Chapman v. Chicago Department of Finance , 2022 IL App (1st) 200547 ( 2022 )


Menu:
  •                                         
    2022 IL App (1st) 200547
    FIRST DISTRICT
    FIRST DIVISION
    February 14, 2022
    No. 1-20-0547
    MATT CHAPMAN,                                    )       Appeal from the
    )       Circuit Court of
    Plaintiff-Appellee,                      )       Cook County
    )
    v.                                               )       No. 18 CH 14043
    )
    THE CHICAGO DEPARTMENT OF                        )       The Honorable
    FINANCE,                                         )       Sanjay T. Tailor,
    )       Judge Presiding.
    Defendant-Appellant.
    JUSTICE COGHLAN delivered the judgment of the court, with opinion.
    Presiding Justice Hyman and Justice Walker concurred in the judgment and opinion.
    OPINION
    ¶1          Following a bench trial, the trial court granted plaintiff Matt Chapman’s Freedom of
    Information Act (FOIA) (5 ILCS 140/1 et seq. (West 2018)) request directed at defendant the
    Chicago Department of Finance (Department), seeking disclosure of an “index of the tables and
    columns within each table” of the Citation Administration and Adjudication System (CANVAS),
    a system used to store, process, and track citation information for parking tickets, speed-light
    camera tickets, stoplight traffic tickets, booting, and towing tickets. On appeal, the Department
    argues that the requested information was exempt from disclosure because it constituted a “file
    layout” and its dissemination “would jeopardize” the security of the CANVAS system and
    database. We affirm.
    ¶2                                     I. BACKGROUND
    ¶3          On August 30, 2018, Chapman submitted the following to the Department:
    “To Whom It May Concern:
    1-20-0547
    Pursuant to the Illinois Freedom of Information Act, I hereby request the
    following records:
    An index of the tables and columns within each table of CANVAS. Please
    include the column data type as well.
    Per the CANVAS specifications, the database in question is Oracle, so the
    below SQL query will likely yield the records pursuant to this request:
    select utc .column_name as colname, uo.object_name as tablename, utc.data_type
    from user_objects uo
    join user_tab_columns utc on uo.object_name = utc.table_name where
    uo.object_type = ‘TABLE’
    The requested documents will be made available to the general public, and
    this request is not being made for commercial purposes.
    ***
    Sincerely,
    Matt Chapman – Free Our Info, NFP”
    On September 12, 2018, the Department notified Chapman of its decision to deny his request,
    stating that the requested records were exempt from disclosure because the “dissemination of [the]
    pieces of network information could jeopardize the security of the systems of the City of Chicago.”
    On September 17, 2018, Chapman disputed the Department’s decision, arguing that “database
    schemas are specifically releasable through FOIA.” 1 On October 2, 2018, after consulting with the
    City of Chicago’s (City) law department, the Department reiterated its decision to deny the FOIA
    request.
    1
    Chapman stated that the released records would be added to Chicago’s public “Data Dictionary”
    (a/k/a “metalicious”) and “will be used for further research of parking tickets.”
    -2-
    1-20-0547
    ¶4          On November 1, 2018, Chapman filed a complaint, asserting a “willful violation of the
    Freedom of Information Act, to respond to [his] Freedom of Information Act requests seeking
    records regarding database schema information of CANVAS, a system used to store parking ticket
    information.” The parties filed cross-motions for summary judgment. The Department’s motion
    included the affidavit of Bruce Coffing, chief information security officer with the city’s
    Department of Innovation and Technology (DoIT), attesting that the “[r]elease of the requested
    information, especially in combination with the information already made public about the
    CANVAS system, would jeopardize the security of not only the CANVAS system and database,
    but also the data contained therein.” Chapman’s motion included the affidavit of Thomas Ptacek,
    an information and software security “vulnerability researcher,” attesting that “[w]ith respect to
    the security of a computer application backed by a database, knowledge of the ‘schema’—the
    collection of tables and their constituent columns—would, in a competently built system, be of
    marginal value to the adversary.” Following a hearing, the trial court denied the cross-motions for
    summary judgment, finding a factual issue regarding the meaning of “marginal value” as stated in
    Ptacek’s affidavit. At trial, both Coffing and Ptacek testified.
    ¶5          Coffing has worked in cybersecurity for about 22 years. He testified that the CANVAS
    system stores “sensitive information,” consisting of “first name and last name of the primary
    vehicle owners and the secondary vehicle owner, driver’s license numbers, addresses, whether or
    not there is handicap parking related to that individual, [and] information about who wrote the
    tickets.” Coffing stated that CANVAS is a “competently built system” that was built based on the
    best practices in the industry.
    ¶6          Coffing also testified that he is responsible for protecting the CANVAS system from a
    “cyberattack,” which occurs when an unauthorized user of the CANVAS system “is attempting to
    achieve a goal that is not in alignment for business purposes for that system.” To prevent a
    -3-
    1-20-0547
    cyberattack, “a layer of defense” is employed, consisting of “numerous controls that all build upon
    each other to provide a defense against adversaries.” One layer of defense includes “limiting the
    information that’s known about a system, so that the adversary has less to capture in their efforts
    to perform recognizance about the system.” By restricting the information that is available, an
    attacker would have to be more “noisy,” which alerts defenders that an attack is underway. The
    activity of an “attacker” who has precise information about the target system “may blend in and
    look like normal activity in the system.” Attacks made by people with more knowledge of the
    system are more precise and effective than attacks made by people who are just conducting
    recognizance.
    ¶7          Coffing stated that Chapman requested a “file layout” because “table names and column
    names” are “the information that the database management system uses to create the structure of
    the database” that stores the data. He explained that using file layouts or source listings, “threat
    actor[s] would perform recognizance on a target or a system and *** would use this information
    to more precisely craft their attacks, again to limit the noise that they would make to limit the
    likelihood of them being detected.” He stated that Chapman’s request undermines “the layer
    defense” strategy because, “by addressing the information that’s available on the system,” more
    information is available “for a threat actor to perform recognizance again to more precisely tailor
    their attacks.” Coffing acknowledged that Chapman’s request did not seek any of the actual data
    in the field, such as parking ticket, red light camera, or speed camera data.
    ¶8          Coffing next explained “SQL” or “sequel for short,” which stands for “structured query
    language” and “is the language that a database management system uses.” A SQL injection is a
    type of cybersecurity attack. “A threat actor would attempt to use sequel to create a sequel
    statement, which is an instruction, and it would attempt to inject that into an existing interface that
    is expecting *** a field that says ‘last name’ ” and then “force the system to do something that it
    -4-
    1-20-0547
    was not intended to do” but “something that the threat actor wants the system to do.” “[I]f you
    have more information about the database, the table names, the column names, you know where
    to look for what you are going after” and “you can precisely write your attack, your SQL Injection,
    when you are entering into that field.” Regarding the CANVAS system specifically, a SQL
    injection is a threat because it “could allow a threat actor to gain access to the data in the system
    *** to exfiltrate data to find out information about *** our constituents to use for whatever
    purposes they have.” Information in the system could also be modified, such as changing a ticket
    from not paid to paid, or from $500 to $1. A threat actor “could do something to delete or otherwise
    modify the data to make it unusable for the system and, therefore, impairing the City’s ability to
    manage citations.”
    ¶9            Coffing also explained that “Zero-day” is another type of an attack and refers “to those
    vulnerabilities that aren’t known except to the attacker *** so, therefore, the defenders don’t have
    the opportunity to defend against them.” He opined that “by making public more information about
    a system, it gives a threat actor more at their disposal to attempt to attack.”
    ¶ 10          On cross-examination, Coffing agreed that the FOIA request was “for the listing of tables
    in the CANVAS database, what the fields are in those tables, and a general description of the type
    of data in each field.” He explained that “if you precisely know what that field name is, then you
    can more precisely craft your attack and you are not going to make noise you are going to go
    undetected or less detected than if you don’t have that information.” Without the information, an
    attacker would have “to make some guesses” and “those inaccurate guesses are going to generate
    errors, they are going to generate logs,” which “are the things that defenders look for to try to
    determine whether or not there is a threat actor in the environment.” Coffing stated that “[o]ne of
    the things that helps us defend that system is not making this information available.” He did not
    “want to make it easier for the bad guys and bad gals out there to attack our system and *** put
    -5-
    1-20-0547
    our constituents’ private data at risk.” According to Coffing, someone who knows any of the field
    names within CANVAS with the proper training could attempt to change data in the system or do
    any of the other attacks that he described.
    ¶ 11          Ptacek testified that he has worked in the information and software security field for 25
    years. As a “vulnerability researcher,” he looks for and helps fix identified vulnerabilities in
    systems. In other words, he “hacks systems for a living.” Ptacek has never worked with the
    CANVAS system, but his general statements “apply to virtually any application built on these
    types of technologies.”
    ¶ 12          Ptacek interpreted the FOIA request as seeking “the schema of the database that backs the
    CANVAS application, the tables and the columns of those tables.” He defined the “schema” as “a
    term of art *** use[d] to describe all of the fields and the database that sit behind these
    applications.” Ptacek would not describe the “schema” as the blueprint of the database or a file
    layout, explaining that the schema “is simply the names of the spread sheets and the column
    matters *** there is a lot more information that would go into the configuration of the database,
    and how that database was used than simply the column headers and the names of those tables.”
    ¶ 13          Ptacek stated that the “system that could be attacked solely with the schema would by
    definition be incompetently built” and potential attackers would not be successful in breaching the
    security of the system because they had the schema. He explained some of the ways that the
    security of a system could be jeopardized. For example, an attacker could perform a SQL injection
    “if [he] knew the specific information about the configuration of the system itself, what operating
    system it was running on, [and] the version of the orbital database that it was using.” As to the
    CANVAS system, he “could enter a citation number, like a ticket number, and get all of the
    information about that ticket.” If an “application was susceptible or vulnerable to a SQL Injection
    attack, instead of entering simply the citation number for that ticket, [he] would enter a number
    -6-
    1-20-0547
    and then in sequel language for every other record in the database.” “If the application was
    vulnerable then it would honor the additional instructions that [he] gave it and would return not
    just the ticket information but also all other data in the database.” The best practices to defend
    against a SQL injection in the citation field “would be to not allow anything but a number in that
    field.”
    ¶ 14             Ptacek also explained that the schema would be “one of the first things you would get from
    an attack, the product of an attack and not a predicate of an attack.” Ptacek stated that in his
    “professional experience doing this for 25 years I’ve never asked for a database schema before I
    start an attack” and “can’t imagine a situation where having the schema would determine whether
    or not I would bother or take the time to attack the system.”
    ¶ 15             Ptacek testified that a vulnerability in the database must exist to break into it. A publicly
    available schema “is not considered a vulnerability in the system.” Knowledge of the schema in
    conjunction with publicly available information “would not make it easier to attack the system.”
    In fact, federal database schemas are publicly available on data.gov. He explained that, “[i]f the
    schema for an application was unexpectedly disclosed, it would not be normal partial best practices
    to purport a vulnerability or an incident in that system simply as a result of the schema being
    disclosed.”
    ¶ 16             As to the phrase “marginal value to the adversary” used in his affidavit, Ptacek elaborated
    that, “based on [his] 25 years of experience doing precisely this kind of work, [he] could not think
    of a thing [he] would do with that information that would allow [him] to in any way more
    effectively attack or compromise the system or do so more precisely or quietly.” But he explained
    that having the schema has some value in helping plan an attack because, for example, it “would
    help isolate the systems that would contain Social Security information so I wouldn’t have to take
    the time to attack lots of other applications.”
    -7-
    1-20-0547
    ¶ 17           Regarding “noise,” Ptacek stated that “it is the source code that would allow you to not
    make noise as an attacker,” not the schema. With the source code, an attacker “would be
    substantially less noisy, but not with the schema, it wouldn’t help.” “The source code is valuable
    and the schema I would say as an attacker is not valuable.” Ptacek testified that he “cannot think
    of a way which publicly disclosing the schema would jeopardize the security of that system.”
    ¶ 18           On January 9, 2020, the trial court entered judgment for Chapman and ordered the
    Department “to produce the requested records by Feb. 10, 2020.” At the Department’s request,
    “the production of all requested records [was] stayed pending the outcome of appeal.”
    ¶ 19                                            II. ANALYSIS
    ¶ 20           In construing the FOIA and the applicability of any exemption, we are guided by familiar
    statutory interpretation principles. “The primary objective in statutory construction is to ascertain
    and give effect to the intent of the legislature.” Haage v. Zavala, 
    2021 IL 125918
    , ¶ 44. “The most
    reliable indicator of legislative intent is the language of the statute, given its plain and ordinary
    meaning.” In re Appointment of Special Prosecutor, 
    2019 IL 122949
    , ¶ 23. “Each word, clause,
    and sentence of a statute must be given a reasonable meaning, if possible, and should not be
    rendered superfluous.” Haage, 
    2021 IL 125918
    , ¶ 44. A “court may consider the reason for the
    law, the problems sought to be remedied, the purposes to be achieved [citations], and the
    consequences of construing the statute one way or another [citations].” 
    Id.
    ¶ 21           In section 1 of the FOIA, the Illinois legislature expressed its intent in enacting the statute,
    stating that it is “the public policy of the State of Illinois that access by all persons to public records
    promotes the transparency and accountability of public bodies at all levels of government” and it
    “is a fundamental obligation of government to operate openly and provide public records as
    expediently and efficiently as possible in compliance with this Act.” 5 ILCS 140/1 (West 2018).
    To achieve the legislature’s intent, the FOIA “is to be liberally construed to achieve the goal of
    -8-
    1-20-0547
    providing the public with easy access to government information,” and “exceptions to disclosure
    are to be construed narrowly so as not to defeat the intended statutory purpose.” In re Appointment
    of Special Prosecutor, 
    2019 IL 122949
    , ¶ 25. “Thus, when a public body receives a proper request
    for information, it must comply with that request unless one of FOIA’s narrow statutory
    exemptions applies.” 
    Id.
    ¶ 22          The Department claims that “section 7(1)(o) expressly exempts the records Chapman
    requested.” Section 7(1)(o) exempts from disclosure:
    “(o) Administrative or technical information associated with automated data
    processing operations, including but not limited to software, operating protocols, computer
    program abstracts, file layouts, source listings, object modules, load modules, user guides,
    documentation pertaining to all logical and physical design of computerized systems,
    employee manuals, and any other information that, if disclosed, would jeopardize the
    security of the system or its data or the security of materials exempt under this Section.” 5
    ILCS 140/7(1)(o) (West 2018).
    “Any public body that asserts that a record is exempt from disclosure has the burden of proving
    by clear and convincing evidence that it is exempt.” 
    Id.
     § 1.2. Whether an exemption applies under
    the FOIA is a question of statutory construction, which we review de novo. Chicago Public Media
    v. Cook County Office of the President, 
    2021 IL App (1st) 200888
    , ¶ 22; Turner v. Joliet Police
    Department, 
    2019 IL App (3d) 170819
    , ¶ 20.
    ¶ 23          The Department interprets section 7(1)(o) as providing a per se exemption from disclosure
    for “file layouts,” which it claims was the information that Chapman requested. The Department
    argues that the phrase “would jeopardize the security of the system or its data or the security of
    materials exempt under this Section” modifies only the catchall phrase “any other information”
    and not “file layouts” based on an application of the last antecedent canon of statutory
    -9-
    1-20-0547
    interpretation.
    ¶ 24          “The last antecedent doctrine, a long-recognized grammatical canon of statutory
    construction, provides that relative or qualifying words, phrases, or clauses are applied to the words
    or phrases immediately preceding them and are not construed as extending to or including other
    words, phrases, or clauses more remote, unless the intent of the legislature, as disclosed by the
    context and reading of the entire statute, requires such an extension or inclusion.” In re E.B., 
    231 Ill. 2d 459
    , 467 (2008). Canons of statutory construction only apply if the language of the statute
    is ambiguous. See Palm v. Holocker, 
    2018 IL 123152
    , ¶ 21; Salier v. Delta Real Estate
    Investments, LLC, 
    2020 IL App (1st) 181512
    , ¶ 36 (“Where the text of a statute is clear and
    unambiguous, *** we need not resort to canons of statutory construction ***.”). But, here, the
    Department contends the opposite. The Department argues that “the plain language of section
    7(1)(o) is a clear indication of the General Assembly’s intent to expressly exempt file layouts from
    FOIA’s disclosure requirements without proof that disclosing such information ‘would jeopardize
    the security of the system.’ ” (Emphasis added.) Thus, the Department, as confirmed during oral
    arguments, does not contend that the statute is ambiguous. For that reason, we need not resort to
    the last antecedent canon of statutory construction to interpret section 7(1)(o) as urged by the
    Department.
    ¶ 25          In Lieber v. Board of Trustees of Southern Illinois University, 
    176 Ill. 2d 401
    , 409 (1997),
    a case relied heavily upon by the Department in its brief and during oral arguments, the Illinois
    Supreme Court determined whether information requested from a university was exempt from
    disclosure based on privacy expectations. Lieber, an apartment building owner near the
    university’s campus, requested from the university disclosure of the names and addresses of
    incoming freshman who had contacted the school inquiring about housing. 
    Id. at 403-04
    . The
    university had previously supplied him with the information, but this practice was later changed.
    - 10 -
    1-20-0547
    
    Id. at 405
    . Lieber filed a FOIA request for the information, which the university denied. 
    Id.
     at 405-
    06. Lieber then sought judicial review of the denial. 
    Id. at 406
    . In response, the university asserted
    that the requested information was exempt from disclosure under section 7(1)(b) of FOIA. 
    Id.
    ¶ 26          Section 7(1)(b) of the version of FOIA in effect at the time of Lieber exempted
    “(b) Information that, if disclosed, would constitute a clearly unwarranted invasion
    of personal privacy, unless the disclosure is consented to in writing by the individual
    subjects of the information. *** Information exempted under this subsection (b) shall
    include but is not limited to:
    (i) files and personal information maintained with respect to ***
    students[.]” 5 ILCS 140/7(1)(b) (West 1994).
    In interpreting that section, the appellate court applied a balancing test, considering “an
    individualized assessment of whether disclosure of the information would invade anyone’s
    personal privacy.” Lieber, 
    176 Ill. 2d at 409
    . Based on the statute’s “clear and unambiguous
    language,” the supreme court determined that a per se approach was better suited than the case-
    by-case balancing approach. 
    Id.
     The court explained that the “per se rule applies to the specific
    exemptions set forth in the subsections of section 7(1)(b) of the Act (5 ILCS 140/7(1)(b) (West
    1994)), which pertains to ‘[i]nformation that, if disclosed, would constitute a clearly unwarranted
    invasion of personal privacy,’ just as it does to the other exemptions in section 7.” 
    Id. at 408
    .
    Ultimately, the court concluded that the names and addresses of accepted individuals, but who
    were not “students” because they had not yet enrolled in the university, were not exempt from
    public disclosure. 
    Id. at 411, 414
    .
    ¶ 27          After oral argument was held in this case, our supreme court decided Mancini Law Group,
    P.C. v. Schaumburg Police Department, 
    2021 IL 126675
    , which we allowed the Department to
    cite as additional authority. We disagree with the Department’s argument that Mancini “adopted
    - 11 -
    1-20-0547
    as part of its holding Lieber’s construction of the section 7 exemptions to require a ‘per se’
    approach.” Because the public body in Mancini Law Group, as here, relied on Lieber, the court
    provided “a detailed discussion of Lieber,” reciting the case’s facts and holding. Id. ¶¶ 23-34. In
    any event, Mancini Law Group is not dispositive.
    ¶ 28           In Mancini Law Group, the plaintiff sent a commercial FOIA request to the police
    department, seeking disclosure of traffic accident reports for all motor vehicle accidents that
    occurred within the village for a specified period of time. Id. ¶ 3. The police department provided
    redacted accident reports, asserting that the redacted information, including home addresses, was
    “private information” exempt from disclosure under section 7(1)(b) of FOIA. Id. Mancini Law
    Group filed suit, alleging that the police department “had willfully and intentionally violated FOIA
    by refusing to produce unredacted accident reports.” Id. ¶ 4. The supreme court recognized that,
    since Lieber, the legislature amended the statute by adding “the exemption for private
    information,” which the court explained, “indicates that the legislature decided to break with
    Lieber on this basis” (holding that names and addresses were subject to disclosure) “and afford
    protection to a broader category of information that was not previously deemed to be exempt.” Id.
    ¶ 36. The court, though, considered Lieber not for its exemption analysis but on a separate waiver
    issue. Id.
    ¶ 29          In Lieber, the case analyzed a different exemption under a prior version of the statute. In
    addition, the plain and ordinary language of the exemption in Lieber is markedly different from
    section 7(1)(o). Significantly, the relevant statutory language in Lieber stated that the
    “[i]nformation exempted under this subsection (b) shall include” and then enumerated five
    different categories of information. (Emphases added.) 5 ILCS 140/7(1)(b) (West 1994); see
    Gibson v. Illinois State Board of Education, 
    289 Ill. App. 3d 12
    , 18 (1997) (“The exemptions of
    section 7 are clearly written and explicitly state that information contained in any of the subsections
    - 12 -
    1-20-0547
    of section 7(1)(b) is exempt.”). Because the legislature did not include the directive “shall include”
    language in section 7(1)(o), the Department’s reliance on the per se approach enunciated in Lieber
    as to section 7(1)(b) is misplaced.
    ¶ 30         Likewise, Mancini Law Group does not compel a finding that the requested “schema” was
    a protected record falling within an exemption. Mancini Law Group recognized that subsequent
    amendments to the FOIA since Lieber demonstrated the legislature’s intent to provide broader
    protection from disclosure of “private information,” noting that “the legislature later clarified that
    home addresses are exempt information.” Mancini Law Group, 
    2021 IL 126675
    , ¶¶ 36-37. As this
    court has recognized, “Lieber involved statutory language that is no longer in effect; it was decided
    in an era when privacy expectations were different.” Timpone v. Illinois Student Assistance
    Comm’n, 
    2019 IL App (1st) 181115
    , ¶ 35. Here, no such privacy concerns are implicated because,
    as the parties’ experts acknowledged, Chapman did not request any of the actual data in the fields.
    ¶ 31         In this case, the relevant exemption pertains to “administrative or technical information
    associated with automated data processing operations.” We are mindful that section 7(1) explicitly
    sets forth categories of public records that are exempt from disclosure. Lieber, 
    176 Ill. 2d at 409
    .
    In other words, if the requested information falls within the enumerated categories provided in
    section 7(1)(a) through (jj), then it “shall be exempt from inspection and copying.” 5 ILCS
    140/7(1) (West 2018). But where, as in section 7(1)(o), additional requirements are expressly
    provided, those requirements must be satisfied before the requested information may be classified
    as “exempt from inspection and copying.” See Mancini Law Group, 
    2021 IL 126675
    , ¶ 16
    (reiterating that public records are “ ‘presumed to be open and accessible’ ” (quoting Illinois
    Education Ass’n v. Illinois State Board of Education, 
    204 Ill. 2d 456
    , 462 (2003))). Therefore, the
    phrase “if disclosed, would jeopardize the security of the system or its data or the security of
    - 13 -
    1-20-0547
    materials exempt under this Section” imposes an additional requirement (“would jeopardize”) that
    must be demonstrated before a public body may exempt information from disclosure.
    ¶ 32         We find that, under the plain and ordinary language of section 7(1)(o), the reasonable
    meaning of “if disclosed, would jeopardize” must apply to every item listed, not only to the catchall
    phrase of “and any other information” as urged by the Department. See DG Enterprises, LLC-Will
    Tax, LLC v. Cornelius, 
    2015 IL 118975
    , ¶ 31 (“generally the use of a conjunctive such as ‘and’
    indicates that the legislature intended that all of the listed requirements be met” (emphasis in
    original)); People v. Lattimore, 
    2011 IL App (1st) 093238
    , ¶ 105 (a list of statutes following the
    conjunction “or” that was preceded with a comma modified only the type of adjudication following
    the “or” rather than all of the adjudications). Under the Department’s proposed per se
    interpretation, the items separately listed in section 7(1)(o), which include user guides and
    employee manuals, would never be disclosed to the public. A blanket prohibition against
    disclosure of the items separately listed in section 7(1)(o) runs contrary to the principle that
    exceptions are to be read narrowly and would frustrate the legislature’s goal in enacting the FOIA
    of providing “the public with easy access to government information.” In re Appointment of
    Special Prosecutor, 
    2019 IL 122949
    , ¶ 25; see Lucy Parsons Labs v. City of Chicago Mayor’s
    Office, 
    2021 IL App (1st) 192073
    , ¶ 18 (all doubts should be resolved “in favor of disclosure in
    light of the public policy underlying” the FOIA); see also 5 ILCS 140/2(c) (West 2018) (public
    records subject to disclosure include “electronic data processing records”); Hites v. Waubonsee
    Community College, 
    2016 IL App (2d) 150836
    , ¶ 68 (“Illinois courts permit disclosure of
    electronic records under FOIA”).
    ¶ 33         Because we find that the phrase “if disclosed, would jeopardize” applies to every item
    enumerated in section 7(1)(o), we need not determine whether the information Chapman requested
    was a “file layout” or falls within the catchall of “any other information,” as both are subject to
    - 14 -
    1-20-0547
    the “would jeopardize” requirement. See Hites, 
    2016 IL App (2d) 150836
    , ¶ 71 (adopting the
    following analogy of a database to a file cabinet: “[T]he database is akin to a file cabinet, and the
    data that populates the database is like the files. FOIA permits a proper request for a single file,
    some of the files, or all of the files.”).
    ¶ 34           The Department next argues that it was only required to establish by clear and convincing
    evidence the possibility that disclosure of the requested information could cause harm. 2 We
    disagree.
    ¶ 35           This court’s decision in Chicago Sun-Times v. Chicago Transit Authority, 
    2021 IL App (1st) 192028
    , ¶ 39, is instructive regarding the meaning of “could” and “would” in the context of
    an exemption to the disclosure of information under the FOIA. In that case, the Sun-Times sought
    disclosure under the FOIA of surveillance video of the Chicago Transit Authority’s (CTA) subway
    platform that showed one customer pushing another customer off the platform. Id. ¶ 1. The CTA
    asserted that the “security measures” exemption of section 7(1)(v) of the FOIA applied, which
    exempts “ ‘security measures *** that are designed to identify, prevent, or respond to potential
    attacks upon a community’s population or systems, facilities, or installations, the destruction or
    contamination of which would constitute a clear and present danger to the health or safety of the
    community, but only to the extent that disclosure could reasonably be expected to jeopardize the
    effectiveness of the measures.’ ” (Emphasis added.) Id. ¶ 7 (quoting 5 ILCS 140/7(1)(v) (West
    2016)). The CTA argued that public disclosure of the requested information “could jeopardize the
    2
    Chapman argues that the Department forfeited this claim because it failed to raise this theory in
    response to his motion for summary judgment and only argued it on “the eve of trial.” Although the trial
    court noted that “this defense theory, which is being advanced today for the first time, which is that a ‘file
    layout’ or ‘source listing’ is exempt without regard to *** whether disclosure would jeopardize security of
    the system,” the trial court, nonetheless, ruled “as a matter of law that that theory is at odds with the plain
    language of the statute.” Therefore, the issue has not been forfeited because it was ruled upon by the trial
    court. See Village of Palatine v. Palatine Associates, LLC, 
    2012 IL App (1st) 102707
    , ¶ 64 (issues raised
    for the first time on appeal are waived).
    - 15 -
    1-20-0547
    effectiveness of its security cameras.” 
    Id.
     Interpreting the language of section 7(1)(v), this court
    concluded that the statute did “not require an agency to prove, by clear and convincing evidence,
    that releasing a particular record would in fact diminish the effectiveness of its security measures”;
    rather, “the agency must meet the lesser burden to show that it could reasonably be expected that
    the release of the record could jeopardize the effectiveness of the agency’s security measures.”
    (Emphases added.) Id. ¶ 44. This court explained that the “General Assembly knew the difference
    between the use of the term could instead of would; it had used the word ‘would’ in other FOIA
    exemptions.” (Emphases in original.) Id. ¶ 43.
    ¶ 36          In this case, unlike in Chicago Sun-Times, the legislature used the word “would” and not
    “could.” Based on Chicago Sun-Times, the Department bears the burden of satisfying the higher
    standard that disclosure of the schema “would” jeopardize the security of the CANVAS system.
    In other words, the Department must demonstrate by clear and convincing evidence more than the
    possibility of a threat to the security of the CANVAS system.
    ¶ 37          Under the “clear and convincing evidence” standard, the proof offered by the plaintiff
    “must ‘leave[ ] no reasonable doubt in the mind of the trier of fact as to the truth of the proposition
    in question.’ ” Metropolitan Capital Bank & Trust v. Feiner, 
    2020 IL App (1st) 190895
    , ¶ 39
    (quoting Parsons v. Winter, 
    142 Ill. App. 3d 354
    , 359 (1986)). We will not reverse the trial court’s
    finding of “clear and convincing evidence” unless it is against the manifest weight of the evidence.
    See Indeck Energy Services, Inc. v. DePodesta, 
    2021 IL 125733
    , ¶ 56 (trial court’s factual findings
    will not be reversed unless the findings are against the manifest weight of the evidence); In re
    Commitment of Tunget, 
    2018 IL App (1st) 162555
    , ¶ 35 (a “clear and convincing evidence” finding
    warrants reversal if that determination was against the manifest weight of the evidence). A trial
    court’s finding “is against the manifest weight of the evidence only if an opposite conclusion is
    clearly evident.” DePodesta, 
    2021 IL 125733
    , ¶ 56.
    - 16 -
    1-20-0547
    ¶ 38            The trial court’s finding that the Department failed to demonstrate by clear and convincing
    evidence that the exemption from disclosure provided in section 7(1)(o) applied to Chapman’s
    FOIA request was not against the manifest weight of the evidence. Ptacek testified that the attack
    of a system would not be facilitated by knowing the schema, the public disclosure of the schema
    was “not considered a vulnerability in the system,” and an attacker knowing the schema would not
    be substantially less “noisy.” Ptacek explained that knowing the source code is valuable to an
    attacker, not the schema. He also explained that an “incompetently built” system “could be
    attacked solely with the schema,” but Coffing affirmed that the CANVAS system was competently
    built.
    ¶ 39            With respect to Coffing’s testimony, the trial court found that he “summarily testified that
    if a threat actor knows the name of a field he can more precisely plan and execute an attack without
    making noise and thereby avoid detection.” The trial court also found that “he really didn’t go into
    it more beyond that, as far as explaining how that would work, at least not in a way that the Court
    found persuasive.” Instead, the trial court found “persuasive Mr. Ptacek’s argument that the
    schema is the product of the attack not the predicate of the attack.”
    ¶ 40            Under the FOIA, the Department, not Chapman, had “the burden of proving by clear and
    convincing evidence” that section 7(1)(o) applied to exempt the requested information. 5 ILCS
    140/1.2 (West 2018). Although Coffing described the approaches and methods that could
    hypothetically be employed to plan and initiate an attack of the CANVAS system’s security, the
    trial court’s finding that he failed to testify persuasively that disclosure of the schema “would
    jeopardize the security of the system or its data” was not “unreasonable, arbitrary, or not based on
    the evidence presented” (Best v. Best, 
    223 Ill. 2d 342
    , 350 (2006)). Construing the exemption
    narrowly, as we must, and given the high burden imposed on the Department to prove that section
    7(1)(o) applied by clear and convincing evidence, we agree with the trial court that the information
    - 17 -
    1-20-0547
    requested by Chapman was subject to disclosure under the facts of this case. See In re Appointment
    of Special Prosecutor, 
    2019 IL 122949
    , ¶ 25. Therefore, the Department must comply with
    Chapman’s FOIA request and disclose “an index of the tables and columns within each table of
    CANVAS.” Disclosure of that information is consistent with the purpose of the FOIA and the
    presumption that public records are open and accessible to any person. 
    Id.
     Because we find in favor
    of Chapman, we need not consider his claim that the requested records were also accessible under
    section 5 of the FOIA (5 ILCS 140/5 (West 2018)), titled “List of records available from public
    body.”
    ¶ 41                                      III. CONCLUSION
    ¶ 42            The Department must provide the information Chapman requested because the information
    was not exempt from disclosure under section 7(1)(o) of the FOIA.
    ¶ 43            Affirmed.
    - 18 -
    1-20-0547
    No. 1-20-0547
    Cite as:                 Chapman v. Chicago Department of Finance, 
    2022 IL App (1st) 200547
    Decision Under Review:   Appeal from the Circuit Court of Cook County, No. 18-CH-
    14043; the Hon. Sanjay T. Tailor, Judge, presiding.
    Attorneys                Celia Meza, Acting Corporation Counsel, of Chicago (Benna
    for                      Ruth Solomon, Myriam Zreczny Kasper, and Elizabeth Mary
    Appellant:               Tisher, Assistant Corporation Counsel, of counsel), for
    appellant.
    Attorneys                Joshua Burday, Matthew Topic, and Merrick Wayne, of Loevy
    for                      & Loevy, of Chicago, for appellee.
    Appellee:
    - 19 -