Back to Prime Nest

Prime Nest

Privacy & Electronic Communications Policy

Last updated: January 2025

Prime Nest ("Prime Nest", "we", "our" or "us") delivers property management services throughout the National Capital Region. This Privacy Policy explains how we comply with the Personal Information Protection and Electronic Documents Act (PIPEDA) and Canada's Anti-Spam Legislation (CASL), and how we collect, use, share, and safeguard your personal information.

Prime Nest collects and processes personal information through our primary website prime-nest.ca and our viewing platform viewing.rsvp, both owned and operated by Prime Nest. Information submitted on either domain is governed by this Privacy Policy.

1. Contact & Accountability

Prime Nest is responsible for the personal information under its control and has appointed a privacy officer to oversee compliance with this Policy.

2. Scope & Definition of Personal Information

This Policy applies to personal information we collect from property owners, tenants, prospective residents, vendors, and website visitors. Personal information includes any information about an identifiable individual, such as contact details, tenancy records, communication preferences, and payment data.

3. Information We Collect

4. How We Use Personal Information

5. Consent & CASL Compliance

6. PIPEDA Principles in Practice

7. How We Share Information

We do not sell personal information. We may share information with service providers, landlords or investors where required to deliver management services, legal authorities where compelled, or transaction counterparties under confidentiality protections.

8. Retention & Storage

We retain personal information only as long as necessary to fulfill the purposes identified in this Policy and meet legal, accounting, or reporting requirements. When no longer required, information is securely anonymized or destroyed.

9. Safeguards

Prime Nest uses layered safeguards proportional to the sensitivity of the information, including encrypted transmission where applicable, role-based access controls, logging, and secure vendor management practices.