February 24, 2017
This publication has been updated as of March 23, 2021.
Organizations, officers and directors are facing a heightened prevalence of cybersecurity risks. According to the Canadian Internet Registration Authority (CIRA) 2020 Cyber Security Report, in 2019:
This heightened incidence of cyber attacks isn’t the only driver of increased concern about cybersecurity risks and the related liability exposure:
Privacy Breach Class Action Surge. The surge in privacy breach class actions in Canada is one driving force. For example, on December 13, 2019, the Ontario Superior Court of Justice certified a class action in Agnew-Americano v. Equifax Canada Co. seeking financial compensation for – you guessed it – a data/privacy breach.
Regulatory Action. Regulatory action is another driving force. For example, on January 19, 2017, the Canadian Securities Administrators (CSA) issued Multilateral Staff Notice 51-347 disclosure of cyber security risk and incidents that, while only applicable to reporting issuers, reflects a broader prevalence of, and heightened concern about, cybersecurity risks and the related liability exposure that all organizations, officers and directors face.
COVID-19 Acceleration. If these weren’t enough to drive organizations to act on cybersecurity and data breach risks, the COVID-19 pandemic should have done so. According to the 2020 CIRA Cybersecurity Report, approximately 30% of organizations saw a spike in the volume of attacks during the pandemic, and 28% of IT workers say their organization has been targeted by a COVID-19 themed security incident.
Here’s a five-step cybersecurity mitigation plan that organizations and their board of directors can and should implement now to minimize the growing data breach liability risks of suspected and actual cyber-attacks.
1. Make it a (priority) corporate governance matter.
The liability exposure for cybersecurity risks is high and getting higher. These risks warrant high-level attention: have a board member or committee take this on as an important and a priority project – and allocate the necessary resources to do the project well.
Quasi-criminal liability. Failure to follow the Canadian data breach rules under the Digital Privacy Act can lead to quasi-criminal liability (it’s not a criminal offence but it’s subject to a penalty that’s similar to a criminal offence, although the court procedures are less complicated) for both organizations and for directors personally. The Digital Privacy Act amends the federal Personal Information and Protection of Electronic Documents Act (PIPEDA) to mandate a data breach response that includes reporting, notification and record-keeping requirements. PIPEDA will soon be replaced with the Consumer Privacy Protection Act (CPPA) which will dramatically change how Canada will protect individuals’ personal information – and regulate organizations’ privacy practices. Among the changes: more and larger penalties for non-compliance.
Civil Liability. Then there are the potential lawsuits resulting from the breach: consumers suing the organization for losing their personal (often sensitive financial) information; banks suing the organization for the cost of compensating consumers for financial losses or replacement of financial information (e.g., credit card replacements); and shareholders/investors suing the corporation and the corporate directors personally (derivative actions) for decreased share values. These lawsuits are now par for the course in the U.S., and are migrating to Canada. There are over 30 pending data breach class actions in Canada; several have been or are being certified (authorized by a court to proceed). More are sure to follow as cyber-attacks and data breaches become more frequent, people become more knowledgeable about their legal rights, and privacy laws become more developed. And though none of these cases have yet been decided by a court, it’s only a matter of time … and win, lose or draw, the organizations will bear the hefty legal costs associated with defending the legal actions.
Negative Publicity. And don’t underestimate the impact of negative media scrutiny, above and beyond any direct financial liability exposure. With the pervasive and real-time power of the media, all eyes (actual and prospective customers, actual and prospective investors and privacy regulators) will be on the organization.
2. Get a good handle on your legal notification obligations.
When a data breach is suspected or actually occurs, organizations need to know who they must – and who they should – tell. Yet only 36% of organizations were likely to inform a regulatory body of a data breach in 2020, according to CIRA’s 2020 Cyber Security Report. Understanding who to notify and when is a critical pre-cursor to creating a response plan that meets the organization’s legal obligations.
Privacy Laws. Only seven Canadian statutes currently specify data breach responses in the private sector. All require notification of the individual(s) whose data has been breached. Most deal specifically with health-related data; only one (Alberta) applies to all personal information held by private organizations:
In addition, the Digital Privacy Act mandates a data breach response including reporting, notification and record-keeping requirements:
Negligence Laws. In addition to the notification requirements under privacy legislation, the organization could also have a broader legal duty under negligence law to notify an individual whose data has been breached if that breach could harm, or could materially increase the risk of harm to, that individual. This broader legal obligation to notify could exist even if there’s no such obligation under privacy legislation.
International Laws. Many organizations will need to also think beyond Canadian borders: the laws of other countries could apply, imposing different notification and disclosure obligations and carrying significant consequences for the organization. For example, on February 3, 2017, the Québec Superior Court authorized a consumer privacy class action in Zuckerman v. Target seeking financial compensation for a data/privacy breach; it was Target’s actions in the U.S. that created significant liability exposure in Canada. Similarly, an organization’s actions in Canada could create significant liability exposure in another country. Many foreign breach notification laws depend on the place of ordinary residence of the individual the breach affects. For example, a Canadian company with information about a California resident who vacations in Canada might have obligations under California’s laws if there’s a breach of the California resident’s information. To complicate things, different jurisdictions have different definitions of “breach” and different notification requirements.
3. And have a good handle on your risk and incident disclosure obligations too.
Reporting issuers (organizations subject to ongoing public disclosure obligations under securities laws and securities of which are generally traded on a public stock exchange) have additional obligations. Generally, securities laws require reporting issuers to publicly disclose all material changes, material facts and material risks to their business. The Staff Notice is one of a series of publications the CSA has issued noting the increased frequency, complexity and costs of cyber attacks on organizations, and highlighting the importance of understanding, mitigating and providing effective disclosure of such risks (see also the CSA’s 2016-2019 Business Plan and Staff Notice 11-332). The Staff Notice identifies cybersecurity as a priority area for issuers, reviews previous disclosure practices and offers assistance to issuers in discharging their cybersecurity-related disclosure obligations. Staff Notices aren’t “laws”, so they aren’t mandatory per se, but the fact the CSA issued this Staff Notice suggests it’s concerned that reporting issuers’ aren’t adequately disclosing cyber risks.
Risk Factor Disclosure. Sixty-one percent of the 240 issuers the CSA reviewed mentioned cybersecurity as part of their risk factor disclosure, mainly as a result of their reliance on information technology systems and third-party risk exposure. The potential impacts of data breaches that issuers identified included: operational delays (e.g. production downtimes or plant and utility outages); inability to manage the supply chain; inability to process customer transactions or otherwise service customers; inventory management disruptions; lost R&D data; and intellectual property devaluation. The CSA concluded the ubiquity of cybersecurity concerns led issuers to use generalized “boilerplate” language in their risk factor disclosure. It admonished issuers for doing so and suggested they instead pay attention to their specific circumstances, particularly in terms of exposure and preparedness. There’s an express expectation that the issuer will disclose specific risks rather than generic risks applicable to all issuers, and will tailor disclosure to their specific circumstances. But issuers shouldn’t confuse tailoring disclosure to their specific circumstances with disclosing cybersecurity strategies or vulnerabilities that could compromise it. When determining what information to disclose, issuers need to balance the probability of a breach taking place and the consequences of such a breach.
Cyber Security Incidence Disclosure. The Staff Notice reminds issuers that they must disclose only those security breaches that constitute a material change (requiring immediate disclosure) or a material fact (requiring disclosure as part of its ongoing reporting obligations) to their business. For example, an issuer dealing with highly sensitive data could consider a minor breach to constitute a material change; an issuer dealing with the delivery of services might not. A non-exhaustive list of factors for issuers to consider in determining whether there’s been a material change includes the nature of the issuer and the frequency, scope and consequences of the breach. And since the discovery of cybersecurity breaches tends to be after the breach has occurred, the issuer may have to disclose the incident before resolving the cause to comply with its reporting obligations.
4. Assess your current situation.
Once you know what your obligations are, conduct a risk assessment: determine the assets that are most susceptible to a data breach, and determine the greatest cyber threats to which they are exposed. Each risk assessment will be unique to the particular organization, but all should consider:
Remote Workers. A contingent of remote workers, whether working from home or otherwise, whether in response to the COVID-19 pandemic or not, and whether employees or gig workers, increases an organization’s cybersecurity risk. According to CIRA’s 2020 Cyber Security Report, cyber-criminals are targeting remote workers, who are both removed from cybersecurity protects and technical support, and more anxious and willing to believe fraudulent email or social media claims, with pandemic-themed phishing efforts.
Third-Party Validation. Using third-party experts to validate the risk assessment usually results in more credibility, with the additional benefit of the ability to benchmark against others in your industry.
Insurance. Carefully assess your situation with your insurance broker too, because specialized lines of cyber risk insurance are increasingly available – and advisable. Victims of cyber breaches often discover, too late, that general insurance doesn’t cover their data breach incident.
5. Be well-prepared, well in advance.
Poor – or no – planning will lead to a poor response, and a poor response will make the breach and its fallout much, much worse. In contrast, good planning makes a good response more likely, and a good response can make the fallout – or at least the liability – of the breach much, much better. For example, in Lozanski v The Home Depot, Canadian customers of Home Depot sued in a class action as the result of the theft of their email addresses when Home Depot’s computer system was hacked. The parties settled the lawsuit, but the Ontario Superior Court of Justice had to approve the settlement and the legal fees. A significant factor in the settlement approval, and reduction in the agreed-upon fees, was Home Depot’s response following the data breach, which the court described as “responsible, prompt, generous and exemplary” and which, the court noted, would have led to the approval of a discontinuance of the class action altogether had the parties not settled. Create a well-conceived data breach action plan to deal with and mitigate an actual or a suspected data breach. Then train all relevant staff on it and rehearse it periodically. The specifics of the plan will vary depending on the nature of the risk exposure uncovered in the assessment, but every plan should:
Act fast. Mandate that the organization take immediate steps to contain the breach and to mitigate the harm that could result. The exact steps will depend on the nature of the breach, but should always include an attempt to retrieve the breached information and limit the further circulation of it, and taking all systems offline.
Third parties. Involve major contractors and service providers in both creating the plan and incorporate them into the plan.
Insurance. Allow for immediate notification to the insurer.
Retain legal counsel. Provide for retention of legal counsel (ideally, counsel that will be as ready as the organization and is teed up in advance). Since litigation after a privacy breach is highly likely, it’s critical to take steps to establish and preserve privilege over the organization’s communications and information generated about the breach to prevent it from being used against the organization in litigation.
Law enforcement. Consider whether the response will include making a report to law enforcement. There’s sometimes a little legal benefit to be gained from doing so, but there may be some public relations benefit.
Communications plan. Have a communications plan about a breach ready. Don’t let fumbles in the response become the story. Line up internal and/or external resources to create and implement a communications plan about the breach. And assume both that you don’t know the true extent of the breach, and that “outsiders” know more than you do. Provide sufficient detail, including who to call for assistance at the organization.
Legal notifications & disclosures. Know who the organization must notify and how – and plan to do it promptly. Delay in the notification will be noticed and become the story and the complaint. So if there is any delay, be ready to explain it, although most breaches become smaller the more you investigate them. And since the notification is likely to trigger complaints to relevant privacy regulators, provide copies of the mandatory breach report to other Privacy Commissioners who might have an interest in the incident.
Sweat the small stuff. It’s not a requirement, but consider whether the organization will offer credit monitoring and in what circumstances (i.e., depending on the nature of the information that’s breached). Anticipate complaints as a result of the disclosures, and have a plan to be able to handle the resulting volume of calls/emails. Plan to respond to complaints clearly and directly; advance scripting is beneficial. And apologies go a long way – but don’t accept liability
Please contact your McInnes Cooper lawyer or any member of The Privacy, Data Protection and Cyber Security Team @ McInnes Cooper to discuss this topic or any other legal issue.
McInnes Cooper has prepared this document for information only; it is not intended to be legal advice. You should consult McInnes Cooper about your unique circumstances before acting on this information. McInnes Cooper excludes all liability for anything contained in this document and any use you make of it.
© McInnes Cooper, 2017. All rights reserved. McInnes Cooper owns the copyright in this document. You may reproduce and distribute this document in its entirety as long as you do not alter the form or the content and you give McInnes Cooper credit for it. You must obtain McInnes Cooper’s consent for any other form of reproduction or distribution. Email us at [email protected] to request our consent.
Jul 27, 2021
Canadian entities regularly contract with foreign companies to provide services in Canada. To complete its obligations under the contract, the…
Jul 21, 2021
Many now agree: it’s imperative that workplaces be both diverse and inclusive. Perhaps the most often-quoted (and definitely most succinct)…
Jun 24, 2021
Many employers use equity compensation plans like employee stock option plans to attract, motivate, and retain talent. One reason stock options…
Jun 21, 2021
There is a duty to consult Indigenous groups when the Crown contemplates actions that may adversely affect their rights under section 35 of the…
Jun 15, 2021
As of January 1, 2021, federally regulated employers (such as banks, telephone and cable systems, most federal Crown corporations,…
Subscribe to McInnes Cooper to stay current with our leading insights on legal updates, trends, news, events, and services.