Chapman v. Chicago Department of Finance

Appellate Court of Illinois
Chapman v. Chicago Department of Finance, 2022 IL App (1st) 200547 (2022)

Chapman v. Chicago Department of Finance

Opinion

2022 IL App (1st) 200547

FIRST DISTRICT FIRST DIVISION February 14, 2022

No. 1-20-0547

MATT CHAPMAN, ) Appeal from the ) Circuit Court of Plaintiff-Appellee, ) Cook County ) v. ) No. 18 CH 14043 ) THE CHICAGO DEPARTMENT OF ) The Honorable FINANCE, ) Sanjay T. Tailor, ) Judge Presiding. Defendant-Appellant.

JUSTICE COGHLAN delivered the judgment of the court, with opinion. Presiding Justice Hyman and Justice Walker concurred in the judgment and opinion.

OPINION

¶1 Following a bench trial, the trial court granted plaintiff Matt Chapman’s Freedom of

Information Act (FOIA) (5 ILCS 140/1 et seq. (West 2018)) request directed at defendant the

Chicago Department of Finance (Department), seeking disclosure of an “index of the tables and

columns within each table” of the Citation Administration and Adjudication System (CANVAS),

a system used to store, process, and track citation information for parking tickets, speed-light

camera tickets, stoplight traffic tickets, booting, and towing tickets. On appeal, the Department

argues that the requested information was exempt from disclosure because it constituted a “file

layout” and its dissemination “would jeopardize” the security of the CANVAS system and

database. We affirm.

¶2 I. BACKGROUND

¶3 On August 30, 2018, Chapman submitted the following to the Department:

“To Whom It May Concern: 1-20-0547

Pursuant to the Illinois Freedom of Information Act, I hereby request the

following records:

An index of the tables and columns within each table of CANVAS. Please

include the column data type as well.

Per the CANVAS specifications, the database in question is Oracle, so the

below SQL query will likely yield the records pursuant to this request:

select utc .column_name as colname, uo.object_name as tablename, utc.data_type

from user_objects uo

join user_tab_columns utc on uo.object_name = utc.table_name where

uo.object_type = ‘TABLE’

The requested documents will be made available to the general public, and

this request is not being made for commercial purposes.

***

Sincerely,

Matt Chapman – Free Our Info, NFP”

On September 12, 2018, the Department notified Chapman of its decision to deny his request,

stating that the requested records were exempt from disclosure because the “dissemination of [the]

pieces of network information could jeopardize the security of the systems of the City of Chicago.”

On September 17, 2018, Chapman disputed the Department’s decision, arguing that “database

schemas are specifically releasable through FOIA.” 1 On October 2, 2018, after consulting with the

City of Chicago’s (City) law department, the Department reiterated its decision to deny the FOIA

request.

1 Chapman stated that the released records would be added to Chicago’s public “Data Dictionary” (a/k/a “metalicious”) and “will be used for further research of parking tickets.”

-2- 1-20-0547

¶4 On November 1, 2018, Chapman filed a complaint, asserting a “willful violation of the

Freedom of Information Act, to respond to [his] Freedom of Information Act requests seeking

records regarding database schema information of CANVAS, a system used to store parking ticket

information.” The parties filed cross-motions for summary judgment. The Department’s motion

included the affidavit of Bruce Coffing, chief information security officer with the city’s

Department of Innovation and Technology (DoIT), attesting that the “[r]elease of the requested

information, especially in combination with the information already made public about the

CANVAS system, would jeopardize the security of not only the CANVAS system and database,

but also the data contained therein.” Chapman’s motion included the affidavit of Thomas Ptacek,

an information and software security “vulnerability researcher,” attesting that “[w]ith respect to

the security of a computer application backed by a database, knowledge of the ‘schema’—the

collection of tables and their constituent columns—would, in a competently built system, be of

marginal value to the adversary.” Following a hearing, the trial court denied the cross-motions for

summary judgment, finding a factual issue regarding the meaning of “marginal value” as stated in

Ptacek’s affidavit. At trial, both Coffing and Ptacek testified.

¶5 Coffing has worked in cybersecurity for about 22 years. He testified that the CANVAS

system stores “sensitive information,” consisting of “first name and last name of the primary

vehicle owners and the secondary vehicle owner, driver’s license numbers, addresses, whether or

not there is handicap parking related to that individual, [and] information about who wrote the

tickets.” Coffing stated that CANVAS is a “competently built system” that was built based on the

best practices in the industry.

¶6 Coffing also testified that he is responsible for protecting the CANVAS system from a

“cyberattack,” which occurs when an unauthorized user of the CANVAS system “is attempting to

achieve a goal that is not in alignment for business purposes for that system.” To prevent a

-3- 1-20-0547

cyberattack, “a layer of defense” is employed, consisting of “numerous controls that all build upon

each other to provide a defense against adversaries.” One layer of defense includes “limiting the

information that’s known about a system, so that the adversary has less to capture in their efforts

to perform recognizance about the system.” By restricting the information that is available, an

attacker would have to be more “noisy,” which alerts defenders that an attack is underway. The

activity of an “attacker” who has precise information about the target system “may blend in and

look like normal activity in the system.” Attacks made by people with more knowledge of the

system are more precise and effective than attacks made by people who are just conducting

recognizance.

¶7 Coffing stated that Chapman requested a “file layout” because “table names and column

names” are “the information that the database management system uses to create the structure of

the database” that stores the data. He explained that using file layouts or source listings, “threat

actor[s] would perform recognizance on a target or a system and *** would use this information

to more precisely craft their attacks, again to limit the noise that they would make to limit the

likelihood of them being detected.” He stated that Chapman’s request undermines “the layer

defense” strategy because, “by addressing the information that’s available on the system,” more

information is available “for a threat actor to perform recognizance again to more precisely tailor

their attacks.” Coffing acknowledged that Chapman’s request did not seek any of the actual data

in the field, such as parking ticket, red light camera, or speed camera data.

¶8 Coffing next explained “SQL” or “sequel for short,” which stands for “structured query

language” and “is the language that a database management system uses.” A SQL injection is a

type of cybersecurity attack. “A threat actor would attempt to use sequel to create a sequel

statement, which is an instruction, and it would attempt to inject that into an existing interface that

is expecting *** a field that says ‘last name’ ” and then “force the system to do something that it

-4- 1-20-0547

was not intended to do” but “something that the threat actor wants the system to do.” “[I]f you

have more information about the database, the table names, the column names, you know where

to look for what you are going after” and “you can precisely write your attack, your SQL Injection,

when you are entering into that field.” Regarding the CANVAS system specifically, a SQL

injection is a threat because it “could allow a threat actor to gain access to the data in the system

*** to exfiltrate data to find out information about *** our constituents to use for whatever

purposes they have.” Information in the system could also be modified, such as changing a ticket

from not paid to paid, or from $500 to $1. A threat actor “could do something to delete or otherwise

modify the data to make it unusable for the system and, therefore, impairing the City’s ability to

manage citations.”

¶9 Coffing also explained that “Zero-day” is another type of an attack and refers “to those

vulnerabilities that aren’t known except to the attacker *** so, therefore, the defenders don’t have

the opportunity to defend against them.” He opined that “by making public more information about

a system, it gives a threat actor more at their disposal to attempt to attack.”

¶ 10 On cross-examination, Coffing agreed that the FOIA request was “for the listing of tables

in the CANVAS database, what the fields are in those tables, and a general description of the type

of data in each field.” He explained that “if you precisely know what that field name is, then you

can more precisely craft your attack and you are not going to make noise you are going to go

undetected or less detected than if you don’t have that information.” Without the information, an

attacker would have “to make some guesses” and “those inaccurate guesses are going to generate

errors, they are going to generate logs,” which “are the things that defenders look for to try to

determine whether or not there is a threat actor in the environment.” Coffing stated that “[o]ne of

the things that helps us defend that system is not making this information available.” He did not

“want to make it easier for the bad guys and bad gals out there to attack our system and *** put

-5- 1-20-0547

our constituents’ private data at risk.” According to Coffing, someone who knows any of the field

names within CANVAS with the proper training could attempt to change data in the system or do

any of the other attacks that he described.

¶ 11 Ptacek testified that he has worked in the information and software security field for 25

years. As a “vulnerability researcher,” he looks for and helps fix identified vulnerabilities in

systems. In other words, he “hacks systems for a living.” Ptacek has never worked with the

CANVAS system, but his general statements “apply to virtually any application built on these

types of technologies.”

¶ 12 Ptacek interpreted the FOIA request as seeking “the schema of the database that backs the

CANVAS application, the tables and the columns of those tables.” He defined the “schema” as “a

term of art *** use[d] to describe all of the fields and the database that sit behind these

applications.” Ptacek would not describe the “schema” as the blueprint of the database or a file

layout, explaining that the schema “is simply the names of the spread sheets and the column

matters *** there is a lot more information that would go into the configuration of the database,

and how that database was used than simply the column headers and the names of those tables.”

¶ 13 Ptacek stated that the “system that could be attacked solely with the schema would by

definition be incompetently built” and potential attackers would not be successful in breaching the

security of the system because they had the schema. He explained some of the ways that the

security of a system could be jeopardized. For example, an attacker could perform a SQL injection

“if [he] knew the specific information about the configuration of the system itself, what operating

system it was running on, [and] the version of the orbital database that it was using.” As to the

CANVAS system, he “could enter a citation number, like a ticket number, and get all of the

information about that ticket.” If an “application was susceptible or vulnerable to a SQL Injection

attack, instead of entering simply the citation number for that ticket, [he] would enter a number

-6- 1-20-0547

and then in sequel language for every other record in the database.” “If the application was

vulnerable then it would honor the additional instructions that [he] gave it and would return not

just the ticket information but also all other data in the database.” The best practices to defend

against a SQL injection in the citation field “would be to not allow anything but a number in that

field.”

¶ 14 Ptacek also explained that the schema would be “one of the first things you would get from

an attack, the product of an attack and not a predicate of an attack.” Ptacek stated that in his

“professional experience doing this for 25 years I’ve never asked for a database schema before I

start an attack” and “can’t imagine a situation where having the schema would determine whether

or not I would bother or take the time to attack the system.”

¶ 15 Ptacek testified that a vulnerability in the database must exist to break into it. A publicly

available schema “is not considered a vulnerability in the system.” Knowledge of the schema in

conjunction with publicly available information “would not make it easier to attack the system.”

In fact, federal database schemas are publicly available on data.gov. He explained that, “[i]f the

schema for an application was unexpectedly disclosed, it would not be normal partial best practices

to purport a vulnerability or an incident in that system simply as a result of the schema being

disclosed.”

¶ 16 As to the phrase “marginal value to the adversary” used in his affidavit, Ptacek elaborated

that, “based on [his] 25 years of experience doing precisely this kind of work, [he] could not think

of a thing [he] would do with that information that would allow [him] to in any way more

effectively attack or compromise the system or do so more precisely or quietly.” But he explained

that having the schema has some value in helping plan an attack because, for example, it “would

help isolate the systems that would contain Social Security information so I wouldn’t have to take

the time to attack lots of other applications.”

-7- 1-20-0547

¶ 17 Regarding “noise,” Ptacek stated that “it is the source code that would allow you to not

make noise as an attacker,” not the schema. With the source code, an attacker “would be

substantially less noisy, but not with the schema, it wouldn’t help.” “The source code is valuable

and the schema I would say as an attacker is not valuable.” Ptacek testified that he “cannot think

of a way which publicly disclosing the schema would jeopardize the security of that system.”

¶ 18 On January 9, 2020, the trial court entered judgment for Chapman and ordered the

Department “to produce the requested records by Feb. 10, 2020.” At the Department’s request,

“the production of all requested records [was] stayed pending the outcome of appeal.”

¶ 19 II. ANALYSIS

¶ 20 In construing the FOIA and the applicability of any exemption, we are guided by familiar

statutory interpretation principles. “The primary objective in statutory construction is to ascertain

and give effect to the intent of the legislature.” Haage v. Zavala,

2021 IL 125918, ¶ 44

. “The most

reliable indicator of legislative intent is the language of the statute, given its plain and ordinary

meaning.” In re Appointment of Special Prosecutor,

2019 IL 122949, ¶ 23

. “Each word, clause,

and sentence of a statute must be given a reasonable meaning, if possible, and should not be

rendered superfluous.” Haage,

2021 IL 125918, ¶ 44

. A “court may consider the reason for the

law, the problems sought to be remedied, the purposes to be achieved [citations], and the

consequences of construing the statute one way or another [citations].”

Id.

¶ 21 In section 1 of the FOIA, the Illinois legislature expressed its intent in enacting the statute,

stating that it is “the public policy of the State of Illinois that access by all persons to public records

promotes the transparency and accountability of public bodies at all levels of government” and it

“is a fundamental obligation of government to operate openly and provide public records as

expediently and efficiently as possible in compliance with this Act.” 5 ILCS 140/1 (West 2018).

To achieve the legislature’s intent, the FOIA “is to be liberally construed to achieve the goal of

-8- 1-20-0547

providing the public with easy access to government information,” and “exceptions to disclosure

are to be construed narrowly so as not to defeat the intended statutory purpose.” In re Appointment

of Special Prosecutor,

2019 IL 122949, ¶ 25

. “Thus, when a public body receives a proper request

for information, it must comply with that request unless one of FOIA’s narrow statutory

exemptions applies.”

Id.

¶ 22 The Department claims that “section 7(1)(o) expressly exempts the records Chapman

requested.” Section 7(1)(o) exempts from disclosure:

“(o) Administrative or technical information associated with automated data

processing operations, including but not limited to software, operating protocols, computer

program abstracts, file layouts, source listings, object modules, load modules, user guides,

documentation pertaining to all logical and physical design of computerized systems,

employee manuals, and any other information that, if disclosed, would jeopardize the

security of the system or its data or the security of materials exempt under this Section.” 5

ILCS 140/7(1)(o) (West 2018).

“Any public body that asserts that a record is exempt from disclosure has the burden of proving

by clear and convincing evidence that it is exempt.”

Id.

§ 1.2. Whether an exemption applies under

the FOIA is a question of statutory construction, which we review de novo. Chicago Public Media

v. Cook County Office of the President,

2021 IL App (1st) 200888, ¶ 22

; Turner v. Joliet Police

Department,

2019 IL App (3d) 170819, ¶ 20

.

¶ 23 The Department interprets section 7(1)(o) as providing a per se exemption from disclosure

for “file layouts,” which it claims was the information that Chapman requested. The Department

argues that the phrase “would jeopardize the security of the system or its data or the security of

materials exempt under this Section” modifies only the catchall phrase “any other information”

and not “file layouts” based on an application of the last antecedent canon of statutory

-9- 1-20-0547

interpretation.

¶ 24 “The last antecedent doctrine, a long-recognized grammatical canon of statutory

construction, provides that relative or qualifying words, phrases, or clauses are applied to the words

or phrases immediately preceding them and are not construed as extending to or including other

words, phrases, or clauses more remote, unless the intent of the legislature, as disclosed by the

context and reading of the entire statute, requires such an extension or inclusion.” In re E.B.,

231 Ill. 2d 459, 467

(2008). Canons of statutory construction only apply if the language of the statute

is ambiguous. See Palm v. Holocker,

2018 IL 123152, ¶ 21

; Salier v. Delta Real Estate

Investments, LLC,

2020 IL App (1st) 181512, ¶ 36

(“Where the text of a statute is clear and

unambiguous, *** we need not resort to canons of statutory construction ***.”). But, here, the

Department contends the opposite. The Department argues that “the plain language of section

7(1)(o) is a clear indication of the General Assembly’s intent to expressly exempt file layouts from

FOIA’s disclosure requirements without proof that disclosing such information ‘would jeopardize

the security of the system.’ ” (Emphasis added.) Thus, the Department, as confirmed during oral

arguments, does not contend that the statute is ambiguous. For that reason, we need not resort to

the last antecedent canon of statutory construction to interpret section 7(1)(o) as urged by the

Department.

¶ 25 In Lieber v. Board of Trustees of Southern Illinois University,

176 Ill. 2d 401, 409

(1997),

a case relied heavily upon by the Department in its brief and during oral arguments, the Illinois

Supreme Court determined whether information requested from a university was exempt from

disclosure based on privacy expectations. Lieber, an apartment building owner near the

university’s campus, requested from the university disclosure of the names and addresses of

incoming freshman who had contacted the school inquiring about housing.

Id. at 403-04

. The

university had previously supplied him with the information, but this practice was later changed.

- 10 - 1-20-0547

Id. at 405

. Lieber filed a FOIA request for the information, which the university denied.

Id.

at 405-

06. Lieber then sought judicial review of the denial.

Id. at 406

. In response, the university asserted

that the requested information was exempt from disclosure under section 7(1)(b) of FOIA.

Id.

¶ 26 Section 7(1)(b) of the version of FOIA in effect at the time of Lieber exempted

“(b) Information that, if disclosed, would constitute a clearly unwarranted invasion

of personal privacy, unless the disclosure is consented to in writing by the individual

subjects of the information. *** Information exempted under this subsection (b) shall

include but is not limited to:

(i) files and personal information maintained with respect to ***

students[.]” 5 ILCS 140/7(1)(b) (West 1994).

In interpreting that section, the appellate court applied a balancing test, considering “an

individualized assessment of whether disclosure of the information would invade anyone’s

personal privacy.” Lieber,

176 Ill. 2d at 409

. Based on the statute’s “clear and unambiguous

language,” the supreme court determined that a per se approach was better suited than the case-

by-case balancing approach.

Id.

The court explained that the “per se rule applies to the specific

exemptions set forth in the subsections of section 7(1)(b) of the Act (5 ILCS 140/7(1)(b) (West

1994)), which pertains to ‘[i]nformation that, if disclosed, would constitute a clearly unwarranted

invasion of personal privacy,’ just as it does to the other exemptions in section 7.”

Id. at 408

.

Ultimately, the court concluded that the names and addresses of accepted individuals, but who

were not “students” because they had not yet enrolled in the university, were not exempt from

public disclosure.

Id. at 411, 414

.

¶ 27 After oral argument was held in this case, our supreme court decided Mancini Law Group,

P.C. v. Schaumburg Police Department,

2021 IL 126675

, which we allowed the Department to

cite as additional authority. We disagree with the Department’s argument that Mancini “adopted

- 11 - 1-20-0547

as part of its holding Lieber’s construction of the section 7 exemptions to require a ‘per se’

approach.” Because the public body in Mancini Law Group, as here, relied on Lieber, the court

provided “a detailed discussion of Lieber,” reciting the case’s facts and holding. Id. ¶¶ 23-34. In

any event, Mancini Law Group is not dispositive.

¶ 28 In Mancini Law Group, the plaintiff sent a commercial FOIA request to the police

department, seeking disclosure of traffic accident reports for all motor vehicle accidents that

occurred within the village for a specified period of time. Id. ¶ 3. The police department provided

redacted accident reports, asserting that the redacted information, including home addresses, was

“private information” exempt from disclosure under section 7(1)(b) of FOIA. Id. Mancini Law

Group filed suit, alleging that the police department “had willfully and intentionally violated FOIA

by refusing to produce unredacted accident reports.” Id. ¶ 4. The supreme court recognized that,

since Lieber, the legislature amended the statute by adding “the exemption for private

information,” which the court explained, “indicates that the legislature decided to break with

Lieber on this basis” (holding that names and addresses were subject to disclosure) “and afford

protection to a broader category of information that was not previously deemed to be exempt.” Id.

¶ 36. The court, though, considered Lieber not for its exemption analysis but on a separate waiver

issue. Id.

¶ 29 In Lieber, the case analyzed a different exemption under a prior version of the statute. In

addition, the plain and ordinary language of the exemption in Lieber is markedly different from

section 7(1)(o). Significantly, the relevant statutory language in Lieber stated that the

“[i]nformation exempted under this subsection (b) shall include” and then enumerated five

different categories of information. (Emphases added.) 5 ILCS 140/7(1)(b) (West 1994); see

Gibson v. Illinois State Board of Education,

289 Ill. App. 3d 12, 18

(1997) (“The exemptions of

section 7 are clearly written and explicitly state that information contained in any of the subsections

- 12 - 1-20-0547

of section 7(1)(b) is exempt.”). Because the legislature did not include the directive “shall include”

language in section 7(1)(o), the Department’s reliance on the per se approach enunciated in Lieber

as to section 7(1)(b) is misplaced.

¶ 30 Likewise, Mancini Law Group does not compel a finding that the requested “schema” was

a protected record falling within an exemption. Mancini Law Group recognized that subsequent

amendments to the FOIA since Lieber demonstrated the legislature’s intent to provide broader

protection from disclosure of “private information,” noting that “the legislature later clarified that

home addresses are exempt information.” Mancini Law Group,

2021 IL 126675, ¶¶ 36-37

. As this

court has recognized, “Lieber involved statutory language that is no longer in effect; it was decided

in an era when privacy expectations were different.” Timpone v. Illinois Student Assistance

Comm’n,

2019 IL App (1st) 181115, ¶ 35

. Here, no such privacy concerns are implicated because,

as the parties’ experts acknowledged, Chapman did not request any of the actual data in the fields.

¶ 31 In this case, the relevant exemption pertains to “administrative or technical information

associated with automated data processing operations.” We are mindful that section 7(1) explicitly

sets forth categories of public records that are exempt from disclosure. Lieber,

176 Ill. 2d at 409

.

In other words, if the requested information falls within the enumerated categories provided in

section 7(1)(a) through (jj), then it “shall be exempt from inspection and copying.” 5 ILCS

140/7(1) (West 2018). But where, as in section 7(1)(o), additional requirements are expressly

provided, those requirements must be satisfied before the requested information may be classified

as “exempt from inspection and copying.” See Mancini Law Group,

2021 IL 126675, ¶ 16

(reiterating that public records are “ ‘presumed to be open and accessible’ ” (quoting Illinois

Education Ass’n v. Illinois State Board of Education,

204 Ill. 2d 456, 462

(2003))). Therefore, the

phrase “if disclosed, would jeopardize the security of the system or its data or the security of

- 13 - 1-20-0547

materials exempt under this Section” imposes an additional requirement (“would jeopardize”) that

must be demonstrated before a public body may exempt information from disclosure.

¶ 32 We find that, under the plain and ordinary language of section 7(1)(o), the reasonable

meaning of “if disclosed, would jeopardize” must apply to every item listed, not only to the catchall

phrase of “and any other information” as urged by the Department. See DG Enterprises, LLC-Will

Tax, LLC v. Cornelius,

2015 IL 118975, ¶ 31

(“generally the use of a conjunctive such as ‘and’

indicates that the legislature intended that all of the listed requirements be met” (emphasis in

original)); People v. Lattimore,

2011 IL App (1st) 093238, ¶ 105

(a list of statutes following the

conjunction “or” that was preceded with a comma modified only the type of adjudication following

the “or” rather than all of the adjudications). Under the Department’s proposed per se

interpretation, the items separately listed in section 7(1)(o), which include user guides and

employee manuals, would never be disclosed to the public. A blanket prohibition against

disclosure of the items separately listed in section 7(1)(o) runs contrary to the principle that

exceptions are to be read narrowly and would frustrate the legislature’s goal in enacting the FOIA

of providing “the public with easy access to government information.” In re Appointment of

Special Prosecutor,

2019 IL 122949, ¶ 25

; see Lucy Parsons Labs v. City of Chicago Mayor’s

Office,

2021 IL App (1st) 192073, ¶ 18

(all doubts should be resolved “in favor of disclosure in

light of the public policy underlying” the FOIA); see also 5 ILCS 140/2(c) (West 2018) (public

records subject to disclosure include “electronic data processing records”); Hites v. Waubonsee

Community College,

2016 IL App (2d) 150836, ¶ 68

(“Illinois courts permit disclosure of

electronic records under FOIA”).

¶ 33 Because we find that the phrase “if disclosed, would jeopardize” applies to every item

enumerated in section 7(1)(o), we need not determine whether the information Chapman requested

was a “file layout” or falls within the catchall of “any other information,” as both are subject to

- 14 - 1-20-0547

the “would jeopardize” requirement. See Hites,

2016 IL App (2d) 150836, ¶ 71

(adopting the

following analogy of a database to a file cabinet: “[T]he database is akin to a file cabinet, and the

data that populates the database is like the files. FOIA permits a proper request for a single file,

some of the files, or all of the files.”).

¶ 34 The Department next argues that it was only required to establish by clear and convincing

evidence the possibility that disclosure of the requested information could cause harm. 2 We

disagree.

¶ 35 This court’s decision in Chicago Sun-Times v. Chicago Transit Authority,

2021 IL App (1st) 192028, ¶ 39

, is instructive regarding the meaning of “could” and “would” in the context of

an exemption to the disclosure of information under the FOIA. In that case, the Sun-Times sought

disclosure under the FOIA of surveillance video of the Chicago Transit Authority’s (CTA) subway

platform that showed one customer pushing another customer off the platform. Id. ¶ 1. The CTA

asserted that the “security measures” exemption of section 7(1)(v) of the FOIA applied, which

exempts “ ‘security measures *** that are designed to identify, prevent, or respond to potential

attacks upon a community’s population or systems, facilities, or installations, the destruction or

contamination of which would constitute a clear and present danger to the health or safety of the

community, but only to the extent that disclosure could reasonably be expected to jeopardize the

effectiveness of the measures.’ ” (Emphasis added.) Id. ¶ 7 (quoting 5 ILCS 140/7(1)(v) (West

2016)). The CTA argued that public disclosure of the requested information “could jeopardize the

2 Chapman argues that the Department forfeited this claim because it failed to raise this theory in response to his motion for summary judgment and only argued it on “the eve of trial.” Although the trial court noted that “this defense theory, which is being advanced today for the first time, which is that a ‘file layout’ or ‘source listing’ is exempt without regard to *** whether disclosure would jeopardize security of the system,” the trial court, nonetheless, ruled “as a matter of law that that theory is at odds with the plain language of the statute.” Therefore, the issue has not been forfeited because it was ruled upon by the trial court. See Village of Palatine v. Palatine Associates, LLC,

2012 IL App (1st) 102707, ¶ 64

(issues raised for the first time on appeal are waived).

- 15 - 1-20-0547

effectiveness of its security cameras.”

Id.

Interpreting the language of section 7(1)(v), this court

concluded that the statute did “not require an agency to prove, by clear and convincing evidence,

that releasing a particular record would in fact diminish the effectiveness of its security measures”;

rather, “the agency must meet the lesser burden to show that it could reasonably be expected that

the release of the record could jeopardize the effectiveness of the agency’s security measures.”

(Emphases added.) Id. ¶ 44. This court explained that the “General Assembly knew the difference

between the use of the term could instead of would; it had used the word ‘would’ in other FOIA

exemptions.” (Emphases in original.) Id. ¶ 43.

¶ 36 In this case, unlike in Chicago Sun-Times, the legislature used the word “would” and not

“could.” Based on Chicago Sun-Times, the Department bears the burden of satisfying the higher

standard that disclosure of the schema “would” jeopardize the security of the CANVAS system.

In other words, the Department must demonstrate by clear and convincing evidence more than the

possibility of a threat to the security of the CANVAS system.

¶ 37 Under the “clear and convincing evidence” standard, the proof offered by the plaintiff

“must ‘leave[ ] no reasonable doubt in the mind of the trier of fact as to the truth of the proposition

in question.’ ” Metropolitan Capital Bank & Trust v. Feiner,

2020 IL App (1st) 190895, ¶ 39

(quoting Parsons v. Winter,

142 Ill. App. 3d 354, 359

(1986)). We will not reverse the trial court’s

finding of “clear and convincing evidence” unless it is against the manifest weight of the evidence.

See Indeck Energy Services, Inc. v. DePodesta,

2021 IL 125733, ¶ 56

(trial court’s factual findings

will not be reversed unless the findings are against the manifest weight of the evidence); In re

Commitment of Tunget,

2018 IL App (1st) 162555, ¶ 35

(a “clear and convincing evidence” finding

warrants reversal if that determination was against the manifest weight of the evidence). A trial

court’s finding “is against the manifest weight of the evidence only if an opposite conclusion is

clearly evident.” DePodesta,

2021 IL 125733, ¶ 56

.

- 16 - 1-20-0547

¶ 38 The trial court’s finding that the Department failed to demonstrate by clear and convincing

evidence that the exemption from disclosure provided in section 7(1)(o) applied to Chapman’s

FOIA request was not against the manifest weight of the evidence. Ptacek testified that the attack

of a system would not be facilitated by knowing the schema, the public disclosure of the schema

was “not considered a vulnerability in the system,” and an attacker knowing the schema would not

be substantially less “noisy.” Ptacek explained that knowing the source code is valuable to an

attacker, not the schema. He also explained that an “incompetently built” system “could be

attacked solely with the schema,” but Coffing affirmed that the CANVAS system was competently

built.

¶ 39 With respect to Coffing’s testimony, the trial court found that he “summarily testified that

if a threat actor knows the name of a field he can more precisely plan and execute an attack without

making noise and thereby avoid detection.” The trial court also found that “he really didn’t go into

it more beyond that, as far as explaining how that would work, at least not in a way that the Court

found persuasive.” Instead, the trial court found “persuasive Mr. Ptacek’s argument that the

schema is the product of the attack not the predicate of the attack.”

¶ 40 Under the FOIA, the Department, not Chapman, had “the burden of proving by clear and

convincing evidence” that section 7(1)(o) applied to exempt the requested information. 5 ILCS

140/1.2 (West 2018). Although Coffing described the approaches and methods that could

hypothetically be employed to plan and initiate an attack of the CANVAS system’s security, the

trial court’s finding that he failed to testify persuasively that disclosure of the schema “would

jeopardize the security of the system or its data” was not “unreasonable, arbitrary, or not based on

the evidence presented” (Best v. Best,

223 Ill. 2d 342, 350

(2006)). Construing the exemption

narrowly, as we must, and given the high burden imposed on the Department to prove that section

7(1)(o) applied by clear and convincing evidence, we agree with the trial court that the information

- 17 - 1-20-0547

requested by Chapman was subject to disclosure under the facts of this case. See In re Appointment

of Special Prosecutor,

2019 IL 122949, ¶ 25

. Therefore, the Department must comply with

Chapman’s FOIA request and disclose “an index of the tables and columns within each table of

CANVAS.” Disclosure of that information is consistent with the purpose of the FOIA and the

presumption that public records are open and accessible to any person.

Id.

Because we find in favor

of Chapman, we need not consider his claim that the requested records were also accessible under

section 5 of the FOIA (5 ILCS 140/5 (West 2018)), titled “List of records available from public

body.”

¶ 41 III. CONCLUSION

¶ 42 The Department must provide the information Chapman requested because the information

was not exempt from disclosure under section 7(1)(o) of the FOIA.

¶ 43 Affirmed.

- 18 - 1-20-0547

No. 1-20-0547

Cite as: Chapman v. Chicago Department of Finance,

2022 IL App (1st) 200547

Decision Under Review: Appeal from the Circuit Court of Cook County, No. 18-CH- 14043; the Hon. Sanjay T. Tailor, Judge, presiding.

Attorneys Celia Meza, Acting Corporation Counsel, of Chicago (Benna for Ruth Solomon, Myriam Zreczny Kasper, and Elizabeth Mary Appellant: Tisher, Assistant Corporation Counsel, of counsel), for appellant.

Attorneys Joshua Burday, Matthew Topic, and Merrick Wayne, of Loevy for & Loevy, of Chicago, for appellee. Appellee:

- 19 -

Reference

Cited By
1 case
Status
Published