{"id":6270,"date":"2022-12-02T14:00:34","date_gmt":"2022-12-02T19:00:34","guid":{"rendered":"https:\/\/www.millerthomson.com\/court-appeal-finds-intrusion-upon-seclusion-applicable-hacked-organizations\/"},"modified":"2025-06-24T13:49:37","modified_gmt":"2025-06-24T17:49:37","slug":"court-appeal-finds-intrusion-upon-seclusion-applicable-hacked-organizations","status":"publish","type":"post","link":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/court-appeal-finds-intrusion-upon-seclusion-applicable-hacked-organizations\/","title":{"rendered":"Failure to prevent a data breach not equal to invasion of privacy: Ontario Court of Appeal shuts the door on \u201cintrusion upon seclusion\u201d tort"},"content":{"rendered":"\n<p>The Ontario Court of Appeal has released a new trilogy of cases regarding the privacy tort \u201cintrusion upon seclusion.\u201d Specifically, whether the privacy tort is available as against commercial entities collecting and storing clients\u2019 personal information, where there was a breach of security by third-party malicious actors as a result of inadequate safeguards. The Court referred to these commercial entities as \u201cDatabase Defendants.\u201d<\/p>\n\n\n\n<p>The three cases are:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><em>Owsianik v Equifax Canada Co<\/em>;<a name=\"_ftnref1\" href=\"#_ftn1\">[1]<\/a><\/li>\n\n\n\n<li><em>Obodo v Trans Union of Canada, Inc<\/em>;<a name=\"_ftnref2\" href=\"#_ftn2\">[2]<\/a> and<\/li>\n\n\n\n<li><em>Winder v Marriott International, Inc<\/em>.<a name=\"_ftnref3\" href=\"#_ftn3\">[3]<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Background<\/h2>\n\n\n\n<p>The tort of intrusion upon seclusion was first recognized by the Ontario Court of Appeal ten years ago in <em>Jones v Tsige<\/em>.<a href=\"#_ftn4\" name=\"_ftnref4\">[4]<\/a> Some other Canadian jurisdictions have enacted specific legislation adopting the tort of invasion of privacy, which covers, among other things, intrusion upon seclusion.<a href=\"#_ftn5\" name=\"_ftnref5\">[5]<\/a><\/p>\n\n\n\n<p>In <em>Jones v Tsige<\/em>, Sandra Jones and Winnie Tsige both worked at the Bank of Montreal. Tsige became involved with Jones\u2019 ex-husband, and used her workplace computer to access Jones\u2019 personal account information at least 174 times. Jones learned of Tsige\u2019s misconduct and sued for invasion of privacy and breach of fiduciary duty, seeking damages of $20,000.<\/p>\n\n\n\n<p>The Court found Tsige liable, establishing the new tort of intrusion upon seclusion. Describing the harm, the Ontario Court of Appeal stated that:<\/p>\n\n\n\n<p>\u201cOne who intentionally intrudes, physically or otherwise, upon the seclusion of another or his private affairs or concerns, is subject to liability to the other for invasion of his privacy, if the invasion would be highly offensive to a reasonable person.\u201d<a href=\"#_ftn6\" name=\"_ftnref6\">[6]<\/a><\/p>\n\n\n\n<p>In order for intrusion upon seclusion to be found:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>the defendant\u2019s conduct must be intentional or reckless;<\/li>\n\n\n\n<li>the defendant must have invaded, without lawful justification, the plaintiff\u2019s private affairs; and<\/li>\n\n\n\n<li>a reasonable person would regard the invasion as highly offensive causing distress, humiliation or anguish.<\/li>\n<\/ul>\n\n\n\n<p>Notably, the Court found that an absence of a financial harm does not prevent the recovery of damages.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The application to organizations in control of personal information<\/h2>\n\n\n\n<p>Given the absence of a private right of action in existing federal privacy law, individuals harmed by privacy breaches have brought actions against these corporations, asserting the tort of intrusion upon seclusion as a cause of action.<\/p>\n\n\n\n<p>In the class action context, for an action to be certified, the pleadings must disclose a reasonable cause of action.<a href=\"#_ftn7\" name=\"_ftnref7\">[7]<\/a> Accordingly, courts have had to determine whether the application of this tort to organizations collecting and storing personal information is valid. The Ontario Court of Appeal set out to clarify this inquiry, hearing three appeals in the class actions context related to whether the tort of intrusion upon seclusion is a viable claim against these organizations, as described below.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><em>Owsianik v Equifax<\/em>, 2022 ONCA 813<\/h3>\n\n\n\n<p>Owsianik, on behalf of the identified class, brought a class action against Equifax, alleging intrusion upon seclusion. For six weeks in 2017, threat actors (i.e. \u201c<strong>hackers<\/strong>\u201d) gained unauthorized access to customers\u2019 personal information stored by Equifax, including social insurance numbers, names, dates of birth, addresses, driver\u2019s licence numbers, credit card numbers, email addresses, and passwords. The data breach affected people all around the world, including approximately 20,000 Canadians.. The representative plaintiff, Owisianik, was among the impacted Canadians and brought a claim alleging that Equifax\u2019s cybersecurity and data protection measures were inadequate, leading to the breach.<\/p>\n\n\n\n<p>Owsianik was initially successful in certifying an intrusion upon seclusion claim as part of a class proceeding. However, the majority of the Divisional Court reversed this finding and held that the tort had no application to a Database Defendant when the private information was accessed by a third-party hacker acting independently of the Database Defendant.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><em>Obodo v Trans Union of Canada Inc<\/em>, 2022 ONCA 814 <\/h3>\n\n\n\n<p>Obodo, on behalf of the identified class, brought a class action against Trans Union, alleging intrusion upon seclusion. Over a two-week period in\u00a02019, hackers, using credentials stolen from a Trans Union customer, accessed the database through a customer portal. Within three months, Trans Union notified the affected parties that their information had been improperly accessed by hackers. Trans Union offered certain compensation to affected parties. The improperly accessed information included information pertaining to about 37,000 Canadians. Those individuals made up the proposed class.<\/p>\n\n\n\n<p>Mr. Obodo\u2019s motion for an order certifying an intrusion upon seclusion claim against Trans Union was unsuccessful. The motion judge did, however, certify other common issues.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><em>Winder v Marriott International Inc, <\/em>2022 ONCA 815<\/h3>\n\n\n\n<p>Winder, on behalf of the identified class, brought a pretrial motion under r. 21.01(1)(a) of the <em>Rules of Civil Procedure<\/em>, for a determination of a question of law. Winder asked the court to determine whether he had pleaded a legally viable cause of action for intrusion upon seclusion against Marriott and the related defendants. His claim arose after Marriott disclosed that information provided to Marriott by customers had been accessed by unknown, unauthorized persons who had hacked into the reservation database of Marriott\u2019s Starwood Hotels.<\/p>\n\n\n\n<p>Winder advanced claims for negligence, breach of contract, and breach of various statutory provisions. He also alleged that Marriott was liable for the intentional tort of intrusion upon seclusion. Winder\u2019s claim alleged, among other things, that Marriott had failed to take adequate steps to protect the private information provided to it by Mr. Winder (and others) from being accessed and\/or used by third-party hackers. The motion judge held that the claim as pleaded did not disclose a viable cause of action against Marriott for intrusion upon seclusion. The other claims made against Marriott were not in issue on the motion.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Finding<\/h2>\n\n\n\n<p>The Court dismissed all three of the appeals. The Court ultimately held that while data controllers can be sued in negligence, contract or breach of statutory obligations to protect personal information, they cannot be sued for the tort of inclusions upon seclusion.<\/p>\n\n\n\n<p>In particular, the Court found that intrusion upon seclusion is an intentional tort. The defendants lacked intention in that they did not do anything that could constitute an act of intrusion or invasion into the privacy of the plaintiffs. The intrusions alleged were committed by unknown third-party hackers, acting independently from, and to the detriment of, the interests of the defendant organizations.<\/p>\n\n\n\n<p>The Court stated the failure to take adequate steps to protect personal information and consequently, the plaintiffs from the intrusion upon their privacy by third parties, may attract liability in negligence, contract and under various statutes. The organizations\u2019 failure to meet their common law duty of care, or their contractual and statutory responsibilities under privacy or data protection law, to the plaintiffs to properly store the data, cannot, however, be transformed by the actions of independent third-party intruders into an invasion by defendant organizations of the plaintiffs\u2019 privacy.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Takeaway<\/h2>\n\n\n\n<p>The Court made clear that organizations that are personal information controllers cannot be found liable under the tort of intrusion upon seclusion for breaches conducted by independent, third-party malicious actors, limiting the causes of action available to plaintiffs.<\/p>\n\n\n\n<p>Nevertheless, organizations can be found liable under non-privacy torts, such as negligence or breach of contract. Moreover, reform to privacy legislation may raise a private right of action for individuals impacted by contravention of the legislation by commercial entities as demonstrated through Quebec\u2019s Bill 64, discussed in our <a href=\"https:\/\/www.millerthomson.com\/en\/blog\/mt-cybersecurity-blog\/quebecs-new-privacy-law-bill-64-is-here-canadian-businesses-take-note\/\" target=\"_blank\" rel=\"noopener\">previous article<\/a>.<\/p>\n\n\n\n<p>To better understand your obligations in the event of a data breach and avoid liability, our <a href=\"https:\/\/www.millerthomson.com\/en\/our-services\/services\/cybersecurity\/\" target=\"_blank\" rel=\"noopener\">Cybersecurity<\/a> and <a href=\"https:\/\/www.millerthomson.com\/en\/our-services\/services\/commercial-litigation\/\" target=\"_blank\" rel=\"noopener\">Commercial Litigation<\/a> groups can help.<\/p>\n\n\n\n<p><a href=\"#_ftnref1\" name=\"_ftn1\">[1]<\/a> 2022 ONCA 813<\/p>\n\n\n\n<p><a href=\"#_ftnref2\" name=\"_ftn2\">[2]<\/a> 2022 ONCA 814<\/p>\n\n\n\n<p><a href=\"#_ftnref3\" name=\"_ftn3\">[3]<\/a> 2022 ONCA 815.<\/p>\n\n\n\n<p><a href=\"#_ftnref4\" name=\"_ftn4\">[4]<\/a> 2012 ONCA 32<\/p>\n\n\n\n<p><a href=\"#_ftnref5\" name=\"_ftn5\">[5]<\/a> See <em>Privacy Act<\/em>, RSBC 1996 c 373; <em>Privacy Act<\/em>, RSM 1987, c P125; <em>Privacy Act<\/em>, RSN 1990 c P-22; <em>Privacy Act<\/em>, RSS 1978, c P-24.<\/p>\n\n\n\n<p><a href=\"#_ftnref6\" name=\"_ftn6\">[6]<\/a> 2012 ONCA 32 at para 19.<\/p>\n\n\n\n<p><a href=\"#_ftnref7\" name=\"_ftn7\">[7]<\/a> <em>Class Proceedings Act, 1992<\/em>, SO 1992 c 5, s 5(1)(a).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Ontario Court of Appeal has released a new trilogy of cases regarding the privacy tort \u201cintrusion upon seclusion.\u201d Specifically, whether the privacy tort is available as against commercial entities collecting and storing clients\u2019 personal information, where there was a breach of security by third-party malicious actors as a result of inadequate safeguards. The Court [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":14345,"parent":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[531],"insight-format":[418],"class_list":["post-6270","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.1.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Failure to prevent a data breach not equal to invasion of privacy: Ontario Court of Appeal shuts the door on \u201cintrusion upon seclusion\u201d tort | Miller Thomson<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/court-appeal-finds-intrusion-upon-seclusion-applicable-hacked-organizations\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Failure to prevent a data breach not equal to invasion of privacy: Ontario Court of Appeal shuts the door on \u201cintrusion upon seclusion\u201d tort | Miller Thomson\" \/>\n<meta property=\"og:description\" content=\"The Ontario Court of Appeal has released a new trilogy of cases regarding the privacy tort \u201cintrusion upon seclusion.\u201d Specifically, whether the privacy tort is available as against commercial entities collecting and storing clients\u2019 personal information, where there was a breach of security by third-party malicious actors as a result of inadequate safeguards. The Court [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/court-appeal-finds-intrusion-upon-seclusion-applicable-hacked-organizations\/\" \/>\n<meta property=\"og:site_name\" content=\"Miller Thomson\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/MillerThomsonLaw\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-02T19:00:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-24T17:49:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Cybersecurity_Post-Image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1776\" \/>\n\t<meta property=\"og:image:height\" content=\"994\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Katherine Chan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@millerthomson\" \/>\n<meta name=\"twitter:site\" content=\"@millerthomson\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Katherine Chan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/court-appeal-finds-intrusion-upon-seclusion-applicable-hacked-organizations\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/court-appeal-finds-intrusion-upon-seclusion-applicable-hacked-organizations\/\"},\"author\":{\"name\":\"Katherine Chan\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/#\/schema\/person\/5473b50a564d1e37f327fdd79cb348f6\"},\"headline\":\"Failure to prevent a data breach not equal to invasion of privacy: Ontario Court of Appeal shuts the door on \u201cintrusion upon seclusion\u201d tort\",\"datePublished\":\"2022-12-02T19:00:34+00:00\",\"dateModified\":\"2025-06-24T17:49:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/court-appeal-finds-intrusion-upon-seclusion-applicable-hacked-organizations\/\"},\"wordCount\":1270,\"publisher\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/court-appeal-finds-intrusion-upon-seclusion-applicable-hacked-organizations\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Cybersecurity_Post-Image.jpg\",\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\"},{\"@type\":[\"WebPage\",\"ItemPage\"],\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/court-appeal-finds-intrusion-upon-seclusion-applicable-hacked-organizations\/\",\"url\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/court-appeal-finds-intrusion-upon-seclusion-applicable-hacked-organizations\/\",\"name\":\"Failure to prevent a data breach not equal to invasion of privacy: Ontario Court of Appeal shuts the door on \u201cintrusion upon seclusion\u201d tort | Miller Thomson\",\"isPartOf\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/court-appeal-finds-intrusion-upon-seclusion-applicable-hacked-organizations\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/court-appeal-finds-intrusion-upon-seclusion-applicable-hacked-organizations\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Cybersecurity_Post-Image.jpg\",\"datePublished\":\"2022-12-02T19:00:34+00:00\",\"dateModified\":\"2025-06-24T17:49:37+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/court-appeal-finds-intrusion-upon-seclusion-applicable-hacked-organizations\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/court-appeal-finds-intrusion-upon-seclusion-applicable-hacked-organizations\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/court-appeal-finds-intrusion-upon-seclusion-applicable-hacked-organizations\/#primaryimage\",\"url\":\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Cybersecurity_Post-Image.jpg\",\"contentUrl\":\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Cybersecurity_Post-Image.jpg\",\"width\":1776,\"height\":994,\"caption\":\"person in hoodie looking at a computer screen\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/court-appeal-finds-intrusion-upon-seclusion-applicable-hacked-organizations\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.millerthomson.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Failure to prevent a data breach not equal to invasion of privacy: Ontario Court of Appeal shuts the door on \u201cintrusion upon seclusion\u201d tort\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/#website\",\"url\":\"https:\/\/www.millerthomson.com\/en\/\",\"name\":\"Miller Thomson\",\"description\":\"National law firm providing business law expertise and litigation and disputes services for businesses across Canada since 1957.\",\"publisher\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.millerthomson.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/#organization\",\"name\":\"Miller Thomson\",\"url\":\"https:\/\/www.millerthomson.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/miller-thomson.svg\",\"contentUrl\":\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/miller-thomson.svg\",\"width\":380,\"height\":50,\"caption\":\"Miller Thomson\"},\"image\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/MillerThomsonLaw\/\",\"https:\/\/x.com\/millerthomson\",\"https:\/\/www.linkedin.com\/company\/miller-thomson-llp\/\",\"https:\/\/www.youtube.com\/@millerthomson\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/#\/schema\/person\/5473b50a564d1e37f327fdd79cb348f6\",\"name\":\"Katherine Chan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/da8a18c240b27905220d948a87957ba19ab6de326b44a2ce3072235c121f996f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/da8a18c240b27905220d948a87957ba19ab6de326b44a2ce3072235c121f996f?s=96&d=mm&r=g\",\"caption\":\"Katherine Chan\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Failure to prevent a data breach not equal to invasion of privacy: Ontario Court of Appeal shuts the door on \u201cintrusion upon seclusion\u201d tort | Miller Thomson","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/court-appeal-finds-intrusion-upon-seclusion-applicable-hacked-organizations\/","og_locale":"en_US","og_type":"article","og_title":"Failure to prevent a data breach not equal to invasion of privacy: Ontario Court of Appeal shuts the door on \u201cintrusion upon seclusion\u201d tort | Miller Thomson","og_description":"The Ontario Court of Appeal has released a new trilogy of cases regarding the privacy tort \u201cintrusion upon seclusion.\u201d Specifically, whether the privacy tort is available as against commercial entities collecting and storing clients\u2019 personal information, where there was a breach of security by third-party malicious actors as a result of inadequate safeguards. The Court [&hellip;]","og_url":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/court-appeal-finds-intrusion-upon-seclusion-applicable-hacked-organizations\/","og_site_name":"Miller Thomson","article_publisher":"https:\/\/www.facebook.com\/MillerThomsonLaw\/","article_published_time":"2022-12-02T19:00:34+00:00","article_modified_time":"2025-06-24T17:49:37+00:00","og_image":[{"width":1776,"height":994,"url":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Cybersecurity_Post-Image.jpg","type":"image\/jpeg"}],"author":"Katherine Chan","twitter_card":"summary_large_image","twitter_creator":"@millerthomson","twitter_site":"@millerthomson","twitter_misc":{"Written by":"Katherine Chan","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/court-appeal-finds-intrusion-upon-seclusion-applicable-hacked-organizations\/#article","isPartOf":{"@id":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/court-appeal-finds-intrusion-upon-seclusion-applicable-hacked-organizations\/"},"author":{"name":"Katherine Chan","@id":"https:\/\/www.millerthomson.com\/en\/#\/schema\/person\/5473b50a564d1e37f327fdd79cb348f6"},"headline":"Failure to prevent a data breach not equal to invasion of privacy: Ontario Court of Appeal shuts the door on \u201cintrusion upon seclusion\u201d tort","datePublished":"2022-12-02T19:00:34+00:00","dateModified":"2025-06-24T17:49:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/court-appeal-finds-intrusion-upon-seclusion-applicable-hacked-organizations\/"},"wordCount":1270,"publisher":{"@id":"https:\/\/www.millerthomson.com\/en\/#organization"},"image":{"@id":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/court-appeal-finds-intrusion-upon-seclusion-applicable-hacked-organizations\/#primaryimage"},"thumbnailUrl":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Cybersecurity_Post-Image.jpg","articleSection":["Cybersecurity"],"inLanguage":"en-US"},{"@type":["WebPage","ItemPage"],"@id":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/court-appeal-finds-intrusion-upon-seclusion-applicable-hacked-organizations\/","url":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/court-appeal-finds-intrusion-upon-seclusion-applicable-hacked-organizations\/","name":"Failure to prevent a data breach not equal to invasion of privacy: Ontario Court of Appeal shuts the door on \u201cintrusion upon seclusion\u201d tort | Miller Thomson","isPartOf":{"@id":"https:\/\/www.millerthomson.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/court-appeal-finds-intrusion-upon-seclusion-applicable-hacked-organizations\/#primaryimage"},"image":{"@id":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/court-appeal-finds-intrusion-upon-seclusion-applicable-hacked-organizations\/#primaryimage"},"thumbnailUrl":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Cybersecurity_Post-Image.jpg","datePublished":"2022-12-02T19:00:34+00:00","dateModified":"2025-06-24T17:49:37+00:00","breadcrumb":{"@id":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/court-appeal-finds-intrusion-upon-seclusion-applicable-hacked-organizations\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/court-appeal-finds-intrusion-upon-seclusion-applicable-hacked-organizations\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/court-appeal-finds-intrusion-upon-seclusion-applicable-hacked-organizations\/#primaryimage","url":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Cybersecurity_Post-Image.jpg","contentUrl":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Cybersecurity_Post-Image.jpg","width":1776,"height":994,"caption":"person in hoodie looking at a computer screen"},{"@type":"BreadcrumbList","@id":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/court-appeal-finds-intrusion-upon-seclusion-applicable-hacked-organizations\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.millerthomson.com\/en\/"},{"@type":"ListItem","position":2,"name":"Failure to prevent a data breach not equal to invasion of privacy: Ontario Court of Appeal shuts the door on \u201cintrusion upon seclusion\u201d tort"}]},{"@type":"WebSite","@id":"https:\/\/www.millerthomson.com\/en\/#website","url":"https:\/\/www.millerthomson.com\/en\/","name":"Miller Thomson","description":"National law firm providing business law expertise and litigation and disputes services for businesses across Canada since 1957.","publisher":{"@id":"https:\/\/www.millerthomson.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.millerthomson.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.millerthomson.com\/en\/#organization","name":"Miller Thomson","url":"https:\/\/www.millerthomson.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.millerthomson.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/miller-thomson.svg","contentUrl":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/miller-thomson.svg","width":380,"height":50,"caption":"Miller Thomson"},"image":{"@id":"https:\/\/www.millerthomson.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/MillerThomsonLaw\/","https:\/\/x.com\/millerthomson","https:\/\/www.linkedin.com\/company\/miller-thomson-llp\/","https:\/\/www.youtube.com\/@millerthomson"]},{"@type":"Person","@id":"https:\/\/www.millerthomson.com\/en\/#\/schema\/person\/5473b50a564d1e37f327fdd79cb348f6","name":"Katherine Chan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.millerthomson.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/da8a18c240b27905220d948a87957ba19ab6de326b44a2ce3072235c121f996f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/da8a18c240b27905220d948a87957ba19ab6de326b44a2ce3072235c121f996f?s=96&d=mm&r=g","caption":"Katherine Chan"}}]}},"_links":{"self":[{"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/posts\/6270","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/comments?post=6270"}],"version-history":[{"count":0,"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/posts\/6270\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/media\/14345"}],"wp:attachment":[{"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/media?parent=6270"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/categories?post=6270"},{"taxonomy":"insight-format","embeddable":true,"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/insight-format?post=6270"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}