<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>#cybersafety Archives - FCL LLP</title>
	<atom:link href="https://fcl-law.com/tag/cybersafety/feed/" rel="self" type="application/rss+xml" />
	<link>https://fcl-law.com/tag/cybersafety/</link>
	<description></description>
	<lastBuildDate>Thu, 14 Oct 2021 12:39:05 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.5</generator>

<image>
	<url>https://fcl-law.com/wp-content/uploads/2026/03/cropped-transparent-32x32.png</url>
	<title>#cybersafety Archives - FCL LLP</title>
	<link>https://fcl-law.com/tag/cybersafety/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Hacking, Data Exclusion Clauses and the Duty to Defend</title>
		<link>https://fcl-law.com/hacking-data-exclusion-clauses-and-the-duty-to-defence/</link>
					<comments>https://fcl-law.com/hacking-data-exclusion-clauses-and-the-duty-to-defence/#respond</comments>
		
		<dc:creator><![CDATA[FCL]]></dc:creator>
		<pubDate>Tue, 30 Mar 2021 12:51:09 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#courtofappeal]]></category>
		<category><![CDATA[#coveragelaw]]></category>
		<category><![CDATA[#cyber]]></category>
		<category><![CDATA[#cybersafety]]></category>
		<category><![CDATA[#insurancecoverage]]></category>
		<category><![CDATA[#insurancepolicy]]></category>
		<category><![CDATA[#onca]]></category>
		<guid isPermaLink="false">https://fcl-law.com/?p=1473</guid>

					<description><![CDATA[<p>Hacking, Data Exclusion Clauses and the Duty to Defend Recently, the Ontario Court of Appeal released a decision which opined on the novel interpretive issue of data exclusion clauses. In Family and Children’s Services of Lanark, Leeds and Grenville v. Co-operators General Insurance Company, 2021 ONCA 159, the appellate court unanimously allowed for the appeal</p>
<p>The post <a href="https://fcl-law.com/hacking-data-exclusion-clauses-and-the-duty-to-defence/">Hacking, Data Exclusion Clauses and the Duty to Defend</a> appeared first on <a href="https://fcl-law.com">FCL LLP</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h1><img fetchpriority="high" decoding="async" class="wp-image-1475 alignleft" src="https://fcl-law.com/wp-content/uploads/2021/03/pexels-luis-gomes-546819-1.jpg" alt="" width="501" height="333" srcset="https://fcl-law.com/wp-content/uploads/2021/03/pexels-luis-gomes-546819-1-200x133.jpg 200w, https://fcl-law.com/wp-content/uploads/2021/03/pexels-luis-gomes-546819-1-300x199.jpg 300w, https://fcl-law.com/wp-content/uploads/2021/03/pexels-luis-gomes-546819-1-400x266.jpg 400w, https://fcl-law.com/wp-content/uploads/2021/03/pexels-luis-gomes-546819-1-500x332.jpg 500w, https://fcl-law.com/wp-content/uploads/2021/03/pexels-luis-gomes-546819-1-600x399.jpg 600w, https://fcl-law.com/wp-content/uploads/2021/03/pexels-luis-gomes-546819-1-768x510.jpg 768w, https://fcl-law.com/wp-content/uploads/2021/03/pexels-luis-gomes-546819-1-800x531.jpg 800w, https://fcl-law.com/wp-content/uploads/2021/03/pexels-luis-gomes-546819-1-1024x680.jpg 1024w, https://fcl-law.com/wp-content/uploads/2021/03/pexels-luis-gomes-546819-1-1200x797.jpg 1200w, https://fcl-law.com/wp-content/uploads/2021/03/pexels-luis-gomes-546819-1.jpg 4288w" sizes="(max-width: 501px) 100vw, 501px" />Hacking, Data Exclusion Clauses and the Duty to Defend</h1>
<p>Recently, the Ontario Court of Appeal released a decision which opined on the novel interpretive issue of data exclusion clauses. In <a href="https://www.canlii.org/en/on/onca/doc/2021/2021onca159/2021onca159.html?autocompleteStr=2021%20ONCA%20159&amp;autocompletePos=1"><em>Family and Children’s Services of Lanark, Leeds and Grenville v. Co-operators General Insurance Company</em></a>, 2021 ONCA 159, the appellate court unanimously allowed for the appeal of an application judge’s decision requiring an action be brought in order to deny the duty to defend.</p>
<p>In this case, the respondent, Family and Children’s Services of Lanark, Leeds and Grenville (“FCS”), hired the respondent, Laridae Communications Inc. (“Laridae”), to provide communication and marketing services, namely updating FCS’s website. Laridae obtained and was insured under both a professional liability policy and a commercial general liability policy (“CGL”) from the appellant, Co-operators General Insurance Company (“Co-operators”). FCS was an additional insured under the CGL.</p>
<p>In April 2016,  a password-protected portal on FCS’s website was hacked. After which, a hyperlink to a confidential report, which contained numerous clients’ personal information, was posted on a social media platform.</p>
<p>Subsequently, a class action was brought against FCS and others. As a result, FCS commenced a third-party claim against Laridae for breach of contract and negligence.</p>
<p>Both FCS and Laridae brought applications seeking a declaration that the appellant had a duty to defend them against the class action and third-party claim after their request was denied.</p>
<p>On the application, the appellant argued that coverage was excluded under both policies for any personal injury arising from the distribution or display of data (“data exclusion clause”). The respondents took the position that the data exclusion clause did not exclude <em>all</em> the claims against them. Moreover, the respondents argued that this was an important issue that should not be determined on an application</p>
<p>The application judge agreed with the respondents concluding that coverage should not be determined on an application. The judge also found that there is the possibility of coverage in this case. Lastly, the application judge concluded that the appellant would be obligated to fund both defences, if there was a conflict of interest between the two respondents and neither of which would report to appellant.</p>
<p>The appellant successfully appealed.</p>
<p>The Ontario Court of Appeal held that a determination regarding the appellant’s duty to defend could be made based on the application materials before the court. Through a coverage analysis, the court found that the exclusion clauses are clear and unambiguous. Moreover, the appellant court disagreed that some of the claims could be covered by the policy. Based on the substance of the claims pleaded in the class action, the allegations would fall directly within the policy exclusions. Therefore, the appellant owes no duty to defend either respondent.</p>
<p>Lastly, Appellate Court affirmed that the onus would be on the <em>insured</em> to establish a reasonable apprehension of a conflict of interest on the part of the insurer in order to remove their right to participate in the defence.</p>
<p>The post <a href="https://fcl-law.com/hacking-data-exclusion-clauses-and-the-duty-to-defence/">Hacking, Data Exclusion Clauses and the Duty to Defend</a> appeared first on <a href="https://fcl-law.com">FCL LLP</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://fcl-law.com/hacking-data-exclusion-clauses-and-the-duty-to-defence/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Data Breach v. Data Hack – What is the difference?</title>
		<link>https://fcl-law.com/data-breach-v-data-hack-what-is-the-difference/</link>
					<comments>https://fcl-law.com/data-breach-v-data-hack-what-is-the-difference/#respond</comments>
		
		<dc:creator><![CDATA[FCL]]></dc:creator>
		<pubDate>Fri, 17 Apr 2020 14:41:55 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#cybersafety]]></category>
		<category><![CDATA[#databreach]]></category>
		<category><![CDATA[#datahack]]></category>
		<category><![CDATA[#privacy #privacylaw #cyber #tech]]></category>
		<guid isPermaLink="false">https://fcl-law.com/?p=1294</guid>

					<description><![CDATA[<p>Data Breach v. Data Hack – What is the difference? We often conflate the terms ‘data breach’ and ‘data hack’ to describe risks associated with computer security. In reality, each encompasses its own space in the cyber security world and delineate distinct protective measures. What is a Data Breach? A data breach speaks to an</p>
<p>The post <a href="https://fcl-law.com/data-breach-v-data-hack-what-is-the-difference/">Data Breach v. Data Hack – What is the difference?</a> appeared first on <a href="https://fcl-law.com">FCL LLP</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong><u><img decoding="async" class="wp-image-1295 alignleft" src="https://fcl-law.com/wp-content/uploads/2020/04/Cybersecurity.jpg" alt="" width="272" height="153" srcset="https://fcl-law.com/wp-content/uploads/2020/04/Cybersecurity-200x113.jpg 200w, https://fcl-law.com/wp-content/uploads/2020/04/Cybersecurity-300x169.jpg 300w, https://fcl-law.com/wp-content/uploads/2020/04/Cybersecurity-400x225.jpg 400w, https://fcl-law.com/wp-content/uploads/2020/04/Cybersecurity-500x282.jpg 500w, https://fcl-law.com/wp-content/uploads/2020/04/Cybersecurity-600x338.jpg 600w, https://fcl-law.com/wp-content/uploads/2020/04/Cybersecurity-768x432.jpg 768w, https://fcl-law.com/wp-content/uploads/2020/04/Cybersecurity-800x451.jpg 800w, https://fcl-law.com/wp-content/uploads/2020/04/Cybersecurity-1024x577.jpg 1024w, https://fcl-law.com/wp-content/uploads/2020/04/Cybersecurity.jpg 1188w" sizes="(max-width: 272px) 100vw, 272px" />Data Breach v. Data Hack – What is the difference?<br />
</u></strong></p>
<p>We often conflate the terms ‘data breach’ and ‘data hack’ to describe risks associated with computer security. In reality, each encompasses its own space in the cyber security world and delineate distinct protective measures.</p>
<p><strong>What is a Data Breach?</strong></p>
<p>A data breach speaks to an inadvertent release of sensitive data from a secure space to an untrusted environment. This often occurs when data is unintentionally left unsecured allowing unauthorized individuals to access it. This form of breach does not occur as a result of malicious intent, but instead due to negligence, incompetence, or human error. An example of this is the Cambridge Analytica scandal, where Facebook released confidential user data to a third party. While some classified this is as a hack, it is technically considered a breach given that Cambridge Analytica did not attempt to break through Facebook’s security screens; it took advantage of a pre-existing privacy oversight.</p>
<p><strong>What is a Data Hack?</strong></p>
<p>A hack on the other hand, is a calculated alteration to a computer’s hardware or software for a purpose other than that originally intended by the developer. Unlike a data breach, a data hack is intentional. It is usually conducted by cyber criminals with malicious intent for adverse purposes such as data theft or fraud. An example of a cyber hack was evidenced in 2018 when Marriot International revealed that cyber criminals had hacked their system to steal confidential data of 500 million customers.</p>
<p><strong>Understanding the Difference:</strong></p>
<p>It is important to understand the distinction between intentional versus inadvertent cyber threats, so we can take measures to protect against all security breaches. The Office of the Privacy Commissioner of Canada has compiled a guide on preventing and responding to both privacy breaches and hacks. This guide is summarized below:</p>
<p><strong>Understand the Threats:</strong></p>
<ol>
<li>Know what personal information you have, where it is, and what you are doing with it.</li>
<li>Know your vulnerabilities by conducting risk and vulnerability assessments and/or penetration tests to ensure that threats to privacy are identified.</li>
<li>Be aware of breaches in your industry. Attackers will often re-use the same attacks against multiple organizations.</li>
</ol>
<p><strong>Thinking Beyond the Hacker:</strong></p>
<ol>
<li>Encrypt laptops, USB keys and other portable media.</li>
<li>Limit the personal information you collect, as well as what you retain.</li>
<li>Protect personal information throughout its lifecycle.</li>
<li>Train your employees.</li>
<li>Limit, and monitor, access to personal information.</li>
<li>Maintain up-to-date software and safeguards.</li>
<li>Implement and monitor, intrusion prevention and detection systems.</li>
</ol>
<p><strong>Containing Breaches</strong></p>
<ol>
<li>Take immediate steps to limit the breach:
<ul>
<li>Designate an appropriate individual to lead the initial investigation.</li>
<li>Determine the need to assemble a team which could include representatives from appropriate parts of the business.</li>
<li>Determine who needs to be made aware of the incident internally, and potentially externally, at this preliminary stage.</li>
<li>Do not compromise the ability to investigate the breach.</li>
</ul>
</li>
<li>Prevent future breaches:
<ul>
<li>Conduct a security audit of both physical and technical security.</li>
<li>Review policies and procedures.</li>
<li>Review employee training practices.</li>
<li>Review service delivery partners (e.g., dealers, retailers, etc.).</li>
</ul>
</li>
</ol>
<p>The complete guideline summarized above can be found here:</p>
<p><a href="https://www.priv.gc.ca/en/privacy-topics/business-privacy/safeguards-and-breaches/privacy-breaches/respond-to-a-privacy-breach-at-your-business/c-t_201809_pb">https://www.priv.gc.ca/en/privacy-topics/business-privacy/safeguards-and-breaches/privacy-breaches/respond-to-a-privacy-breach-at-your-business/c-t_201809_pb</a></p>
<p>&nbsp;</p>
<p>The post <a href="https://fcl-law.com/data-breach-v-data-hack-what-is-the-difference/">Data Breach v. Data Hack – What is the difference?</a> appeared first on <a href="https://fcl-law.com">FCL LLP</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://fcl-law.com/data-breach-v-data-hack-what-is-the-difference/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Curbing Privacy Risks When Working From Home</title>
		<link>https://fcl-law.com/curbing-privacy-risks-when-working-from-home/</link>
					<comments>https://fcl-law.com/curbing-privacy-risks-when-working-from-home/#respond</comments>
		
		<dc:creator><![CDATA[fcladmin]]></dc:creator>
		<pubDate>Fri, 03 Apr 2020 15:37:50 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#COVID-19]]></category>
		<category><![CDATA[#cyber]]></category>
		<category><![CDATA[#cybersafety]]></category>
		<category><![CDATA[#employers]]></category>
		<category><![CDATA[#privacylaw]]></category>
		<category><![CDATA[#privacypolicy]]></category>
		<category><![CDATA[#Workfromhome]]></category>
		<guid isPermaLink="false">https://fcl-law.com/?p=1277</guid>

					<description><![CDATA[<p>Curbing Privacy Risks When Working From Home All Canadian workplaces are obligated under Canadian Privacy Laws to secure the use, collection, retention, disclosure or disposal of sensitive data. In the legal world, this obligation is doubly compounded by our professional duty to protect the confidentiality of our clients. Law firms therefore, invest in all precautions</p>
<p>The post <a href="https://fcl-law.com/curbing-privacy-risks-when-working-from-home/">Curbing Privacy Risks When Working From Home</a> appeared first on <a href="https://fcl-law.com">FCL LLP</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>Curbing Privacy Risks When Working From Home<br />
</strong></p>
<p>All Canadian workplaces are obligated under Canadian Privacy Laws to secure the use, collection, retention, disclosure or disposal of sensitive data. In the legal world, this obligation is doubly compounded by our professional duty to protect the confidentiality of our clients. Law firms therefore, invest in all precautions necessary to secure against risks of unauthorized use of data. This often translates into strict technical and organizational measures to insulate against privacy breaches in practice.</p>
<p>With the rapid spread of COVID-19, the world has witnessed an extraordinary turn of events that could not have been anticipated. To keep operational, law firms have had to promptly adapt to a remote workplace model where employees are working from home. However, given the speed at which this arrangement was implemented, many organizations may not have had systems in place to insulate against the security risks that may arise.</p>
<p>Many employees working from home share equipment and spaces with other family members. Such settings can present situations of unattended documents and notes with sensitive information recorded. Additionally, electronic information may be accessed on devices that are not exclusively for the use of the authorized person. The device itself, may not be equipped with passwords and technical guards that are offered at an office. Employees are now presented with the challenge of discharging the same duties to secure confidential material, but without the infrastructure in place to do so. Therefore, the current climate of mass disruption, has made organizations particularly susceptible to privacy breaches or cyber attacks.</p>
<p>It is important for organizations to take immediate steps to ensure the protection of sensitive information. These steps include:</p>
<p><strong>Updating and implementing security measures</strong></p>
<ul>
<li>Employers need to update their privacy policies and procedures to reflect the current needs, issues, and solutions surrounding a remote workplace;</li>
<li>Employers need to consider the risks of cyber attacks and have measures in place to respond to any security breaches;</li>
<li>Employers need to invest in revamping their IT infrastructure to ensure employees have access to a secure remote platform. These measures may include providing a protected VPN connection to employees which encrypts confidential communication;</li>
<li>Employers should utilize access-based security features such as a multi-factor authentication protocol to protect their employees’ accounts; and,</li>
<li>Employers should closely monitor network-related activities to flag security breaches.</li>
</ul>
<p><strong>Training employees </strong></p>
<ul>
<li>Employee training should focus on how to manage security risks from home. Some of these measures include the use of a secure location such a locked cabinet to limit the exposure of confidential information to family members;</li>
<li>Employees should password protect all devices, and access confidential documents through a centralized and secured device; and,</li>
<li>Employees should use electronic platforms enabled by the organization so they are connecting to the workplace network through a secure VPN connection that is protected by firewalls and antivirus software.</li>
</ul>
<p>It is imperative to maintain the integrity of this profession by ensuring that the duty of confidentiality owed to our clients is not compromised under any circumstance. It is incumbent on the prudent organization and employee to jointly make best efforts to conduct our business as securely as possible.</p>
<p>The post <a href="https://fcl-law.com/curbing-privacy-risks-when-working-from-home/">Curbing Privacy Risks When Working From Home</a> appeared first on <a href="https://fcl-law.com">FCL LLP</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://fcl-law.com/curbing-privacy-risks-when-working-from-home/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
