Skip to content

Brought to you by

Dentons logo

Dentons Data

Your trusted advisor for all things digital.

open menu close menu

Dentons Data

  • Home
  • About Us

Information and Privacy Commissioner of Ontario Rejects Privilege Claim, Orders Production of Cybersecurity Report

By Chloe Snider and Luca Lucarini
May 11, 2020
  • Cybersecurity
  • Data
  • Privacy
Share on Facebook Share on Twitter Share via email Share on LinkedIn

When responding to a cyberattack, an organization will likely need to retain external cybersecurity, ransomware and digital forensics experts. Their work product (reports and other documents related to the incident or the organization’s data security practices) may later become the subject of a production request by either a regulator or plaintiff in litigation. It is therefore important to consider in advance if and how such work product may be protected by privilege in order to be able to respond adequately to such a request.

This issue – whether such documents are protected by privilege – arose in a recent decision of the Information and Privacy Commissioner of Ontario (the “IPC”). In PHIPA Decision 114, which followed a cybersecurity incident suffered by a large health company, the IPC found that the documents generated by third party experts were not privileged and were therefore subject to a demand for production. There are important lessons to be learned from this case.

The Facts

In November 2019, one of Canada’s largest health diagnostics companies was the victim of a major cybersecurity incident (the “Incident”). Cyberattackers penetrated its networks, extracted data (including the personal health information of over 85,000 customers in Ontario), and demanded a ransom. This resulted in several class proceedings being commenced against the company.

In December 2019, the IPC sent a letter to the company asking a number of questions and ordered production of certain documents. This was followed by a back and forth with further demands for documents and assertions of privilege over certain requested documents.  In February 2020, the IPC issued a Notice of Review, to notify the company that a review of the Incident had been commenced under the Personal Health Information Protection Act (“PHIPA”), and again demanded that the company produce a number of documents. The IPC’s demand included documents produced or received by cybersecurity firms retained by the company to assist in responding to the breach (the “Third Party Documents”). These included:

  • an incident report generated by CrowdStrike (a cybersecurity IT company), including draft versions of the report (the “CrowdStrike Report”);
  • a penetration test conducted by CrowdStrike after the Incident (the “Penetration Test”); and
  • communications between the cyberattackers and Cytelligence, a firm retained to engage the cyberattackers (the “Cytelligence Communications”).

The company asserted litigation and solicitor-client privilege over the above documents. The IPC asked the company to produce an itemized list of documents over which it claimed privilege, containing detail sufficient to establish exactly what documents existed and the basis for each claim. The IPC also summonsed the interim general counsel of the company to ask further questions about the privilege claims.

The Decision

The IPC considered whether there was sufficient evidence to support the claims of privilege. Importantly, the IPC was not addressing whether PHIPA gave it authority to compel production of privileged documents.

Litigation Privilege: The IPC found that the documents were not protected by litigation privilege because the company had not provided sufficient evidence that the documents had been created for the dominant purpose of litigation. Even absent any potential litigation, the company would have had to respond to the Incident under its statutory obligations to identify, contain, investigate and remediate potential privacy breaches. The IPC characterized the actions taken in response to these obligations as “operational needs” that stood independent of litigation. In reaching this conclusion, the IPC noted that:

  • The retainer with CrowdStrike to provide incident response services predated the breach by several months, and consisted of assistance helping the company’s IT team to respond to, contain, investigate and remediate a prospective breach, as well as to provide strategic recommendations;
  • As part of this service, Crowd Strike had performed an assessment of the company’s’ computer systems, and in doing so actually discovered the breach;
  • CrowdStrike had performed the Penetration Test in order to test the Company’s systems before it publicly announced the breach, (so as to avoid a follow-up cyberattack); and
  • The company had retained Cyintelligence to communicate with the cyberattackers, retrieve the stolen data from the cyberattackers, and understand how the cyberattackers had compromised the company’s systems (all of which were “operational needs”).

The IPC also rejected the argument that the underlying facts contained in the Third Party Documents were privileged because they were included in documents produced at the instruction of counsel.

Solicitor-Client Privilege: The IPC also rejected the claim of solicitor-client privilege. The IPC found that a blanket assertion of privilege over the Third Party Documents did not (i) explain which of these communications (if any) were made to/from either in-house or external counsel; or (ii) how they were made for the purpose of seeking or giving legal advice.

The IPC took the view that the company had not provided a list of privileged items as requested, but had instead produced a document listing out categories of documents that could exist for each retainer and asserting privilege over all of them. The IPC found that counsel had not provided sufficient detail about CrowdStrike’s work on behalf of the company.

As a result, the company was ordered to produce all of the Third Party Documents.

Takeaways for Business

The IPC’s decision illustrates how documents produced by third-party cybersecurity, ransomware and digital forensics experts in response to a cyberattack or other breach of security safeguards may become the subject of a regulator’s production demand, and may thereby also be available to plaintiffs in litigation resulting from a cyberattack. If an organization seeks to assert privilege over such documents, the regulator may ask the organization to provide detailed submissions or testimony as to why privilege should apply. Retainers, particularly advance retainers with third party providers, should be carefully worded.

Organizations should consider these privilege issues at the time of retaining an expert, and consider whether this should be done through counsel, so that, where appropriate, steps can be taken to situate their preparation within the context of impending litigation and/or seeking legal advice. In some cases, it may also then be helpful to provide explanations about the preparation and purpose of these reports so that the regulator (or the court) can assess these privilege issues. Retainers, particularly advance retainers with third party providers, should be carefully worded and have their scope precisely defined.

With sufficient advance preparation, and a clear understanding of the scope and application of privilege, an organization can reduce the risk that potentially damaging information may surface after a data incident.


For more information about Denton’s data expertise and how we can help, please see our Transformative Technologies and Data Strategy page and our unique Dentons Data suite of data solutions for every business, including our unique advance retainer solution, breach response and breach preparation solutions.

Share on Facebook Share on Twitter Share via email Share on LinkedIn
Subscribe and stay updated
Receive our latest blog posts by email.
Stay in Touch
Health privacy, phipa, Privacy, Privilege
Chloe Snider

About Chloe Snider

Chloe Snider is a partner in Dentons’ Litigation and Dispute Resolution and Transformative Technologies groups. Her practice focuses on litigating complex commercial disputes and assisting clients manage risk. She is a strategic and critical legal thinker who works efficiently to develop practical solutions for her clients.

All posts Full bio

Luca Lucarini

About Luca Lucarini

Luca Lucarini is an associate in our Litigation & Dispute Resolution and Transformative Technologies and Data Strategy groups. Luca acts for clients on a variety of regulatory, commercial and civil litigation matters, with a particular emphasis on privacy and health law.

All posts Full bio

RELATED POSTS

  • Artificial Intelligence
  • Privacy

Key legal considerations with generative AI

By Bob Tarantino
  • Privacy

Privacy Commmissioner Announces New “Re-Framed” Consultation on Transborder Data Flows

By Kirsten Thompson
  • CPPA (Bill C-11)
  • Legislation
  • Privacy

CPPA: An in-depth look at the codes of practice and certification program provisions in Canada’s proposed new privacy law

By Kirsten Thompson

About Dentons

Redefining possibilities. Together, everywhere. For more information visit dentons.com

Grow, Protect, Operate, Finance. Dentons, the law firm of the future is here. Copyright 2023 Dentons. Dentons is a global legal practice providing client services worldwide through its member firms and affiliates. Please see dentons.com for Legal notices.

Categories

Subscribe and stay updated

Receive our latest blog posts by email.

Stay in Touch

Dentons logo in black and white

© 2025 Dentons

  • Legal notices
  • Privacy policy
  • Terms of use
  • Cookies on this site