This presentation discusses the emerging tort of "intrusion upon seclusion" in Canada. It summarizes a key court case, Jones v. Tsige, that recognized this tort for the first time. The tort involves the intentional and unauthorized intrusion upon a person's private affairs or concerns in a manner highly offensive to a reasonable person. The presentation examines the implications of this new tort for corporate data security, computer monitoring, employer surveillance, private investigations, and litigation involving investigations. It advises employers to have clear, well-enforced policies governing access to employee information and electronic devices to reduce risks from this developing area of privacy law.
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...Case IQ
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Possibly Go Wrong?
Complete the form below to watch the webinar
1
Electronic surveillance is becoming more prevalent in the workplace but there are issues, both legal and logistical, that need to be considered. There are pros and cons. It is a great tool to monitor employees but employers need to consider whether it will impair trust, injure relationships or send a negative message to the workforce.
Join Timothy Dimoff, security expert and president of SACS Consulting, as he discusses the pros and cons of electronic surveillance.
Ethical Issues in Discovery - Trial SkillsKlemchuk LLP
Ethical issues in discovery and lessons to be learned from recent discovery-related decisions, citing Qualcomm v. Broadcom, Rimkus v. Cammarata, and Pension Committee v. Bank of America Securities
Ethical Issues in eDiscovery - Lessons to be LearnedKlemchuk LLP
Ethical issues in discovery and lessons to be learned from recent discovery-related decisions, citing Qualcomm v. Broadcom, Rimkus v. Cammarata, and Pension Committee
Ethical issues in discovery and lessons to be learned from recent discovery-related decisions, citing Rambus/Micron and Rambus/Hynix, Qualcomm v. Broadcom, Rimkus v. Cammarata, and Personal Audio v. Apple
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...Case IQ
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Possibly Go Wrong?
Complete the form below to watch the webinar
1
Electronic surveillance is becoming more prevalent in the workplace but there are issues, both legal and logistical, that need to be considered. There are pros and cons. It is a great tool to monitor employees but employers need to consider whether it will impair trust, injure relationships or send a negative message to the workforce.
Join Timothy Dimoff, security expert and president of SACS Consulting, as he discusses the pros and cons of electronic surveillance.
Ethical Issues in Discovery - Trial SkillsKlemchuk LLP
Ethical issues in discovery and lessons to be learned from recent discovery-related decisions, citing Qualcomm v. Broadcom, Rimkus v. Cammarata, and Pension Committee v. Bank of America Securities
Ethical Issues in eDiscovery - Lessons to be LearnedKlemchuk LLP
Ethical issues in discovery and lessons to be learned from recent discovery-related decisions, citing Qualcomm v. Broadcom, Rimkus v. Cammarata, and Pension Committee
Ethical issues in discovery and lessons to be learned from recent discovery-related decisions, citing Rambus/Micron and Rambus/Hynix, Qualcomm v. Broadcom, Rimkus v. Cammarata, and Personal Audio v. Apple
E-Discovery 10 Years after Qualcomm v. Broadcom - Where We Are and Where We A...Kirby Drake
This presentation provides an electronic discovery overview, identifies the lessons to be learned from Qualcomm v. Broadcom, and discusses cases that have come after Qualcomm v. Broadcom related to e-discovery.
An hour long presentation on "hot topics" for Canadian employers. Deals with business system monitoring, employee responsibility for "off duty" publication and background checks.
Op 21 maart vond de officiële opening van het Legal Tech Lab plaats. Alle partners gaven samen met docenten en studenten een workshop verzorgen tijdens deze middag. Hieronder het programma met een overzicht van de workshops. Bijgaand de eDiscovery presentative van ZyLAB
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Diana Maier
No matter what kind of law practice you have, you need to comply with privacy laws generally and lawyers' ethical duties with respect to privacy, specifically. In this presentation, legal ethics counsel Sarah Banola (Cooper, White and Cooper, LLP) and employment and privacy attorney Diana Maier (Law Offices of Diana Maier) deliver a primer on privacy law and teach you the key areas of privacy law and associated ethical obligations.
Privacy rules matter—make sure your firm stays compliant.
While every lawyer knows the basic rules behind confidentiality and attorney-client privilege, the significance of privacy law is less well-known—and that lack of knowledge can impact your law firm. Emerging privacy rights and rights of action are impacting businesses of all types—including those in the legal profession. Local, national, and even international laws are making privacy the next frontier in data management for lawyers.
Are you prepared to adjust to the new demands of privacy for law firms, and move beyond confidentiality?
Join Joshua Lenon—an IAPP Certified Information Privacy Professional and Clio’s Lawyer in Residence and Data Protection Officer—as he explains how these privacy laws can impact law firms and what your firm should do to ensure compliance.
In this free 1-hour CLE-eligible webinar, you’ll learn:
Why law firm data must conform with emerging privacy regulations
The impact of clients’ compliance with privacy law on firm operations
Future privacy laws that may affect your law firm—no matter where you operate
https://www.clio.com/events/webinar-law-firm-privacy/
How your nonprofit can avoid data breaches and ensure privacyTechSoup Canada
Increasingly, nonprofits hold large quantities of digital assets (such as donor information, grant application details, financial records, etc.). Organizations of all sizes and industries are being targeted by cyber criminals. Cyber-attacks will often devastate an organization’s operations and have significant financial, legal and reputational consequences.
In this webinar, Imran Ahmad of Miller Thomson, LLP will explain how implementing best practices from a pre-breach standpoint can go a long way to mitigate the negative consequences of a cyber-attack.
What you will learn:
- what the cyber threat landscape looks like
- how to ensure privacy of your digital assets
- steps to take in the aftermath of a cyber-attack
E-Discovery 10 Years after Qualcomm v. Broadcom - Where We Are and Where We A...Kirby Drake
This presentation provides an electronic discovery overview, identifies the lessons to be learned from Qualcomm v. Broadcom, and discusses cases that have come after Qualcomm v. Broadcom related to e-discovery.
An hour long presentation on "hot topics" for Canadian employers. Deals with business system monitoring, employee responsibility for "off duty" publication and background checks.
Op 21 maart vond de officiële opening van het Legal Tech Lab plaats. Alle partners gaven samen met docenten en studenten een workshop verzorgen tijdens deze middag. Hieronder het programma met een overzicht van de workshops. Bijgaand de eDiscovery presentative van ZyLAB
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Diana Maier
No matter what kind of law practice you have, you need to comply with privacy laws generally and lawyers' ethical duties with respect to privacy, specifically. In this presentation, legal ethics counsel Sarah Banola (Cooper, White and Cooper, LLP) and employment and privacy attorney Diana Maier (Law Offices of Diana Maier) deliver a primer on privacy law and teach you the key areas of privacy law and associated ethical obligations.
Privacy rules matter—make sure your firm stays compliant.
While every lawyer knows the basic rules behind confidentiality and attorney-client privilege, the significance of privacy law is less well-known—and that lack of knowledge can impact your law firm. Emerging privacy rights and rights of action are impacting businesses of all types—including those in the legal profession. Local, national, and even international laws are making privacy the next frontier in data management for lawyers.
Are you prepared to adjust to the new demands of privacy for law firms, and move beyond confidentiality?
Join Joshua Lenon—an IAPP Certified Information Privacy Professional and Clio’s Lawyer in Residence and Data Protection Officer—as he explains how these privacy laws can impact law firms and what your firm should do to ensure compliance.
In this free 1-hour CLE-eligible webinar, you’ll learn:
Why law firm data must conform with emerging privacy regulations
The impact of clients’ compliance with privacy law on firm operations
Future privacy laws that may affect your law firm—no matter where you operate
https://www.clio.com/events/webinar-law-firm-privacy/
How your nonprofit can avoid data breaches and ensure privacyTechSoup Canada
Increasingly, nonprofits hold large quantities of digital assets (such as donor information, grant application details, financial records, etc.). Organizations of all sizes and industries are being targeted by cyber criminals. Cyber-attacks will often devastate an organization’s operations and have significant financial, legal and reputational consequences.
In this webinar, Imran Ahmad of Miller Thomson, LLP will explain how implementing best practices from a pre-breach standpoint can go a long way to mitigate the negative consequences of a cyber-attack.
What you will learn:
- what the cyber threat landscape looks like
- how to ensure privacy of your digital assets
- steps to take in the aftermath of a cyber-attack
Privacy and breaches in health care - a legal updateDan Michaluk
A 45 minute presentation to hospital administrators in Ontario. A state of the nation address on the legal environment related to data security incidents.
The internet as a corporate security resourceDan Michaluk
One hour presentation to in house lawyers at a federally regulated employer. Analysis is based on Canadian federal privacy legislation (PIPEDA) and Ontario Rules of Professoinal Conduct.
Fasken Law firm discusses the legal rights and responsibilities of Mid Size commercial businesses with respect to Data Privacy and Data Security laws in Canada
In any kind of business, there is a chance that employers will be required to investigate one or more employees at some point for allegations of misconduct such as discrimination or sexual harassment. A properly conducted workplace investigation is not only legally required but can also go a long way in protecting companies and mitigating risks for future problems.
In this webinar, Diana Maier and Beth Arnese go over the key things to know about workplace investigations so that you can garner the maximum legal protection such investigations may provide.
Topics addressed include when to investigate, how to prepare for an investigation, how to interview witnesses, how to prepare a written report, what to do after the investigation, and overall best practices for investigations.
This class will provide students with a defined roadmap and checklist of steps one may take when presented with the specter of trade secret related significant business threats. Important subjects covered in the class include defining “win” scenarios upfront to avoid mission creep, working with outside counsel and a 3rd party computer forensic expert, the identification, preservation and analysis of evidence to inform appropriate actions, special considerations for handling of smartphone based evidence, leveraging evidence derived from smartphones, reasonable steps to take to preserve attorney-client communication security, and the acquisition of phone and text records via a subpoena.
BUSINESS LAW REVIEW- 2022: Defending White Collar Crime-101Financial Poise
While white collar crimes don’t usually carry the same stigma or penalties as violent crime, the consequences of a conviction, or even an allegation can be devastating. Leaving prison time aside, the business may also face investigation, prosecution and possibly, the risk of reputational damage, financial loss and unwanted exposure.
As governmental enforcement of laws against those accused of white collar crime increases, companies need to understand how to avoid unknowingly acting in ways that may be unlawful, how to prevent and detect potential employee misconduct, and how to react if misconduct does occur.
Part of the webinar series: Business Law Review 2022
See more at https://www.financialpoise.com/webinars/
Ecno cyber - 23 June 2023 - djm(137852631.1).pptxDan Michaluk
One hour presentation to IT professionals at Ontario school boards. Covers labour issues in MFA rollout, threat information sharing and business e-mail compromises and PHIPA.
Critical Issues in School Board Cyber SecurityDan Michaluk
An hour presentation to school board officials in Ontario on cyber security issues, covering the threat environment, defense, incident response, threat information sharing and vendor issues.
One hour presentation to Ontario public sector institutions that looks at the privacy and security implications the main information flows associated with COVID-19 workplace health and safety.
Here's a one hour presentation to Canadian municipal lawyers on the union right of access to information that arises under labour law and how it has fared against employee privacy claims.
1 hours presentation to IT security and law enforcement audience on how access to information legislation and related pressures affect public bodies in Canada.
Privacy, Data Security and Anti-Spam ComplianceDan Michaluk
45 min prez to compliance professionals at Canadian financial institutions. A survey presentation covering privacy, data security and anti-spam (CASL).
I hate the term "breach" - please call it a "security incident" - but the term "breach coach" is certainly ingrained. Posting today's presentation on the role of the coach as I step out the door to an insurance sector event.
Who is the "health information custodian" when an institution with an educational mandate provides health care? PHIPA gives institutions choice. Here's a presentation i gave yesterday in which I argue that the institution (and not its practitioners) should assume the role of the HIC.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Privacy tort and your workplace
1. Intrusion Upon Seclusion
The New Privacy Tort and Your
Workplace
Joint HR/Legal Presentation
February 15, 2012
John Bruce and Dan Michaluk
2. Invasion of Privacy
• U.S. and U.K. courts have recognized torts
• Canadian courts more cautious to date
• Privacy interests protected under other torts –
defamation, nuisance, trespass
• Four provinces with limited statutory torts
• Misappropriation of personality tort (Ontario, 70s)
• Now, “intrusion upon seclusion” tort recognized
The Privacy Tort and Your Workplace
3. Jones v. Tsige
• Bank employee snoops on other bank employee’s
banking records
• Bank disciplines defendant, plaintiff sues
• Motion judge dismiss – no cause of action
• Court of Appeal recognizes tort, awards $10,000
in damages
The Privacy Tort and Your Workplace
4. Jones v. Tsige
One who intentionally intrudes, physically or otherwise, upon the seclusion of
another or his private affairs or concerns, is subject to liability to the other for
invasion of privacy, if the invasion would be highly offensive to a reasonable
person.
1. Intentional, unauthorized intrusion
2. Upon private affairs or concerns
3. Highly offensive to the reasonable person
The Privacy Tort and Your Workplace
5. What the Tort Is
• A personal tort
• Scope will reflect competing interests (free
expression, freedom of the press)
• No proof of damages required, but non-pecuniary
damages ordinarily no more than $20,000
• Court signals “highly offensive” relates to
sensitivity of information (e.g., financial records,
sexual practices and orientation, employment)
The Privacy Tort and Your Workplace
6. What the Tort Is Not
• About intentional disclosure of private information
• About asking for information (as employers do)
• A rule that governs the exclusion of evidence
The Privacy Tort and Your Workplace
7. Impact on Corporate Data Security
• Risks driven by pre-existing duties
• Breach of direct “supervisory” or “custodial” duty
based in negligence, fiduciary status, contract
• Reasonable safeguarding duty under legislation
• Are vicarious liability claims a practical risk?
• Employee snooping is a known, common risk that
you should address through access control
technology and well enforced policy
The Privacy Tort and Your Workplace
8. Impact on Computer Monitoring
• Things are changing… very quickly
• R. v. Cole raises questions about a reasonable
expectation of privacy arising out of personal use
• SCC will hear an appeal this year
• Tsige suggests that breaching a reasonable
expectation of privacy is not enough
• But don’t be a test case
The Privacy Tort and Your Workplace
9. Impact on Computer Monitoring
1. Articulate purpose for which you may access stored information
2. Make sure conditions tied to personal use are clear
3. Claim your interest in the entire system, including devices issued to
employees
4. Make clear that access controls are employed for the company’s
benefit
5. Make clear that passwords are to foster user accountability and are
for the company’s benefit
6. Deal with access to forensic information
7. Ban work on personal devices unless you develop a “BYOD” policy
that manages the risks
The Privacy Tort and Your Workplace
10. Employer Surveillance and Investigations
• Other potential intrusions?
• Desk searches
• Locker searches
• Bag searches
• In-plant/facility video surveillance
• Surveillance outside the plant/facility
The Privacy Tort and Your Workplace
11. Private Investigation Retainers
• An obvious risk that you ought to address
• Structure the decision to retain
• Reasonable grounds?
• Who decides?
• Structure the retainer
• Authorized means? Unauthorized means?
• Requirements (e.g., video only in public)
• Indemnification for breach
The Privacy Tort and Your Workplace
12. Investigations and Litigation
• Expect the tort to be plead where your cause case
rests on an investigation
• Expect claims from family members
• On the positive side, it’s an option for structuring
settlement payments for better tax treatment
The Privacy Tort and Your Workplace
13. Intrusion Upon Seclusion
The New Privacy Tort and Your
Workplace
Joint HR/Legal Presentation
February 15, 2012
John Bruce and Dan Michaluk