Personal information and your privacy - FAQs (2024)

< Back to commitments

Personal information and your privacy

  • How we collect and use data
  • FAQs

question Q. How does Bell protect access to my account?

answer A. To protect your account and personal information, we have safeguards in place to verify your identity. That’s why we ask you to confirm who you are when you call us.

For example, we might ask you to confirm certain account information or service usage details that only you should know. This authentication process helps prevent pretexting, also called “social engineering,” which is an illegal practice used by those trying to commit fraud to obtain access to someone else’s information.

We ask for your patience and understanding when we request such information from you, as the purpose of this process is to protect you.

question Q. Can I allow other people to access my account?

answer A. As an account holder, you can authorize someone else (a co-user) to access your account. We have different authorization levels that dictate what you can do and what information you have access to. Here’s a chart of common transactions and who can carry them out, based on the type of account.

BELL MOBILITY

Transaction Account
holder
Authorized
co-user
Other user
Activate a service Available Not Available Not Available
Cancel a service Available Available Not Available
Make a payment Available Available Available
Upgrade hardware Available Available Not Available
Unlock a device Available Available Not Available
Change a phone number Available Available Available
Change a plan or feature Available Available Available

BELL HOME PHONE

Transaction Account
holder
Authorized
co-user
Activate a service Available Not Available
Cancel a service Available Not Available
Make a payment Available Available
Change a phone number Available Not Available
Change a plan or feature Available Available
Suspend or restore service Available Available

question Q. How can I manage the account of someone who passed away?

answer A. Taking care of the estate of a deceased person can be a difficult task. In the event an account holder passes away, the estate becomes responsible for any outstanding balance. If you wish to deactivate an account or transfer responsibility to another person, please contact us .

Learn more about what to do following the death of an account holder .

question Q. How does Bell protect children’s data?

answer A. We always request permission from a parent or legal guardian before knowingly collecting, using or disclosing any personally identifiable information about a child who is under age 13 (e.g. for contests and promotions). This policy applies to all our websites and services intended for children.

question Q. How is information shared in emergencies?

answer A. Under exceptional circ*mstances, we may collect, use or disclose personal information without your knowledge or consent. For example:

  • An emergency where a person’s life, health or security is threatened
  • A criminal investigation or breach of an agreement
  • When we are required to comply with a legal request, such as a subpoena, warrant or court order

question Q. Does Bell monitor my use of its services?

answer A. From time to time, we may monitor your use of our services in accordance with our Acceptable Use Policy and applicable laws. For example, we may need to review your bandwidth consumption to make sure our service is functioning properly and/or that you are complying with our Terms of Service .

We may monitor your use if we suspect any of the following activities:

  • Spamming
  • Harassment
  • Uploading, downloading or sharing files that are protected by copyright
  • Fraudulent use of our services

To learn more, please read our guidelines on the responsible use of Bell services .

question Q. Does Bell record customer service calls?

answer A. To help us continually improve our customer service, we may record certain calls from customers and use these recordings to train our employees, as well as to monitor compliance. In keeping with federal legislation, you are informed by a recorded message that your call may be recorded for quality assurance purposes.

question Q. Does Bell keep a record of my text messages?

answer A. We do not keep copies of your texts (SMS) or iMessages.

question Q. Is my personal information shared with smart home device providers?

answer A. Only with your consent. When you use a voice command smart home device to access our services, we may share some of your personal information with the device provider. For more details about what information is shared, please see the terms and conditions and privacy policies of your smart home device providers.

question Q. What is express consent?

answer A. Express consent means explicitly agreeing to something either verbally, by signing a document, checking a box or otherwise actively communicating agreement. When personal information is highly sensitive, we will ask for your express consent before collecting it, such as before performing a credit check.

question Q. What is implied consent?

answer A. Implied consent means we can assume from your actions that you agree to the use of your information under reasonable circ*mstances. For example, when you sign up for a service, we imply your consent to track your usage so we can bill you, and to use your address to mail you important notices about your service.

question Q. Is my personal information secure?

answer A. We do our best to keep your personal information secure. We also encourage you to learn about ways to keep yourself safe from fraud.

Learn how to protect yourself from telecom fraud

question Q. How do I contact the Bell Privacy Office?

answer A. The security and privacy of your personal information is important. You can contact the Bell Privacy Office at privacy@bell.ca , toll-free at 1 866 875-5016, or by mail at:

The Bell Privacy Office
160 Elgin Street
Ottawa, Ontario K2P 2C4

We investigate all privacy complaints and take appropriate steps to resolve them, including changing our practices when required.

Our services

Bell Canada

Bell is Canada's largest communications company, providing consumers and business with solutions for all their communications needs.

The leader in digital TV

Bell Fibe TV, the best TV service, provides stunning 4K picture and high-fidelity sound. Using fibre optic technology, Bell Fibe TV brings the best TV experience right to your door – no dish required.

The Bell Fibe TV app lets you access live TV and on-demand television content using your Bell Streamer or by downloading the Fibe TV app on Amazon Fire TV, Android TV, Apple TV or by Google Cast using your Google Chromecast.

Bell Satellite TV provides a great variety of HD and 4K channels, the best receivers and the best image quality – making it the leader in digital satellite TV service in Canada.

The latest cell phones, Mobile Internet devices, smartwatches and tablets

Choose from the latest iPhone devices from Apple, Samsung devices, Google phones, tablets and other popular smartphones. Stay connected on the Bell 5G-capable network with blazing-fast speeds, coast-to-coast coverage and clear reception.

Ultra-fast high-speed fibre home Internet

Command the fastest upload speeds with Bell Fibe Internet on Canada’s largest fibre optic network. Bell's high-speed home Internet lets you share photos and videos with upload speeds of up to 940 Mbps and download speeds of up to 1.5 Gigabits per second.

The most reliable home phone service

If you are looking for reliable home phone services, Bell Home phone guarantees exceptional services at all times or you get your money back.

Promotions and offers

Looking for new products and services from Bell? See the latest Bell promotions and offers or visit a Bell store to learn more.

Communications solutions for businesses

As Canada's leading trusted technology advisor, Bell Canada delivers end-to-end solutions to our small and medium-sized business (SMB) customers, from business Internet to business Mobility services and long distance solutions.

Bell Business Markets is committed to delivering the integrated solutions large organizations need to increase productivity, sustain profitable growth, maximize service differentiation and minimize risk in today's challenging environment.

Personal information and your privacy - FAQs (2024)

FAQs

What is the right to privacy of personal information? ›

The Privacy Act of 1974 guarantees the right of individuals to be protected against an unwarranted invasion of their privacy from the collection, maintenance, use, and disclosure of personal information. It is intended to protect individuals from an invasion of personal privacy through federal agency misuse.

What questions to ask about privacy? ›

10 Important Questions About Privacy
  • What's the difference between Privacy and Security? ...
  • How do you know which regulations apply to your organization? ...
  • Are small businesses affected by privacy regulations? ...
  • What are the fines and penalties if an organization doesn't meet privacy law compliance?

What is the privacy policy of personal information? ›

What Is a Privacy Policy? A privacy policy on your website is a legal document informing users about how you collect and handle their personal data, who you share it with, if you sell it, and any other relevant details.

What is considered private personal information? ›

According to the bill, “private information” includes name, social security number, a driver's license number, credit or debit card number, financial account number (with or without security code, as long as an authorized person could gain access to the account), biometric information, and username or email address ...

What are 5 examples of personal information? ›

What is personal information?
  • an individual's name, signature, address, phone number or date of birth.
  • sensitive information.
  • credit information.
  • employee record information.
  • photographs.
  • internet protocol (IP) addresses.

What are the four types of invasion of privacy? ›

It generally consists of the following four distinct causes of action, called torts:
  • Appropriation of Name or Likeness.
  • Intrusion Upon Seclusion.
  • False Light.
  • Public Disclosure of Private Facts.

What is a privacy checklist? ›

Develop a checklist for assessing third-party compliance with privacy standards: Regularly evaluate third-party services to ensure ongoing compliance with data protection standards. This assessment should include verifying their privacy policies, security measures, and data handling practices.

What is the 12 right to privacy? ›

Article 12

No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks.

What are the six words about privacy? ›

Truth, Confidence, Stability, Recovery, Secure, Responsible. Privacy is confidence in truth being shared about the stability of what will hold things private.

What is the privacy Act for personal data? ›

The CCPA requires businesses to give consumers certain information in a “notice at collection.” A notice at collection must list the categories of personal information businesses collect about consumers and the purposes for which they use the categories of information.

What is personal data privacy? ›

Data privacy generally means the ability of a person to determine for themselves when, how, and to what extent personal information about them is shared with or communicated to others. This personal information can be one's name, location, contact information, or online or real-world behavior.

What is privacy as control over personal information? ›

Privacy laws aim to give back individuals control over their data, empowering them to know how their data is being used, by whom, and why, giving them control over their personal data.

What are examples of confidential personal information? ›

The following information is confidential:
  • Social Security number.
  • Name.
  • Personal financial information.
  • Family information.
  • Medical information.
  • Credit card numbers, bank account numbers, amount / what donated.
  • Telephone / fax numbers, e-mail, URLs.

What is the difference between personal privacy and information privacy? ›

Broadly speaking, privacy is the right to be let alone, or freedom from interference or intrusion. Information privacy is the right to have some control over how your personal information is collected and used.

What is not personal information? ›

Generally, information that is only about a business is not considered to be 'personal information'. This is because the Privacy Act defines an 'individual' as a 'natural person', and the ordinary meaning of a 'natural person' does not include a body politic or corporate entity (including a company).

What does the 14th Amendment say about privacy? ›

The Supreme Court, however, beginning as early as 1923 and continuing through its recent decisions, has broadly read the "liberty" guarantee of the Fourteenth Amendment to guarantee a fairly broad right of privacy that has come to encompass decisions about child rearing, procreation, marriage, and termination of ...

What is the constitutional right to personal privacy? ›

The First Amendment provides the freedom to choose any religious belief and to keep that choice private. The Third Amendment protects the zone of privacy in the home. The Fourth Amendment protects the right of privacy against unreasonable searches. It also applies to unlawful seizures by law enforcement.

What is personal privacy in the 4th Amendment? ›

“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things ...

What is the common law right to privacy? ›

The essence of the law derives from a right to privacy, defined broadly as "the right to be let alone". It usually excludes personal matters or activities which may reasonably be of public interest, like those of celebrities or participants in newsworthy events.

Top Articles
Latest Posts
Article information

Author: Merrill Bechtelar CPA

Last Updated:

Views: 6158

Rating: 5 / 5 (50 voted)

Reviews: 89% of readers found this page helpful

Author information

Name: Merrill Bechtelar CPA

Birthday: 1996-05-19

Address: Apt. 114 873 White Lodge, Libbyfurt, CA 93006

Phone: +5983010455207

Job: Legacy Representative

Hobby: Blacksmithing, Urban exploration, Sudoku, Slacklining, Creative writing, Community, Letterboxing

Introduction: My name is Merrill Bechtelar CPA, I am a clean, agreeable, glorious, magnificent, witty, enchanting, comfortable person who loves writing and wants to share my knowledge and understanding with you.