Case Report – No prejudice where information simply made to “lie about in the great wide world” (ABCA)

On January 31, the Alberta Court of Appeal quashed a procedural appeal brought by a non-party to a longstanding commercial litigation dispute and, in doing so, made some comments on the use of information gathered in the discovery process.

The non-party appealed from an order which granted the plaintiffs partial relief from the implied undertaking and a confidentiality order. The non-party claimed the order caused it prejudice in a second related action, presumably in which it was a defendant. The Court rejected the prejudice argument (emphasis in original):

Since counsel for the appellant argued that he would be prejudiced if his client could not appeal, we went beyond mere status and inquired into the nature of the prejudice or injustice suggested. He seemed to think that the order under appeal put into evidence in the second suit against him, information gathered largely without his participation, even his knowledge, in the first suit.

That suggestion of ex parte injustice is not correct. Both the implied undertaking restricting the use of information got through discovery, and confidentiality orders, merely add an extra impediment to attempts to use evidence for purposes outside the original lawsuit. If those impediments are removed, then the information in question simply has the same status as all other information lying about in the great wide world.

The first rule of the law of evidence is that courts will not receive all information as evidence. Much of it is inadmissible: most hearsay, for example, and all irrelevant information. Therefore, waiving the implied undertaking rule, or lifting a confidentiality order, has no effect on such inadmissibility. What is inadmissible as evidence for other reasons other than confidentiality or implied undertakings remains inadmissible. To lift a confidentiality order or the implied undertaking merely allows the parties to another action to tender the information as evidence. It has no influence whatever on the judge or master’s decision about whether to accept it as evidence. The usual common-law rules of evidence (as modified by statute or Rules of Court) still apply.

The Court also noted that the order appealed from gave the non-party an express right to raise the matter of fairness in the second action.

Dreco Energy Services v. Wenzel Downhole Tools, 2008 ABCA 36 (CanLII).

Employee privacy, Web 2.0 and other random musings of a management employment lawyer

The judiciary should confine itself to those incremental changes which are necessary to keep the common law in step with the dynamic and evolving fabric of our society.

Iacobucci J. in R. v. Salituro

* * *

I’ve stayed away from Web 2.0 issues on this blog until now. But when a colleague who I wouldn’t have guessed called me the other day and was quite obviously flabbergasted about how powerful the Facebook application is, it confirmed my very non-original opinion that this phenomenon of people posting personal stuff on the internet could change the shape of privacy law.

I was a resister at first, not of the technology, but of the technology as something that was going to change the law as we know it. You see, I’m a former research lawyer and (as you know) like to follow developing case law. Through this affair of the heart I’ve learned that nine out of ten judgements are confined to their facts. The tenth is usually one I can squeeze some meaning out of, formerly in our internal firm newsletters and now in this blog. I know well that incremental change is truly the norm for the common law. So even as a user of Facebook that was fully-aware of the new masses of people taking control of the internet’s content, I was sceptical (or clueless) that Web 2.0 meant much for privacy law.

My non-belief was aided by my practice as a management-side employment lawyer. We get asked to help employers manage employees who post bad things on the internet all the time. Most of the time we rely on contractual rights, hopefully ones that are helped by a nice “blogging” policy so employer interests can be protected without having to rely on an argument that “employees ought to have known.” Like maybe a policy that tells employees that saying an improper thing to 350 Facebook friends can cause just as much harm as saying it to the world and, hence, will be treated as such. Disputes about off-duty conduct and about how far an employer’s right to regulate an employee’s private life goes have been litigated in Canada for years. Not simple by any means, but nothing new.

Then came the harder files. Former employees don’t have employment contracts. They can have a duty to keep information confidential, but in Canadian law the duty is based on the circumstances under which information is communicated and received. Disparagement of a former manager doesn’t fit, and as a result I’ve gained a rather quick interest in the law of defamation. But what if a former employee publishes a true but embarrassing or harmful fact about a former manager? Or a patient or client? Think about an accurate and fair account of bad management. Say it includes a manager’s home phone number stolen from a personnel file. Or maybe a nurse posts information about a patient’s medical condition on a Facebook page. If employee and patient privacy is regulated, the organization may be in for a problem with a privacy regulator (though not likely for disclosure of the bad management story). But does it have a legal means of acting against the rogue former employee to contain the breach? Does the manager or patient for that matter? What the heck is the basis for the claim?

What’s that? “A new common law right of privacy,” you say?

I am happy that I work with many fair and reasonable organizations, but I’m not really in the running for the “new invasion of privacy tort and implied (contractual) privacy rights advocate-of-the-year” award. We’re only inching our way towards court-based recognition of privacy rights in Canada. Though a newly-recognized privacy right would cause some constraint on management, the example above shows that new bases for protecting privacy would at least fit with some management interests. I think most employers would feel compelled to take action to protect a manager whose privacy is under attack by a former employee simply as a matter of good human resources. A novel confidentiality clause in an employment contract may take employers part of the way provided it hits the right level of post-employment restrictiveness, but such a clause would only invite the truly important question: what types of restrictions on expression ought to be imposed or enforced by a court in the name or privacy?

So I’m a believer now. I’ve mentioned before that I recently read Daniel Solove‘s book, The Future of Reputation. It’s a great read, and got me thinking about privacy law and its relationship to freedom of expression, an issue of balance that I don’t get exposed to when working with very technical privacy regulation on a day-in and day-out basis. It also helped me unlock a link between privacy, the law of defamation and even intellectual property that I hadn’t fully understood and that is critical to our developing common law of privacy. Web 2.0 will push the common law along, maybe incrementally, but likely at a pace that reflects a true social phenomenon. We might expect bad decisions and confusing jurisprudence given the pace of change, but we’ll soon enough have a rational governing common law.

But, of course, the significance of Web 2.0 raises other challenging issues.

There’s the increasing significance of the principle of practical obscurity – the one that says information can still be private (or one’s interest in keeping something private can subsist) even if it is exposed to some unauthorized or limited authorized access if it is so buried that the information remains obscure. This has been a part of privacy law for some time, recognized as early as 1989 by the United States Supreme Court in Reporters Committee, but it is a principle that should now have an increasing importance as privacy law develops.

Then there’s the merging of professional and personal reputation and its impact on workplace privacy law. My loving and understanding wife accepts that I “work” all the time and in turn brings her own laptop to our dinner table – which, appropriately enough, is four feet high and more of a casual dinner “bar.” I also have a mainly professional blog but a deep craving to blow the barrier between my personal and professional personas apart by revealing more and more of myself online. If I’m going to be on-duty all the time I’d better do it in my own skin or I’ll be bound for misery and burnout eh?

I assume the way I work is not atypical for a year 2008 knowledge worker in his or her mid-30s, and therfore ask the following: Have we surrendered all privacy to our employers? Or is a new legal framework for employee privacy needed now that the “workplace” is boundless and there is no true “off-duty?” If the boundary between the workplace and the outside world is disintegrating, where should courts now draw the line between what an employer is and is not allowed to know about its employees?

Can you tell I’m excited? Thanks for listening to my story and my ramblings. I’m looking forward to watching this play out and following the developments. If you have any good readings to further feed my interest please let me know. See ya!

Information Roundup – January 27, 2008

Not bad for a dead of winter weekend. A monochrome out and back paddle from the famous R.C. Harris Water Filtration Plant to the not-so-famous Ashbridges Bay Water Filtration Plant on Saturday. On Sunday, a nice brunch with Seanna and Hugo and then another paddle with just me and the long-tail ducks that winter on the lake.

Here are my good reads of the week.

  • Ronald K. Perkowski, Coping With the EDD Drumbeat. There are lots of articles on controlling the cost of electronic discovery, but I’d call this one “contrarian” and even “radical” in that it shoots hard at consultant, vendor and external counsel practices. By in-house counsel at Haliburton Company. (Law.com)
  • Stewart Weltman, Lean Litigation Practice. I like the ideas here: avoid the lawyer as firefighter syndrome; analyze the case in advance; develop your best case story; create a roadmap and a budget; and litigate with the goal of winning, not settling. (ABA Section of Litigation)
  • Jennifer Stoddart, Response to Industry Canada’s PIPEDA Consultation. A letter from the Privacy Commissioner of Canada. Includes an interesting request for a new discretion to decline to hear complaints that are frivolous or (confining her mandate even further) not in the public interest. (Privacy Commissioner of Canada)
  • David Fraser, US Department of Commerce privacy incident response plan. David links to the Department’s risk assessment matrix for breach notificaiton. I like the concept of having a tool for rapid risk assessment for supporting breach response. You’re sometimes forced to make big dollar decisions on gut without one, and finding an expert to put him or herself on the hook is hard. This is about the most practical model I’ve seen, but I wonder how valid it is. If anyone knows of any other risk assessment models please let me know. (Privacylawyer.ca)

I’ve been listening to the Great Lake Swimmers all weekend too. Just a great indie-folk band from Toronto. You can listen here. See ya!

British Columbia MOE agrees to reform its FOI practices

On January 22, the British Columbia OIPC released an investigation report dealing with a complaint brought by eight environmental organizations which alleged three ministries were suffering from systemic flaws in their processing of FOI requests. Commissioner Loukidelis held that further analysis would be required to make a firm finding, but that there was some basis for an allegation of a “systemic problem” at the MOE. This was enough to make the MOE agree to a remedial plan with six core tasks.

Investigation Report FO8-01, [2008] B.C.I.P.D. No. 5 (QL).

Paper on RFID in Health Care Released

The Ontario IPC and Hewlett-Packard have released a joint-paper entitled, “RFID and Privacy – Guidance for Health-Care Providers.” The report discusses the privacy issues associated with RFID health care applications as grouped into three types:

  • those involving tagging things
  • those involving tagging things linked to people and
  • those involving tagging people.

It identifies the latter two types as being privacy sensitive, with tagging “things linked to people” being more sensitive if the the link is strong, as is the case with tags affixed to individually-prescribed vials of medicine. As with most IPC reports of this type, the authors have generally guarded against making potentially binding statements on specific issues. While the authors note many new applications and comment generally on their potential benefit, the report neither endorses nor denounces any specific application. The most strong statement in the report was made about an application totally unrelated to health care. On the use of contactless identification cards for employee identification purposes, the authors said:

RFID-embedded (“contactless”) Identification cards are a special category of health care RFID use. Here we must distinguish between employee identification (and access) cards (whether “smart” or not), and patient identification cards. Employee Identification cards are increasingly being equipped with RFID technologies in order to identify and authenticate the bearer and facilitate access to physical spaces and other (e.g. computer) resources, as well as for process control and audit purposes. Dual or multi-purpose employee identity cards can serve differing functions at different times, according to context. Such a multi-purpose card and the data it contains, if not properly controlled, invites over-identification for some functions, function creep, and unwanted employee profiling.

While making this strong statement on employee identification, the report said that an RFID patient identification program may be acceptable where it…

…responds to a defined problem or issue in a limited, proportional and effective manner, and is deployed in a way that minimizes privacy and security risks, at least as effectively as any alternative solution.

I sense the two pull quotes above were the subject of considerable discussion. And while employers in Ontario should take heed of the report’s warning, the IPC has a very limited jurisdiction to enforce employee privacy rights in Ontario, even on behalf of employees who work at hospitals.

Case Report – Ireland Supreme Court on creating records and proportionality

On December 5th, a 2-1 majority of the Supreme Court of Ireland held that it was not improper to order a defendant to create and produce a special report from a database. However, a separately constituted majority held that, in the circumstances, the costs of such an order would be disproportionate to its benefit until and unless the plaintiff proved the defendant was liable.

The impugned order was made in the context of a competition law dispute. The plaintiff was a domestic seller of calling cards who claimed that the defendant network owner engaged in a discriminatory pricing practice that favoured foreign providers. It requested production of records of specific calls from one or more archived database files in order to prove liability and damages.

The parties argued the merits of the production request in light of another set of records that was also ordered to be produced. When it became apparent that the disclosure of the other set of records would not provide evidence the plaintiff felt it needed to meet its burden of proof, it pressed for production of the call records. The defendant only then strongly raised its proportionality concerns and made a factual admission which it claimed would render production unnecessary. It also claimed that the impugned order would require it to compile, analyze and present information in a form in which it never existed.

The defendant ultimately prevailed at the Supreme Court based on its proportionality argument. Fennelly J. and Kearns J.’s reasoning arguably turned on the plaintiff’s factual admission, which they held made production unnecessary to proof of liability and disproportionate in light of the cost of production (claimed to require the purchase of hardware costing approximately of 150,000 and significant other cost outlays to be made over a six month period). Both recognized the potential necessity of production to proof of damages, and held that the plaintiff may file a fresh application for discovery should it first prove liability. In reaching his finding Fennelly J. said:

I have come to the conclusion that the very unusual burden and heavy cost of the discovery in this case requires the Court to have a clear view of the litigious benefit to the plaintiff from obtaining the extremely detailed breakdown of information which is the only remaining issue.

Geoghegan J., dissenting on the proportionality issue, took the opposite view on the burden of proof, making comments that favoured a strict burden of proving disproportionate costs once evidence is shown to be relevant and necessary. He noted that the defendant had raised cost as a barrier to production well into the dispute and then had argued cost in its submissions without adducing supportive evidence. He said:

My overall impression is that essentially, the appellant was trying unsuccessfully to frighten the court by the mention of what superficially at least would be large figures but figures unsupported by solid evidence.

While the bifurcation of production in response to cost is novel and the dispute on burden of proof significant, the Court’s treatment of the “creating records” issue was dealt with on a more broadly-reasoned basis. Fennelly J. endorsed Geoghegan J.’s reasoning, and Kearns J. did not make comment. Geoghegan J. reasoned that the form in which data is stored is not relevant to the form in which its produced. He said:

It is common knowledge that a vast amount of stored information in the business world which formerly would have been in a documentary form in the traditional sense is now computerised. As a matter of fairness and common sense the courts must adapt themselves to this situation and fashion appropriate analogous orders of discovery. In order to achieve a reasonable parity with traditional documentary discovery it may well be necessary to direct a party “to create documents” within the meaning of the notice of appeal. It may indeed also be necessary to direct a party “to create documents” within the meaning of the notice of appeal even if such “documents” “do not exist at the time the order is made”. I am deliberately using quotation marks because I do not intend to adjudicate on the quasi-metaphysical argument of Mr. Paul Anthony McDermott, counsel for the respondent, that the “documents” do in fact “exist”. At any rate that matter can probably be argued both ways but I would be firmly of opinion that an order of discovery can be made which involves the creation of documents which do not exist, made in the kind of context in which it is sought in this case. Otherwise, potential litigants could operate their business computers in such a way that they would be able to evade any worthwhile discovery. In expressing the above views, I accept that superficially I am perhaps going a step further than the English authorities have done in so far as their rule of court can apparently be interpreted to cover computer discovery. I have no hesitation, however, in making that extension.

Dome Telecom v. Eircom, [2007] IESC 59.

Information Roundup – January 20, 2008

No paddling this weekend. You’d be surprised how warm today’s wetsuits are. They can take you to minus ten centigrade comfortably, but in fresh water you get a lot of ice-up below minus five and if its windy getting in and out of the water can be pretty unpleasant. To rub my landlocked status in, I got surf reports (with pictures) from my friends Alex in Nova Scotia, Jean-Luc in Santa Barbara and Jan in Raglan, New Zealand. Can you tell that I get cranky when I don’t get in the water?!

Anyway, I came back to the law on the basis that pursuits of the legal kind can be as good a means of finding enlightenment as the aquatic. On that note, here’s what I read of interest this week.

  • Randy Cohen (The Ethicist), Anonymity Breach. An ethical (and legal dilemma) on investigating the identity of a student who writes discriminatory teaching evaluation under a promise of confidentiality. (New York Times)
  • Ellen Nakashima, In Child Porn Case, A Digital Dilemma. Covers an appeal that addresses whether a decryption order in furtherance of a child pornography investigation would violate the right against self-incrimination. (Washington Post)
  • Pete Yost, White House Missing CIA, Iraq E-Mails. The Washington Post has had the leading coverage on the allegations that the White House has failed to comply with the Presidential Records Act, now scheduled for a February 15th hearing by the Committee on Government Oversight and Reform. (Washington Post)
  • Ellen Perlman, Delete at Your Own Risk. Food for thought for freedom of information coordinators and government records managers. I agree with the basic premise, but disagree to the extent the article suggests that retention beyond statutorily-mandated retention periods is necessarily a good risk-management practice. (Governing.com)

Enjoy!

Case Report – Alberta reference checker benefits all by taking notes

On January 2nd, the Alberta OIPC dismissed a complaint alleging that an employment reference had been given in violation of the Alberta PIPA.

The complaint was against both the prospective and former employer. It alleged that both breached the Act by communicating a negative reference that included irrelevant and inaccurate personal information – namely, that the complainant had been married three times and that she was a liar and a thief. To simplify, the Act authorizes the non-consentual collection, use and disclosure of personal information in the reference checking process, but the personal information given and received must be relevant to the hiring decision. The Act also imposes a requirement to “make a reasonable effort” to ensure that any information given or received is accurate and complete.

In this case, the complainant said she had a telephone conversation with the reference giver in which he admitted conveying the irrelevant information. The reference giver disputed this allegation, and the Commissioner held that his version of events was more likely to be true because it was corroborated by notes taken and produced by the the reference giver. The Commissioner also held that the employer giving the reference had conveyed an accurate assessment of the complainant’s performance.

There is also a point of some technical significance in the decision. The Commissioner held that “personal employee information” includes the employment information of former employees, thereby departing slightly from his analysis in earlier decisions.

Thank you to David Fraser for bringing this to my attention through his Canadian Privacy Law Blog.

George Byma Real Estate Team (Re), [2008] A.I.P.C. No. 2 (QL) (Alta. OIPC).

Case Report – Ontario court says spoliation inference doesn’t hinge on bad faith

In this product liability case, the Ontario Superior Court of Justice dismissed a defendant’s motion for a spoliation inference brought because the plaintiff destroyed a ventilation fan that it later argued had caused the damaging fire.

The plaintiff ultimately failed in making its claim that the defendant breached a duty to warn them of the inherent dangers in using the fan and the need to address these dangers through regular maintenance. The plaintiff did, however, meet its first evidentiary hurdle – proof that the fan actually caused the fire, a point disputed by the defendant partly based on the plaintiff’s destruction of the fan.

The fire occurred in mid-September. The fire inspector from the local fire department concluded the fan had caused the fire, and in early October the plaintiff’s insurer retained an expert who reached the same conclusion. In February of the following year the expert disposed of the fan after receiving an instruction from the plaintiff’s insurance adjuster. The plaintiff filed its claim over three and a half years later. Given the missing evidence, the defendant produced an expert report that was based on a review of photographs and other documentary production rather than the fan itself.

The Court made a number of broad statements in disposing of the spoliation motion. Most significantly, it held that in Ontario (as opposed to the approach seemingly favoured British Columbia) proof of bad faith is not required to support an inference that the evidence destroyed would have been favourable to the party who destroyed it. There are other elements of the spoliation decision that are more difficult to decipher but, in the end, the Court decided for the defendant on other grounds.

Dickson v. Broan-NuTone Canada Inc., [2007] O.J. No. 5114 (Q.L.) (S.C.J.).