Case Report – Fiduciaries may prepare to depart

There is a line of case law in which Canadian courts have held that “ordinary employees” can take steps in preparing to compete post-departure without violating their duty of loyality and fidelity. In this August 17th Saskatchewan Court of Appeal cause case, the court held that fiduciaries may also take such preparatory steps provided they do not usurp a corporate opportunity or otherwise breach the trust upon which their fiduciary status is based. In other words, evidence of preparation alone is not enough to prove a breach. The court said:

Applying the case law to these activities, the trial judge did not err in saying that Mr. Fleming did not breach the fiduciary duty owed to his employer. The steps taken were of an exploratory nature only and fall easily into the category of contemplation and casual discussions with others. I reach this conclusion even though these were activities that would have resulted in a business capable of competing directly with Ryly’s, if they had come to fruition. To use Professor Flannigan’s analysis, however, Mr. Fleming did not reach the point of opportunistically diverting his employer’s resources to his or her own self interest rather than for the limited purpose authorized by the employer. No resource belonging to the employer was used in Mr. Fleming’s activities.

Calyniuk Restaurants Inc. v. Fleming, 2007 SKCA 85 (CanLII).

Case Report – Employer owns mixed contact list stored on its system

In this United Kingdom departing employee case from this June, the High Court held that an employer had exclusive ownership of a contact list alleged by an employee to be his personal contact list because it was maintained on its computer system.

The defendant was a journalist who worked in trade publication and conference buisnesses for a number of years before joining the claimant, who operated a similar business. He gave evidence that he maintaned a personal contact list, updated it from time to time, and had over eight years of editorial and industry contacts amassed when he commenced employment with the claimant. Nine years later, and after transferring the list to an MS Outlook database maintained by the claimant and adding work-related contacts, the defendant left with two other employees to start a competing business. In addition to suing to recover damages for the defendant’s pre-departure breach of loyalty and fidelity, the claimant disputed his ownership of the list.

Although it held that the company had not effectively incorporated its computer use policy into the defendant’s contract of employment, the court nonetheless found it had exclusive ownership of the list. It made the following broad statement:

I am satisfied that where an address list is contained on Outlook or some similar program which is part of the employer’s e-mail system and backed up by the employer or by arrangement made with the employer, the database or list of information (depending whether one is applying the Database Regulations or the general law) will belong to the employer…

In all those circumstances, I find that such lists will be the property of the employer and may not be copied or removed in their entirety by employees for use outside their employment or after their employment comes to an end.

Because this is not likely to be appreciated by many employees, it is in my judgment highly desirable that employers should devise and publish an e-mail policy…

In the absence of such a laid down policy, I next have to consider the status of contact details which have been put on to an employer’s system by an employee for their own use outside their employment, in ignorance of the fact that they would thereby become part of the Claimant’s property…

In my judgment it is reasonable to imply in the absence of any laid down guidance a term that an employee will at the end of their employment be entitled to take copies of their own personal information and, where the information is person [sic.] and confidential to them, such as details of their doctor, banker or legal adviser, to remove them from the employer’s system.

Most forms of e-mail system will permit the creation of compartmentalised address books, so that ordinarily an employee will be able to put their own personal contact details of friends, relations, and the like into a personal address book. In those circumstances, in the absence of clear evidence of an e-mail policy, I would be inclined to the view that ownership of that part of the database resided with the employee…

In assessing the facts, the Court held that the defendant copied the entire mixed list for the purpose of competing with the defendant and that it would not be appropriate for it to parse the list. It ordered the sequestered database to be delivered up to the claimant and enjoined the defendant from using it except for contact information “known by other means.”

Pennwell Publishing (UK) Ltd v. Ornstien, [2007] EWHC 1570 (QB).

Case Report – Jurisdiction to order production of non-resident data

The Federal Court rejected an application to vacate a production order made under section 231.2 of the Income Tax Act. The order required two Canadian eBay subsidiaries to produce data about specific Canadian eBay users that resided on servers operated by eBay’s American subsidiary in the United States.

The Court dealt only with the issue of whether it had jurisdiction to order production of non-resident data because the parties agreed that the Court should reserve on whether there was a sufficient basis for the order pending resolution of the appeal in Canada (MNR) v. The Greater Montreal Real Estate Board, 2006 FC 1069 (CanLII). On the threshold issue, the Court stated:

In the present case, eBay Canada has access to and uses information respecting PowerSellers. It is not determinative of the issue that the electronic apparatus storing the information which eBay Canada accesses is outside Canada. The information can be summoned up in Canada and for the usual business purposes of eBay Canada. The situation may be different if the information never had been used in Canada.

For commentary by Michael Geist, please click here.

eBay Canada Limited v. Canada (National Revenue), 2007 FC 930 (CanLII).

Data breach response – a multidisciplinary perspective

In some chance timing given the release of the report on the Canadian investigation into the TJX breach, I presented today at a lunch meeting of the Association of Certified Forensic Investigators of Canada together with David Malamed of Grant Thonrton. We called the presentation “Data Breach Response: A Multidisciplinary Perspective.”

This is the first presentation David and I have given on an project we started at the beginning of the summer together with Karen Gordon, an expert crises communicator from Squeaky Wheel Communications. The idea we are promoting is that organizations should be using multi-disciplinary teams to manage breach response and, whether internal or external experts are used, the team should be defined in a formal breach response plan.

I’ve posted a copy of the presentation here.

Case Report – Data breach investigation report released

The Privacy Commissioner of Canada and the Office of the Information and Privacy Commissioner of Alberta have released their joint report into the TJX/Winners data breach. They found that TJX breached the collection, retention and safeguarding rules in both the federal and Alberta commercial privacy statutes.

With respect to TJX’s system for preventing the fraudulent return of goods, the commissioners held that TJX breached both statutes by collecting drivers license and other provincial ID numbers to identify individuals who returned goods without a receipt. While they accepted the importance of identifying such individuals for purposes of fraud control, they also held that retaining this sensitive data was not necessary and that TJX also did not give adequate notice of the purposes for its collection. The commissioners said:

A driver’s license is proof that an individual is licensed to operate a motor vehicle; it is not an identifier for conducting analysis of shopping-return habits. Although licenses display a unique number that TJX can use for frequency analysis, the actual number is irrelevant to this purpose. TJX requires only a number—any number—that can be consistently linked to an individual (and one that has more longevity and is more accurate than a name and telephone number).

Moreover, a driver’s license number is an extremely valuable piece of data to fraudsters and identity thieves intent on creating false identification with valid information. After drivers’ license identity numbers have been compromised, they are difficult or impossible to change. For this reason, retailers and other organizations should ensure that they are not collecting identity information unless it is necessary for the transaction.

Having made this finding, they accepted TJX’s proposal to create unique identifiers from provincial ID numbers by using cryptographic hashing and approved of a three-year retention period for this information.

On the collection and retention of payment card information for processing purposes, the commissioners held that TJX’s retention of information for 18 months in accordance with its contractual obligations to financial institutions was reasonable, but were critical of TJX’s practice of retaining the information for longer periods for “troubleshooting” purposes. They reasoned that TJX had not clearly established “troubleshooting” as a primary purpose for collection, nor had it established the need to retain information in order to troubleshoot.

Finally, the commissioners held that TJX did not meet the safeguarding standard in both acts, primarily because it failed to upgrade its wireless encryption protocol within a reasonable period of time. Version 1.1 of the Payment Card Industry Data Security was released in September 2006 and endorsed the “Wi-fi Protected Access” or “WPA” encryption protocol. The commissioners said that TJX should have been adhering to this standard by “late 2006.” They commented:

TJX relied on a weak encryption protocol and failed to convert to a stronger encryption standard within a reasonable period of time. The breach occurred in July 2005, conversion began in October 2005, and the pilot project was completed in January 2007. We are also aware that the final conversion to a higher level of encryption will be completed soon.

Furthermore, while TJX took the steps to implement a higher level of encryption, there is no indication that it segregated its data so that cardholder data could be held on a secure server while it undertook its conversion to WPA.

TJX had a duty to monitor its systems vigorously. If adequate monitoring of security threats was in place, then TJX should have been aware of an intrusion prior to December 2006.

This comes just days after a settlement was announced in the related class action lawsuit.

Report of an Investigation into the Security, Collection and Retention of Personal Information (26 September 2007, C.P.P. and Alberta O.I.P.C.).

Case Report – Deemed undertaking protects against disclosure

On September 10th, a panel of the Divisional Court held that a motions judge erred in ordering a plaintiff in a disability insurance action to disclose a defence medical report and surveillance video that were prepared for and disclosed to the plaintiff in a prior tort action. The motions judge had ordered disclosure subject to the deemed undertaking’s constraint on use. The Divisional Court held that the disclosure order, absent an exercise of discretion under sub-rule 30.1.01(8), offended the rule. It also held that the reference to “use of evidence obtained in one proceeding” in sub-rule 30.1.01(6) does not support disclosure subject to a constraint on use:

The motion judge was concerned that under sub-rule 30.1.01(6) one could not use evidence from another proceeding to impeach the testimony of a witness, unless such evidence had been disclosed and therefore, impliedly, the Rule cannot be read to prohibit disclosure, but merely to restrict the use of such evidence once disclosed. We are of the view that sub-rule (6) allowing evidence from another proceeding to be used for impeachment refers to evidence which is lawfully in the hands of the examining party. Sub-rule (6) refers to “evidence obtained in one proceeding …”. We agree with the appellant’s submission that sub-rule (6) does not provide for or require the disclosure of protected evidence for use in impeaching testimony. It merely provides for the limited use of such evidence, when it is lawfully available.

Kitchenham v. AXA Insurance Canada, 2007 CanLII 37892 (ON S.C.D.C.).

Case Report – Publication of teaching evaluation data lawful

Arbitrator Brent held that the University of Windsor did not violate its faculty collective agreement or the Ontario Freedom of Information and Protection of Privacy Act by publishing teaching evaluation scores on a secure network for access by students and other members of the university community.

She made three findings. First, she held that the change in practice did not breach a frozen practices provision in the collective agreement because the publication condition (freedom from publication, as was argued) was not fundamental to the employment relationship. Second, she held that the express collective agreement restriction on disclosure of faculty personal information did not apply because the information disclosed was not “personal information” under the collective agreement. In reaching this finding, she relied on permissive collective agreement language that referred to the use of teacher evaluation data to construe the term “personal information.” Finally, she held that FIPPA did not apply based on its employment-related records exclusion and the fact that the data was used in the University’s promotion, tenure and renewal process. In rejecting the Association’s argument that student use of the data brought the records under the auspices of the Act, she said:

To argue that it ceases to become a “labour relations” or “employment-related” matter once it is made available to the students would in my view have the effect of excluding SET from FIPPA when it is used for employment related purposes but then including it when it is used to provide information to students. Such a result would be contrary to the Court of Appeal’s decision that once it is determined that FIPPA does not apply to certain material, then that material is exempt from FIPPA for ever.

University of Windsor and University of Windsor Faculty Association (Re) (19 February 2007, Brent).

Sedona Conference search and retrieval draft paper

I direct your attention to this very informative August 2007 draft/public comment paper by the Sedona Conference Working Group 1. In discussing best practices in the use of search and information retrieval methods in discovery, the paper advocates the use of automated search and retrieval methods as an alternative to manual search and suggests eight practice points.

Here are some key quotes made in advocating for automated search:

  • A consensus is forming in the legal community that human review of documents in discovery is expensive, time consuming, and error-prone. There is growing consensus that the application of linguistic and mathematic-based content analysis, embodied in new forms of search and retrieval technologies, tools, techniques and process in support of the review function can effectively reduce litigation cost, time, and error rates.
  • It is not possible to discuss this issue without noting that there appears to be a myth that manual review by humans of large amounts of information is as accurate and complete as possible – perhaps even perfect – and constitutes the gold standard by which all searches should be measured. Even assuming that the profession had the time and resources to continue to conduct manual review of massive sets of electronic data sets (which it does not), the relative efficacy of that approach versus utilizing newly developed automated methods of review remains very much open to debate. Moreover, past research demonstrates the gap between lawyers’ expectations and the true efficacy of certain types of searches. The Blair and Maron study (discussed below) reflects that human beings are less than 20% to 25% accurate and complete in searching and retrieving information from a heterogeneous set of documents (i.e., in many data types and formats). The importance of this point cannot be overstated, as it provides a critical frame of reference in evaluating how new and enhanced forms of automated search methods and tools may yet be of benefit in litigation.
  • There is no magic to the science of search and retrieval: only mathematics, linguistics, and hard work. If lawyers do not become conversant in this area, they risk surrendering the intellectual jurisdiction to other fields.

Case Report – Court says consensual disclosure a principle of fundamental justice

Yesterday, the Ontario Superior Court of Justice invalidated Ontario’s new adoption disclosure regime, which opened past and future adoption records to searching adult adoptees and birth parents notwithstanding individual consent. The judgement contains a significant discussion of how section 7 of the Canadian Charter of Rights and Freedoms restricts government disclosure of personal information.

The applicants, three adopted persons and a father who was recorded as a birth parent in government records despite some uncertainty about his paternity, objected the the adoption disclosure regime brought in by the provinces Adoption Information Disclosure Act. In short, the Act allowed adult adopted persons to obtain information that could be used to identify their birth parents and allowed birth parents to obtain similar information in respect of their children who had reached 19 years of age. These disclosures could be made without consent, but the regime did feature two protections. Adopted individuals and birth parents could file a “no contact” notice, in which case thier searching parents and adoptees would be restricted from contacting them despite receiving information that would allow for contact. Adopted individuals and birth parents could also apply for a non-disclosure order, to be granted in exceptional circumstances to protect against “sexual harm” or “significant physical or emotional harm.”

Mr. Justice Belobaba held that the regime violated the applicants’ section 7 rights. His key factual determination was that the applicants had established a reasonable expectation of privacy in their adoption records based on the history of the adoption regime: “Since 1927, the statutory framework in Ontario has been predicated on confidentiality.” Based on this finding and the principles articulated by the Supreme Court of Canada in R. v. O’Connor, Belobaba J. found that the applicants’ liberty interest was engaged by the propsetive dislcosure of their identifying information. He then went on to find that the applicants’ had been deprived of this interest in a manner inconsistent with the following newly-articulated principle of fundamental justice:

Where an individual has a reasonable expectation of privacy in personal and confidential information, that information may not be disclosed to third parties without his or her consent.

Addressing the seeming strictness of this principle, Belobaba J. suggested that governmental interests in disclosure may be partly managed based on the “reasonable expectation of privacy” qualifier, which he characterized as a manageable and predictable legal principle. Beyond this, he suggested that governments should be responsible for justifying non-consensual disclosures under the Charter‘s saving provision.

Counsel for the Attorney-General raised some concerns about the need to balance interests in the process of formulating a principle of fundamental justice. It wasn’t clear to me if the submissions on this point were directed at the broadly stated “right to privacy” principle or at the more refined Suggested Principle [as quoted above]. In any event, let me set out my understanding of balancing at the section 7 stage of the analysis.

The balancing of individual and societal interests within section 7 is only relevant when elucidating a particular principle of fundamental justice – and here the relevant intersts were balanced using language such as “reasonable expectation of privacy.” Once the principle of fundamental justice has been elucidated, however, it is not within the ambit of section 7 to bring into account further societal interests, such as the rights of the searching adoptee or birth parent or the implications for government record-keeping etc. These considerations will be looked at, if at all, under section 1, where the Crown has the burden of proving that the impugned law is demonstrably justified in a free and democratic society.

On the facts and despite the two protections in the Act, Belobaba J. held that the government had not met its section 1 onus and issued a declaration of invalidity.

Cheskes v. Ontario (Attorney-General) (19 September 2007, Ont. S.C.J.).