and insurance KYC documents must be retained for 5 years after the end of the business relationship, as required by the PCMLTFA. Employment-related copies must be kept for the duration of employment plus the applicable limitation period. For rejected rental applications, all documents must be deleted promptly. Retaining documents beyond the necessary period without justification breaches PIPEDA's retention limitation principle.

What technical measures are required to protect stored identity documents?

PIPEDA Principle 4.7 and OPC guidance require encryption at rest and in transit, access restricted to individuals with a justified operational need, regular review of access rights, and logging of all access. Secure deletion must be irreversible at the end of the retention period. For organizations processing more than 1,000 identity documents per month, a Privacy Impact Assessment is recommended.

What are the PIPEDA obligations when using an automated document verification system?

Using an automated verification system requires transparency about the use of automated processing, meaningful recourse including access to human review, and a data processing agreement with the automated verification provider specifying data location, security measures, and deletion terms.

Stay informed

Get our compliance insights and practical guides delivered to your inbox.

Explore further

Discover our practical guides and resources to master document compliance.