SlideShare a Scribd company logo
1 of 29
Presented By
Introduction to
Freedom of
Information Law
(The Law of
Information)
Dan Michaluk
April 2022
Your presenter
Dan is a cybersecurity, privacy and information
management lawyer, with significant experience
working with education and public sector organizations
in Canada. Dan helps organizations:
• respond optimally to security and cyber incidents
• defend security and privacy complaints, claims and
grievances
• handle complex freedom of information matters
and appeals
• address security and other operational issues
while minimizing privacy risks
Dan has maintained a privacy and security practice
since 2003 and has acted as a security incident
“coach” since 2006. He has represented clients in
significant privacy, security and freedom of information
litigation, including at the Ontario Court of Appeal and
Supreme Court of Canada.
Dan Michaluk
Partner
2
o The Best Lawyers in Canada (Privacy and Data
Security Law)
o Chambers Canada – Canada’s Leading Lawyers for
Business (Privacy & Data Protection)
o Lexpert Zenith Award – Celebrating Mid-Career
Excellence in Computer and IT Law (2018)
o LLB, Queen's University, 1997
o B.Comm, Queen's University, 1994
o The law of information underpins the privacy
and cyber practice – openness is the flip
side of secrecy
o FOI is a key driver of the law of information
• The scope of individual privacy rights
• The legitimate scope of confidential business
information
• The scope of legal privilege
o Public sector incident responders need to
know it
…to professionals in the privacy and cyber milieu
Why FOI is relevant
3
FOI basics
o Applies to designated “institutions” or “public
bodies” (tied to government funding)
o Statutes may exclude some records altogether
o Presumptive right of access to “records” in “custody
or control” (or “control”)
o And they exempt some information from the right of
public access
• Discretionary versus mandatory
• Status based versus harms based
o Institutions have the burden of establishing that an
exemption applies
o And information that can be severed must be
severed (“disconnected snippets” test)
How FOI works
FOI basics
5
o Personal privacy (mandatory)
• Federal – personal information
• Provincial – unjustified invasion
o Third-party business (mandatory)
• Trade secrets, commercial, technical and scientific
information
• Status based and harms based
o Economic interests of government (discretionary)
• Also status and harms based
• This is where institutional security comes in
o Privilege, advice and recommendations…
Key exemptions
FOI basics
6
Key legal concepts
o The test is disjunctive – note the “or”
o Not as straightforward as one may think
because…
• … one can have control without custody …
• bare possession does not amount to custody
o Contextual, multi-factor test – ATIA leading
case is Canada (Information Commissioner)
v. Canada (Minister of National Defence),
2011 SCC 25 (CanLII), [2011] 2 SCR 306
Custody or control
Key legal concepts
8
o Personal e-mails held on City server are not
within the City’s custody despite the City’s
governance of the e-mail system
o Not integrated, nothing to do with City business,
no issue of employee misconduct
o City of Ottawa v. Ontario, 2010 ONSC 6835
(CanLII), which is consistent with R v Cole and
2012 SCC 53 and Johnson v Bell Canada, 2008
FC 1086
Bare possession does not amount to custody
Key legal concepts
9
Scenario. Conti has stolen 200GB of data. The e-discovery
comes back identifying 10GB of personal files, including tax
returns with SINs. What does the organization do?
o Harms based exemptions are marked by the words
“could reasonably be expected to” or “reasonable
expectation of probable harm”
o The SCC has said that the standard this means
more than a mere possibility but less than likelihood
(50% plus a feather) - Merck Frosst Canada Ltd. v.
Canada (Health), 2012 SCC 3
o Also, the quality of the evidence must be “detailed
and convincing” or “clear and cogent”
o Practically harms based arguments require proof of
(a) confidentiality and (b) basic facts that establish
risk is non-speculative
o Case law recognizes difficulty of predicting future
events in a law enforcement context – Fineberg,
1994 CanLII 10563
The test for harm
Key legal concepts
10
o A legal right which allows persons to resist
compulsory disclosure of communications and
documents rooted in some recognized public
interest in secrecy
• Class based or case-by-case
o Based in common law, statute and the Charter and
recognized in FOI statutes
o Can be waived by purposeful communication about
a privileged communication or document
o Applies to communications and documents and not
facts, which is essential to understand
• Our investigator told us exfiltration was unlikely
• There is no evidence that establishes exfiltration
• We believe that exfiltration was unlikely
Legal privilege
Key legal concepts
11
o “About an identifiable individual”
o Must reveal something personal about an
individual in the relevant context – e.g.
doctors’ gross income from practice ≠ PI, air
traffic controller communications ≠ PI
o The test, however, is contextual – e.g. air
traffic controller under investigation!
o And must be a sufficient linkage - is there a
reasonable expectation that, when the
information in the record at issue is combined
with information from sources otherwise
available, the individual can be identified?
Personal information
Key legal concepts
12
o The right of privacy is not absolute
o In FOI statutes, this is reflected in the
“unjustified invasion of privacy” exemptions,
which attempt to set a balance
o Three stage analysis – deemed to be
inaccessible? Presumed to be an unjustified
invasion? Left to balancing based on
factors?
o Example of principle in action
• Lottery winners identities protected
• But not the identify of insiders
Unjustified invasion of privacy
Key legal concepts
13
o Records >> information >> data
o An institution must disclose what information
it can
o But when does redaction become an
exercise in futility, warranting withholding of
whole records?
o When what’s left would be meaningless (in
the context), and constitute “disconnected
snippets” of text
Disconnected snippets test
Key legal concepts
14
Presented By
Impact of new
and emerging
technologies on
FOI
Dan Michaluk
March 2022
The impact of internet
publication and search
Internet publication and search
17
o With the internet, we can no longer “hide in
the noise” or enjoy “practical obscurity”
o It has been used to shield the identity of
lottery winners once published - Order PO-
2812 (in which IPC relies on SCOTUS
Reporters’ Committee case and R v Duarte)
o This case was from 2009, is practical
obscurity still a reality today???
Practical obscurity is no longer protection
Internet publication and search
18
o Related principle – a disclosure to one is a
disclosure to the world
o This is about equal application of the law,
and as such is sound
o We generally don’t distinguish requester A
from requester B based on motive
o From an institutional perspective, the full
scope of potential harm should always be
presumed
o The question – Is that so?
A requester’s identity is irrelevant
Internet publication and search
19
o Information which in isolation appears
meaningless or trivial could, when fitted
together, permit a comprehensive
understanding of the information being
protected
o The “assiduous inquirer” or “informed
reader” has a strong ability to look-up
information piece together the full picture
o Note - in the Maher Arar decision (2007 FC
766) the Federal Court made that there
must be a factual basis for asserting that
innocuous information will lead to harm
Mosaic effect
Internet publication and search
20
The impact of the cyber
threat
o The Merck test - The institution resisting public
disclosure “must show that the risk of harm is
considerably above a mere possibility,
although not having to establish on the
balance of probabilities that the harm will in
fact occur.”
o How will regulators account for the plain
existence of adversaries and the potential for
“threat shifting” – “the response of adversaries
to perceived safeguards and/or
countermeasures (i.e., security controls), in
which adversaries change some characteristic
of their intent/targeting in order to avoid and/or
overcome those
safeguards/countermeasures.” (NIST)
The harms test and the risk of threat shifting
The impact of the cyber threat
22
o Ontario PO-3670 - location of its data centre
can be kept secret, consistent with Ontario
government IT standard and ISO/IEC
27002:2013
o BC F17-23 - Drive names and paths of LAN
storage systems reference to a secure
system URL based on security architect
data about standard practice
o BC F18-13 - manual relating to the a
stadium roof SCADA system.
Access denied
The impact of the cyber threat
23
o BC F-15-72 - User IDs disclosed over
Ministry arguments that such disclosure
would give hackers “valuable information to
assist in breaching layers of security of
government systems to access extremely
sensitive corrections information.”
o F2013-13 - Alberta OIPC rejected an
argument that obtaining a list of cellphone
numbers would allow an individual to
infiltrate a system or harm its safety and
security
• What about RROSH and e-mail addresses?
Access granted
The impact of the cyber threat
24
o There’s a legitimate need to share and obtain threat
information - any information related to a threat that
might help an organization protect itself against a
threat or detect the activities of an actor. Major
types of threat information include indicators, TTPs,
security alerts, threat intelligence reports, and tool
configurations
o Sharing between FOI institutions creates many
presumptively accessible copies
• Threat shifting potential is real
o So should institutions still share?
• Yes – benefit to all > cost
• Information becomes stale quickly, reducing risks
• If you have a 3P to distribute masked copies, do it
Threat information sharing and threat exchanges
The impact of the cyber threat
25
Data, data and more
data
o Traditionally, institutions sent search memos to
internal custodians, who would engage in
“field filtering”
o Has been affirmed despite allegations that
custodians cannot be trusted – see MO-2634
o Pressure to move to an “e-FOI” approach –
retrieve, de-duplicate and conduct a
coordinated search of an electronic repository
o Simply more efficient for dealing with large
sets of data, but it’s leading to costs that are
significant
Traditional FOI versus e-FOI
Data, data and more data
27
o FOI is a user pay system, though the tariffs
leave much of the cost unfunded
o In Ontario, there’s an outsourcing option that
can be used to recover 100% of the costs
• The costs, including computer costs, that the
institution incurs in locating, retrieving,
processing and copying the record if those
costs are specified in an invoice that the
institution has received
o E.g. MO-2154 - $12,500 fees affirmed for
request that included deleted e-mails
How are costs handled?
Data, data and more data
28
For more information, contact:
The information contained herein is of a general nature and is not intended to constitute legal advice, a complete statement of the law, or an opinion on
any subject. No one should act upon it or refrain from acting without a thorough examination of the law after the facts of a specific situation are considered.
You are urged to consult your legal adviser in cases of specific questions or concerns. BLG does not warrant or guarantee the accuracy, currency or
completeness of this presentation. No part of this presentation may be reproduced without prior written permission of Borden Ladner Gervais LLP.
© 2020 Borden Ladner Gervais LLP. Borden Ladner Gervais is an Ontario Limited Liability Partnership.
Thank You
Dan Michaluk
Partner
416.367.6097
dmichaluk@blg.com

More Related Content

Similar to Introduction to FOI law (the law of information)

Revision Data Protection Act (Eduardo And Salvador)
Revision   Data Protection Act (Eduardo And Salvador)Revision   Data Protection Act (Eduardo And Salvador)
Revision Data Protection Act (Eduardo And Salvador)
itgsabc
 
An Unmanned Aircraft System ( Uas )
An Unmanned Aircraft System ( Uas )An Unmanned Aircraft System ( Uas )
An Unmanned Aircraft System ( Uas )
Megan Espinoza
 
Trade secrets vs. confidential information
Trade secrets vs. confidential informationTrade secrets vs. confidential information
Trade secrets vs. confidential information
Altacit Global
 
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Lisa Abe-Oldenburg, B.Comm., JD.
 

Similar to Introduction to FOI law (the law of information) (20)

How your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyHow your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacy
 
Cyber, secrecy and the public body
Cyber, secrecy and the public bodyCyber, secrecy and the public body
Cyber, secrecy and the public body
 
The Privacy Law Landscape: Issues for the research community
The Privacy Law Landscape: Issues for the research communityThe Privacy Law Landscape: Issues for the research community
The Privacy Law Landscape: Issues for the research community
 
[Privacy Webinar Slides] Global Enforcement Priorities
[Privacy Webinar Slides] Global Enforcement Priorities[Privacy Webinar Slides] Global Enforcement Priorities
[Privacy Webinar Slides] Global Enforcement Priorities
 
Revision Data Protection Act (Eduardo And Salvador)
Revision   Data Protection Act (Eduardo And Salvador)Revision   Data Protection Act (Eduardo And Salvador)
Revision Data Protection Act (Eduardo And Salvador)
 
All_you_need_to Know_About_the_Data_Privacy_Act.pdf
All_you_need_to Know_About_the_Data_Privacy_Act.pdfAll_you_need_to Know_About_the_Data_Privacy_Act.pdf
All_you_need_to Know_About_the_Data_Privacy_Act.pdf
 
An Unmanned Aircraft System ( Uas )
An Unmanned Aircraft System ( Uas )An Unmanned Aircraft System ( Uas )
An Unmanned Aircraft System ( Uas )
 
2017 PlaceConf: Location & Privacy - What Marketers Must Know (Future of Priv...
2017 PlaceConf: Location & Privacy - What Marketers Must Know (Future of Priv...2017 PlaceConf: Location & Privacy - What Marketers Must Know (Future of Priv...
2017 PlaceConf: Location & Privacy - What Marketers Must Know (Future of Priv...
 
So You Want to Protect Privacy: Now What?
So You Want to Protect Privacy: Now What?So You Want to Protect Privacy: Now What?
So You Want to Protect Privacy: Now What?
 
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceCorporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
 
Data Privacy Compliance
Data Privacy ComplianceData Privacy Compliance
Data Privacy Compliance
 
The pandemic and privacy
The pandemic and privacyThe pandemic and privacy
The pandemic and privacy
 
Trade secrets vs. confidential information
Trade secrets vs. confidential informationTrade secrets vs. confidential information
Trade secrets vs. confidential information
 
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
 
ACEDS-Kroll Ontrack 2-24-15 Webcast
ACEDS-Kroll Ontrack 2-24-15 WebcastACEDS-Kroll Ontrack 2-24-15 Webcast
ACEDS-Kroll Ontrack 2-24-15 Webcast
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
 
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
 
Privacy in the Workplace: How Much Snooping is Legal and Proper?
Privacy in the Workplace: How Much Snooping is Legal and Proper?Privacy in the Workplace: How Much Snooping is Legal and Proper?
Privacy in the Workplace: How Much Snooping is Legal and Proper?
 
What is in store for e-discovery in 2015?
What is in store for e-discovery in 2015?What is in store for e-discovery in 2015?
What is in store for e-discovery in 2015?
 

More from Dan Michaluk

More from Dan Michaluk (20)

Ecno cyber - 23 June 2023 - djm(137852631.1).pptx
Ecno cyber - 23 June 2023 - djm(137852631.1).pptxEcno cyber - 23 June 2023 - djm(137852631.1).pptx
Ecno cyber - 23 June 2023 - djm(137852631.1).pptx
 
Critical Issues in School Board Cyber Security
Critical Issues in School Board Cyber SecurityCritical Issues in School Board Cyber Security
Critical Issues in School Board Cyber Security
 
Higher Education Sexual Violence Presentation
Higher Education Sexual Violence PresentationHigher Education Sexual Violence Presentation
Higher Education Sexual Violence Presentation
 
Cyber class action claims at an inflection point
Cyber class action claims at an inflection pointCyber class action claims at an inflection point
Cyber class action claims at an inflection point
 
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...
Cyber security for the regulator and regulated  - Ontario Regulatory Authorit...Cyber security for the regulator and regulated  - Ontario Regulatory Authorit...
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...
 
Union access to information
Union access to informationUnion access to information
Union access to information
 
Cybersecurity Risk Governance
Cybersecurity Risk GovernanceCybersecurity Risk Governance
Cybersecurity Risk Governance
 
Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?
 
The privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsThe privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analytics
 
Advocates' Society Tricks of the Trade 2019 - A Privacy Update
Advocates' Society Tricks of the Trade 2019 - A Privacy UpdateAdvocates' Society Tricks of the Trade 2019 - A Privacy Update
Advocates' Society Tricks of the Trade 2019 - A Privacy Update
 
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam CompliancePrivacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam Compliance
 
Cyber Insurance and Incident Response Practice
Cyber Insurance and Incident Response Practice Cyber Insurance and Incident Response Practice
Cyber Insurance and Incident Response Practice
 
Role of a breach coach
Role of a breach coachRole of a breach coach
Role of a breach coach
 
PHIPA for school boards
PHIPA for school boardsPHIPA for school boards
PHIPA for school boards
 
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam CompliancePrivacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam Compliance
 
Finding internet evidence
Finding internet evidenceFinding internet evidence
Finding internet evidence
 
Sexual Assault in Higher Education - Law Policy and Practice
Sexual Assault in Higher Education - Law Policy and PracticeSexual Assault in Higher Education - Law Policy and Practice
Sexual Assault in Higher Education - Law Policy and Practice
 
Cas cyber prez
Cas cyber prezCas cyber prez
Cas cyber prez
 
Canadian Association of University Solicitors - Privacy Update 2016
Canadian Association of University Solicitors - Privacy Update 2016Canadian Association of University Solicitors - Privacy Update 2016
Canadian Association of University Solicitors - Privacy Update 2016
 
Student Conduct Investigations - Examining Evidence and Determining Credibiliity
Student Conduct Investigations - Examining Evidence and Determining CredibiliityStudent Conduct Investigations - Examining Evidence and Determining Credibiliity
Student Conduct Investigations - Examining Evidence and Determining Credibiliity
 

Recently uploaded

一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
Fir La
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理
Airst S
 
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
F La
 
一比一原版赫瑞瓦特大学毕业证如何办理
一比一原版赫瑞瓦特大学毕业证如何办理一比一原版赫瑞瓦特大学毕业证如何办理
一比一原版赫瑞瓦特大学毕业证如何办理
Airst S
 
Article 12 of the Indian Constitution law
Article 12 of the Indian Constitution lawArticle 12 of the Indian Constitution law
Article 12 of the Indian Constitution law
yogita9398
 
一比一原版(BCU毕业证书)伯明翰城市大学毕业证成绩单原件一模一样
一比一原版(BCU毕业证书)伯明翰城市大学毕业证成绩单原件一模一样一比一原版(BCU毕业证书)伯明翰城市大学毕业证成绩单原件一模一样
一比一原版(BCU毕业证书)伯明翰城市大学毕业证成绩单原件一模一样
mefyqyn
 
一比一原版(UW毕业证书)西雅图华盛顿大学毕业证原件一模一样
一比一原版(UW毕业证书)西雅图华盛顿大学毕业证原件一模一样一比一原版(UW毕业证书)西雅图华盛顿大学毕业证原件一模一样
一比一原版(UW毕业证书)西雅图华盛顿大学毕业证原件一模一样
doypbe
 
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
ss
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理
Airst S
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
bd2c5966a56d
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
Airst S
 
一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理
e9733fc35af6
 

Recently uploaded (20)

一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理
 
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
 
Dematerialisation of securities of private companies
Dematerialisation of securities of private companiesDematerialisation of securities of private companies
Dematerialisation of securities of private companies
 
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersPhilippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
 
一比一原版赫瑞瓦特大学毕业证如何办理
一比一原版赫瑞瓦特大学毕业证如何办理一比一原版赫瑞瓦特大学毕业证如何办理
一比一原版赫瑞瓦特大学毕业证如何办理
 
Navigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxNavigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptx
 
3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt
 
Chambers Global Practice Guide - Canada M&A
Chambers Global Practice Guide - Canada M&AChambers Global Practice Guide - Canada M&A
Chambers Global Practice Guide - Canada M&A
 
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
 
Article 12 of the Indian Constitution law
Article 12 of the Indian Constitution lawArticle 12 of the Indian Constitution law
Article 12 of the Indian Constitution law
 
一比一原版(BCU毕业证书)伯明翰城市大学毕业证成绩单原件一模一样
一比一原版(BCU毕业证书)伯明翰城市大学毕业证成绩单原件一模一样一比一原版(BCU毕业证书)伯明翰城市大学毕业证成绩单原件一模一样
一比一原版(BCU毕业证书)伯明翰城市大学毕业证成绩单原件一模一样
 
ARTICLE 370 PDF about the indian constitution.
ARTICLE 370 PDF about the  indian constitution.ARTICLE 370 PDF about the  indian constitution.
ARTICLE 370 PDF about the indian constitution.
 
一比一原版(UW毕业证书)西雅图华盛顿大学毕业证原件一模一样
一比一原版(UW毕业证书)西雅图华盛顿大学毕业证原件一模一样一比一原版(UW毕业证书)西雅图华盛顿大学毕业证原件一模一样
一比一原版(UW毕业证书)西雅图华盛顿大学毕业证原件一模一样
 
It’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy Novices
It’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy NovicesIt’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy Novices
It’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy Novices
 
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
 
一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理
 

Introduction to FOI law (the law of information)

  • 1. Presented By Introduction to Freedom of Information Law (The Law of Information) Dan Michaluk April 2022
  • 2. Your presenter Dan is a cybersecurity, privacy and information management lawyer, with significant experience working with education and public sector organizations in Canada. Dan helps organizations: • respond optimally to security and cyber incidents • defend security and privacy complaints, claims and grievances • handle complex freedom of information matters and appeals • address security and other operational issues while minimizing privacy risks Dan has maintained a privacy and security practice since 2003 and has acted as a security incident “coach” since 2006. He has represented clients in significant privacy, security and freedom of information litigation, including at the Ontario Court of Appeal and Supreme Court of Canada. Dan Michaluk Partner 2 o The Best Lawyers in Canada (Privacy and Data Security Law) o Chambers Canada – Canada’s Leading Lawyers for Business (Privacy & Data Protection) o Lexpert Zenith Award – Celebrating Mid-Career Excellence in Computer and IT Law (2018) o LLB, Queen's University, 1997 o B.Comm, Queen's University, 1994
  • 3. o The law of information underpins the privacy and cyber practice – openness is the flip side of secrecy o FOI is a key driver of the law of information • The scope of individual privacy rights • The legitimate scope of confidential business information • The scope of legal privilege o Public sector incident responders need to know it …to professionals in the privacy and cyber milieu Why FOI is relevant 3
  • 5. o Applies to designated “institutions” or “public bodies” (tied to government funding) o Statutes may exclude some records altogether o Presumptive right of access to “records” in “custody or control” (or “control”) o And they exempt some information from the right of public access • Discretionary versus mandatory • Status based versus harms based o Institutions have the burden of establishing that an exemption applies o And information that can be severed must be severed (“disconnected snippets” test) How FOI works FOI basics 5
  • 6. o Personal privacy (mandatory) • Federal – personal information • Provincial – unjustified invasion o Third-party business (mandatory) • Trade secrets, commercial, technical and scientific information • Status based and harms based o Economic interests of government (discretionary) • Also status and harms based • This is where institutional security comes in o Privilege, advice and recommendations… Key exemptions FOI basics 6
  • 8. o The test is disjunctive – note the “or” o Not as straightforward as one may think because… • … one can have control without custody … • bare possession does not amount to custody o Contextual, multi-factor test – ATIA leading case is Canada (Information Commissioner) v. Canada (Minister of National Defence), 2011 SCC 25 (CanLII), [2011] 2 SCR 306 Custody or control Key legal concepts 8
  • 9. o Personal e-mails held on City server are not within the City’s custody despite the City’s governance of the e-mail system o Not integrated, nothing to do with City business, no issue of employee misconduct o City of Ottawa v. Ontario, 2010 ONSC 6835 (CanLII), which is consistent with R v Cole and 2012 SCC 53 and Johnson v Bell Canada, 2008 FC 1086 Bare possession does not amount to custody Key legal concepts 9 Scenario. Conti has stolen 200GB of data. The e-discovery comes back identifying 10GB of personal files, including tax returns with SINs. What does the organization do?
  • 10. o Harms based exemptions are marked by the words “could reasonably be expected to” or “reasonable expectation of probable harm” o The SCC has said that the standard this means more than a mere possibility but less than likelihood (50% plus a feather) - Merck Frosst Canada Ltd. v. Canada (Health), 2012 SCC 3 o Also, the quality of the evidence must be “detailed and convincing” or “clear and cogent” o Practically harms based arguments require proof of (a) confidentiality and (b) basic facts that establish risk is non-speculative o Case law recognizes difficulty of predicting future events in a law enforcement context – Fineberg, 1994 CanLII 10563 The test for harm Key legal concepts 10
  • 11. o A legal right which allows persons to resist compulsory disclosure of communications and documents rooted in some recognized public interest in secrecy • Class based or case-by-case o Based in common law, statute and the Charter and recognized in FOI statutes o Can be waived by purposeful communication about a privileged communication or document o Applies to communications and documents and not facts, which is essential to understand • Our investigator told us exfiltration was unlikely • There is no evidence that establishes exfiltration • We believe that exfiltration was unlikely Legal privilege Key legal concepts 11
  • 12. o “About an identifiable individual” o Must reveal something personal about an individual in the relevant context – e.g. doctors’ gross income from practice ≠ PI, air traffic controller communications ≠ PI o The test, however, is contextual – e.g. air traffic controller under investigation! o And must be a sufficient linkage - is there a reasonable expectation that, when the information in the record at issue is combined with information from sources otherwise available, the individual can be identified? Personal information Key legal concepts 12
  • 13. o The right of privacy is not absolute o In FOI statutes, this is reflected in the “unjustified invasion of privacy” exemptions, which attempt to set a balance o Three stage analysis – deemed to be inaccessible? Presumed to be an unjustified invasion? Left to balancing based on factors? o Example of principle in action • Lottery winners identities protected • But not the identify of insiders Unjustified invasion of privacy Key legal concepts 13
  • 14. o Records >> information >> data o An institution must disclose what information it can o But when does redaction become an exercise in futility, warranting withholding of whole records? o When what’s left would be meaningless (in the context), and constitute “disconnected snippets” of text Disconnected snippets test Key legal concepts 14
  • 15. Presented By Impact of new and emerging technologies on FOI Dan Michaluk March 2022
  • 16. The impact of internet publication and search
  • 18. o With the internet, we can no longer “hide in the noise” or enjoy “practical obscurity” o It has been used to shield the identity of lottery winners once published - Order PO- 2812 (in which IPC relies on SCOTUS Reporters’ Committee case and R v Duarte) o This case was from 2009, is practical obscurity still a reality today??? Practical obscurity is no longer protection Internet publication and search 18
  • 19. o Related principle – a disclosure to one is a disclosure to the world o This is about equal application of the law, and as such is sound o We generally don’t distinguish requester A from requester B based on motive o From an institutional perspective, the full scope of potential harm should always be presumed o The question – Is that so? A requester’s identity is irrelevant Internet publication and search 19
  • 20. o Information which in isolation appears meaningless or trivial could, when fitted together, permit a comprehensive understanding of the information being protected o The “assiduous inquirer” or “informed reader” has a strong ability to look-up information piece together the full picture o Note - in the Maher Arar decision (2007 FC 766) the Federal Court made that there must be a factual basis for asserting that innocuous information will lead to harm Mosaic effect Internet publication and search 20
  • 21. The impact of the cyber threat
  • 22. o The Merck test - The institution resisting public disclosure “must show that the risk of harm is considerably above a mere possibility, although not having to establish on the balance of probabilities that the harm will in fact occur.” o How will regulators account for the plain existence of adversaries and the potential for “threat shifting” – “the response of adversaries to perceived safeguards and/or countermeasures (i.e., security controls), in which adversaries change some characteristic of their intent/targeting in order to avoid and/or overcome those safeguards/countermeasures.” (NIST) The harms test and the risk of threat shifting The impact of the cyber threat 22
  • 23. o Ontario PO-3670 - location of its data centre can be kept secret, consistent with Ontario government IT standard and ISO/IEC 27002:2013 o BC F17-23 - Drive names and paths of LAN storage systems reference to a secure system URL based on security architect data about standard practice o BC F18-13 - manual relating to the a stadium roof SCADA system. Access denied The impact of the cyber threat 23
  • 24. o BC F-15-72 - User IDs disclosed over Ministry arguments that such disclosure would give hackers “valuable information to assist in breaching layers of security of government systems to access extremely sensitive corrections information.” o F2013-13 - Alberta OIPC rejected an argument that obtaining a list of cellphone numbers would allow an individual to infiltrate a system or harm its safety and security • What about RROSH and e-mail addresses? Access granted The impact of the cyber threat 24
  • 25. o There’s a legitimate need to share and obtain threat information - any information related to a threat that might help an organization protect itself against a threat or detect the activities of an actor. Major types of threat information include indicators, TTPs, security alerts, threat intelligence reports, and tool configurations o Sharing between FOI institutions creates many presumptively accessible copies • Threat shifting potential is real o So should institutions still share? • Yes – benefit to all > cost • Information becomes stale quickly, reducing risks • If you have a 3P to distribute masked copies, do it Threat information sharing and threat exchanges The impact of the cyber threat 25
  • 26. Data, data and more data
  • 27. o Traditionally, institutions sent search memos to internal custodians, who would engage in “field filtering” o Has been affirmed despite allegations that custodians cannot be trusted – see MO-2634 o Pressure to move to an “e-FOI” approach – retrieve, de-duplicate and conduct a coordinated search of an electronic repository o Simply more efficient for dealing with large sets of data, but it’s leading to costs that are significant Traditional FOI versus e-FOI Data, data and more data 27
  • 28. o FOI is a user pay system, though the tariffs leave much of the cost unfunded o In Ontario, there’s an outsourcing option that can be used to recover 100% of the costs • The costs, including computer costs, that the institution incurs in locating, retrieving, processing and copying the record if those costs are specified in an invoice that the institution has received o E.g. MO-2154 - $12,500 fees affirmed for request that included deleted e-mails How are costs handled? Data, data and more data 28
  • 29. For more information, contact: The information contained herein is of a general nature and is not intended to constitute legal advice, a complete statement of the law, or an opinion on any subject. No one should act upon it or refrain from acting without a thorough examination of the law after the facts of a specific situation are considered. You are urged to consult your legal adviser in cases of specific questions or concerns. BLG does not warrant or guarantee the accuracy, currency or completeness of this presentation. No part of this presentation may be reproduced without prior written permission of Borden Ladner Gervais LLP. © 2020 Borden Ladner Gervais LLP. Borden Ladner Gervais is an Ontario Limited Liability Partnership. Thank You Dan Michaluk Partner 416.367.6097 dmichaluk@blg.com

Editor's Notes

  1. Welcome everyone I’m Dan Michaluk Happy to present on the current state of FOI As part of the Osgoode Certificate in Privacy & Cybersecurity … FOI has been a key part of my own practice for a long time now – 20 years Grown into cyber security and cyber incident response, heavily in the last five os ro yesr Time when lawyers are trying to find true legal substance in providing cyber services (to distinguish them from many, many consultants in the space) Understanding the law of information is part of that And that’s really what FOI law has been to me, a chance to learn and apply the law of information Easily called this the law of information
  2. -bla bla bla -but do visit allaboutinformation.ca
  3. Whether you are a lawyer or a nonlegal professional, everything we do in this space is premised on the law of information -It’s not as transitory as computer law, internet law or AI law -It addresses the more foundational questions -What does privacy mean? -What information has a “quality of confidence” such that it deserves legal protection? -What communications warrant the application of a legal privilege? I think if you have a good sense of how to answer these questions you’ll be better at your job And FOI’s drives that law Think of some of the key cases about privacy – Dagg for example, is a case about an ATIP request The same goes for confidentiality and legal privilege So there’s a lot to joining the club of FOI nerds to which I belong Maybe more practically… if you’re a cyber responder in the public sector you need to know it As you’ll see… FOI puts a lot of pressure on transparency pressure on public sector intuitions You need to be able to manage that when you’re responding to a public sector incident
  4. -statutes provincial and federal – underscored by Charter
  5. -personal information is exempt… head has discretion to disclose it if head believes public interest clearly outweighs the resulting invasion of privacy (but very protective) -versus provincial unjustified invasion standard – personal information is not necessarily exempt… built in balance to the exemption
  6. -STAART W FOI – DOESN’T APPLY TO RECORDS UNLESS THEY ARE IN CUSTODY OR CONTROL -control without custody -outsourcing and accountability is a big topic in data security and privacy -organization object is to foster strong control without custody -standard terms -put them in a DPA – data protection addendum -recent cases in Ontario PS – Halton DSB and TDSB -bare possession is not necessarily custody -prime minister’s agenda not in control of RCMP or Privy Counsel Office -though they had them in their possession -see the leading test here
  7. -get this finding with personal e-mails on government e-mail servers -ordinarily not subject to the presumptive right of access -based on facts but pretty broad … -that’s a 400,000 e-discovery bill by the way -but you learn a lot about how your network is being used -truly personal then disregard -at most give employees mass warning -personal business – individual warning -personal use that you’ve invited, then include that in your notification set -send me back this form -here’s a form to send to our insurance company for enrollment
  8. EXEMPTION ISSUE – IF THE DISCLSOURE COULD REASONABLY BE EXPECTED TO CAUSE ECONOMIC HARM, PROTECTED -How much risk does there need to before it warrants putting up a barrier to the transparency guaranteed by statute? -risk assessment which is part of the data security domain 1) identify your threat scenario – a competitor will use this information to under bid us 2) assess the probability of it happening – low, medium, high -look for evidence that underscores the probability – do that by inference (connect the dots) -we are have four key competitors -we all of our products are identical -it’s happened to us before -you get a bit of a break when the threat scenario is about a malicious actor -drive to the evidence that helps you understand the probability of the bad action -one other respect of cyber security this relates to is data classification -green/public, amber medium security, protect, top secret -if you work with this model enough you will see data classifications pop out at you -some information just doesn’t have a quality of confidence -factual and not evaluative -facts are obvious rather than non obvious -and the facts are general in nature
  9. Privilege is so important to understand FOI – EXEMPT – IF PRIVILEGED IT IS EXEMP -lcass based -soclitor and client privilege, litigation privilege, settlement privilege – look at the parameters and see fi they are met -case by case – balance all the factors -slavuych – terminated for tenture feedback received in confidence -communications and documetns and not facts… hard to understand but very important, especially when you are trying to avoid a waiver -simply because you can refer to facts without waiving gprivilege ANOTHER -this allegation is bogus -we had our expert counsel look into it -it is bogus because of x and y
  10. FOI – more amenable to protection if it is PI -under some statutes it is protected pure and simple, other you have to engage in a second layer of balancing Definition and key case law Ontario Medical Association v Ontario (Information and Privacy Commissioner), 2018 ONCA 673 Canada (Information Commissioner) v Canada (Transportation Accident Investigation and Safety Board) 2006 FCA 157 Gordon v Canada (Minister of Health) + Ontario Case called Pascoe Tie in to cyber -lose 200gb -teams of 35 reviewer ploughing through trying to identify all PI -my own preference is to ho source -students do it on a small scale… applying this law Also -can I send that spreadsheet in plaint text e-mail if I delete the first and last name colums -please… -answer is probably no…. -that’s just a variation of pseudoanonymization – remove enough identierfrs to sufficiently protect a data set
  11. -in Ontario and most of the provinces the test is unjustified invasion -can have an invitation of privacy, and the public interest in government transparency prevails over it -literally justifies the invasion Tie into cyber an data security is rather fundamental -what is and is not reasonable to disclose -how sensitive is something -what’s a good -incredibly contextual -incredibly hard to protect -because the law is very clear that privacy is not absolute -lost of my practice is trying to be a good judge of that -the problem with pracy protectxion is that itg’s causin gfinrformaiton not to flow -think of network security and the need for early detection -need solid behavioral monitoring -but the rules are unclear -it’s rare to give an unqualified opinion but often we can enable if we have a strong graps of how a judg eor a commissioner will strike the balance -
  12. Foi -disclose what you can -withhold what you must -and if you must withhold so much that the disclosure is meaningless -just hold back the whole doc Rather tdirectly a data security/confidentiality problem -what can you reveal whithout revealing the secret indrieclty -a good task for lawyer -about text and inferences -if you can apply this test it’s like you’ll be better as speaking data seurity
  13. A little more applied And a little highler level Where we are and where are we going Identify the issues to study
  14. Called openness under pressure It’s about how FOI is responding to modern challenges -ease by which information is disseminated -the cyber threat Each of these factors weigh against the disclosure of government information pursuant to the FOI regime
  15. Let’s look a little more closely at the two factors Ease by which information is disseminated, increase the impact and harm from the disclosure of information -so much so that we have privacy law developing to put brakes on the flow of information -with the RTBF, new online harassment tort, the Sherman estate case -legal developmetns that counter act the free flow we are seeing -puts pressure on the FOI system too – weighs against stranspraency -true adversaries who will use benign information against organizations -hackers are doing open source intelligence gathering to perpetrate hacks -almost any information held within an organization can be used for social engineering purposes -we’re experiencing VPN problems -not confidential business information -used by hackers who compromised Twitter’s account management system in 2020 -Now I’m not suggesting hackers will file FOI requests -but any FOI requester is free to publish a response on the internet… so how should we adjust?
  16. Let’s examine this some more by reference to some fundamental principles The first one being the principle of practical obscurity … Information is practically obscure if has been published but is nonetheless not widely distributed or known Practical obscurity is protective in this way … To date it has been mainly used to preserve privacy despite limited publication …. -did a case in which we argued that point successfully -lottery winner > $50,000… media release (security reasons) -but they were not available on the internet -argued that they needed tor remain practically secure … -rap sheets… convictions a matter of public records but access denied under FOI statute in any event … This was 2009 We just won’t likely have that fact scenario available to us going forward The internet is like an archive of everything…
  17. Here’s another related principle … -denied access to requester’s own information … likely harm to others In my view, there is sufficient evidence before me to conclude that the appellant’s motives for seeking access to this information are not benevolent and that he has demonstrated a history of intimidating behaviour. …. -sounds so sensible but it is radical…. -another person could conceivably access the same information and treat it freely ….
  18. -not only is the information at issue likely to be disseminated -it may be more readily decoded to cause harm…. The affiant X (for the RCMP) explains that “the more limited the dissemination of some of the information, the more likely an informed reader can determine the targets, sources and methods of operation of the agency” Traditionally we look at the “informed reader” or the “assiduous inquirer” [what now in light of the internet]