SlideShare une entreprise Scribd logo
1  sur  45
An Information Management Update
for In-House Counsel


September 19, 2012
F. Cesario, D. Michaluk, A. Tibble
Outline

•   Access to business system information
•   Privilege issues and recent developments
•   Data security, breach response and privacy class
    actions
•   Workplace threat assessment as information
    management
•   Medical information management – essentials
    and developments

An information management update for in-house counsel
Access to business system
information
The ideal – single purpose systems

               Mine                              Yours




An information management update for in-house counsel
The reality – significant intermingling
•   Personal use of work systems puts personal
    information side-by-side work information
•   BYOD puts work information on personal devices
•   Cloud computing puts your work system on a computer with
    others’ work systems




An information management update for in-house counsel
The problem – bad policy
•   “The content of an email account will only be entered
    in a case where significant cause exists, or if the
    company can show that it has some evidence of
    illegal or serious infractions of policy or applicable
    legislation.”




An information management update for in-house counsel
The problem – bad law
•   CACE asks this Court to re-balance employer and
    employee interests. To strike a proper balance, the
    Court should give significant weight to the primary
    function of a work-issued computer and should
    recognize that a work-issued computer is only one
    part of a work information system that must be
    routinely accessed by an employer for a variety of
    legitimate reasons.
                                        (CACE factum in R v Cole)


An information management update for in-house counsel
One solution – more law and policy

•   You deal with data security in your cloud
    contracts. Have you dealt with audit and
    investigation requirements?
•   Your acceptable use policies must be clear that
    personal use is conditional on specific and
    detailed rights and requires a sacrifice of personal
    autonomy



An information management update for in-house counsel
Other more fundamental solutions

•   Revert to a no personal use rule
•   Segregate the data created by personal use from
    the data created by work use (this is what BYOD
    technology and policy attempts to do)




An information management update for in-house counsel
Privilege issues and recent
developments
Privilege

•   Protecting privilege for confidential
    communications is an important consideration
•   What is privileged?
•   How can you protect those communications and
    avoid pitfalls?




An information management update for in-house counsel
Reis v CIBC Mortgages Inc (2011, Master)

•   In response to a human rights complaint, in-house
    counsel requested an employee to conduct an
    internal investigation and prepare notes
•   Notes were relied on in preparing the company’s
    response to the HRTO … company relied on the
    response in discovery in the civil action
•   Plaintiff argued that reliance on the response
    constituted waiver of privilege with respect to notes


An information management update for in-house counsel
Reis v CIBC Mortgages Inc (2011, Master)

•   Court held that
     •   reliance on response did not waive privilege
         attaching to the notes
     •   information/facts in notes were not privileged
     •   opinions, conclusions, and recommendations
         of investigator are privileged



An information management update for in-house counsel
Humberplex Developments (2011, Master)

•   In response to prospective legal action, the
    corporation required that all related documents be
    copied to in-house counsel
•   The corporation then claimed privilege for all the
    documents and refused to produce them




An information management update for in-house counsel
Humberplex Developments (2011, Master)

•   Court held that
     •   merely copying a lawyer to the communication did
         not automatically make it privileged

     •   where documents are prepared for simultaneous
         review by legal and non-legal personnel, the primary
         purpose of the document is not the securing of legal
         advice



An information management update for in-house counsel
L’Abbe v Allen-Vanguard (2011, Master)

•   Action for misrepresentation arising out of a share
    purchase agreement – defence of “due diligence”
•   Plaintiffs claimed privilege for 6,000 documents
    including all communications with legal advisors
    (including in-house counsel)




An information management update for in-house counsel
L’Abbe v Allen-Vanguard (2011, Master)

Court held that:
•   By implicitly putting due diligence at issue, the
    plaintiff waived privilege over legal advice integral
    to the pre-closing inquiries and searches
•   Blanket claims of privilege over communications
    with general counsel were denied. Privilege could
    only attach if the content of the document contained
    legal advice.


An information management update for in-house counsel
Discussion Scenario 1
In-house counsel orders an investigation and a report on a
workplace incident raising allegations of harassment and
discrimination

Issues to consider:
•   Is the report privileged?
•   Who prepared the report?
•   Who conducted the investigation?
•   Who directed the investigation and reporting process?
•   Does the privilege attach to the report or the underlying facts?



An information management update for in-house counsel
Discussion Scenario 2
In-house counsel is copied to a variety of internal communications in the
lead up to litigation.


Issues to consider:


•   Are the communications privileged?
•   Are they protected by solicitor-client privilege or litigation privilege?
•   Which parties are involved in the communication?
•   What is the subject and purpose of the communication?




An information management update for in-house counsel
Discussion Scenario 3
External counsel is attached to a variety of communications with the client.
These communications are also copied to third parties.


Issues to consider:


•   What are the circumstances were privilege can be lost?
•   Will forwarding opinions or communications to "outside" individuals
    result in waiver of privilege?
•   Will forwarding communications to experts or consultants result in
    waiver?




An information management update for in-house counsel
Data security, breach response and
privacy class actions – Implications for
you
The horror story of the day

•   Elections Ontario
     •   Two USB keys lost (1.4 to 2.4 million electors)
     •   Middle management signoff on questionable
         protocol featuring secure use of USB keys
     •   Protocol not followed by employees
     •   Supervisors worked remote from site, didn’t
         understand what encryption was
     •   IPC report focuses on systemic failures


An information management update for in-house counsel
Information governance best practices

•   Risk assessment structures
•   Intrusion detection and security audit structures
•   Records management
•   Human resources policy
•   Physical transfer of persona information policy
•   Disposal procedures
•   Privacy breach procedures


An information management update for in-house counsel
Then there’s the low hanging fruit

•   Company issued
     •   USB keys
     •   Laptops and portable devices
•   Sending work home
•   Bad actors in IT
•   Recycling versus shredding
                   What are you doing to prevent a breach?
            Have you met the reasonable in-house lawyer standard?



An information management update for in-house counsel
The service provider risk

•   An organization is accountable for the handling of
    personal information by its service providers
•   Key providers to legal = external counsel,
    litigation support and forensic support
•   Due diligence = duly diligent selection, contracting
    and relationship administration




An information management update for in-house counsel
The service provider risk

•   Questions
     •   To what degree does the reasonable organization
         trust its external counsel because they are external
         counsel?
     •   Is it reasonable to let external counsel subcontract
         parts of the discovery process without becoming
         engaged? What are the appropriate controls?




An information management update for in-house counsel
Data security, breach response and
privacy class actions – Implications for
your organization
Data breach class action activity

•   We are aware of eight claims issued in 2012
     •   Seven for data loss
     •   One for improper collection
•   We are aware of five claims issues in 2011
     •   Three for data loss
     •   Two for improper collection
•   The CBA national class action database shows
    comparatively little activity before 2010

An information management update for in-house counsel
Rowlands v Durham Region (2012, ONSC)
•   Lost USB key – personal and confidential info of 83,524
    people who had received H1N1 shot
•   Claim that info could be used to facilitate identity theft
•   Class action certified and settlement approved
•   “It is now probable that no one has the missing USB key . . .
    This case, it bears emphasizing, would look far different
    if information from the lost USB key had been abused
    by a wrongdoer.”




An information management update for in-house counsel
Mazzonna v DaimlerChrysler (2012, QSC)

•   Lost data tape: personal info (name, address,
    SIN)
•   Petitioner alleged “inconvenience, pain, suffering
    and/or fear” due to the loss of personal info
•   motion for certification of class action dismissed
•   Petitioner did not meet test that she suffered
    damages: “inconveniences were negligible”
•   NB: other elements of test were satisfied

An information management update for in-house counsel
Implications for in-house counsel
•   Move the data loss risk up on your list
     •   How will the company demonstrate due diligence?
     •   Should we be conducting periodic audits?
     •   Does the company have adequate insurance coverage?
•   Take control of the potential liability through your breach
    reporting protocol
     •   Have a strong internal reporting duty
     •   Set out clear decision-making accountability
     •   Set out authority to promptly obtain expert assistance

An information management update for in-house counsel
Violence prevention as information
management
An organization’s duty of care

•   Worker protection duties
     •   Take all reasonable precautions
     •   Acquaint worker and supervisors with hazards
     •   Duty to warn workers about the risk of violence in
         narrow circumstances
•   Parallel duties to others (students, customers…)
    under common law and Occupiers’ Liability Act



An information management update for in-house counsel
Violence prevention as info management
•    Violence prevention through employment screening, physical security and crises
     response
•    Plus duty to process information (threat assessment)




                                                                         Threat
                    Threat Inquiry
                                            Threat Assessment          Management
                      (Reliable                 Process
                                           (Defensible Thought)          (Sound
                     Evidence)            (Threat Assessment)           Response)
      Event that
     reasonably
      reveals a
    safety threat




An information management update for in-house counsel
Violence prevention as info management

•   Getting the “input” right is a challenge. The
    standard of care probably requires a form of
    surveillance, but what’s the scope?




An information management update for in-house counsel
Threat assessment process must be sound

•   Reasonable assessment in all the circumstances,
    especially considering time
     •   Fact based and investigative
     •   Team based and multi-disciplinary (HR, Legal,
         Security, OH&S)
     •   Qualified by knowledge and experience of assessors
     •   Collaborative (with subject) when feasible
     •   Documented


An information management update for in-house counsel
Recent lessons – set mandate very clearly




An information management update for in-house counsel
Recent lessons – careful handoff to police

•   When you don’t have the control normally
    associated with internal matters
•   What to do
     •   Convey all relevant facts (behaviors, risk factors,
         victim impact)
     •   May convey defensible opinions (with credentials)
     •   Outline the limits of your resources, your jurisdiction



An information management update for in-house counsel
Key readings
•   The Final Report and Findings of the Safe School
    Initiative (US Secret Service and DOE, 2002)
•   Workplace Violence – Issues in Response (US FBI,
    2004)
•   Workplace Violence Prevention and Intervention
    (ASIS/SHRM WVP1.1-2011)
•   Clinical Risk Management (Sainsbury Centre for
    Mental Health, 2000)


An information management update for in-house counsel
Medical information management
Key considerations

•   Define the roles - employer, employee, third party
    administrator
•   Education - inform employees of party roles
•   Consent forms
•   File management




An information management update for in-house counsel
Role definition


                                           Medical
               Employer
                                           Advisor




               Employee                      HCP




An information management update for in-house counsel
Telus Inc and TWA (2011, Goodfellow)
•   Arbitrator says grievor retains fundamental control over
    highlight private information in custody of employer
•   To prepare for arbitration, an employer should seek
    employee consent
•   Question – Why can’t an employer rely on the its prior
    obtained consent to receive and use the information for
    employment-related purposes?
•   In practice – We need to get better about the consent
    obtained at the time information is received.



An information management update for in-house counsel
Complex Services Inc (2012, Surdykowski)

•   Arbitrator Surdykowski says
     •   Jones v Tsige does not alter the rules for obtaining
         employee medical information in employees’ favour
     •   Law is clear and is set out in
          •   Hamilton Health Sciences (2007, Surdykowski)
          •   Providence Care (2011, Surdykowski)




An information management update for in-house counsel
An Information Management Update
for In-House Counsel


September 19, 2012
F. Cesario, D. Michaluk, A. Tibble

Contenu connexe

Tendances

Ten Common e-Discovery Mistakes to Avoid in Wage and Hour Cases
 Ten Common e-Discovery Mistakes to Avoid in Wage and Hour Cases Ten Common e-Discovery Mistakes to Avoid in Wage and Hour Cases
Ten Common e-Discovery Mistakes to Avoid in Wage and Hour Cases
Nadia Brannon
 
Are Your PCs and Laptops Recovery and Discovery Ready?
Are Your PCs and Laptops Recovery and Discovery Ready?Are Your PCs and Laptops Recovery and Discovery Ready?
Are Your PCs and Laptops Recovery and Discovery Ready?
Iron Mountain
 
EDRM Foundational e-Discovery Practices-ilta
EDRM Foundational e-Discovery Practices-iltaEDRM Foundational e-Discovery Practices-ilta
EDRM Foundational e-Discovery Practices-ilta
David Kearney
 
Legal Liability for IOT Cybersecurity Vulnerabilities
Legal Liability for IOT Cybersecurity VulnerabilitiesLegal Liability for IOT Cybersecurity Vulnerabilities
Legal Liability for IOT Cybersecurity Vulnerabilities
Priyanka Aash
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It Security
CTIN
 

Tendances (20)

Ten Common e-Discovery Mistakes to Avoid in Wage and Hour Cases
 Ten Common e-Discovery Mistakes to Avoid in Wage and Hour Cases Ten Common e-Discovery Mistakes to Avoid in Wage and Hour Cases
Ten Common e-Discovery Mistakes to Avoid in Wage and Hour Cases
 
Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...
 
Are Your PCs and Laptops Recovery and Discovery Ready?
Are Your PCs and Laptops Recovery and Discovery Ready?Are Your PCs and Laptops Recovery and Discovery Ready?
Are Your PCs and Laptops Recovery and Discovery Ready?
 
Institute for the entrepreneur v1r3
Institute for the entrepreneur v1r3Institute for the entrepreneur v1r3
Institute for the entrepreneur v1r3
 
The ugly, the bad and the good of cloud computing for government institutions
The ugly, the bad and the good of cloud computing for government institutionsThe ugly, the bad and the good of cloud computing for government institutions
The ugly, the bad and the good of cloud computing for government institutions
 
Systemising advice
Systemising adviceSystemising advice
Systemising advice
 
SNW Fall 2009
SNW Fall 2009SNW Fall 2009
SNW Fall 2009
 
EDRM Foundational e-Discovery Practices-ilta
EDRM Foundational e-Discovery Practices-iltaEDRM Foundational e-Discovery Practices-ilta
EDRM Foundational e-Discovery Practices-ilta
 
The Online Court - CTC 2017
The Online Court - CTC 2017The Online Court - CTC 2017
The Online Court - CTC 2017
 
Wipo smes ge_08_topic07
Wipo smes ge_08_topic07Wipo smes ge_08_topic07
Wipo smes ge_08_topic07
 
Legal Liability for IOT Cybersecurity Vulnerabilities
Legal Liability for IOT Cybersecurity VulnerabilitiesLegal Liability for IOT Cybersecurity Vulnerabilities
Legal Liability for IOT Cybersecurity Vulnerabilities
 
Looking Forward - Regulators and Data Incidents
Looking Forward - Regulators and Data IncidentsLooking Forward - Regulators and Data Incidents
Looking Forward - Regulators and Data Incidents
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It Security
 
Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?
 
Best practices to mitigate data breach risk
Best practices to mitigate data breach riskBest practices to mitigate data breach risk
Best practices to mitigate data breach risk
 
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
 
MIS ppt 1
MIS ppt 1MIS ppt 1
MIS ppt 1
 
Cloud Computing Legal for Pennsylvania Bar Association
Cloud Computing Legal for Pennsylvania Bar AssociationCloud Computing Legal for Pennsylvania Bar Association
Cloud Computing Legal for Pennsylvania Bar Association
 
Mining IT Summit Nov 6 2014
Mining IT Summit Nov 6 2014Mining IT Summit Nov 6 2014
Mining IT Summit Nov 6 2014
 

Similaire à An information management update for in house counsel

3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
Resilient Systems
 
Building an enterprise forensics response service
Building an enterprise forensics response serviceBuilding an enterprise forensics response service
Building an enterprise forensics response service
Seccuris Inc.
 
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
keturahhazelhurst
 
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
jeremylockett77
 
Are You Prepared For a Data Breach
Are You Prepared For a Data BreachAre You Prepared For a Data Breach
Are You Prepared For a Data Breach
Brian Heidelberger
 
15. Brian Bailey presentation 2 DQ Asia Pacific 2010
15. Brian Bailey presentation 2 DQ Asia Pacific 201015. Brian Bailey presentation 2 DQ Asia Pacific 2010
15. Brian Bailey presentation 2 DQ Asia Pacific 2010
Brian Bailey
 

Similaire à An information management update for in house counsel (20)

3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach Cost
 
Co3 rsc r5
Co3 rsc r5Co3 rsc r5
Co3 rsc r5
 
74 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.1674 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.16
 
BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...
BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...
BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...
 
Isa 2
Isa 2 Isa 2
Isa 2
 
Information privacy
Information privacyInformation privacy
Information privacy
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
ACEDS-Zylab 4-3-15 Webcast
ACEDS-Zylab 4-3-15 Webcast ACEDS-Zylab 4-3-15 Webcast
ACEDS-Zylab 4-3-15 Webcast
 
Building an enterprise forensics response service
Building an enterprise forensics response serviceBuilding an enterprise forensics response service
Building an enterprise forensics response service
 
Eversheds SHINE Webinars - Multi jurisdictional compliance 23rd October 2014
Eversheds SHINE Webinars - Multi jurisdictional compliance 23rd October 2014Eversheds SHINE Webinars - Multi jurisdictional compliance 23rd October 2014
Eversheds SHINE Webinars - Multi jurisdictional compliance 23rd October 2014
 
Education law conferences, March 2018, Keynote 2 - 10 steps in 10 weeks to GD...
Education law conferences, March 2018, Keynote 2 - 10 steps in 10 weeks to GD...Education law conferences, March 2018, Keynote 2 - 10 steps in 10 weeks to GD...
Education law conferences, March 2018, Keynote 2 - 10 steps in 10 weeks to GD...
 
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
 
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
1. Ethics for IT Professionals and IT Users2. PrivacyE.docx
 
Using international standards to improve US cybersecurity
Using international standards to improve US cybersecurityUsing international standards to improve US cybersecurity
Using international standards to improve US cybersecurity
 
Are You Prepared For a Data Breach
Are You Prepared For a Data BreachAre You Prepared For a Data Breach
Are You Prepared For a Data Breach
 
15. Brian Bailey presentation 2 DQ Asia Pacific 2010
15. Brian Bailey presentation 2 DQ Asia Pacific 201015. Brian Bailey presentation 2 DQ Asia Pacific 2010
15. Brian Bailey presentation 2 DQ Asia Pacific 2010
 
Preparing your Business for the Data Protection Bill
Preparing your Business for the Data Protection BillPreparing your Business for the Data Protection Bill
Preparing your Business for the Data Protection Bill
 
Webinar: Don’t Be a Victim to Cyber Liability Risks
Webinar: Don’t Be a Victim to Cyber Liability RisksWebinar: Don’t Be a Victim to Cyber Liability Risks
Webinar: Don’t Be a Victim to Cyber Liability Risks
 
ACEDS-Stroock 9-4-14 Webcast Presentation
ACEDS-Stroock 9-4-14 Webcast Presentation ACEDS-Stroock 9-4-14 Webcast Presentation
ACEDS-Stroock 9-4-14 Webcast Presentation
 

Plus de Dan Michaluk

Plus de Dan Michaluk (20)

Ecno cyber - 23 June 2023 - djm(137852631.1).pptx
Ecno cyber - 23 June 2023 - djm(137852631.1).pptxEcno cyber - 23 June 2023 - djm(137852631.1).pptx
Ecno cyber - 23 June 2023 - djm(137852631.1).pptx
 
Critical Issues in School Board Cyber Security
Critical Issues in School Board Cyber SecurityCritical Issues in School Board Cyber Security
Critical Issues in School Board Cyber Security
 
Introduction to FOI law (the law of information)
Introduction to FOI law (the law of information)Introduction to FOI law (the law of information)
Introduction to FOI law (the law of information)
 
Higher Education Sexual Violence Presentation
Higher Education Sexual Violence PresentationHigher Education Sexual Violence Presentation
Higher Education Sexual Violence Presentation
 
Cyber class action claims at an inflection point
Cyber class action claims at an inflection pointCyber class action claims at an inflection point
Cyber class action claims at an inflection point
 
The pandemic and privacy
The pandemic and privacyThe pandemic and privacy
The pandemic and privacy
 
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...
Cyber security for the regulator and regulated  - Ontario Regulatory Authorit...Cyber security for the regulator and regulated  - Ontario Regulatory Authorit...
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...
 
Union access to information
Union access to informationUnion access to information
Union access to information
 
Cybersecurity Risk Governance
Cybersecurity Risk GovernanceCybersecurity Risk Governance
Cybersecurity Risk Governance
 
The Current State of FOI
The Current State of FOIThe Current State of FOI
The Current State of FOI
 
Cyber, secrecy and the public body
Cyber, secrecy and the public bodyCyber, secrecy and the public body
Cyber, secrecy and the public body
 
The privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsThe privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analytics
 
Advocates' Society Tricks of the Trade 2019 - A Privacy Update
Advocates' Society Tricks of the Trade 2019 - A Privacy UpdateAdvocates' Society Tricks of the Trade 2019 - A Privacy Update
Advocates' Society Tricks of the Trade 2019 - A Privacy Update
 
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam CompliancePrivacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam Compliance
 
Cyber Insurance and Incident Response Practice
Cyber Insurance and Incident Response Practice Cyber Insurance and Incident Response Practice
Cyber Insurance and Incident Response Practice
 
Role of a breach coach
Role of a breach coachRole of a breach coach
Role of a breach coach
 
PHIPA for school boards
PHIPA for school boardsPHIPA for school boards
PHIPA for school boards
 
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam CompliancePrivacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam Compliance
 
Finding internet evidence
Finding internet evidenceFinding internet evidence
Finding internet evidence
 
Sexual Assault in Higher Education - Law Policy and Practice
Sexual Assault in Higher Education - Law Policy and PracticeSexual Assault in Higher Education - Law Policy and Practice
Sexual Assault in Higher Education - Law Policy and Practice
 

Dernier

The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
daisycvs
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
amitlee9823
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
amitlee9823
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Sheetaleventcompany
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Anamikakaur10
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
amitlee9823
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
dlhescort
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
amitlee9823
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
lizamodels9
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
dlhescort
 

Dernier (20)

👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
JAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
JAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLJAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
JAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
 
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceMalegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 

An information management update for in house counsel

  • 1. An Information Management Update for In-House Counsel September 19, 2012 F. Cesario, D. Michaluk, A. Tibble
  • 2. Outline • Access to business system information • Privilege issues and recent developments • Data security, breach response and privacy class actions • Workplace threat assessment as information management • Medical information management – essentials and developments An information management update for in-house counsel
  • 3. Access to business system information
  • 4. The ideal – single purpose systems Mine Yours An information management update for in-house counsel
  • 5. The reality – significant intermingling • Personal use of work systems puts personal information side-by-side work information • BYOD puts work information on personal devices • Cloud computing puts your work system on a computer with others’ work systems An information management update for in-house counsel
  • 6. The problem – bad policy • “The content of an email account will only be entered in a case where significant cause exists, or if the company can show that it has some evidence of illegal or serious infractions of policy or applicable legislation.” An information management update for in-house counsel
  • 7. The problem – bad law • CACE asks this Court to re-balance employer and employee interests. To strike a proper balance, the Court should give significant weight to the primary function of a work-issued computer and should recognize that a work-issued computer is only one part of a work information system that must be routinely accessed by an employer for a variety of legitimate reasons. (CACE factum in R v Cole) An information management update for in-house counsel
  • 8. One solution – more law and policy • You deal with data security in your cloud contracts. Have you dealt with audit and investigation requirements? • Your acceptable use policies must be clear that personal use is conditional on specific and detailed rights and requires a sacrifice of personal autonomy An information management update for in-house counsel
  • 9. Other more fundamental solutions • Revert to a no personal use rule • Segregate the data created by personal use from the data created by work use (this is what BYOD technology and policy attempts to do) An information management update for in-house counsel
  • 10. Privilege issues and recent developments
  • 11. Privilege • Protecting privilege for confidential communications is an important consideration • What is privileged? • How can you protect those communications and avoid pitfalls? An information management update for in-house counsel
  • 12. Reis v CIBC Mortgages Inc (2011, Master) • In response to a human rights complaint, in-house counsel requested an employee to conduct an internal investigation and prepare notes • Notes were relied on in preparing the company’s response to the HRTO … company relied on the response in discovery in the civil action • Plaintiff argued that reliance on the response constituted waiver of privilege with respect to notes An information management update for in-house counsel
  • 13. Reis v CIBC Mortgages Inc (2011, Master) • Court held that • reliance on response did not waive privilege attaching to the notes • information/facts in notes were not privileged • opinions, conclusions, and recommendations of investigator are privileged An information management update for in-house counsel
  • 14. Humberplex Developments (2011, Master) • In response to prospective legal action, the corporation required that all related documents be copied to in-house counsel • The corporation then claimed privilege for all the documents and refused to produce them An information management update for in-house counsel
  • 15. Humberplex Developments (2011, Master) • Court held that • merely copying a lawyer to the communication did not automatically make it privileged • where documents are prepared for simultaneous review by legal and non-legal personnel, the primary purpose of the document is not the securing of legal advice An information management update for in-house counsel
  • 16. L’Abbe v Allen-Vanguard (2011, Master) • Action for misrepresentation arising out of a share purchase agreement – defence of “due diligence” • Plaintiffs claimed privilege for 6,000 documents including all communications with legal advisors (including in-house counsel) An information management update for in-house counsel
  • 17. L’Abbe v Allen-Vanguard (2011, Master) Court held that: • By implicitly putting due diligence at issue, the plaintiff waived privilege over legal advice integral to the pre-closing inquiries and searches • Blanket claims of privilege over communications with general counsel were denied. Privilege could only attach if the content of the document contained legal advice. An information management update for in-house counsel
  • 18. Discussion Scenario 1 In-house counsel orders an investigation and a report on a workplace incident raising allegations of harassment and discrimination Issues to consider: • Is the report privileged? • Who prepared the report? • Who conducted the investigation? • Who directed the investigation and reporting process? • Does the privilege attach to the report or the underlying facts? An information management update for in-house counsel
  • 19. Discussion Scenario 2 In-house counsel is copied to a variety of internal communications in the lead up to litigation. Issues to consider: • Are the communications privileged? • Are they protected by solicitor-client privilege or litigation privilege? • Which parties are involved in the communication? • What is the subject and purpose of the communication? An information management update for in-house counsel
  • 20. Discussion Scenario 3 External counsel is attached to a variety of communications with the client. These communications are also copied to third parties. Issues to consider: • What are the circumstances were privilege can be lost? • Will forwarding opinions or communications to "outside" individuals result in waiver of privilege? • Will forwarding communications to experts or consultants result in waiver? An information management update for in-house counsel
  • 21. Data security, breach response and privacy class actions – Implications for you
  • 22. The horror story of the day • Elections Ontario • Two USB keys lost (1.4 to 2.4 million electors) • Middle management signoff on questionable protocol featuring secure use of USB keys • Protocol not followed by employees • Supervisors worked remote from site, didn’t understand what encryption was • IPC report focuses on systemic failures An information management update for in-house counsel
  • 23. Information governance best practices • Risk assessment structures • Intrusion detection and security audit structures • Records management • Human resources policy • Physical transfer of persona information policy • Disposal procedures • Privacy breach procedures An information management update for in-house counsel
  • 24. Then there’s the low hanging fruit • Company issued • USB keys • Laptops and portable devices • Sending work home • Bad actors in IT • Recycling versus shredding What are you doing to prevent a breach? Have you met the reasonable in-house lawyer standard? An information management update for in-house counsel
  • 25. The service provider risk • An organization is accountable for the handling of personal information by its service providers • Key providers to legal = external counsel, litigation support and forensic support • Due diligence = duly diligent selection, contracting and relationship administration An information management update for in-house counsel
  • 26. The service provider risk • Questions • To what degree does the reasonable organization trust its external counsel because they are external counsel? • Is it reasonable to let external counsel subcontract parts of the discovery process without becoming engaged? What are the appropriate controls? An information management update for in-house counsel
  • 27. Data security, breach response and privacy class actions – Implications for your organization
  • 28. Data breach class action activity • We are aware of eight claims issued in 2012 • Seven for data loss • One for improper collection • We are aware of five claims issues in 2011 • Three for data loss • Two for improper collection • The CBA national class action database shows comparatively little activity before 2010 An information management update for in-house counsel
  • 29. Rowlands v Durham Region (2012, ONSC) • Lost USB key – personal and confidential info of 83,524 people who had received H1N1 shot • Claim that info could be used to facilitate identity theft • Class action certified and settlement approved • “It is now probable that no one has the missing USB key . . . This case, it bears emphasizing, would look far different if information from the lost USB key had been abused by a wrongdoer.” An information management update for in-house counsel
  • 30. Mazzonna v DaimlerChrysler (2012, QSC) • Lost data tape: personal info (name, address, SIN) • Petitioner alleged “inconvenience, pain, suffering and/or fear” due to the loss of personal info • motion for certification of class action dismissed • Petitioner did not meet test that she suffered damages: “inconveniences were negligible” • NB: other elements of test were satisfied An information management update for in-house counsel
  • 31. Implications for in-house counsel • Move the data loss risk up on your list • How will the company demonstrate due diligence? • Should we be conducting periodic audits? • Does the company have adequate insurance coverage? • Take control of the potential liability through your breach reporting protocol • Have a strong internal reporting duty • Set out clear decision-making accountability • Set out authority to promptly obtain expert assistance An information management update for in-house counsel
  • 32. Violence prevention as information management
  • 33. An organization’s duty of care • Worker protection duties • Take all reasonable precautions • Acquaint worker and supervisors with hazards • Duty to warn workers about the risk of violence in narrow circumstances • Parallel duties to others (students, customers…) under common law and Occupiers’ Liability Act An information management update for in-house counsel
  • 34. Violence prevention as info management • Violence prevention through employment screening, physical security and crises response • Plus duty to process information (threat assessment) Threat Threat Inquiry Threat Assessment Management (Reliable Process (Defensible Thought) (Sound Evidence) (Threat Assessment) Response) Event that reasonably reveals a safety threat An information management update for in-house counsel
  • 35. Violence prevention as info management • Getting the “input” right is a challenge. The standard of care probably requires a form of surveillance, but what’s the scope? An information management update for in-house counsel
  • 36. Threat assessment process must be sound • Reasonable assessment in all the circumstances, especially considering time • Fact based and investigative • Team based and multi-disciplinary (HR, Legal, Security, OH&S) • Qualified by knowledge and experience of assessors • Collaborative (with subject) when feasible • Documented An information management update for in-house counsel
  • 37. Recent lessons – set mandate very clearly An information management update for in-house counsel
  • 38. Recent lessons – careful handoff to police • When you don’t have the control normally associated with internal matters • What to do • Convey all relevant facts (behaviors, risk factors, victim impact) • May convey defensible opinions (with credentials) • Outline the limits of your resources, your jurisdiction An information management update for in-house counsel
  • 39. Key readings • The Final Report and Findings of the Safe School Initiative (US Secret Service and DOE, 2002) • Workplace Violence – Issues in Response (US FBI, 2004) • Workplace Violence Prevention and Intervention (ASIS/SHRM WVP1.1-2011) • Clinical Risk Management (Sainsbury Centre for Mental Health, 2000) An information management update for in-house counsel
  • 41. Key considerations • Define the roles - employer, employee, third party administrator • Education - inform employees of party roles • Consent forms • File management An information management update for in-house counsel
  • 42. Role definition Medical Employer Advisor Employee HCP An information management update for in-house counsel
  • 43. Telus Inc and TWA (2011, Goodfellow) • Arbitrator says grievor retains fundamental control over highlight private information in custody of employer • To prepare for arbitration, an employer should seek employee consent • Question – Why can’t an employer rely on the its prior obtained consent to receive and use the information for employment-related purposes? • In practice – We need to get better about the consent obtained at the time information is received. An information management update for in-house counsel
  • 44. Complex Services Inc (2012, Surdykowski) • Arbitrator Surdykowski says • Jones v Tsige does not alter the rules for obtaining employee medical information in employees’ favour • Law is clear and is set out in • Hamilton Health Sciences (2007, Surdykowski) • Providence Care (2011, Surdykowski) An information management update for in-house counsel
  • 45. An Information Management Update for In-House Counsel September 19, 2012 F. Cesario, D. Michaluk, A. Tibble