Purpose Limitation and Secondary Use
Plain English Translation
Quebec Law 25 Section 12 enforces strict purpose limitation, prohibiting organizations from using personal information for a secondary purpose without obtaining new, express consent. Exceptions exist for specific scenarios such as fraud prevention, service delivery, and statistical research using de-identified data. To maintain Quebec Law 25 compliance, organizations must document the lawful basis for secondary use and clearly track all Loi 25 consent requirements.
Technical Implementation
Use the tabs below to select your organization size.
Required Actions (startup)
- Maintain a centralized list of declared purposes for data collection.
- Implement basic consent mechanisms before reusing data for new features.
Required Actions (scaleup)
- Integrate a consent management platform (CMP) to track secondary purpose opt-in and opt-out preferences.
- Establish internal procedures to document exceptions like fraud prevention or service delivery.
Required Actions (enterprise)
- Implement automated data lineage and purpose-based access controls.
- Conduct continuous audits on the use of de-identified information for research and statistics.
Under Quebec Law 25 section 12 secondary use of personal information is strictly prohibited unless the organization obtains new consent from the individual or a specific statutory exception applies.
Express consent is strictly required before using sensitive personal information for any new, secondary purpose. For non-sensitive data, organizations must learn how to obtain express consent under Quebec Law 25 or rely on standard consent mechanisms unless a legal exception is met.
A secondary purpose is any use of personal data that falls outside the direct, relevant connection to the original purposes stated at the time of collection. Notably, commercial or philanthropic prospection is never considered a consistent primary purpose and requires separate consent.
The Law 25 exceptions to consent for secondary purposes include uses that are consistent with the original purpose, clearly for the individual's benefit, necessary for fraud prevention, necessary for requested service delivery, or for study and research if the data is de-identified.
Yes, the Law 25 fraud prevention exception personal information use rule allows the secondary application of data without new consent if it is strictly necessary to prevent and detect fraud or to assess and improve security measures.
No, the Law 25 service delivery exception for secondary use allows organizations to process data without a new round of consent if the use is strictly necessary to provide or deliver a product or service specifically requested by the individual.
To understand how to document lawful basis for secondary use under Law 25, organizations should maintain a detailed Record of Processing Activities and conduct Lawful Basis Assessments mapping data usage to specific Section 12 exceptions.
Consent language must be clear, simple, and presented separately from other terms. When dealing with Quebec Law 25 secondary purpose opt out vs opt in requirements, organizations should utilize active opt-in mechanisms rather than relying on passive acceptance or pre-ticked boxes.
Yes, the Law 25 de-identified information research and statistics exception permits secondary use for study, research, or statistics without consent, provided the information is properly de-identified and measures are taken to limit the risk of re-identification.
Organizations must provide a straightforward way for users to withdraw their consent for secondary uses. Once withdrawn, the organization must immediately cease using the personal information for that specific secondary purpose.
Start by defining approved purposes and mapping processing activities to those purposes, then require an explicit review when a team proposes a new use. Tools like WatchDog Security's Compliance Center can help centralize control requirements, track evidence (e.g., RoPA, lawful-basis assessments), and flag gaps when consent or an exception is not documented.
Treat each secondary use as a decision record: document the purpose change, the consent basis (if applicable), or the specific exception and supporting rationale, plus who approved it and when. Tools like WatchDog Security's Policy Management can help standardize these workflows with controlled templates, versioning, and acknowledgment tracking so teams can consistently demonstrate governance during audits.
"Unless the person concerned gives his consent, personal information may not be used within the enterprise except for the purposes for which it was collected. Such consent must be given expressly when it concerns sensitive personal information. Personal information may, however, be used for another purpose without the consent of the person concerned, but only (1) if it is used for purposes consistent with the purposes for which it was collected; (2) if it is clearly used for the benefit of the person concerned; (3) if its use is necessary for the purpose of preventing and detecting fraud or of assessing and improving protection and security measures; (4) if its use is necessary for the purpose of providing or delivering a product or providing a service requested by the person concerned; or (5) if its use is necessary for study or research purposes or for the production of statistics and if the information is de-identified."
| Version | Date | Author | Description |
|---|---|---|---|
| 1.0.0 | 2026-02-23 | WatchDog Security GRC Team | Initial publication |