{"id":5976,"date":"2021-09-13T16:31:11","date_gmt":"2021-09-13T20:31:11","guid":{"rendered":"https:\/\/www.millerthomson.com\/osfi-updates-cybersecurity-breach-notification-requirements\/"},"modified":"2026-03-10T15:49:58","modified_gmt":"2026-03-10T19:49:58","slug":"osfi-updates-cybersecurity-breach-notification-requirements","status":"publish","type":"post","link":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/osfi-updates-cybersecurity-breach-notification-requirements\/","title":{"rendered":"OSFI updates cybersecurity breach notification requirements"},"content":{"rendered":"\n<p>The Office of the Superintendent of Financial Institutions (\u201c<strong>OSFI<\/strong>\u201d) released a new <a href=\"https:\/\/www.osfi-bsif.gc.ca\/Eng\/fi-if\/rg-ro\/gdn-ort\/adv-prv\/Pages\/TCSIR.aspx\">Advisory on Technology and Cyber Security Incident Reporting<\/a>, effective August 13, 2021 (the \u201c<strong>Advisory<\/strong>\u201d) which seeks to govern how federally-regulated financial institutions (\u201c<strong>FRFIs<\/strong>\u201d) should disclose and report technology and cybersecurity incidents. The Advisory replaces its January 2019 predecessor, on which we have <a href=\"https:\/\/www.millerthomson.com\/en\/publications\/communiques-and-updates\/financial-services-restructuring-communique\/january-30-2019-fsi\/one-incident-potentially-multiple-breach-reporting-requirements-osfi-introduces-cyber-breach-notification-guidelines-for-financial-institutions\/\">previously commented<\/a>. The requirements are in addition to any potential privacy breach reporting requirements that institutions may be subject to under the federal <em>Personal Information Protection &amp; Electronic Documents Act <\/em>(\u201c<strong>PIPEDA<\/strong>\u201d) or provincial privacy legislation such as Alberta\u2019s <em>Personal Information Protection Act<\/em>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">An increased role for OSFI?<\/h2>\n\n\n\n<p>According to OSFI, the purpose of the current Advisory is to provide a \u201ccoordinated and integrated approach to OSFI\u2019s awareness of, and response to, technology and cyber security incidents\u201d at FRFIs, indicating a more pronounced role for OSFI in addressing cyber preparedness. While the Advisory sets out OSFI\u2019s current incident reporting requirements in detail, it is noteworthy that OSFI does not specify any explicit expectations in relation to what an incident management framework should look like. Accordingly, each FRFI appears to have some degree of discretion as to how to structure its own framework, provided that the reporting requirements prescribed by the Advisory are met.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Changes to mandatory incident reporting requirements<\/h2>\n\n\n\n<p>There have been significant changes to the reporting requirements such that reporting is likely to occur more promptly and with greater frequency where a cybersecurity incident transpires.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Reports to be provided within 24h<\/h3>\n\n\n\n<p>Firstly, the Advisory requires FRFIs to report a technology or cyber security incident to OSFI\u2019s Technology Risk Division and their Lead Superior at OSFI within 24 hours, or sooner if possible. This timeline has been shortened from the previous 72-hour window. OSFI recognizes that the shortened timeline will likely mean that information requested remains unavailable and provides guidance for how to report such initial information accordingly. It also includes subsequent reporting requirements as new information becomes available.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Reporting form<\/h3>\n\n\n\n<p>Incidents must be reported using a new <a href=\"https:\/\/www.osfi-bsif.gc.ca\/Eng\/Docs\/TCSIR-frm.pdf\">Incident Reporting and Resolution form<\/a>, shown in Appendix II of the Advisory. The form serves as a more streamlined process from the former advisory which solely outlined the expected details of a response.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">More extensive reporting criteria<\/h3>\n\n\n\n<p>The Advisory\u2019s criteria for reporting is more extensive, which will result in more incidents being reported. Under the Advisory, a reportable incident may have a number of characteristics including any one or more of the following:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Impact on other FRFIs or the financial system;<\/li>\n\n\n\n<li>Impact to payment services;<\/li>\n\n\n\n<li>Impact to operations, infrastructure, data and\/or systems;<\/li>\n\n\n\n<li>Operational impact to internal users and external customers;<\/li>\n\n\n\n<li>Reputational impact;<\/li>\n\n\n\n<li>Disaster recovery, technology or cyber-incident management protocols have been activated by the FRFI or third-party vendors;<\/li>\n\n\n\n<li>Reported to all or a combination of the following:\n<ul class=\"wp-block-list\">\n<li>the Office of the Privacy Commissioner and\/or other local or foreign regulatory agencies;<\/li>\n\n\n\n<li>the Board of Directors and\/or Senior\/Executive Management;<\/li>\n\n\n\n<li>another federal government department; or<\/li>\n\n\n\n<li>any law enforcement agencies.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Initiation of a cyber-insurance claim;<\/li>\n\n\n\n<li>Assessment by a FRFI to be of a high or critical severity, level or ranked Priority\/Severity\/Tier 1 or 2; or<\/li>\n\n\n\n<li>Breach of internal risk appetites or thresholds.<\/li>\n<\/ul>\n\n\n\n<p>For incidents that do not align with or contain the specific criteria listed above, or when a FRFI is uncertain, notification to OSFI is encouraged as a precaution.<\/p>\n\n\n\n<p>For a complete list, see \u201cCriteria for Reporting\u201d in the <a href=\"https:\/\/www.osfi-bsif.gc.ca\/Eng\/fi-if\/rg-ro\/gdn-ort\/adv-prv\/Pages\/TCSIR.aspx\">Advisory<\/a><\/p>\n\n\n\n<p>To exemplify reportable incidents, Appendix I of the Advisory sets out a series of examples to aid FRFI\u2019s assess their reporting obligations and notes that, when in doubt about whether to report, FRFIs should consult their Lead Supervisor.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Consequences of failure to report<\/h3>\n\n\n\n<p>Should an FRFI fail to report a technology or cybersecurity incident, the Advisory provides that the FRFI will be subject to increased supervisory oversight which might include enhanced monitoring activities, watch-listing or staging of the FRFI.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What does this mean for FRFIs?<\/h2>\n\n\n\n<p>FRFIs are encouraged to: (i) use the updated OSFI <a href=\"https:\/\/www.osfi-bsif.gc.ca\/Eng\/fi-if\/in-ai\/Pages\/cbrsk.aspx\">Cyber Security Self-Assessment<\/a> to assess their current level of cyber preparedness and work to develop and maintain effective cyber security practices; and (ii) update their incident response policies and procedures to align with the current Advisory. The foregoing should be done in addition to ensuring compliance with the latest reporting obligations upon the occurrence of a technology or cyber security incident.<\/p>\n\n\n\n<p>If you have any questions or wish to discuss the Advisory or cyber security preparedness, please reach out to David Krebs, Domenic Presta or another member of our Privacy or Technology Teams.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Office of the Superintendent of Financial Institutions (\u201cOSFI\u201d) released a new Advisory on Technology and Cyber Security Incident Reporting, effective August 13, 2021 (the \u201cAdvisory\u201d) which seeks to govern how federally-regulated financial institutions (\u201cFRFIs\u201d) should disclose and report technology and cybersecurity incidents. The Advisory replaces its January 2019 predecessor, on which we have previously [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":14345,"parent":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[531],"insight-format":[418],"class_list":["post-5976","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.1.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>OSFI updates cybersecurity breach notification requirements | Miller Thomson<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/osfi-updates-cybersecurity-breach-notification-requirements\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"OSFI updates cybersecurity breach notification requirements | Miller Thomson\" \/>\n<meta property=\"og:description\" content=\"The Office of the Superintendent of Financial Institutions (\u201cOSFI\u201d) released a new Advisory on Technology and Cyber Security Incident Reporting, effective August 13, 2021 (the \u201cAdvisory\u201d) which seeks to govern how federally-regulated financial institutions (\u201cFRFIs\u201d) should disclose and report technology and cybersecurity incidents. The Advisory replaces its January 2019 predecessor, on which we have previously [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/osfi-updates-cybersecurity-breach-notification-requirements\/\" \/>\n<meta property=\"og:site_name\" content=\"Miller Thomson\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/MillerThomsonLaw\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-13T20:31:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-10T19:49:58+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@millerthomson\" \/>\n<meta name=\"twitter:site\" content=\"@millerthomson\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/osfi-updates-cybersecurity-breach-notification-requirements\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/osfi-updates-cybersecurity-breach-notification-requirements\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/#\/schema\/person\/3f9143e8aec04617923b89fecf6886ea\"},\"headline\":\"OSFI updates cybersecurity breach notification requirements\",\"datePublished\":\"2021-09-13T20:31:11+00:00\",\"dateModified\":\"2026-03-10T19:49:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/osfi-updates-cybersecurity-breach-notification-requirements\/\"},\"wordCount\":757,\"publisher\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/osfi-updates-cybersecurity-breach-notification-requirements\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Cybersecurity_Post-Image.jpg\",\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\"},{\"@type\":[\"WebPage\",\"ItemPage\"],\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/osfi-updates-cybersecurity-breach-notification-requirements\/\",\"url\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/osfi-updates-cybersecurity-breach-notification-requirements\/\",\"name\":\"OSFI updates cybersecurity breach notification requirements | Miller Thomson\",\"isPartOf\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/osfi-updates-cybersecurity-breach-notification-requirements\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/osfi-updates-cybersecurity-breach-notification-requirements\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Cybersecurity_Post-Image.jpg\",\"datePublished\":\"2021-09-13T20:31:11+00:00\",\"dateModified\":\"2026-03-10T19:49:58+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/osfi-updates-cybersecurity-breach-notification-requirements\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/osfi-updates-cybersecurity-breach-notification-requirements\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/osfi-updates-cybersecurity-breach-notification-requirements\/#primaryimage\",\"url\":\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Cybersecurity_Post-Image.jpg\",\"contentUrl\":\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Cybersecurity_Post-Image.jpg\",\"width\":1776,\"height\":994,\"caption\":\"person in hoodie looking at a computer screen\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/osfi-updates-cybersecurity-breach-notification-requirements\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.millerthomson.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"OSFI updates cybersecurity breach notification requirements\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/#website\",\"url\":\"https:\/\/www.millerthomson.com\/en\/\",\"name\":\"Miller Thomson\",\"description\":\"National law firm providing business law expertise and litigation and disputes services for businesses across Canada since 1957.\",\"publisher\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.millerthomson.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/#organization\",\"name\":\"Miller Thomson\",\"url\":\"https:\/\/www.millerthomson.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/miller-thomson.svg\",\"contentUrl\":\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/miller-thomson.svg\",\"width\":380,\"height\":50,\"caption\":\"Miller Thomson\"},\"image\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/MillerThomsonLaw\/\",\"https:\/\/x.com\/millerthomson\",\"https:\/\/www.linkedin.com\/company\/miller-thomson-llp\/\",\"https:\/\/www.youtube.com\/@millerthomson\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/#\/schema\/person\/3f9143e8aec04617923b89fecf6886ea\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2fb85dacd7d0cf6d162ec9c30c25b90c6e69a82dbe5ebe52991d2ec0d73e4890?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2fb85dacd7d0cf6d162ec9c30c25b90c6e69a82dbe5ebe52991d2ec0d73e4890?s=96&d=mm&r=g\",\"caption\":\"admin\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"OSFI updates cybersecurity breach notification requirements | Miller Thomson","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/osfi-updates-cybersecurity-breach-notification-requirements\/","og_locale":"en_US","og_type":"article","og_title":"OSFI updates cybersecurity breach notification requirements | Miller Thomson","og_description":"The Office of the Superintendent of Financial Institutions (\u201cOSFI\u201d) released a new Advisory on Technology and Cyber Security Incident Reporting, effective August 13, 2021 (the \u201cAdvisory\u201d) which seeks to govern how federally-regulated financial institutions (\u201cFRFIs\u201d) should disclose and report technology and cybersecurity incidents. The Advisory replaces its January 2019 predecessor, on which we have previously [&hellip;]","og_url":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/osfi-updates-cybersecurity-breach-notification-requirements\/","og_site_name":"Miller Thomson","article_publisher":"https:\/\/www.facebook.com\/MillerThomsonLaw\/","article_published_time":"2021-09-13T20:31:11+00:00","article_modified_time":"2026-03-10T19:49:58+00:00","author":"admin","twitter_card":"summary_large_image","twitter_creator":"@millerthomson","twitter_site":"@millerthomson","twitter_misc":{"Written by":"admin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/osfi-updates-cybersecurity-breach-notification-requirements\/#article","isPartOf":{"@id":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/osfi-updates-cybersecurity-breach-notification-requirements\/"},"author":{"name":"admin","@id":"https:\/\/www.millerthomson.com\/en\/#\/schema\/person\/3f9143e8aec04617923b89fecf6886ea"},"headline":"OSFI updates cybersecurity breach notification requirements","datePublished":"2021-09-13T20:31:11+00:00","dateModified":"2026-03-10T19:49:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/osfi-updates-cybersecurity-breach-notification-requirements\/"},"wordCount":757,"publisher":{"@id":"https:\/\/www.millerthomson.com\/en\/#organization"},"image":{"@id":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/osfi-updates-cybersecurity-breach-notification-requirements\/#primaryimage"},"thumbnailUrl":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Cybersecurity_Post-Image.jpg","articleSection":["Cybersecurity"],"inLanguage":"en-US"},{"@type":["WebPage","ItemPage"],"@id":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/osfi-updates-cybersecurity-breach-notification-requirements\/","url":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/osfi-updates-cybersecurity-breach-notification-requirements\/","name":"OSFI updates cybersecurity breach notification requirements | Miller Thomson","isPartOf":{"@id":"https:\/\/www.millerthomson.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/osfi-updates-cybersecurity-breach-notification-requirements\/#primaryimage"},"image":{"@id":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/osfi-updates-cybersecurity-breach-notification-requirements\/#primaryimage"},"thumbnailUrl":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Cybersecurity_Post-Image.jpg","datePublished":"2021-09-13T20:31:11+00:00","dateModified":"2026-03-10T19:49:58+00:00","breadcrumb":{"@id":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/osfi-updates-cybersecurity-breach-notification-requirements\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/osfi-updates-cybersecurity-breach-notification-requirements\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/osfi-updates-cybersecurity-breach-notification-requirements\/#primaryimage","url":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Cybersecurity_Post-Image.jpg","contentUrl":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Cybersecurity_Post-Image.jpg","width":1776,"height":994,"caption":"person in hoodie looking at a computer screen"},{"@type":"BreadcrumbList","@id":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/osfi-updates-cybersecurity-breach-notification-requirements\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.millerthomson.com\/en\/"},{"@type":"ListItem","position":2,"name":"OSFI updates cybersecurity breach notification requirements"}]},{"@type":"WebSite","@id":"https:\/\/www.millerthomson.com\/en\/#website","url":"https:\/\/www.millerthomson.com\/en\/","name":"Miller Thomson","description":"National law firm providing business law expertise and litigation and disputes services for businesses across Canada since 1957.","publisher":{"@id":"https:\/\/www.millerthomson.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.millerthomson.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.millerthomson.com\/en\/#organization","name":"Miller Thomson","url":"https:\/\/www.millerthomson.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.millerthomson.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/miller-thomson.svg","contentUrl":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/miller-thomson.svg","width":380,"height":50,"caption":"Miller Thomson"},"image":{"@id":"https:\/\/www.millerthomson.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/MillerThomsonLaw\/","https:\/\/x.com\/millerthomson","https:\/\/www.linkedin.com\/company\/miller-thomson-llp\/","https:\/\/www.youtube.com\/@millerthomson"]},{"@type":"Person","@id":"https:\/\/www.millerthomson.com\/en\/#\/schema\/person\/3f9143e8aec04617923b89fecf6886ea","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.millerthomson.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/2fb85dacd7d0cf6d162ec9c30c25b90c6e69a82dbe5ebe52991d2ec0d73e4890?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2fb85dacd7d0cf6d162ec9c30c25b90c6e69a82dbe5ebe52991d2ec0d73e4890?s=96&d=mm&r=g","caption":"admin"}}]}},"_links":{"self":[{"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/posts\/5976","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/comments?post=5976"}],"version-history":[{"count":1,"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/posts\/5976\/revisions"}],"predecessor-version":[{"id":47482,"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/posts\/5976\/revisions\/47482"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/media\/14345"}],"wp:attachment":[{"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/media?parent=5976"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/categories?post=5976"},{"taxonomy":"insight-format","embeddable":true,"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/insight-format?post=5976"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}