SlideShare uma empresa Scribd logo
1 de 20
Investigating without running afoul of
privacy laws


Dan Michaluk
October 3, 2012
Outline

•   Governing privacy law
•   Access to business system information
•   Surveillance outside the workplace
•   Gathering internet evidence




Investigating without running afoul of privacy laws
Governing privacy law

•   Nothing stops you from investigating (or auditing)
     •   But there are a variety of means by which individuals
         can cause the conduct of an investigation to be
         reviewed
     •   There may be liability for over-stepping




Investigating without running afoul of privacy laws
Governing privacy law

•   Privacy regulation (patchy application to EEs)
     •   Federal works and undertakings – PIPEDA
          •   State Farm, 2010 FC 736
          •   Johnson v Bell Canada, 2008 FC 1086
     •   Employment in BC, Alberta Quebec
     •   Broad public sector application o/s Ontario




Investigating without running afoul of privacy laws
Governing privacy law

•   Individual privacy rights
     •   Implied rights under a collective agreement
     •   Intrusion upon seclusion tort
          •   Jones v Tsige, 2012 ONCA 32
     •   Privacy statutes
          •   BC, Sask, Man, NL (+ Quebec Charter)
     •   Section 8 of the Charter (for government)
          •   See Longueuil, 1997 SCC on application


Investigating without running afoul of privacy laws
Governing privacy law

•   Rules of evidence
     •   Labour arbitrators split 50/50 on authority to exclude
     •   Some court cases accept authority to exclude
          •   See Mathews, 2007 BCSC 1825
     •   Section 7 of Manitoba Privacy Act




Investigating without running afoul of privacy laws
Governing privacy law

•   A recent example – Calgary Police, F2012-07
     •   Internal sexual misconduct investigation
     •   Review of work e-mail account
     •   Search for “password”
     •   Found password to outside account
     •   Searched outside account




Investigating without running afoul of privacy laws
Governing privacy law

•   A recent example – Alberta Govt (Sims, 2012)
     •   Credit checks on 26 employees by internal
         investigator as part of a needs or motive analysis
     •   Without consent
     •   Agreed that employees “suffered emotional stress”
         as a result of privacy breach
     •   Arbitrator awards $1,250 each



Investigating without running afoul of privacy laws
Access to business system information
•   The ideal – single purpose systems
              Mine                           Yours




Investigating without running afoul of privacy laws
Access to business system information

•   The reality – significant intermingling
     •   Utility of internet invites personal use at work
     •   Utility of handheld devices puts work on personal
         devices
     •   Utility and value of cloud computing puts your work
         system on a computer with others’ work systems




Investigating without running afoul of privacy laws
Access to business system information

•   The problem – bad law
     •   CACE asks this Court to re-balance employer and
         employee interests. To strike a proper balance, the Court
         should give significant weight to the primary function of a
         work-issued computer and should recognize that a work-
         issued computer is only one part of a work information
         system that must be routinely accessed by an employer
         for a variety of legitimate reasons.
                                        (CACE factum in R v Cole)


Investigating without running afoul of privacy laws
Access to business system information

•   One solution – more law and policy
     •   You deal with data security in your cloud contracts.
         Have you dealt with audit and investigation
         requirements?
     •   Your acceptable use policies must be clear that
         personal use is conditional on specific and detailed
         rights and requires a sacrifice of personal autonomy




Investigating without running afoul of privacy laws
Access to business system information

•   Other more fundamental solutions
     •   Revert to a no personal use rule
     •   Segregate the data created by personal use from
         the data created by work use (this is what BYOD
         technology and policy attempts to do)




Investigating without running afoul of privacy laws
Surveillance outside the workplace

•   Intrusion upon seclusion tort
      One who intentionally intrudes, physically or otherwise, upon the seclusion of
      another or his private affairs or concerns, is subject to liability to the other for
      invasion of privacy, if the invasion would be highly offensive to a reasonable
                                           person.

     1.   Intentional, unauthorized intrusion
     2.   Upon private affairs or concerns
     3.   Highly offensive to the reasonable person




Investigating without running afoul of privacy laws
Surveillance outside the workplace

•   An obvious risk that you ought to address
•   Structure the decision to retain
     •   Reasonable grounds?
     •   Who decides?
•   Structure the retainer
     •   Authorized means? Unauthorized means?
     •   Requirements (e.g., video only in public)
     •   Indemnification for breach

Investigating without running afoul of privacy laws
Gathering internet evidence

•   If published, then likely okay
     •   Judges likely to be conservative
          •   see Murphy v Perger, 2007 ONSC
          •   see UFCW v Alberta, 2012 ABCA 130
     •   Most privacy statutes have exclusions for “publicly
         available information”
          •   Subject to interpretation
          •   Seek advice if privacy legislation applies
          •   If not excluded, investigation exemption may apply


Investigating without running afoul of privacy laws
Gathering internet evidence

•   If not published
     •   Receiving a printout from a friend is okay
     •   Hacking in (e.g., through a found password) is
         prohibited by the Criminal Code
     •   Impersonating someone with intent to gain
         advantage is prohibited by the Criminal Code




Investigating without running afoul of privacy laws
Gathering internet evidence

•   If not published…
     •   The CBA Code of Professional Conduct (lawyer as
         advocate rule) says:
          •   The lawyer may properly seek information from any potential
              witness (whether under subpoena or not) but should disclose the
              lawyer’s interest and take care not to subvert to suppress any
              evidence or procure the witness to stay out of the way. The
              lawyer shall not approach or deal with an opposite party who is
              professional represented save through or with the consent of
              that party’s lawyer.




Investigating without running afoul of privacy laws
Gathering internet evidence

•   If not published…
     •   The CBA Code of Professional Conduct (avoiding
         questionable conduct) says:
          •   Public confidence in the administration of justice and the legal
              profession may be eroded by irresponsible conduct on the part
              of the individual lawyer. For that reason, even the appearance of
              impropriety should be avoided.
     •   Arguably applies because the tactic for gaining access to
         information entails taking advantage of the subject




Investigating without running afoul of privacy laws
Investigating without running afoul of
privacy laws


Dan Michaluk
October 3, 2012

Mais conteúdo relacionado

Mais procurados

“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation tomasztopa
 
The ins and outs of the e-FOI process
The ins and outs of the e-FOI processThe ins and outs of the e-FOI process
The ins and outs of the e-FOI processDan Michaluk
 
Boulder/Denver Software Club Presentation: "All Things Data - Data Right...
Boulder/Denver Software Club Presentation: "All Things Data - Data Right...Boulder/Denver Software Club Presentation: "All Things Data - Data Right...
Boulder/Denver Software Club Presentation: "All Things Data - Data Right...Jason Haislmaier
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security:  Risk Management and AvoidancePrivacy and Data Security:  Risk Management and Avoidance
Privacy and Data Security: Risk Management and AvoidanceAmy Purcell
 
GDPR and EA Commissioning a web site part 2 - Legal Environment
GDPR and EA Commissioning a web site part 2 - Legal EnvironmentGDPR and EA Commissioning a web site part 2 - Legal Environment
GDPR and EA Commissioning a web site part 2 - Legal EnvironmentAllen Woods
 
Social media – issues and trends caus 2014
Social media – issues and trends   caus 2014Social media – issues and trends   caus 2014
Social media – issues and trends caus 2014Dan Michaluk
 
Legal Considerations of Digital Document Storage and E-Signature, Authority f...
Legal Considerations of Digital Document Storage and E-Signature, Authority f...Legal Considerations of Digital Document Storage and E-Signature, Authority f...
Legal Considerations of Digital Document Storage and E-Signature, Authority f...ImageSoft
 
Amcto presentation final
Amcto presentation finalAmcto presentation final
Amcto presentation finalDan Michaluk
 
Don't be a robot: You can't automate your ethical considerations
Don't be a robot: You can't automate your ethical considerationsDon't be a robot: You can't automate your ethical considerations
Don't be a robot: You can't automate your ethical considerationsNehal Madhani
 
74 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.1674 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.16Glenn E. Davis
 
Privacy & publicity trade secrets in Wisconsin
Privacy & publicity trade secrets in WisconsinPrivacy & publicity trade secrets in Wisconsin
Privacy & publicity trade secrets in WisconsinBoyle_Fredrickson
 
Strong Host Security Policies are Good Business
Strong Host Security Policies are Good BusinessStrong Host Security Policies are Good Business
Strong Host Security Policies are Good BusinessHostingCon
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal informationUc Man
 

Mais procurados (20)

“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
 
Pls 780 week 3
Pls 780 week 3Pls 780 week 3
Pls 780 week 3
 
Pls 780 week 5
Pls 780 week 5Pls 780 week 5
Pls 780 week 5
 
The ins and outs of the e-FOI process
The ins and outs of the e-FOI processThe ins and outs of the e-FOI process
The ins and outs of the e-FOI process
 
Boulder/Denver Software Club Presentation: "All Things Data - Data Right...
Boulder/Denver Software Club Presentation: "All Things Data - Data Right...Boulder/Denver Software Club Presentation: "All Things Data - Data Right...
Boulder/Denver Software Club Presentation: "All Things Data - Data Right...
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Pls 780 week 9
Pls 780 week 9Pls 780 week 9
Pls 780 week 9
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security:  Risk Management and AvoidancePrivacy and Data Security:  Risk Management and Avoidance
Privacy and Data Security: Risk Management and Avoidance
 
GDPR and EA Commissioning a web site part 2 - Legal Environment
GDPR and EA Commissioning a web site part 2 - Legal EnvironmentGDPR and EA Commissioning a web site part 2 - Legal Environment
GDPR and EA Commissioning a web site part 2 - Legal Environment
 
Social media – issues and trends caus 2014
Social media – issues and trends   caus 2014Social media – issues and trends   caus 2014
Social media – issues and trends caus 2014
 
Legal Considerations of Digital Document Storage and E-Signature, Authority f...
Legal Considerations of Digital Document Storage and E-Signature, Authority f...Legal Considerations of Digital Document Storage and E-Signature, Authority f...
Legal Considerations of Digital Document Storage and E-Signature, Authority f...
 
Amcto presentation final
Amcto presentation finalAmcto presentation final
Amcto presentation final
 
Don't be a robot: You can't automate your ethical considerations
Don't be a robot: You can't automate your ethical considerationsDon't be a robot: You can't automate your ethical considerations
Don't be a robot: You can't automate your ethical considerations
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
Data privacy & social media
Data privacy & social mediaData privacy & social media
Data privacy & social media
 
74 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.1674 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.16
 
Privacy & publicity trade secrets in Wisconsin
Privacy & publicity trade secrets in WisconsinPrivacy & publicity trade secrets in Wisconsin
Privacy & publicity trade secrets in Wisconsin
 
Strong Host Security Policies are Good Business
Strong Host Security Policies are Good BusinessStrong Host Security Policies are Good Business
Strong Host Security Policies are Good Business
 
Ethical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on ComputingEthical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on Computing
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal information
 

Semelhante a Investigating without running afoul of privacy laws

Employment and Labour Law Seminar - June 13, 2013
Employment and Labour Law Seminar - June 13, 2013Employment and Labour Law Seminar - June 13, 2013
Employment and Labour Law Seminar - June 13, 2013This account is closed
 
New Technologies in the Workplace: Privacy Issues
New Technologies in the Workplace: Privacy IssuesNew Technologies in the Workplace: Privacy Issues
New Technologies in the Workplace: Privacy Issueslgarib
 
Surveillance and security.pptx
Surveillance and security.pptxSurveillance and security.pptx
Surveillance and security.pptxjohn6938
 
Gdpr demystified - making sense of the regulation
Gdpr demystified  - making sense of the regulationGdpr demystified  - making sense of the regulation
Gdpr demystified - making sense of the regulationJames Mulhern
 
The internet as a corporate security resource
The internet as a corporate security resourceThe internet as a corporate security resource
The internet as a corporate security resourceDan Michaluk
 
Employee Privacy Rights: New Developments in the Law
Employee Privacy Rights: New Developments in the LawEmployee Privacy Rights: New Developments in the Law
Employee Privacy Rights: New Developments in the LawEnercare Inc.
 
Big data needs big protection
Big data needs big protectionBig data needs big protection
Big data needs big protectionNoel Hatch
 
Marywright 120326114508 Phpapp02 (1)
Marywright 120326114508 Phpapp02 (1)Marywright 120326114508 Phpapp02 (1)
Marywright 120326114508 Phpapp02 (1)J. Kim Scholes
 
Librarian RDM Training: Ethics and copyright for research data
Librarian RDM Training: Ethics and copyright for research dataLibrarian RDM Training: Ethics and copyright for research data
Librarian RDM Training: Ethics and copyright for research dataRobin Rice
 
The Privacy Law Landscape: Issues for the research community
The Privacy Law Landscape: Issues for the research communityThe Privacy Law Landscape: Issues for the research community
The Privacy Law Landscape: Issues for the research communityARDC
 
Privacy issues in data analytics
Privacy issues in data analyticsPrivacy issues in data analytics
Privacy issues in data analyticsshekharkanodia
 
CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)Sam Bowne
 
CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)Sam Bowne
 
Data Privacy in India and data theft
Data Privacy in India and data theftData Privacy in India and data theft
Data Privacy in India and data theftAmber Gupta
 
What All Organisations Need to Know About Data Protection and Cloud Computing...
What All Organisations Need to Know About Data Protection and Cloud Computing...What All Organisations Need to Know About Data Protection and Cloud Computing...
What All Organisations Need to Know About Data Protection and Cloud Computing...Brian Miller, Solicitor
 

Semelhante a Investigating without running afoul of privacy laws (20)

Employment and Labour Law Seminar - June 13, 2013
Employment and Labour Law Seminar - June 13, 2013Employment and Labour Law Seminar - June 13, 2013
Employment and Labour Law Seminar - June 13, 2013
 
4-Privacy1.pptx
4-Privacy1.pptx4-Privacy1.pptx
4-Privacy1.pptx
 
New Technologies in the Workplace: Privacy Issues
New Technologies in the Workplace: Privacy IssuesNew Technologies in the Workplace: Privacy Issues
New Technologies in the Workplace: Privacy Issues
 
Surveillance and security.pptx
Surveillance and security.pptxSurveillance and security.pptx
Surveillance and security.pptx
 
Gdpr demystified - making sense of the regulation
Gdpr demystified  - making sense of the regulationGdpr demystified  - making sense of the regulation
Gdpr demystified - making sense of the regulation
 
The internet as a corporate security resource
The internet as a corporate security resourceThe internet as a corporate security resource
The internet as a corporate security resource
 
AI and Privacy
AI and PrivacyAI and Privacy
AI and Privacy
 
Employee Privacy Rights: New Developments in the Law
Employee Privacy Rights: New Developments in the LawEmployee Privacy Rights: New Developments in the Law
Employee Privacy Rights: New Developments in the Law
 
Big data needs big protection
Big data needs big protectionBig data needs big protection
Big data needs big protection
 
Marywright 120326114508 Phpapp02 (1)
Marywright 120326114508 Phpapp02 (1)Marywright 120326114508 Phpapp02 (1)
Marywright 120326114508 Phpapp02 (1)
 
Introduction to GDPR
Introduction to GDPRIntroduction to GDPR
Introduction to GDPR
 
Librarian RDM Training: Ethics and copyright for research data
Librarian RDM Training: Ethics and copyright for research dataLibrarian RDM Training: Ethics and copyright for research data
Librarian RDM Training: Ethics and copyright for research data
 
The Privacy Law Landscape: Issues for the research community
The Privacy Law Landscape: Issues for the research communityThe Privacy Law Landscape: Issues for the research community
The Privacy Law Landscape: Issues for the research community
 
Privacy Compliance for Law Firms: Moving Beyond Confidentiality
Privacy Compliance for Law Firms: Moving Beyond ConfidentialityPrivacy Compliance for Law Firms: Moving Beyond Confidentiality
Privacy Compliance for Law Firms: Moving Beyond Confidentiality
 
Privacy issues in data analytics
Privacy issues in data analyticsPrivacy issues in data analytics
Privacy issues in data analytics
 
CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)
 
CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)
 
Data Protection and IDEA
Data Protection and IDEAData Protection and IDEA
Data Protection and IDEA
 
Data Privacy in India and data theft
Data Privacy in India and data theftData Privacy in India and data theft
Data Privacy in India and data theft
 
What All Organisations Need to Know About Data Protection and Cloud Computing...
What All Organisations Need to Know About Data Protection and Cloud Computing...What All Organisations Need to Know About Data Protection and Cloud Computing...
What All Organisations Need to Know About Data Protection and Cloud Computing...
 

Mais de Dan Michaluk

Ecno cyber - 23 June 2023 - djm(137852631.1).pptx
Ecno cyber - 23 June 2023 - djm(137852631.1).pptxEcno cyber - 23 June 2023 - djm(137852631.1).pptx
Ecno cyber - 23 June 2023 - djm(137852631.1).pptxDan Michaluk
 
Critical Issues in School Board Cyber Security
Critical Issues in School Board Cyber SecurityCritical Issues in School Board Cyber Security
Critical Issues in School Board Cyber SecurityDan Michaluk
 
Introduction to FOI law (the law of information)
Introduction to FOI law (the law of information)Introduction to FOI law (the law of information)
Introduction to FOI law (the law of information)Dan Michaluk
 
Higher Education Sexual Violence Presentation
Higher Education Sexual Violence PresentationHigher Education Sexual Violence Presentation
Higher Education Sexual Violence PresentationDan Michaluk
 
Cyber class action claims at an inflection point
Cyber class action claims at an inflection pointCyber class action claims at an inflection point
Cyber class action claims at an inflection pointDan Michaluk
 
The pandemic and privacy
The pandemic and privacyThe pandemic and privacy
The pandemic and privacyDan Michaluk
 
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...
Cyber security for the regulator and regulated  - Ontario Regulatory Authorit...Cyber security for the regulator and regulated  - Ontario Regulatory Authorit...
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...Dan Michaluk
 
Union access to information
Union access to informationUnion access to information
Union access to informationDan Michaluk
 
Cybersecurity Risk Governance
Cybersecurity Risk GovernanceCybersecurity Risk Governance
Cybersecurity Risk GovernanceDan Michaluk
 
Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?Dan Michaluk
 
The Current State of FOI
The Current State of FOIThe Current State of FOI
The Current State of FOIDan Michaluk
 
Cyber, secrecy and the public body
Cyber, secrecy and the public bodyCyber, secrecy and the public body
Cyber, secrecy and the public bodyDan Michaluk
 
The privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsThe privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsDan Michaluk
 
Advocates' Society Tricks of the Trade 2019 - A Privacy Update
Advocates' Society Tricks of the Trade 2019 - A Privacy UpdateAdvocates' Society Tricks of the Trade 2019 - A Privacy Update
Advocates' Society Tricks of the Trade 2019 - A Privacy UpdateDan Michaluk
 
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam CompliancePrivacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam ComplianceDan Michaluk
 
Cyber Insurance and Incident Response Practice
Cyber Insurance and Incident Response Practice Cyber Insurance and Incident Response Practice
Cyber Insurance and Incident Response Practice Dan Michaluk
 
Role of a breach coach
Role of a breach coachRole of a breach coach
Role of a breach coachDan Michaluk
 
PHIPA for school boards
PHIPA for school boardsPHIPA for school boards
PHIPA for school boardsDan Michaluk
 
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam CompliancePrivacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam ComplianceDan Michaluk
 
Finding internet evidence
Finding internet evidenceFinding internet evidence
Finding internet evidenceDan Michaluk
 

Mais de Dan Michaluk (20)

Ecno cyber - 23 June 2023 - djm(137852631.1).pptx
Ecno cyber - 23 June 2023 - djm(137852631.1).pptxEcno cyber - 23 June 2023 - djm(137852631.1).pptx
Ecno cyber - 23 June 2023 - djm(137852631.1).pptx
 
Critical Issues in School Board Cyber Security
Critical Issues in School Board Cyber SecurityCritical Issues in School Board Cyber Security
Critical Issues in School Board Cyber Security
 
Introduction to FOI law (the law of information)
Introduction to FOI law (the law of information)Introduction to FOI law (the law of information)
Introduction to FOI law (the law of information)
 
Higher Education Sexual Violence Presentation
Higher Education Sexual Violence PresentationHigher Education Sexual Violence Presentation
Higher Education Sexual Violence Presentation
 
Cyber class action claims at an inflection point
Cyber class action claims at an inflection pointCyber class action claims at an inflection point
Cyber class action claims at an inflection point
 
The pandemic and privacy
The pandemic and privacyThe pandemic and privacy
The pandemic and privacy
 
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...
Cyber security for the regulator and regulated  - Ontario Regulatory Authorit...Cyber security for the regulator and regulated  - Ontario Regulatory Authorit...
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...
 
Union access to information
Union access to informationUnion access to information
Union access to information
 
Cybersecurity Risk Governance
Cybersecurity Risk GovernanceCybersecurity Risk Governance
Cybersecurity Risk Governance
 
Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?
 
The Current State of FOI
The Current State of FOIThe Current State of FOI
The Current State of FOI
 
Cyber, secrecy and the public body
Cyber, secrecy and the public bodyCyber, secrecy and the public body
Cyber, secrecy and the public body
 
The privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsThe privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analytics
 
Advocates' Society Tricks of the Trade 2019 - A Privacy Update
Advocates' Society Tricks of the Trade 2019 - A Privacy UpdateAdvocates' Society Tricks of the Trade 2019 - A Privacy Update
Advocates' Society Tricks of the Trade 2019 - A Privacy Update
 
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam CompliancePrivacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam Compliance
 
Cyber Insurance and Incident Response Practice
Cyber Insurance and Incident Response Practice Cyber Insurance and Incident Response Practice
Cyber Insurance and Incident Response Practice
 
Role of a breach coach
Role of a breach coachRole of a breach coach
Role of a breach coach
 
PHIPA for school boards
PHIPA for school boardsPHIPA for school boards
PHIPA for school boards
 
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam CompliancePrivacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam Compliance
 
Finding internet evidence
Finding internet evidenceFinding internet evidence
Finding internet evidence
 

Último

Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...noida100girls
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insightsseri bangash
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in managementchhavia330
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdftbatkhuu1
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 

Último (20)

Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insights
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in management
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdf
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 

Investigating without running afoul of privacy laws

  • 1. Investigating without running afoul of privacy laws Dan Michaluk October 3, 2012
  • 2. Outline • Governing privacy law • Access to business system information • Surveillance outside the workplace • Gathering internet evidence Investigating without running afoul of privacy laws
  • 3. Governing privacy law • Nothing stops you from investigating (or auditing) • But there are a variety of means by which individuals can cause the conduct of an investigation to be reviewed • There may be liability for over-stepping Investigating without running afoul of privacy laws
  • 4. Governing privacy law • Privacy regulation (patchy application to EEs) • Federal works and undertakings – PIPEDA • State Farm, 2010 FC 736 • Johnson v Bell Canada, 2008 FC 1086 • Employment in BC, Alberta Quebec • Broad public sector application o/s Ontario Investigating without running afoul of privacy laws
  • 5. Governing privacy law • Individual privacy rights • Implied rights under a collective agreement • Intrusion upon seclusion tort • Jones v Tsige, 2012 ONCA 32 • Privacy statutes • BC, Sask, Man, NL (+ Quebec Charter) • Section 8 of the Charter (for government) • See Longueuil, 1997 SCC on application Investigating without running afoul of privacy laws
  • 6. Governing privacy law • Rules of evidence • Labour arbitrators split 50/50 on authority to exclude • Some court cases accept authority to exclude • See Mathews, 2007 BCSC 1825 • Section 7 of Manitoba Privacy Act Investigating without running afoul of privacy laws
  • 7. Governing privacy law • A recent example – Calgary Police, F2012-07 • Internal sexual misconduct investigation • Review of work e-mail account • Search for “password” • Found password to outside account • Searched outside account Investigating without running afoul of privacy laws
  • 8. Governing privacy law • A recent example – Alberta Govt (Sims, 2012) • Credit checks on 26 employees by internal investigator as part of a needs or motive analysis • Without consent • Agreed that employees “suffered emotional stress” as a result of privacy breach • Arbitrator awards $1,250 each Investigating without running afoul of privacy laws
  • 9. Access to business system information • The ideal – single purpose systems Mine Yours Investigating without running afoul of privacy laws
  • 10. Access to business system information • The reality – significant intermingling • Utility of internet invites personal use at work • Utility of handheld devices puts work on personal devices • Utility and value of cloud computing puts your work system on a computer with others’ work systems Investigating without running afoul of privacy laws
  • 11. Access to business system information • The problem – bad law • CACE asks this Court to re-balance employer and employee interests. To strike a proper balance, the Court should give significant weight to the primary function of a work-issued computer and should recognize that a work- issued computer is only one part of a work information system that must be routinely accessed by an employer for a variety of legitimate reasons. (CACE factum in R v Cole) Investigating without running afoul of privacy laws
  • 12. Access to business system information • One solution – more law and policy • You deal with data security in your cloud contracts. Have you dealt with audit and investigation requirements? • Your acceptable use policies must be clear that personal use is conditional on specific and detailed rights and requires a sacrifice of personal autonomy Investigating without running afoul of privacy laws
  • 13. Access to business system information • Other more fundamental solutions • Revert to a no personal use rule • Segregate the data created by personal use from the data created by work use (this is what BYOD technology and policy attempts to do) Investigating without running afoul of privacy laws
  • 14. Surveillance outside the workplace • Intrusion upon seclusion tort One who intentionally intrudes, physically or otherwise, upon the seclusion of another or his private affairs or concerns, is subject to liability to the other for invasion of privacy, if the invasion would be highly offensive to a reasonable person. 1. Intentional, unauthorized intrusion 2. Upon private affairs or concerns 3. Highly offensive to the reasonable person Investigating without running afoul of privacy laws
  • 15. Surveillance outside the workplace • An obvious risk that you ought to address • Structure the decision to retain • Reasonable grounds? • Who decides? • Structure the retainer • Authorized means? Unauthorized means? • Requirements (e.g., video only in public) • Indemnification for breach Investigating without running afoul of privacy laws
  • 16. Gathering internet evidence • If published, then likely okay • Judges likely to be conservative • see Murphy v Perger, 2007 ONSC • see UFCW v Alberta, 2012 ABCA 130 • Most privacy statutes have exclusions for “publicly available information” • Subject to interpretation • Seek advice if privacy legislation applies • If not excluded, investigation exemption may apply Investigating without running afoul of privacy laws
  • 17. Gathering internet evidence • If not published • Receiving a printout from a friend is okay • Hacking in (e.g., through a found password) is prohibited by the Criminal Code • Impersonating someone with intent to gain advantage is prohibited by the Criminal Code Investigating without running afoul of privacy laws
  • 18. Gathering internet evidence • If not published… • The CBA Code of Professional Conduct (lawyer as advocate rule) says: • The lawyer may properly seek information from any potential witness (whether under subpoena or not) but should disclose the lawyer’s interest and take care not to subvert to suppress any evidence or procure the witness to stay out of the way. The lawyer shall not approach or deal with an opposite party who is professional represented save through or with the consent of that party’s lawyer. Investigating without running afoul of privacy laws
  • 19. Gathering internet evidence • If not published… • The CBA Code of Professional Conduct (avoiding questionable conduct) says: • Public confidence in the administration of justice and the legal profession may be eroded by irresponsible conduct on the part of the individual lawyer. For that reason, even the appearance of impropriety should be avoided. • Arguably applies because the tactic for gaining access to information entails taking advantage of the subject Investigating without running afoul of privacy laws
  • 20. Investigating without running afoul of privacy laws Dan Michaluk October 3, 2012