SlideShare a Scribd company logo
1 of 19
Presented By
The current
state of FOI
Dan Michaluk
March 2021
Your presenter
Dan is a well-recognized cybersecurity, privacy and
information management lawyer, with significant
experience working with education and public sector
organizations in Canada. Dan helps organizations:
• respond optimally to security and cyber incidents
• defend security and privacy complaints, claims and
grievances
• handle complex freedom of information matters
and appeals
• address security and other operational issues
while minimizing privacy risks
Dan has maintained a privacy and security practice
since 2003 and has acted as a security incident
“coach” since 2006. He has represented clients in
significant privacy, security and freedom of information
litigation, including at the Ontario Court of Appeal and
Supreme Court of Canada.
Dan Michaluk
Partner
2
o The Best Lawyers in Canada (Privacy and Data
Security Law)
o Chambers Canada – Canada’s Leading Lawyers for
Business (Privacy & Data Protection)
o Lexpert Zenith Award – Celebrating Mid-Career
Excellence in Computer and IT Law (2018)
o LLB, Queen's University, 1997
o B.Comm, Queen's University, 1994
o The law of information underpins the privacy
and cyber practice
o FOI is a key driver of the law of information
• The scope of individual privacy rights
• The legitimate scope of confidential business
information
• The scope of legal privilege
o Public sector incident responders need to
know it
…to professionals in the privacy and cyber milieu
Why FOI is relevant
3
Agenda
o FOI basics
o Openness under pressure
o Data security and FOI
How should FOI respond to the increased need for
secrecy?
4
FOI basics
o Applies to designated “institutions” or “public
bodies” (tied to government funding)
o Presumptive right of access to “records” in
“custody or control” (or “control”)
o Though the Act excludes some records
altogether
o And exempts some information from the right
of public access
o Institutions have the burden of establishing
that an exemption applies
o And information that can be severed must be
severed (“disconnected snippets” test)
How FOI works
FOI basics
6
o Not as straightforward as one may think
because…
• … one can have control without custody – see
Laurentian University federated university
case and consider government employee use
of personal IT services
• … bare possession does not amount to
custody – e.g. City of Ottawa e-mail case
o Contextual, multi-factor test – ATIA leading
case is Canada (Information Commissioner)
v. Canada (Minister of National Defence),
2011 SCC 25 (CanLII), [2011] 2 SCR 306
Custody or control
FOI basics
7
o Personal privacy (mandatory)
• Federal – personal information
• Provincial – unjustified invasion
o Third-party business (mandatory)
• Trade secrets, commercial, technical and scientific
information
• Class based or harms based
o Economic interests of government (discretionary)
• Also class and harms based
• This is where institutional security comes in
o Privilege, advice and recommendations…
Key exemptions
FOI basics
8
Openness under
pressure
Openness under pressure
10
o With the internet, we can no longer “hide in
the noise” or enjoy “practical obscurity”
o It has been used to shield the identity of
lottery winners once published - Order PO-
2812 (in which IPC relies on SCOTUS
Reporters’ Committee case and R v Duarte)
o This case was from 2009, is practical
obscurity still a reality today???
Practical obscurity is no longer protection
Openness under pressure
11
o Related principle – a disclosure to one is a
disclosure to the world
o This is about equal application of the law,
and as such is sound
o We generally don’t distinguish requester A
from requester B based on motive
o From an institutional perspective, the full
scope of potential harm should always be
presumed
o The question – Is that so?
A requester’s identity is irrelevant
Openness under pressure
12
o Information which in isolation appears
meaningless or trivial could, when fitted
together, permit a comprehensive
understanding of the information being
protected
o The “assiduous inquirer” or “informed
reader” has a strong ability to look-up
information piece together the full picture
o Note - in the Maher Arar decision (2007 FC
766) the Federal Court made that there
must be a factual basis for asserting that
innocuous information will lead to harm
Mosaic effect
Openness under pressure
13
Data security and FOI
o The Merck test - The institution resisting public
disclosure “must show that the risk of harm is
considerably above a mere possibility,
although not having to establish on the
balance of probabilities that the harm will in
fact occur.”
o How will regulators account for the plain
existence of adversaries and the potential for
“threat shifting” – “the response of adversaries
to perceived safeguards and/or
countermeasures (i.e., security controls), in
which adversaries change some characteristic
of their intent/targeting in order to avoid and/or
overcome those
safeguards/countermeasures.” (NIST)
The harms test and the risk of threat shifting
Data security and FOI
15
o Ontario PO-3670 - location of its data centre
can be kept secret, consistent with Ontario
government IT standard and ISO/IEC
27002:2013
o BC F17-23 - Drive names and paths of LAN
storage systems reference to a secure
system URL based on security architect
data about standard practice
o BC F18-13 - manual relating to the a
stadium roof SCADA system.
Access denied
Data security and FOI
16
o BC F-15-72 - User IDs disclosed over
Ministry arguments that such disclosure
would give hackers “valuable information to
assist in breaching layers of security of
government systems to access extremely
sensitive corrections information.”
o F2013-13 - Alberta OIPC rejected an
argument that obtaining a list of cellphone
numbers would allow an individual to
infiltrate a system or harm its safety and
security
• What about RROSH and e-mail addresses?
Access granted
Data security and FOI
17
o There’s a legitimate need to share and obtain threat
information - any information related to a threat that
might help an organization protect itself against a
threat or detect the activities of an actor. Major
types of threat information include indicators, TTPs,
security alerts, threat intelligence reports, and tool
configurations
o Sharing between FOI institutions creates many
presumptively accessible copies
• Threat shifting potential is real
o So should institutions still share?
• Yes – benefit to all > cost
• Information becomes stale quickly, reducing risks
• If you have a 3P to distribute masked copies, do it
Threat information sharing and threat exchanges
Data security and FOI
18
For more information, contact:
The information contained herein is of a general nature and is not intended to constitute legal advice, a complete statement of the law, or an opinion on
any subject. No one should act upon it or refrain from acting without a thorough examination of the law after the facts of a specific situation are considered.
You are urged to consult your legal adviser in cases of specific questions or concerns. BLG does not warrant or guarantee the accuracy, currency or
completeness of this presentation. No part of this presentation may be reproduced without prior written permission of Borden Ladner Gervais LLP.
© 2020 Borden Ladner Gervais LLP. Borden Ladner Gervais is an Ontario Limited Liability Partnership.
Thank You
Dan Michaluk
Partner
416.367.6097
dmichaluk@blg.com

More Related Content

What's hot

[CB20] Privacy protection and Data breach incident response regulation in Eas...
[CB20] Privacy protection and Data breach incident response regulation in Eas...[CB20] Privacy protection and Data breach incident response regulation in Eas...
[CB20] Privacy protection and Data breach incident response regulation in Eas...
CODE BLUE
 
Data Privacy Micc Presentation
Data Privacy   Micc PresentationData Privacy   Micc Presentation
Data Privacy Micc Presentation
ashishjoshi
 
Professionalism and Civility in Electronic Discovery
Professionalism and Civility in Electronic DiscoveryProfessionalism and Civility in Electronic Discovery
Professionalism and Civility in Electronic Discovery
Parsons Behle & Latimer
 

What's hot (20)

Studentsat Risk Managingon Campus Violence
Studentsat Risk Managingon Campus ViolenceStudentsat Risk Managingon Campus Violence
Studentsat Risk Managingon Campus Violence
 
Social media – issues and trends caus 2014
Social media – issues and trends   caus 2014Social media – issues and trends   caus 2014
Social media – issues and trends caus 2014
 
Cybersecurity and data loss - It's not just about lost USB keys today
Cybersecurity and data loss - It's not just about lost USB keys todayCybersecurity and data loss - It's not just about lost USB keys today
Cybersecurity and data loss - It's not just about lost USB keys today
 
[CB20] Privacy protection and Data breach incident response regulation in Eas...
[CB20] Privacy protection and Data breach incident response regulation in Eas...[CB20] Privacy protection and Data breach incident response regulation in Eas...
[CB20] Privacy protection and Data breach incident response regulation in Eas...
 
Cybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data EncryptionCybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data Encryption
 
How your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyHow your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacy
 
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam CompliancePrivacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam Compliance
 
Working with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security StrategiesWorking with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security Strategies
 
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
 
Legal Issues for Innovators & Inventors (Series: Intellectual Property 201)
Legal Issues for Innovators & Inventors (Series: Intellectual Property 201)Legal Issues for Innovators & Inventors (Series: Intellectual Property 201)
Legal Issues for Innovators & Inventors (Series: Intellectual Property 201)
 
Data Privacy Micc Presentation
Data Privacy   Micc PresentationData Privacy   Micc Presentation
Data Privacy Micc Presentation
 
Mandatory data breach notification for Australia
Mandatory data breach notification for AustraliaMandatory data breach notification for Australia
Mandatory data breach notification for Australia
 
Professionalism and Civility in Electronic Discovery
Professionalism and Civility in Electronic DiscoveryProfessionalism and Civility in Electronic Discovery
Professionalism and Civility in Electronic Discovery
 
Privacy and breaches in health care - a legal update
Privacy and breaches in health care - a legal updatePrivacy and breaches in health care - a legal update
Privacy and breaches in health care - a legal update
 
The ugly, the bad and the good of cloud computing
The ugly, the bad and the good of cloud computingThe ugly, the bad and the good of cloud computing
The ugly, the bad and the good of cloud computing
 
Internal Investigations and Employee Privacy
Internal Investigations and Employee PrivacyInternal Investigations and Employee Privacy
Internal Investigations and Employee Privacy
 
Pls 780 week 9
Pls 780 week 9Pls 780 week 9
Pls 780 week 9
 
Gdpr demystified - making sense of the regulation
Gdpr demystified  - making sense of the regulationGdpr demystified  - making sense of the regulation
Gdpr demystified - making sense of the regulation
 
Cyber Liability Coverage in the Marketplace with Dan Cotter
Cyber Liability Coverage in the Marketplace with Dan CotterCyber Liability Coverage in the Marketplace with Dan Cotter
Cyber Liability Coverage in the Marketplace with Dan Cotter
 
20 New Trends and Developments in Computer and Internet Law
20 New Trends and Developments in Computer and Internet Law20 New Trends and Developments in Computer and Internet Law
20 New Trends and Developments in Computer and Internet Law
 

Similar to The Current State of FOI

Amcto presentation final
Amcto presentation finalAmcto presentation final
Amcto presentation final
Dan Michaluk
 
ZoomLens - Loveland, Subramanian -Tackling Info Risk
ZoomLens - Loveland, Subramanian -Tackling Info RiskZoomLens - Loveland, Subramanian -Tackling Info Risk
ZoomLens - Loveland, Subramanian -Tackling Info Risk
John Loveland
 
2014 NCSAM - Data Security and Compliance—What You Need to Know.pptx
2014 NCSAM - Data Security and Compliance—What You Need to Know.pptx2014 NCSAM - Data Security and Compliance—What You Need to Know.pptx
2014 NCSAM - Data Security and Compliance—What You Need to Know.pptx
VITNetflix
 
wp-follow-the-data
wp-follow-the-datawp-follow-the-data
wp-follow-the-data
Numaan Huq
 
A Case For Information Protection Programs
A Case For Information Protection ProgramsA Case For Information Protection Programs
A Case For Information Protection Programs
Michael Annis
 
Target Data Security Breach Case Study
Target Data Security Breach Case StudyTarget Data Security Breach Case Study
Target Data Security Breach Case Study
Angilina Jones
 

Similar to The Current State of FOI (20)

Introduction to FOI law (the law of information)
Introduction to FOI law (the law of information)Introduction to FOI law (the law of information)
Introduction to FOI law (the law of information)
 
The Sedona Canada Panel on Privacy and E-Discovery
The Sedona Canada Panel on Privacy and E-DiscoveryThe Sedona Canada Panel on Privacy and E-Discovery
The Sedona Canada Panel on Privacy and E-Discovery
 
Amcto presentation final
Amcto presentation finalAmcto presentation final
Amcto presentation final
 
What is in store for e-discovery in 2015?
What is in store for e-discovery in 2015?What is in store for e-discovery in 2015?
What is in store for e-discovery in 2015?
 
Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015
 
ZoomLens - Loveland, Subramanian -Tackling Info Risk
ZoomLens - Loveland, Subramanian -Tackling Info RiskZoomLens - Loveland, Subramanian -Tackling Info Risk
ZoomLens - Loveland, Subramanian -Tackling Info Risk
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
2014 NCSAM - Data Security and Compliance—What You Need to Know.pptx
2014 NCSAM - Data Security and Compliance—What You Need to Know.pptx2014 NCSAM - Data Security and Compliance—What You Need to Know.pptx
2014 NCSAM - Data Security and Compliance—What You Need to Know.pptx
 
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
 
Data Privacy Compliance
Data Privacy ComplianceData Privacy Compliance
Data Privacy Compliance
 
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
 
How to Build and Implement your Company's Information Security Program
How to Build and Implement your Company's Information Security ProgramHow to Build and Implement your Company's Information Security Program
How to Build and Implement your Company's Information Security Program
 
wp-follow-the-data
wp-follow-the-datawp-follow-the-data
wp-follow-the-data
 
2017 PlaceConf: Location & Privacy - What Marketers Must Know (Future of Priv...
2017 PlaceConf: Location & Privacy - What Marketers Must Know (Future of Priv...2017 PlaceConf: Location & Privacy - What Marketers Must Know (Future of Priv...
2017 PlaceConf: Location & Privacy - What Marketers Must Know (Future of Priv...
 
An ethical approach to data privacy protection
An ethical approach to data privacy protectionAn ethical approach to data privacy protection
An ethical approach to data privacy protection
 
Paul Louis Arslanian, Former Director Bureau d´Enteques et d´Analyses until 2...
Paul Louis Arslanian, Former Director Bureau d´Enteques et d´Analyses until 2...Paul Louis Arslanian, Former Director Bureau d´Enteques et d´Analyses until 2...
Paul Louis Arslanian, Former Director Bureau d´Enteques et d´Analyses until 2...
 
A Case For Information Protection Programs
A Case For Information Protection ProgramsA Case For Information Protection Programs
A Case For Information Protection Programs
 
Target Data Security Breach Case Study
Target Data Security Breach Case StudyTarget Data Security Breach Case Study
Target Data Security Breach Case Study
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation
 

More from Dan Michaluk

Cacuss 2015 sexual violence
Cacuss 2015 sexual violenceCacuss 2015 sexual violence
Cacuss 2015 sexual violence
Dan Michaluk
 

More from Dan Michaluk (19)

Ecno cyber - 23 June 2023 - djm(137852631.1).pptx
Ecno cyber - 23 June 2023 - djm(137852631.1).pptxEcno cyber - 23 June 2023 - djm(137852631.1).pptx
Ecno cyber - 23 June 2023 - djm(137852631.1).pptx
 
Critical Issues in School Board Cyber Security
Critical Issues in School Board Cyber SecurityCritical Issues in School Board Cyber Security
Critical Issues in School Board Cyber Security
 
Cybersecurity Risk Governance
Cybersecurity Risk GovernanceCybersecurity Risk Governance
Cybersecurity Risk Governance
 
Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?
 
The privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsThe privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analytics
 
Advocates' Society Tricks of the Trade 2019 - A Privacy Update
Advocates' Society Tricks of the Trade 2019 - A Privacy UpdateAdvocates' Society Tricks of the Trade 2019 - A Privacy Update
Advocates' Society Tricks of the Trade 2019 - A Privacy Update
 
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam CompliancePrivacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam Compliance
 
Cyber Insurance and Incident Response Practice
Cyber Insurance and Incident Response Practice Cyber Insurance and Incident Response Practice
Cyber Insurance and Incident Response Practice
 
Role of a breach coach
Role of a breach coachRole of a breach coach
Role of a breach coach
 
PHIPA for school boards
PHIPA for school boardsPHIPA for school boards
PHIPA for school boards
 
Finding internet evidence
Finding internet evidenceFinding internet evidence
Finding internet evidence
 
Sexual Assault in Higher Education - Law Policy and Practice
Sexual Assault in Higher Education - Law Policy and PracticeSexual Assault in Higher Education - Law Policy and Practice
Sexual Assault in Higher Education - Law Policy and Practice
 
Cas cyber prez
Cas cyber prezCas cyber prez
Cas cyber prez
 
Canadian Association of University Solicitors - Privacy Update 2016
Canadian Association of University Solicitors - Privacy Update 2016Canadian Association of University Solicitors - Privacy Update 2016
Canadian Association of University Solicitors - Privacy Update 2016
 
Student Conduct Investigations - Examining Evidence and Determining Credibiliity
Student Conduct Investigations - Examining Evidence and Determining CredibiliityStudent Conduct Investigations - Examining Evidence and Determining Credibiliity
Student Conduct Investigations - Examining Evidence and Determining Credibiliity
 
Cyber legal update oct 7 2015
Cyber legal update oct 7 2015Cyber legal update oct 7 2015
Cyber legal update oct 7 2015
 
How to manage a data breach
How to manage a data breachHow to manage a data breach
How to manage a data breach
 
Cacuss 2015 sexual violence
Cacuss 2015 sexual violenceCacuss 2015 sexual violence
Cacuss 2015 sexual violence
 
Responding to Data Breaches
Responding to Data BreachesResponding to Data Breaches
Responding to Data Breaches
 

Recently uploaded

一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
Fir La
 
一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理
e9733fc35af6
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
Airst S
 
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
F La
 
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
ss
 
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
e9733fc35af6
 
一比一原版(UCB毕业证书)英国伯明翰大学学院毕业证如何办理
一比一原版(UCB毕业证书)英国伯明翰大学学院毕业证如何办理一比一原版(UCB毕业证书)英国伯明翰大学学院毕业证如何办理
一比一原版(UCB毕业证书)英国伯明翰大学学院毕业证如何办理
e9733fc35af6
 
一比一原版(McMaster毕业证书)麦克马斯特大学毕业证学历认证可查认证
一比一原版(McMaster毕业证书)麦克马斯特大学毕业证学历认证可查认证一比一原版(McMaster毕业证书)麦克马斯特大学毕业证学历认证可查认证
一比一原版(McMaster毕业证书)麦克马斯特大学毕业证学历认证可查认证
trryfxkn
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理
Airst S
 
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
Airst S
 

Recently uploaded (20)

3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt
 
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
 
Chambers Global Practice Guide - Canada M&A
Chambers Global Practice Guide - Canada M&AChambers Global Practice Guide - Canada M&A
Chambers Global Practice Guide - Canada M&A
 
It’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy Novices
It’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy NovicesIt’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy Novices
It’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy Novices
 
Navigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxNavigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptx
 
一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理
 
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
 
Mischief Rule of Interpretation of statutes
Mischief Rule of Interpretation of statutesMischief Rule of Interpretation of statutes
Mischief Rule of Interpretation of statutes
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
 
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
 
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
 
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
 
一比一原版(UCB毕业证书)英国伯明翰大学学院毕业证如何办理
一比一原版(UCB毕业证书)英国伯明翰大学学院毕业证如何办理一比一原版(UCB毕业证书)英国伯明翰大学学院毕业证如何办理
一比一原版(UCB毕业证书)英国伯明翰大学学院毕业证如何办理
 
Understanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective BargainingUnderstanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective Bargaining
 
一比一原版(McMaster毕业证书)麦克马斯特大学毕业证学历认证可查认证
一比一原版(McMaster毕业证书)麦克马斯特大学毕业证学历认证可查认证一比一原版(McMaster毕业证书)麦克马斯特大学毕业证学历认证可查认证
一比一原版(McMaster毕业证书)麦克马斯特大学毕业证学历认证可查认证
 
Career As Legal Reporters for Law Students
Career As Legal Reporters for Law StudentsCareer As Legal Reporters for Law Students
Career As Legal Reporters for Law Students
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理
 
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
 
CASE STYDY Lalman Shukla v Gauri Dutt BY MUKUL TYAGI.pptx
CASE STYDY Lalman Shukla v Gauri Dutt BY MUKUL TYAGI.pptxCASE STYDY Lalman Shukla v Gauri Dutt BY MUKUL TYAGI.pptx
CASE STYDY Lalman Shukla v Gauri Dutt BY MUKUL TYAGI.pptx
 

The Current State of FOI

  • 1. Presented By The current state of FOI Dan Michaluk March 2021
  • 2. Your presenter Dan is a well-recognized cybersecurity, privacy and information management lawyer, with significant experience working with education and public sector organizations in Canada. Dan helps organizations: • respond optimally to security and cyber incidents • defend security and privacy complaints, claims and grievances • handle complex freedom of information matters and appeals • address security and other operational issues while minimizing privacy risks Dan has maintained a privacy and security practice since 2003 and has acted as a security incident “coach” since 2006. He has represented clients in significant privacy, security and freedom of information litigation, including at the Ontario Court of Appeal and Supreme Court of Canada. Dan Michaluk Partner 2 o The Best Lawyers in Canada (Privacy and Data Security Law) o Chambers Canada – Canada’s Leading Lawyers for Business (Privacy & Data Protection) o Lexpert Zenith Award – Celebrating Mid-Career Excellence in Computer and IT Law (2018) o LLB, Queen's University, 1997 o B.Comm, Queen's University, 1994
  • 3. o The law of information underpins the privacy and cyber practice o FOI is a key driver of the law of information • The scope of individual privacy rights • The legitimate scope of confidential business information • The scope of legal privilege o Public sector incident responders need to know it …to professionals in the privacy and cyber milieu Why FOI is relevant 3
  • 4. Agenda o FOI basics o Openness under pressure o Data security and FOI How should FOI respond to the increased need for secrecy? 4
  • 6. o Applies to designated “institutions” or “public bodies” (tied to government funding) o Presumptive right of access to “records” in “custody or control” (or “control”) o Though the Act excludes some records altogether o And exempts some information from the right of public access o Institutions have the burden of establishing that an exemption applies o And information that can be severed must be severed (“disconnected snippets” test) How FOI works FOI basics 6
  • 7. o Not as straightforward as one may think because… • … one can have control without custody – see Laurentian University federated university case and consider government employee use of personal IT services • … bare possession does not amount to custody – e.g. City of Ottawa e-mail case o Contextual, multi-factor test – ATIA leading case is Canada (Information Commissioner) v. Canada (Minister of National Defence), 2011 SCC 25 (CanLII), [2011] 2 SCR 306 Custody or control FOI basics 7
  • 8. o Personal privacy (mandatory) • Federal – personal information • Provincial – unjustified invasion o Third-party business (mandatory) • Trade secrets, commercial, technical and scientific information • Class based or harms based o Economic interests of government (discretionary) • Also class and harms based • This is where institutional security comes in o Privilege, advice and recommendations… Key exemptions FOI basics 8
  • 11. o With the internet, we can no longer “hide in the noise” or enjoy “practical obscurity” o It has been used to shield the identity of lottery winners once published - Order PO- 2812 (in which IPC relies on SCOTUS Reporters’ Committee case and R v Duarte) o This case was from 2009, is practical obscurity still a reality today??? Practical obscurity is no longer protection Openness under pressure 11
  • 12. o Related principle – a disclosure to one is a disclosure to the world o This is about equal application of the law, and as such is sound o We generally don’t distinguish requester A from requester B based on motive o From an institutional perspective, the full scope of potential harm should always be presumed o The question – Is that so? A requester’s identity is irrelevant Openness under pressure 12
  • 13. o Information which in isolation appears meaningless or trivial could, when fitted together, permit a comprehensive understanding of the information being protected o The “assiduous inquirer” or “informed reader” has a strong ability to look-up information piece together the full picture o Note - in the Maher Arar decision (2007 FC 766) the Federal Court made that there must be a factual basis for asserting that innocuous information will lead to harm Mosaic effect Openness under pressure 13
  • 15. o The Merck test - The institution resisting public disclosure “must show that the risk of harm is considerably above a mere possibility, although not having to establish on the balance of probabilities that the harm will in fact occur.” o How will regulators account for the plain existence of adversaries and the potential for “threat shifting” – “the response of adversaries to perceived safeguards and/or countermeasures (i.e., security controls), in which adversaries change some characteristic of their intent/targeting in order to avoid and/or overcome those safeguards/countermeasures.” (NIST) The harms test and the risk of threat shifting Data security and FOI 15
  • 16. o Ontario PO-3670 - location of its data centre can be kept secret, consistent with Ontario government IT standard and ISO/IEC 27002:2013 o BC F17-23 - Drive names and paths of LAN storage systems reference to a secure system URL based on security architect data about standard practice o BC F18-13 - manual relating to the a stadium roof SCADA system. Access denied Data security and FOI 16
  • 17. o BC F-15-72 - User IDs disclosed over Ministry arguments that such disclosure would give hackers “valuable information to assist in breaching layers of security of government systems to access extremely sensitive corrections information.” o F2013-13 - Alberta OIPC rejected an argument that obtaining a list of cellphone numbers would allow an individual to infiltrate a system or harm its safety and security • What about RROSH and e-mail addresses? Access granted Data security and FOI 17
  • 18. o There’s a legitimate need to share and obtain threat information - any information related to a threat that might help an organization protect itself against a threat or detect the activities of an actor. Major types of threat information include indicators, TTPs, security alerts, threat intelligence reports, and tool configurations o Sharing between FOI institutions creates many presumptively accessible copies • Threat shifting potential is real o So should institutions still share? • Yes – benefit to all > cost • Information becomes stale quickly, reducing risks • If you have a 3P to distribute masked copies, do it Threat information sharing and threat exchanges Data security and FOI 18
  • 19. For more information, contact: The information contained herein is of a general nature and is not intended to constitute legal advice, a complete statement of the law, or an opinion on any subject. No one should act upon it or refrain from acting without a thorough examination of the law after the facts of a specific situation are considered. You are urged to consult your legal adviser in cases of specific questions or concerns. BLG does not warrant or guarantee the accuracy, currency or completeness of this presentation. No part of this presentation may be reproduced without prior written permission of Borden Ladner Gervais LLP. © 2020 Borden Ladner Gervais LLP. Borden Ladner Gervais is an Ontario Limited Liability Partnership. Thank You Dan Michaluk Partner 416.367.6097 dmichaluk@blg.com