[Cite as Gannett GP Media, Inc. v. Ohio Dept. of Pub. Safety, 2017-Ohio-4247.]
GANNETT GP MEDIA, INC., Case No. 2017-00051-PQ
D/B/A, THE CINCINNATI ENQUIRER
Special Master Jeffery W. Clark
Requester
REPORT AND RECOMMENDATION
v.
OHIO DEPARTMENT OF PUBLIC
SAFETY
Respondent
{¶1} Ohio is a party state to the interstate Emergency Management Assistance
Compact (EMAC). R.C. 5502.40. The EMAC facilitates mutual assistance between
compact states to manage any emergency or disaster that is duly declared by the
governor of an affected state. The authorized representative of a party state requests
assistance by contacting the authorized representative of another party state. Requests
must provide the following information:
(i) A description of the emergency service function for which assistance is
needed, such as but not limited to * * *, law enforcement, * * *.
(ii) The amount and type of personnel, equipment, materials and supplies
needed, and a reasonable estimate of the length of time they will be needed.
(iii) The specific place and time for staging of the assisting party's response and a
point of contact at that location.
Id. Article III(B). R.C. 5502.40 contains no language prohibiting disclosure of any
assistance records. EMAC requests, agreements, and billing are made using
standardized forms, including the multi-section “REQ-A” request form. A sample blank
REQ-A form (Excel file, sections separated into 8 sheets) can be viewed at:
http://www.floridadisaster.org/Response/Operations/EMAC/documents/EMAC%20REQ-
A%20Form%2012-2011.xlsx. See also http://www.emacweb.org/ for EMAC overview,
processes, and forms (both pages accessed April 13, 2017.)
Case No. 2017-00051-PQ -2- REPORT AND RECOMMENDATION
{¶2} In the fall of 2016, the North Dakota Emergency Management Agency
requested, and the Ohio State Highway Patrol (OSHP) agreed to provide, assistance in
responding to protests over the Dakota Access Pipeline (DAPL) under construction near
the Sioux Tribe Native American Reservation. Ex. A, ¶ 7-9. This agreement was
memorialized by the parties through completion of an EMAC REQ-A form.
{¶3} The Ohio State Highway Patrol is a division of respondent Ohio Department
of Public Safety (DPS). On November 3, 2016, an employee of requester
Gannett GP Media d/b/a The Cincinnati Enquirer (GP Media), made a public records
request to DPS for the following:
1. A list of the names and ranks of the 37 Ohio troopers sent to North Dakota via an
agreement with the Emergency Managemet [sic] Assistance Compact (EMAC).
2. Any and all communication issued or received by any employee of the Ohio State
Highway Patrol, regarding the deployment of these officers.
3. Any document that outlines the agreement between the EMAC and the OSHP
regarding the action of sending the 37 troopers.
4. Any OSHP bylaws or procedures which govern agreements with EMAC.
{¶4} On November 23, 2016, P.R. Casey, IV, Associate Legal Counsel and
Public Records Manager for DPS, responded to each numbered request as
summarized below:
1. Records withheld based on the Security Records exception, R.C. 149.433(A)(1)
& (2)(a), and the Fourteenth Amendment protected privacy interest in officers’
personal security and bodily integrity,
2. Request denied as overly broad, but DPS encloses 39 pages of responsive
records from a previous, more specific request, subject to redactions under
R.C. 149.433(A)(1) & (2)(a),
3. Records withheld on the same basis as request #1,
4. DPS has no public records responsive to this request.
{¶5} On November 29, 2016, John Greiner, legal counsel for GP Media, sent a
letter disputing Casey’s November 23, 2016 responses as to requests numbered 1, 2,
and 3. On December 2, 2016, Casey replied to Greiner’s concerns, and added to his
previous response to Request No. 2 the following:
Case No. 2017-00051-PQ -3- REPORT AND RECOMMENDATION
“DPS does not keep its email records organized in such a manner as to allow for
a successful search based on the overly broad terms provided. Fulfillment of
your request would require our office to scrutinize and analyze every email for
any records containing information responsive to your request. * * * Please be
aware however, my offer from the November 23 letter to work with your client to
narrow the terms of the overly broad search, remains unchanged.”
In a letter dated December 22, 2016, Greiner responded to the December 2, 2016
letter, disputing in further detail the grounds given by DPS for its denials. On
January 11, 2017, Casey responded by affirming his previous responses, and
reiterating that, “I remain ready and willing to work with you or your client to discuss
ways to find actual records. Again, please feel free to contact me at your earliest
convenience to discuss request #2 in more detail.”
{¶6} On January 17, 2017, GP Media filed a complaint under R.C. 2743.75
alleging denial of access to public records in violation of R.C. 149.43(B). GP Media
attached copies of the original records request, and the above-referenced
correspondence with DPS. On February 14, 2017, mediation was conducted with a
representative of GP Media and representatives of DPS. On February 17, 2017, the
court was notified that the case was not resolved and that mediation was terminated.
On March 6, 2017, DPS filed its response pursuant to R.C. 2743.75(E)(2). DPS
attached the affidavits of OSHP Lieutenant Colonel Kevin Teaford; North Dakota (N.D.)
Criminal Intelligence Analyst Cody Larson; Bismarck, North Dakota Police Department
Lieutenant Jason Stugelmeyer; and a printout of a PowerPoint presentation used by
Larson to document and train on the practice of online “doxing.” On March 8, 2017, the
court ordered DPS to submit, under seal, an unredacted copy of the withheld records,
which DPS states are all contained in the REQ-A completed by North Dakota and Ohio,
and invited an affidavit explaining DPS application of a claimed exception to each part
of the withheld records.
{¶7} R.C.149.43(C) provides that a person allegedly aggrieved by a violation of
division (B) of that section may either commence a mandamus action, or file a complaint
Case No. 2017-00051-PQ -4- REPORT AND RECOMMENDATION
under R.C. 2743.75. In mandamus actions alleging violations of R.C. 149.43(B), a
relator must establish by “clear and convincing evidence” that they are entitled to relief.
State ex rel. Miller v. Ohio State Hwy. Patrol, 136 Ohio St.3d 350, 2013-Ohio-3720,
¶ 14. As for actions under R.C. 2743.75 alleging violations of R.C. 149.43(B), neither
party has suggested that another standard should apply, nor is another standard
prescribed by statute. R.C. 2743.75(F)(1) states that such claims are to be determined
through “the ordinary application of statutory law and case law * * *.” Accordingly, the
merits of this claim shall be determined under a standard of clear and convincing
evidence, i.e., “that measure or degree of proof which is more than a mere
‘preponderance of the evidence,’ but not to the extent of such certainty as is required
‘beyond a reasonable doubt’ in criminal cases, and which will produce in the mind of the
trier of facts a firm belief or conviction as to the facts sought to be established.” Cross v.
Ledford, 161 Ohio St. 469 (1954), paragraph three of the syllabus.
{¶8} For the reasons stated below, the special master concludes that the request
for all communication to or from all OSHP employees regarding the 2016 deployment
was properly denied as ambiguous and overly broad, but that DPS improperly denied
GP Media’s requests for the names of Troopers and documents outlining the assistance
agreement when it withheld responsive records in their entirety, instead of redacting
only items within the records that were exempt from disclosure.
Request No. 2: All Communication by Any OSHP Employee Regarding
Deployment
{¶9} To demonstrate a denial of access to public records in violation of
R.C. 149.43(B), an allegedly aggrieved person must show that they have made a proper
request for reasonably identified public records. “‘[I]t is the responsibility of the person
who wishes to inspect and/or copy records to identify with reasonable clarity the records
at issue.’ * * * ” State ex rel. Morgan v. New Lexington, 112 Ohio St.3d 33, 2006-Ohio-
6365, ¶ 29. Determination of whether such requests are proper or improper is based on
Case No. 2017-00051-PQ -5- REPORT AND RECOMMENDATION
the facts and circumstances of each case. State ex rel. Zidonis v. Columbus State
Comm. College, 133 Ohio St.3d 122, 2012-Ohio-4228, ¶ 26; State ex rel. O'Shea &
Assocs. Co., L.P.A. v. Cuyahoga Metro. Hous. Auth., 131 Ohio St.3d 149, 2012-Ohio-
115, ¶ 21.
{¶10} An ambiguous request for research rather than specific records
undermines the legitimate interests of both the public office and the requester. A
request to find all communications “regarding” a topic, to or from any employee,
anywhere in the office, requires a needle-in-the-haystack search through the office’s
paper and electronic communications. It also requires judgment calls as to whether any
given communication – whether personal, tenuous, or duplicative – is “regarding” the
topic. If a public office attempts such a universal search, the time involved results in
delay for the requester. Nor can a public office assume that agreeing to “do the best it
can” with an ambiguous or overly broad request, instead of denying it, will shield it from
liability. See State ex rel. Bott Law Group, LLC v. Ohio Dep't of Natural Res., 10th Dist.
Franklin No. 12AP-448, 2013-Ohio-5219. The dilemma for the public office may not be
whether the public office can identify any records responsive to the request, but whether
the terms of the request permit it to reasonably identify all responsive records. Request
No. 2 poses a potentially impossible task to respond fully to its ambiguous and overly
broad terms.
{¶11} Ohio’s public records statutory and case law incentivize requesters and
public offices to cooperate in clarifying ambiguous and overly broad requests, with the
goal of finding the specific records that the requester seeks while minimizing the burden
on the public office. First, R.C. 149.43(B)(2) shields public offices by permitting them to
deny such a request, subject to revision:
(B)(2) * * * If a requester makes an ambiguous or overly broad request or has
difficulty in making a request for copies or inspection of public records under this
section such that the public office or the person responsible for the requested
public record cannot reasonably identify what public records are being requested,
the public office or the person responsible for the requested public record may
Case No. 2017-00051-PQ -6- REPORT AND RECOMMENDATION
deny the request but shall provide the requester with an opportunity to revise the
request by informing the requester of the manner in which records are
maintained by the public office and accessed in the ordinary course of the public
office's or person's duties.
In State ex rel. Shaughnessy v. Cleveland, Slip Opinion No. 2016-Ohio-8447, ¶ 10, the
Supreme Court cited examples of unreasonable requests to conduct research rather
than identifying the records sought:
“The Public Records Act does not compel a public office ‘to do research or to
identify records containing selected information.’ See State ex rel. Fant v. Tober,
8th Dist. Cuyahoga No. 63737, 1993 Ohio App. LEXIS 2591, 1993 WL 173743,
*1 (Apr. 28, 1993), aff'd, 68 Ohio St.3d 117, 1993 Ohio 154, 623 N.E.2d 1202
(1993). See also Morgan, 121 Ohio St.3d 600, 2009-Ohio-1901, 906 N.E.2d
1105, at ¶ 14-15 (request for “[a]ny and all email communications * * * which
reference * * * the ‘evidence-based model’ or education funding in general” was
overbroad) (first ellipsis sic); State ex rel. Thomas v. Ohio State Univ., 71 Ohio
St.3d 245, 246, 1994 Ohio 261, 643 N.E.2d 126 (1994) (noting denial of writ of
mandamus where request for records sought selected information ‘regarding or
related to’ any pro-animal-rights action group or individual), citing Fant.”
The request found improper in Shaughnessy required research through seven days of
police incident reports to identify only those reports containing injuries of interest to the
requester. Id.; accord State ex rel. Daugherty v. Mohr, 10th Dist. Franklin No. 11AP-5,
2011-Ohio-6453, ¶ 32-35 (“all * * * policies, emails, or memos regarding whether prison
officials are authorized to ‘triple cell’ inmates into segregation”); State ex rel. Dillery v.
Icsman, 92 Ohio St.3d 312, 314, 750 N.E.2d 156 (2001) (request for “any and all
records generated * * * containing any reference whatsoever to Kelly Dillery”); State ex
rel. Glasgow v. Jones, 119 Ohio St.3d 391, 2008-Ohio-4788, ¶ 16-19 (request for any
and all email sent or received for six months by one official); Zidonis, supra, ¶¶ 4, 28-32
(request for all email between two employees where the office did not maintain email
records so that they could be retrieved based on sender and recipient status); but see
State ex rel. Carr v. London Corr. Inst., 144 Ohio St.3d 211, 2015-Ohio-2363, ¶ 25-29
(request for email between one person and one department for two months found not
Case No. 2017-00051-PQ -7- REPORT AND RECOMMENDATION
overly broad). A request for communications is also ambiguous or overly broad when it
identifies correspondents only as belonging to titles, groups or categories, for which
research is required to establish a correspondent’s membership. State ex rel. Oriana
House, Inc. v. Montgomery, 10th Dist. Franklin Nos. 04AP-492, 04AP-504, 2005-Ohio-
3377, ¶ 9, overturned on other grounds, 2005-Ohio-6763.
{¶12} GP Media requested “[a]ny and all communication issued or received by
any employee of the Ohio State Highway Patrol, regarding the deployment of these
officers.” This request falls squarely within the above case citations of ambiguous or
overly broad requests. The request is not limited to a mission file, or to communications
during a fixed time with North Dakota authorities. Instead, the request compels DPS to
perform a search through all communications – internal and external, paper and
electronic – “issued or received by any employee of the Ohio State Highway Patrol.”
The request gives no time frame, and does not describe OSHP records as they are
maintained and accessed. The research topic of desired communications is, “regarding
the deployment of these officers,” an ambiguous phrase that could encompass anything
from the deployment agreement (which GP Media did separately and specifically
request) to personal communications with family, press releases, or tangential mention
in remotely related records, with no clear limit. Without revision, the request fails to
enable DPS to identify all potentially responsive records, and only responsive records,
in a search through OSHP’s universe of communications. Oriana House, Id.;
Shaughnessy ¶ 10, citing Thomas. I conclude that Request No. 2 was improperly
ambiguous, overly broad, and requested a search or research rather than reasonably
identifying the records sought.
{¶13} After an office has denied a request that is ambiguous, overly broad, or
otherwise does not reasonably identify the records requested, it is then required to
“provide the requester with an opportunity to revise the request by informing the
requester of the manner in which records are maintained by the public office and
Case No. 2017-00051-PQ -8- REPORT AND RECOMMENDATION
accessed in the ordinary course of the public office’s or person’s duties.” R.C.
149.43(B)(2). The statute does not require the office to provide a comprehensive
records maintenance tutorial, or to rewrite the requester’s request for them, but the
office should convey some relevant information to support revision of the request.
Options include, but are not limited to, offering to discuss revision with the requester,
Morgan v. Strickland, supra, ¶ 14-20; Zidonis ¶ 40; Bott, supra, ¶ 52, a written
explanation of how records are maintained and accessed, and providing the requester
with a copy of the office’s records retention schedule. Zidonis ¶ 33-41. A requester’s
demonstrated ability to craft proper requests in the past, or the requester’s preexisting
knowledge of the responding office’s records practices, can show that the requester
already possesses information necessary to revise and narrow a request. Id. A public
office’s voluntary effort to provide some responsive records, notwithstanding denial of
the request, is considered favorably in evaluating its response to an ambiguous or
overly broad request. Id.; Morgan v. Strickland, ¶¶ 6, 14.
{¶14} After DPS exercised its right to deny Request No. 2 as ambiguous and
overly broad, it invited GP Media to revise the request, and repeatedly offered to
discuss the request to help GP Media clarify the records sought. DPS advised that it
did not have the capability to search department email using the terms given in Request
No. 2. (Casey letter of December 2, 2016.) DPS voluntarily provided GP Media with 39
pages of records previously produced to a different requester in response to a narrower
request. (Compl. Attachments, pp. 5-43.) DPS’s quotation of this narrower request
provided an example to GP Media of reasonable identification of email records, and the
court takes notice that requester was assisted in correspondence by experienced public
records legal counsel. I conclude that DPS sufficiently met its obligation to provide
GP Media with the opportunity and information to revise this request.
{¶15} GP Media has failed to show by clear and convincing evidence that
Request No. 2 was a proper request that reasonably identified the records sought. I
Case No. 2017-00051-PQ -9- REPORT AND RECOMMENDATION
therefore recommend that GP Media’s claim of denial of access with respect to Request
No. 2 be DENIED. The parties retain the ability to continue negotiating their respective
interests in obtaining and providing any records that GP Media seeks. In their
correspondence, DPS offered to discuss narrowing the request and ways to find actual
records. GP Media responded that it welcomed the opportunity to discuss the matter in
more detail. Such discussions are favored by the courts, and could profitably include
DPS referring GP Media to online records retention schedules relevant to the request,
and GP Media narrowing the request with this and other information provided through
discussion,1 Nat'l Fedn. of the Blind of Ohio v. Ohio Rehab. Servs. Comm'n, 10th Dist.
Franklin No. 09AP-1177, 2010-Ohio-3384, ¶ 39. The parties are encouraged to
cooperate going forward to achieve a mutually acceptable resolution of their interests.
Exceptions Asserted By DPS
{¶16} In asserting exceptions to an otherwise proper public records request, a
public office bears the burden of proof:
Exceptions to disclosure under the Public Records Act, R.C. 149.43, are strictly
construed against the public-records custodian, and the custodian has the
burden to establish the applicability of an exception. * * * A custodian does not
meet this burden if it has not proven that the requested records fall squarely
within the exception.
State ex rel. Cincinnati Enquirer v. Jones-Kelley, 118 Ohio St.3d 81, 2008-Ohio-1770,
886 N.E.2d 206, ¶ 10. “If a public record contains information that is exempt from the
duty to permit public inspection or to copy the public record, the public office or the
person responsible for the public record shall make available all of the information within
the public record that is not exempt.” R.C. 149.43(B)(1); State ex rel. Rocker v.
Guernsey Cty. Sheriff’s Office, 126 Ohio St.3d 224, 2010-Ohio-3288, ¶ 8-15; State ex
1 DPS did not direct GP Media to relevant record series titles, although OSHP records retention
schedules are available to the public online: http://apps.das.ohio.gov/rims/Search/PublicSearch.asp.
DPS agency code = DHS, and OSHP division code = OSHP. Accessed April 18, 2017.
Case No. 2017-00051-PQ -10- REPORT AND RECOMMENDATION
rel. Cincinnati Enquirer v. Ohio Dept. of Pub. Safety, Slip Opinion No. 2016-Ohio-7987,
¶ 49-50. Where a public office claims an exception based on risks that are not evident
within the records themselves, the office must provide more than conclusory statements
in affidavits to support that claim. State ex rel. Besser v. Ohio State Univ., 89 Ohio
St.3d 396, 400-404, 732 N.E.2d 373 (2000). More than bare allegations in an affidavit
are necessary to meet the government’s burden to show that a record would disclose
information that would endanger the life or physical safety of law enforcement
personnel, crime victims, witnesses or confidential information sources (under
analogous R.C. 149.43(A)(2)(d)). State ex rel. Nelson v. Cleveland P.D., 8th Dist.
Cuyahoga No. 62558, 1992 Ohio App. LEXIS 4134, *5-7; State ex rel. Jenkins v.
Cleveland, 82 Ohio App.3d 770, 785, 613 N.E.2d 652 (8th Dist.1992).
{¶17} DPS does not dispute that Requests Nos. 1 (Trooper names and rank) and
3 (documentation of agreement to deploy) were proper requests for records
documenting official functions of the OSHP. DPS denied these requests by stating that
all responsive records were “security records” excepted from public disclosure. DPS
additionally responded that release of the names/ranks and EMAC Agreement would
violate the Troopers’ 14th Amendment right to privacy. Requests Nos. 1 and 3 will be
analyzed based on each exception asserted. However, the REQ-A submitted under
seal does not contain the rank of any Trooper listed therein and therefore disclosure of
rank will not be included in the analysis of these requests.
Request No. 1: Names of Troopers
Fourteenth Amendment Right to Privacy
{¶18} DPS asserts that the Troopers’ names are excepted from release because
disclosure would violate their constitutional right of privacy under the Fourteenth
Amendment. Upon careful review, the evidence in this case supports the privacy
exception only to the extent of withholding the Troopers’ names during deployment.
The evidence does not justify the continuing use of the exception following the
Troopers’ return to Ohio.
Case No. 2017-00051-PQ -11- REPORT AND RECOMMENDATION
{¶19} Law enforcement officers have a fundamental constitutional interest in
preventing the release of private information when disclosure would create a substantial
risk of serious bodily harm or death from a perceived likely threat. Kallstrom v.
Columbus, 136 F.3d 1055, 1064 (6th Cir.1998) (Kallstrom I). Any such disclosure by
the state should be measured under strict scrutiny. Where state action infringes upon a
fundamental right, such action will be upheld under the substantive due process
component of the Fourteenth Amendment only where the governmental action furthers
a compelling state interest, and is narrowly drawn to further that state interest. Id.; State
ex rel. Enquirer v. Craig, 132 Ohio St.3d 68, 2012-Ohio-1999, ¶ 14. The fact that the
requesting party does not pose a threat is irrelevant to a public office’s allegation that
released information “may fall into the wrong hands.” Id. ¶ 19. Records found to be
protected under the Fourteenth Amendment privacy right are “[r]ecords the release of
which is prohibited by state or federal law,” and therefore excepted from the definition of
“public record” by R.C. 149.43(A)(1)(v). Id. ¶ 13.
{¶20} OSHP Lieutenant Colonel Teaford received pre-deployment reports of
threats to North Dakota and other-state law enforcement personnel assisting with the
DAPL protest response. He related briefing by the OSHP Intelligence Unit of incidents
and threats of assault and vandalism at the North Dakota site against some officers and
equipment. (Ex. A ¶¶ 14-20, 22, 27, 33; see also Ex. B ¶ 3-9 and attached slides.)
While this evidence established that law enforcement officers were exposed to a risk of
physical harm while in contact with protesters, no evidence is presented that a Trooper
was more likely to be physically attacked, or be exposed to greater physical harm,
simply because their name was known to a person facing them at the site. However,
Lieutenant Colonel Teaford further stated that he had been informed that Pipeline
protesters or their supporters engaged in “doxing” some law enforcement officers
serving at the DAPL site. “Doxing” involves posting a known person’s identity and other
personal information online with the intent to intimidate, harass or cause physical or
Case No. 2017-00051-PQ -12- REPORT AND RECOMMENDATION
financial harm to the persons identified, and to their family members. (Response at
pp. 3, 14-15; Ex. A, ¶ 18; Ex. B, ¶ 4, Ex. C ¶ 4-11.) Although much of the text in the
slides attached to Ex. B is difficult to read, it appears that the doxing therein relates
substantially if not entirely to North Dakota law enforcement personnel. (Ex. B, ¶ 4-9
and attached slides; Ex. C,¶¶ 5, 7-9, 11-12.) DPS does not document any incident
where an OSHP Trooper has been doxed, or where other out-of-state law enforcement
personnel have been doxed. However, the reports and briefings received by the OSHP
in advance of deployment supported a reasonable belief that release of Trooper
identities while they were a physical focus of attention for protesters at the DAPL site
posed a substantial risk of retaliatory harassment or serious physical harm to Troopers’
families, through doxing. (Ex. A ¶ 17-18.) The withholding of names in response to
GP Media’s November 3, 2016 request, like the removal of name bars from the
Troopers’ uniforms, (Ex. A ¶ 19.), was designed to reduce that perceived risk.
{¶21} However, once the risk of physical harm or non-physical retaliation has
receded, a public office may be obligated to produce information previously withheld
under the Fourteenth Amendment right of privacy. State ex rel. Quolke v. Strongsville
City School Dist. Bd. of Edn., 142 Ohio St.3d 509, 2015-Ohio-1083, ¶ 25-31. Quolke
upheld a finding that,
“during the strike, the board reasonably concluded that disclosure of the names
and other personal information about the replacement teachers would expose
them to substantial risk of serious harm. However, in general, a court is to
consider the facts and circumstances existing at the time that it makes its
determination on a writ of mandamus, not at some earlier time. State ex rel.
Pressley v. Indus. Comm., 11 Ohio St.2d 141, 162, 228 N.E.2d 631 (1967).”
Id. ¶ 28-29. The Court affirmed that records showing names and identification numbers
of replacement teachers employed during a teachers’ strike were no longer exempt from
disclosure, where there was no evidence that once the strike was over there was any
remaining threat to them. Id. ¶ 25-31. An assertion of ongoing or future risk must be
supported by relevant evidence specific to that time period. “[W]ithout a clear
Case No. 2017-00051-PQ -13- REPORT AND RECOMMENDATION
development of the factual circumstances that would accompany any future release of
personal information * * *, any finding regarding future risk to the personal safety of the
officers and their families would be speculative.” Kallstrom I at 1068. Notably, upon
remand from Kallstrom I the federal district court found that Officer Kallstrom and her
fellow plaintiffs had “failed to provide any potentially admissible evidence to suggest that
the release of any information contained in the three personnel files may place any of
the plaintiffs at any risk of serious bodily harm. Nor have they identified a current
‘perceived likely threat.’” Kallstrom v. Columbus, 165 F.Supp.2d 686, 695 (S.D.Ohio
2001) (Kallstrom II).
{¶22} Only one case cited by DPS upheld withholding the names of law
enforcement officers.2 The other cases cited fail to support the indefinite withholding
of officer personal information based on conclusory assertions of risk. In State
ex rel. Keller v. Cox, 85 Ohio St.3d 279, 707 N.E.2d 931 (1999), a request identified
Detective Paul Reece by name, and sought access to Reece’s personnel and internal
affairs records. Reece’s affidavit stated that the criminal defendant on whose behalf the
request was made, and a person the defendant had contacted, had threatened Reece
and his wife. Although the Supreme Court found that the affidavit could not be
considered for purposes of the dispositive Civ.R. 12(B)(6) motion, it upheld exemption
of Reece’s personnel file based on Kallstrom I, finding that,
“files that contain the names of the officers’ children, spouses, parents, home
addresses, telephone numbers, beneficiaries, medical information, and the like
should not be available to a defendant who might use the information to achieve
nefarious ends.”
Id. p. 282. Keller applied Kallstrom I to withhold family and residence information, but
not Keller’s name. A later federal decision clarified that Kallstrom I “did not create a
2 DPS states that Kallstrom I and Keller both held that “the officer’s name” could be withheld.
(Response pp. 11,13) However, neither case contains such a holding. DPS elsewhere correctly states
that the officer’s identity was already known in Keller (Id. p. 13.), and there is no indication in Kallstrom I
that officers’ names were either withheld, or held by the court to be subject to Fourteenth Amendment
privacy.
Case No. 2017-00051-PQ -14- REPORT AND RECOMMENDATION
broad right protecting plaintiffs’ personal information. Rather, Kallstrom created a
narrowly tailored right, limited to circumstances where the information disclosed was
particularly sensitive and the persons to whom it was disclosed were particularly
dangerous vis-à-vis the plaintiffs.” Barber v. Overton, 496 F.3d 449, 456 (6th Cir. 2007)
(release of correctional officers’ social security numbers and birth dates to an inmate did
not violate the officers’ due process rights).
{¶23} In the one cited case where law enforcement officers’ names were withheld
under the constitutional privacy exemption, the circumstances were exceptional.
Cincinnati police officers had engaged in a gunfight with an outlaw motorcycle gang, in
which the gang’s national “enforcer” was killed, and two officers were wounded. Craig,
132 Ohio St.3d 68, 2012-Ohio-1999, ¶¶ 2-4. The police chief received information that
there was a good possibility the gang would target Cincinnati police in retaliation,
especially those involved in the gunfight, “and that the threat of retaliation for the death
of the national enforcer could last indefinitely.” Id. ¶ 5. The Chief testified that,
“[B]ased on his ‘historic knowledge,’ it is not unusual for an outlaw motorcycle
gang to seek revenge against the police when one of its members is shot and
killed by the police. Both officers who had been wounded had themselves
returned fire, and both were concerned that if the Iron Horsemen discovered their
identities, the gang would retaliate by attacking them or members of their
families.”
Id. In the Chief’s deposition, filed under seal, he provided “confidential information
confirming the existence of threatened retaliation against the wounded officers.” Id.¶ 22.
The Supreme Court held that the identifying information of the wounded police officers
was excepted from disclosure, based on credible evidence of a perceived likely threat
that the motorcycle gang would retaliate against the wounded officers for killing the
gang’s national enforcer. Id. ¶ 20-23. DPS has provided no comparable evidence in this
case of violent incidents involving Troopers from which to anticipate individual
retaliation; no threat of physical harm or doxing of any individual Ohio Trooper before or
since their return; no evidence that earlier, general threats of retaliation could last
Case No. 2017-00051-PQ -15- REPORT AND RECOMMENDATION
indefinitely; and no affidavit from any Trooper in support of nondisclosure of their
identity. State ex rel. Cincinnati Enquirer v. Streicher, 1st Dist. Hamilton No. C-100820,
2011-Ohio-4498, ¶ 28-30; Craig ¶¶ 5, 20.
{¶24} Separate from any alleged future risk of serious bodily harm or death, DPS
asserts that “Troopers also have a right to protect themselves against ‘doxing’ and
perceived threats that are not physical in nature.” (Response p. 14.) DPS cites State
ex rel. Beacon Journal Publishing Co. v. Akron, 70 Ohio St.3d 605, 612, 640 N.E.2d
164, which held only that city employees have a constitutional privacy right against
unchecked release of their Social Security numbers, due to the risk of identity theft.
Notably, other personal information in that case, including “[e]mployees’ addresses,
telephone numbers, salaries, level of education, and birth dates, among other things,
were all provided” without objection from the employees. Id. pp. 605, 610-611. The
Quolke Court considered Beacon Journal v. Akron, and threats of nonphysical harm like
those that DPS asserts on behalf of the Troopers, but did not find them persuasive.
Quolke ¶¶ 26-27, 30. Finally, the federal Sixth Circuit has limited the scope of
informational privacy rights under the Fourteenth Amendment, and determined that a
mere risk that information disclosure could result in identity theft or damage to credit
rating does not implicate a fundamental constitutional interest. “[I]dentity theft
constitutes a serious personal invasion, [but] it simply does not implicate the well-
established right to personal security as contemplated by this court in Kallstrom.”
Lambert v. Hartman, 517 F.3d 433, 444-445 (6th Cir.2008). No Ohio case has created
a general fundamental constitutional interest in the privacy of one’s name. But see
State ex rel. McCleary v. Roberts, 88 Ohio St.3d 365, 372, 725 N.E.2d 1144 (2000)
(database of photographs, names, addresses and other personal information of
uniquely vulnerable juvenile customers found subject to Fourteenth Amendment privacy
right).
Case No. 2017-00051-PQ -16- REPORT AND RECOMMENDATION
{¶25} Ohio does have a robust statutory framework of exceptions for peace
officers’ and their families’ “personal information,” but the names of peace officers are
not protected. To the contrary, the Revised Code expressly requires that every law
enforcement agency, as a public office,
“shall maintain a database or a list that includes the name and date of birth of all
public officials and employees elected to or employed by that public office. The
database or list is a public record and shall be made available upon a request
made pursuant to section 149.43 of the Revised Code.”
R.C. 149.434(A). Statutory provisions for confidentiality of peace officer3 personal
information include: R.C. 4501.271 (upon request, the Bureau of Motor Vehicles shall
not disclose a peace officer’s residence address, or shall provide a business address on
his or her driver’s license, or both); R.C. 149.45(D) (upon request, public offices other
than county auditors must redact the address of the requesting peace officer from any
record it makes available to the general public on the internet); R.C. 319.28(B) (upon
request, the county auditor must remove the name, and replace it with the initials, of a
peace officer from any record made available to the general public on the internet or a
publicly accessible database and the general tax list of real and public utility property
and the general duplicate of real and public utility property, as the name of the person
that appears on the deed); R.C. 2921.24 and 2921.25 (no officer, court or employee of a
law enforcement agency shall disclose, without a determination of good cause, the
home address of a peace officer who is a witness or arresting officer in a pending
criminal case); R.C. 149.43(A)(1)(h) and (A)(2)(d) (exception for records pertaining to a
particular law enforcement matter, the release of which would create a high probability
of endangering the life or physical safety of law enforcement personnel). In addition,
R.C. 149.43(A)(1)(p) and (A)(7) exempt release of a peace officer’s personal residence
address, social security and banking numbers, benefit information, and similar
3Each of the statutes cited in this paragraph uses or creates a definition of “peace officer” that
includes OSHP Troopers.
Case No. 2017-00051-PQ -17- REPORT AND RECOMMENDATION
information regarding the peace officer’s family members, as well as photographs of
peace officers who may engage in undercover assignments. Of these exceptions, only
R.C. 149.43(A)(2)(d) implies authority to withhold a peace officer’s name, under specific
circumstances within a law enforcement investigation. By enumerating public records
exceptions for specific peace officer information, the General Assembly has already
weighed and balanced the competing public policy considerations between the public’s
right to know that information generally, and the potential harm, inconvenience or
burden imposed on the agency by disclosure. State ex rel. James v. Ohio State Univ.,
70 Ohio St.3d 168, 172, 637 NE.2d 911 (1994). Compare State ex rel. Vindicator v.
Wolff, 132 Ohio St.3d 481, 2012-Ohio-3328, ¶ 32-37 (alternative access to the same
records, and other protections for the rights sought to be defended, counter plaintiffs’
demand for restricted access to records under Sup.R. 45(E)). Thus, while officers’
residential and familial records have specific protections, statutory and constitutional law
are far more restrained when it comes to concealing the names of law enforcement
officers.
{¶26} The policy underlying the Public Records Act is that “open government
serves the public interest and our democratic system.” State ex rel. Dann v. Taft, 109
Ohio St.3d 364, 2006-Ohio-1825, 848 N.E.2d 472, ¶ 20. “[O]ne of the salutary purposes
of the Public Records Law is to ensure accountability of government to those being
governed.” State ex rel. Strothers v. Wertheim, 80 Ohio St.3d 155, 158, 684 N.E.2d
1239, 1242 (1997). Therefore, R.C. 149.43 must be construed “liberally in favor of
broad access, and any doubt is resolved in favor of disclosure of public records.” State
ex rel. Cincinnati Enquirer v. Hamilton Cty., 75 Ohio St.3d 374, 376, 662 N.E.2d 334
(1996). Exceptions to disclosure must be strictly construed. State ex rel. Thomas v.
Ohio State Univ., 71 Ohio St.3d 245, 247, 643 N.E.2d 126 (1994). This applies to any
exception, including the constitutional right to personal security and bodily integrity.
Social workers, patrol officers, strikebreaking employees, judicial officers, prosecutors,
Case No. 2017-00051-PQ -18- REPORT AND RECOMMENDATION
health and zoning inspectors, politicians, corrections officers, and scores of other public
employees can be subject to harassment and threats of serious physical harm in the
course of their duties, yet their names are available to the public. As the federal district
court concluded in releasing information regarding the Kallstrom officers: “The Court
appreciates the need to protect the health and safety of law enforcement officials and
their families. But the health and safety of this democracy depend on a press that can
function without additional burdens being imposed based on its ability to publish
information concerning government activities.” Kallstrom v. Columbus, 165 F. Supp. 2d
686, 703 (S.D. Ohio 2001).
{¶27} The risk that was perceived during deployment has now receded. DPS
presents no evidence of retaliatory pursuit of the Troopers or their families. At the
present remove in time and distance from the North Dakota protesters, DPS has not
provided the required “clear development of the factual circumstances that would
accompany any future release” of the Troopers’ names. Kallstrom I, p. 1068. The bare
allegations of continuing physical risk in the response and in Exhibits A-C are
speculative and non-specific. An attenuated and receding risk of online harassment is
not the kind of threat that justifies indefinitely concealing the names of law enforcement
officers who exercised plenary police power during a public, uniformed mission. Even
under strict scrutiny, the evidence does not support a finding that disclosure of the
Trooper names would pose a current substantial risk of serious bodily harm or death to
the Troopers or their families from any perceived likely threat, and DPS has therefore
failed to prove that the Fourteenth Amendment right of privacy applies to the names of
the Troopers at the present time.4
4 Even had the requisite level of future threat been shown, release would still satisfy the
remainder of the constitutional balancing test. The courts assume that the interests served by allowing
public access to public records rise to the level of a compelling state interest, Kallstrom I. at 1065; State
ex rel. Cincinnati Enquirer v. Streicher, 1st Dist. Hamilton No. C-100820, 2011-Ohio-4498, ¶ 31. And the
request for names and the agreement was narrowly drawn to serve the interest of public access, as it
requested none of the residence or family information found problematic in Kallstrom I. Unlike the
Case No. 2017-00051-PQ -19- REPORT AND RECOMMENDATION
Request No. 1: Names of Troopers
Records Directly Used to Protect Against Attack, R.C. 149.433(A)(1)
{¶28} DPS separately asserts that the Troopers’ names are excepted from
release pursuant to R.C. 149.433(A)(1) and (B)(1):
(A) As used in this section: * * * ‘Security record’ means any of the following:
(1) A record that contains information directly used for protecting or maintaining
the security of a public office against attack, interference, or sabotage.
(B)(1) A record kept by a public office that is a security record is not a public
record under section 149.43 of the Revised Code and is not subject to mandatory
release or disclosure under that section.
“Public office” as used in the statute includes officials and employees. State ex rel.
Plunderbund Media, L.L.C., v. Born, 141 Ohio St.3d 422, 2014-Ohio-3679, ¶ 20.
{¶29} As detailed in the Fourteenth Amendment analysis, DPS provides no
evidence that the Troopers were any more subject to physical attack or sabotage at the
DPS site whether protesters knew their names, or did not. The evidence shows that the
predicted risk of “doxing” perceived by the OSHP in advance of and during deployment
justified withholding Trooper names to protect them during deployment from the
“interference” of threats against their families. The evidence does not justify the
continuing use of this exception following the Troopers’ return to Ohio.
{¶30} In Plunderbund, supra, ¶¶ 3-7, 19-31, DPS records of the investigation of
direct threats against the governor were found to meet the definition of “security
records” in R.C. 149.433(A)(3)(a) – recodified in 2016 as R.C. 149.433(A)(1), 2016
Sub.S.B. No. 321. However, like the federal court in Kallstrom I, the Plunderbund Court
cautioned DPS specifically, and agencies generally, that the exception must be proven
in each case:
This is not to say that all records involving criminal activity in or near a public
building or concerning a public office or official are automatically ‘security
request in Craig, the request for Trooper names was not mitigated by any release of other enlightening
mission information from the REQ-A. Craig ¶ 21.
Case No. 2017-00051-PQ -20- REPORT AND RECOMMENDATION
records.’ The department and other agencies of state government cannot simply
label a criminal or safety record a “security record” and preclude it from release
under the public-records law, without showing that it falls within the definition in
R.C. 149.433.
Id. ¶29. Nor should this exception be asserted beyond the person(s) demonstrably at
risk, or after the risk has abated. In State ex rel. Ohio Republican Party v. FitzGerald,
145 Ohio St.3d 92, 2015-Ohio-5056, the county withheld as “security records” key-card-
swipe data for the one employee against whom verified threats had been received, but
released the same data for employees who had not received threats. Id. ¶¶ 6-8, 24.
The Court determined that when the threatened employee left his position, the key-card-
swipe data were no longer security records, and ordered their release. Id. ¶¶ 27-28, 30.
{¶31} In contrast with the records withheld in Plunderbund and FitzGerald
involving direct threats against particular officials, DPS shows no direct threats made
against these Troopers either individually or as a group. However, for the same
reasons discussed in connection with the Fourteenth Amendment Right to Privacy, I find
that withholding the names in response to GP Media’s November 3, 2016 request, like
the removal of name bars from the Troopers’ uniforms, was designed to reduce a
perceived substantial risk of online harassment including physical threats toward
Troopers’ families, threatening “interference” with the Troopers’ mission. (Ex. A, ¶¶ 17-
19, 29). The list of names therefore qualified as “security records” during deployment.
{¶32} An initial correct withholding of a record as a security record under
R.C. 149.433(A)(1) does not establish the exception in perpetuity. The courts must take
into account that violence, harassment, and online threats associated with a particular
event often recede as a function of time and distance. In the analogous Quolke case,
the facts justifying withholding the names of replacement teachers during a strike
included protesters chanting, jeering, and cursing; acts of harassment and intimidation;
taking and posting photographs online with derogatory and offensive comments; posting
of signs in neighborhoods where some replacement teachers lived identifying them by
Case No. 2017-00051-PQ -21- REPORT AND RECOMMENDATION
name and disclosing their addresses; violence against vehicles, and using vehicles; and
threats that consequences would follow replacement teachers “throughout their
careers.” Id. ¶¶ 5-9, 29, 30, However, the Court found that by the time the action was
filed:
“the board had presented little or no evidence that once the strike was over, there
was any remaining threat to the replacement teachers. That decision was issued
“taking into consideration the facts and circumstances as they exist[ed] * * *,
several months after the strike.”
Id. ¶ 30. Five months have passed since the Troopers’ return to Ohio from North
Dakota. Further, unlike the replacement teachers in Quolke, the Troopers do not reside
near the protest site, or work in the same profession as the protesters. Against this
separation in time and distance, DPS presents little or no evidence of credible current
threats directed against the Troopers or their families. DPS has not shown that actual
doxing of Ohio Troopers has occurred, either collectively or individually. The evidence
fails to support any continuing or new threat of physical harm following the return of the
Troopers to Ohio. The bare allegations of continuing risk are non-specific and
speculative, and do not establish withholding of names as “directly * * * protecting or
maintaining the security of [these Troopers] against attack, interference, or sabotage.”
The evidence does not establish that release of the list of names at this time threatens a
substantial risk of future physical or even nonphysical harm.
{¶33} I find that during the DAPL deployment DPS officials were permitted5 to
withhold the list of Trooper names pursuant to R.C. 149.433(A)(1), based on reports
that law enforcement officers and their families would be targeted for retaliation through
5 The wording of R.C. 149.433(B) (“a security record is not a public record under section 149.43”)
establishes only a discretionary exception to the Public Records Act, and does not prohibit release of
security records. 2000 Ohio Op. Att’y Gen. No. 021 (“R.C. 149.43 does not expressly prohibit the
disclosure of items that are excluded from the definition of public records, but merely provides that their
disclosure is not mandated.”)
Case No. 2017-00051-PQ -22- REPORT AND RECOMMENDATION
doxing if their identities were known. However, the evidence does not justify the
continuing use of the exception to withhold Trooper names following their return to Ohio.
Request No. 3: EMAC Agreement
Fourteenth Amendment Right to Privacy
{¶34} DPS parenthetically asserts that other identifying information in the EMAC
agreement would violate the Troopers’ constitutionally-protected privacy rights
to personal security and bodily integrity. (Response p. 11.) In support, DPS states
that “information such as hourly pay rate that could easily lead to the Trooper’s
identities * * *.” (Response p. 14.) Lieutenant Colonel Teaford suggests how hourly pay
rate could be traced to a Trooper’s name, and adds the item, “employee ID,” as
information that could disclose identity. (Ex. A ¶ 27.)
{¶35} Based on the same evidence and reasoning applied to the Troopers’
names, I find that the employee ID numbers contained in the EMAC Agreement were
subject to withholding under the Fourteenth Amendment right to privacy during the
Troopers’ deployment to North Dakota, but not at the present time. However, the
argument that a person could use a known hourly pay rate to research a particular
employee’s identity is too attenuated to make pay rate release a “disclosure of identity.”
Twenty-one of the thirty-seven hourly rates in the REQ-A appear beside more than one
name, even before considering their likely duplications with over fifteen hundred other
Troopers employed by the OSHP. In the absence of any direct risk shown, disclosure
of financial and time records violates neither equal protection nor substantive due
process guarantees. State ex rel. Beacon Journal Publ. Co. v. Bodiker, 134 Ohio
App.3d 415, 429-430, 731 N.E.2d 245 (10th Dist. 1999). I conclude that the Fourteenth
Amendment right of privacy did not apply to the Troopers’ pay rates listed in the EMAC
Agreement at any time during or following deployment.
Request No. 3: EMAC Agreement
Records Directly Used to Protect Against Attack, R.C. 149.433(A)(1)
Case No. 2017-00051-PQ -23- REPORT AND RECOMMENDATION
{¶36} DPS argues that the entire EMAC Agreement meets the definition of
“security record” set out in R.C. 149.433(A)(1):
(1) Any record that contains information directly used for protecting or
maintaining the security of a public office against attack, interference, or
sabotage;
DPS asserts that the withholding of “deployment plans,” “vulnerability assessments,”
and “tactical response plans” allegedly contained in the form is a direct use to protect or
maintain the security of the Troopers. (Response at pp. 8-11.) However, most of the
sections in the REQ-A form contain only administrative and billing information. A limited
number of records in a few sections do meet the definition of “security records,” and
may be redacted.
{¶37} As noted in the application of this exception to the list of Trooper names,
the Supreme Court has cautioned DPS and other agencies of state government that
simply labeling records involving criminal activity concerning a public office or official as
“security records” is insufficient, without showing that it falls squarely within the
definition in R.C. 149.433. Plunderbund, supra, ¶¶ 19-31. In State ex rel. Miller v.
Pinkney, Slip Opinion No. 2017-Ohio-1335, a sheriff’s office broadly labeled as “security
records” all offense and incident reports in which the county executive was identified as
a reportee, complainant, or victim. Upon examination in camera, the Supreme Court
determined that nine withheld reports “are not security records and are subject to
release with the redaction of exempt information.” Id. ¶ 1-4, Appendix. Regarding
security of government equipment, see State ex rel. Data Trace Info. Servs., L.L.C. v.
Cuyahoga Cty. Fiscal Officer, 131 Ohio St.3d 255, 2012-Ohio-753, 963 N.E.2d 1288,
¶ 65 (CDs documenting procedure and operation of recorder’s office to make backup
copies of instruments recorded are not “security records.”).
{¶38} DPS alleges that the REQ-A contains the OSHP’s entire deployment plan
for the North Dakota Pipeline protest. (Response p. 9; Ex. A ¶ 24.) In identifying
Case No. 2017-00051-PQ -24- REPORT AND RECOMMENDATION
“information directly used to protect” the Troopers from attack, interference, and
sabotage, DPS refers to “operational tactics used,” “future response plans,” plans of “an
operational response for each day,” “a law enforcement response plan to violent
protests and criminal acts,” “specific and unique vulnerability assessments,” and
“specific and unique response plans.” (Response pp. 3-4, 8-9) However, upon review
of the REQ-A, which was completed and signed prior to deployment, I find that it
contains no “plans” in the sense of detailed proposals for operational actions and
responses. Instead, both the response, and the affidavit of Lieutenant Colonel Teaford,
show that any such plans were created as part of briefings that took place after the
REQ-A was completed. (Response ¶ 3-4.) For example, in his affidavit, Lieutenant
Colonel Teaford warns against release of briefings and updates that occurred during
deployment, such as,
“daily email briefing from one of the commanders, which included updates on
North Dakota authorities’ written daily intelligence records. In my review of these
records, I can confirm that the documents contained known threats to law
enforcement, security vulnerabilities, and tactical response plans for each day.”
(Ex. A ¶ 20.),
“One of the commanders also updated me on the previous day’s activities,
including the Troopers’ tactical responses to violent protests. These response
plans were unique * * *. (Ex. A ¶ 21.),
“The information from these briefings was used each day by law enforcement to
prepare for the day’s protest response * * *.” (Ex. A ¶ 22.), and
“we would * * * likely use the same operational response plans set forth in the
prior daily email briefings.” (Ex. A ¶ 24.).
These extended references to post-deployment briefings, North Dakota daily
intelligence records, the “plans” developed during deployment, as well as any security
opinions to the extent that they rely on these references (e.g. Ex. A ¶¶ 25, 27-32), are
irrelevant in evaluating the actual contents of the REQ-A.
Case No. 2017-00051-PQ -25- REPORT AND RECOMMENDATION
{¶39} In the REQ-A form, only the lists of equipment promised by the OSHP, and
prospective disclosure of the staging area, appear to meet the definition of “security
record” in R.C. 149.433(A)(1). The evidence does not establish any direct relationship
between withholding the administrative and billing information that constitute the rest of
the contents of the REQ-A, and the security of Troopers from attack, interference or
sabotage. Regarding the similarly worded exception for trial preparation records,
Time sheets and billing records generally can be categorized as “routine office
records” that fall outside the definition of “trial preparation records.” See State ex
rel. Carpenter v. Tubbs Jones (1995), 72 Ohio St. 3d 579, 580, 651 N.E.2d 993.
Bodiker, supra at 427.
{¶40} Based on the above, I find that only the records within the REQ-A
regarding equipment and staging area are subject to R.C. 149.433(A)(1), and the
remainder are routine administrative and billing records that do not meet the definition of
“security records.” Appended to this report is an Attachment - Recommended
Redactions To REQ-A in which the sections and fields of the EMAC Agreement/REQ-A
are listed beside specific recommendations as to what information is subject to
withholding under the “security record” exception in R.C. 149.433(A)(1).
{¶41} DPS asserts that the “security record” exemption for these records
continues after the Troopers’ return, alleging risk to future officers through disclosure of
the REQ-A “operational response plans and briefings,” and operational tactics used.
(Response at p. 10-11.) However, this exception does not automatically apply in
perpetuity, and requires proof of continuing application. In Plunderbund, the records of
investigations of threats against the governor were found still to be “security records,”
regardless of investigation status or the passage of time, but in Plunderbund, DPS
provided much more detailed testimony connecting the disclosure of that information to
future risks to the governor and his successors. Plunderbund. ¶ 24-31. In FitzGerald,
documents were found no longer security records once the county executive left office.
Id. ¶¶ 27-28, 30. See Pinkney, Slip Opinion No. 2017-Ohio-1335, Appendix (documents
Case No. 2017-00051-PQ -26- REPORT AND RECOMMENDATION
appear to contain innocuous information, unfounded threats, and/or were several years
old). The evidence in this case supports withholding only the lists of the OSHP
equipment promised, based on testimony that the same lists would be used in future
similar operations. (Ex. A ¶¶ 13, 29-32.) After deployment and return, the location of
the initial staging area in North Dakota is only historical information and no longer meets
the definition of a “security record.”
{¶42} Applying R.C. 149.43(A)(2)(d), an analogous exception involving officer
safety, the Eighth District Court of Appeals found that prospective release of a “strike
plan” that would reveal specific procedures, plans and techniques at a time of potential
civic unrest “is precisely the kind of ‘information that would endanger the life or physical
safety of law enforcement personnel * * *.’’ State ex rel. Cleveland Police Patrolmen’s
Ass’n v. Cleveland, 122 Ohio App.3d 696, 699-701 (8th Dist.1997). However, an
attempted retrospective application of R.C. 149.43(A)(2)(d) was rebuffed in Conley v.
Corr. Reception Ctr., 141 Ohio App.3d 412, 414-416, 751 N.E.2d 528 (4th Dist.2001)
where an inmate made a request for work schedules and photographs of corrections
officers who had worked in his segregation unit on two past dates, with the purpose of
identifying particular officers who he claimed had battered him. The appellate court
overruled the trial court’s dismissal of the claim, holding that the correctional institution
was required to present “an affirmative showing that disclosure would endanger the
officer.” Id. p. 416. The court observed that even granting that the inmate had a motive
to attempt to harm his alleged assailants was not enough to establish a high probability
of danger as a matter of law, especially since the inmate had been transferred to
another institution. The court noted that “[a] different case would be presented if the
[inmate]’s request involved future work schedules, or similar information which could be
used to discern specific law enforcement tactics or techniques on a given day and
location.” Id. p. 417. The level of proof required by these cases is not present in this
case.
Case No. 2017-00051-PQ -27- REPORT AND RECOMMENDATION
{¶43} DPS also asserts that the “security record” portions of the REQ-A may be
reused in hypothetical future OSHP deployments to North Dakota or in preparing OSHP
requests for assistance, and that disclosing the current REQ-A may put other states at
risk by revealing the specific request information from North Dakota. However, the
REQ-A does not contain either operational response plans or briefings, and the
affidavits provide only conclusory opinions and factually contradicted assertions. For
example, DPS asserts that dissemination of the REQ-A would threaten the security of
out-of-state law enforcement:
[T]he EMAC agreement in the present case contains information relevant to
North Dakota’s requests to other participating states. Therefore, some of the
information contained within the EMAC agreement protects not just the Ohio
Troopers from attack, interference, and sabotage, but all law enforcement who
have assisted in North Dakota.
(Response p. 8-9.) DPS further asserts that withholding the REQ-A directly protects
what are expected to be similarly worded requests by Ohio in requests for assistance:
Should Ohio need to enact the EMAC to request law enforcement assistance to
the State, Ohio’s request and subsequent EMAC agreement with out-of-state law
enforcement agencies would undoubtedly look similar to North Dakota’s EMAC
agreement here. [citing Ex. A p. 3]
(Response p. 10.) DPS argues in effect that release of an EMAC agreement by any
compact state poses this risk:
In the wrong hands the information in the EMAC agreement could be used to
thwart law enforcement’s efforts to maintain peaceful protests, or to compromise
the personal safety of law enforcement personnel, thereby placing these officers
in significant danger. [citing Ex. A p.4]
However, multiple law enforcement agencies from at least six states that have assisted
North Dakota with the DAPL protests have released redacted or full EMAC requests,
agreements and in one case an after-action report in response to public records
Case No. 2017-00051-PQ -28- REPORT AND RECOMMENDATION
requests.6 Some of the web sites in footnote 6 are government sites, and the EMAC
records reproduced in the remainder must logically be available on the public record of
their disclosing agencies to any future requests. The assertion that Ohio’s copy of the
REQ-A must be withheld to conceal information because it is common to North Dakota’s
requests to other states, and to future Ohio requests and agreements, is contradicted
when similar or identical information is publicly available from other sources. “The
Supreme Court has found that ‘the interests in privacy fade when the information
involved already appears on the public record.’ Cox Broad. Corp. v. Cohn, 420 U.S.
469, 494-95, 43 L. Ed. 2d 328, 95 S. Ct. 1029 (1975).” Kallstrom II p. 695. Accord,
Besser v. Ohio State Univ., 89 Ohio St.3d 396, 403, 732 N.E.2d 373 (2000) (email
containing information readily ascertainable from other sources is not “trade secret”);
State ex rel. Jenkins v. Cleveland, 82 Ohio App.3d 770, 785, 613 N.E.2d 652
(8th Dist.1992) (some of the information that would allegedly endanger life or physical
safety “is available through other public records”).
{¶44} Conclusory allegations of future risk of serious bodily harm are not
sufficient alone. The evidence in this case supports the conclusion that the danger of
retaliation or physical harm to the Troopers has receded, and that DPS is now obligated
6 Released with redactions –Indiana EMAC Mission Order Authorization Form:
https://ia801904.us.archive.org/5/items/IndianaEMACDAPL/Public%20Records%20Request%20EMAC%
20DAPL.pdf; Louisiana (2 missions: Lafourche and St. Charles) REQ-A:
https://archive.org/stream/EMACLADAPL/EMAC-
%20Lafourche%20%28Redacted%29#page/n0/mode/2up http://www.publicrecordmedia.org/wp-
content/uploads/2017/MNDPS2016_pd_006.pdf (click “Full text of ‘EMAC DAPL Louisana [sic]
Agreements,’” or “See other formats.”; Minnesota Hennepin Co. Sheriff’s Office Mission Order
Authorization Form: http://www.publicrecordmedia.org/wp-
content/uploads/2017/MNDPS2016_pd_003.pdf; Minnesota REQ-A:
http://www.publicrecordmedia.org/wp-content/uploads/2017/MNDPS2016_pd_006.pdf; Minnesota Anoka
County Sheriff’s Office Intergovernmental Agreement: http://www.publicrecordmedia.org/wp-
content/uploads/2017/MNDPS2016_pd_008.pdf; Nebraska (3 missions) REQ-As:
https://www.muckrock.com/foi/nebraska-300/emac-agreement-and-after-action-reports-regarding-dapl-
north-dakota-nebraska-emergency-management-agency-30020/; Wyoming (copy of ND request only):
https://www.muckrock.com/news/archives/2017/jan/18/north-dakota-emac-request/.
Released in entirety - Wisconsin: http://www.unicornriot.ninja/?p=11176 (after action report,
Intergovernmental Agreement, and EMAC RC-2 form, St. Croix Co. Sheriff’s Office.
All accessed April 14, 2017.
Case No. 2017-00051-PQ -29- REPORT AND RECOMMENDATION
to disclose the location of the staging area for the 2016 deployment. The other
information identified as security records within the REQ-A remains subject to the
exception, as noted in the Appendix.
Request No. 3: EMAC Agreement
Records Prepared to Respond to Acts of Terrorism – R.C. 149.433(A)(2)(a)
{¶45} Separately from R.C. 149.43(A)(1), DPS asserts that the EMAC Agreement
is excepted pursuant to R.C. 149.433(A)(2):
“(A) As used in this section: * * *. ‘Security record’ means any of the following:
(2) Any record assembled, prepared, or maintained by a public office or public
body to prevent, mitigate, or respond to acts of terrorism, including any of the
following: (a) Those portions of records containing specific and unique
vulnerability assessments or specific and unique response plans either of which
is intended to prevent or mitigate acts of terrorism, and communication codes or
deployment plans of law enforcement or emergency response personnel; * * *.”
(Emphasis added.)
DPS submits no evidence by affidavit or otherwise that Ohio, North Dakota, or Federal
authorities have determined that the DAPL protests included acts of terrorism.7
Lieutenant Colonel Teaford describes the request from North Dakota as one for “law
enforcement assistance in responding to protests over the Dakota Access Pipeline
(DAPL),” not to prevent, mitigate, or respond to acts of terrorism. In the absence of
qualified evidence, the court may not draw an inference that a protest where some
participants use violence involves “acts of terrorism.”
{¶46} I conclude that because R.C. 149.433(A)(2) applies only to records
“assembled, prepared, or maintained by a public office * * * to prevent, mitigate, or
respond to acts of terrorism,” and DPS provides no evidence that it prepared the REQ-A
to prevent, mitigate or respond to acts of terrorism, DPS has not met its burden to prove
that R.C. 149.433(A)(2) applies to the records at issue.
7 Despite the wording of the link, the article provided at page 14 footnote 3 of DPS’ response,
http://www.cincinnati.com/story/new/2017/01/10/ohio-officials-calling-standing-rock-protesters-
terrorists/96250080/, does not quote any “Ohio officials calling Standing Rock protesters terrorists.”
Case No. 2017-00051-PQ -30- REPORT AND RECOMMENDATION
Request No. 4: OSHP Bylaws or Procedures
No Responsive Records
{¶47} With respect to Request No. 4, “Any OSHP bylaws or procedures which
govern agreements with EMAC,” DPS responded on November 23, 2016 that there
were no responsive records to this request. Ex. A ¶¶ 6, 10. A respondent has no duty
to create or provide access to nonexistent records. State ex rel. Lanham v. Smith, 112
Ohio St.3d 527, 2007-Ohio-609, ¶ 15. Based on this evidence, I find that GP Media has
not shown a denial of access to any existing records responsive to Request No. 4.
“Security Records” May Be Redacted from EMAC Agreement
{¶48} DPS argues that the REQ-A may be withheld in its entirety, rather than
redacting only those items meeting the definition of “security record.” (Response p. 7-
8.) DPS points to the definition in R.C. 149.433(A)(1) of “[a]ny record that contains
information directly used for protecting * * *.” However, the Public Records Act
expressly requires that only records falling squarely within an exception may be
withheld:
“If a public record contains information that is exempt from the duty to permit
public inspection or to copy the public record, the public office or the person
responsible for the public record shall make available all of the information within
the public record that is not exempt.”
R.C. 149.43(B)(1). The suggestion that the exception covers an entire 8-page
document, no matter how little of it constitutes a “security record,”
“ignores [Supreme Court] precedent holding that public records can be items,
documents, and items within documents. See, e.g., State ex rel. Beacon Journal
Publishing Co. v. Akron (1994), 70 Ohio St.3d 605, 606, 1994 Ohio 6, 640 N.E.2d
164 (Social Security numbers found within payroll files were ‘records’ for
purposes of R.C. 149.011(G)); Dupuis, 98 Ohio St.3d 126, 2002 Ohio 7041, 781
N.E.2d 163, P21 (settlement proposal within larger court record is a public
record). Moreover, a contrary holding would ignore our precedent that the public
records laws should be read broadly and construed liberally to effectuate the
intent of the statute. See State ex rel. Plain Dealer, 80 Ohio St.3d at 518, 687
Case No. 2017-00051-PQ -31- REPORT AND RECOMMENDATION
N.E.2d 661; Gannett Satellite Information Network, Inc., 80 Ohio St.3d at 264,
685 N.E.2d 1223; Hutson, 70 Ohio St.3d at 623, 640 N.E.2d 174.”
Kish v. Akron, 109 Ohio St.3d 162, 2006-Ohio-1244, footnote 3.
{¶49} Further, an analogous exception for “trial preparation” records is defined
using identical language, as “any record that contains information that is specifically
compiled in reasonable anticipation of [court proceedings].” R.C. 149.43(A)(4).
However, not every record that simply contains trial preparation records within it may be
withheld in its entirety from a public records request:
“[R]ecords which purportedly contain trial preparation records * * * may be
viewed in camera by this court to determine which sections may be redacted
pursuant to the trial preparation records exception.”
Bodiker, supra, at 428. Public offices have redacted security records from larger
records, where appropriate. In FitzGerald, 145 Ohio St.3d 92, 2015-Ohio-5056, the
county released key-card-swipe data for five employees and withheld only the data for
the county executive, Id. ¶ 6, rather than labeling the entire key-card-swipe database a
“security record” and withholding all six. In State ex rel. Bardwell v. Cordray, 181 Ohio
App.3d 661, 2009-Ohio-1265 (10th Dist.), ¶¶ 68-70, 78, the Attorney General’s Office
redacted only a phone number and an email response as security records, from within
larger correspondence. See also other-state REQ-A redactions in footnote 6.
A document that is composed entirely of security records, or in which security records
are inextricably intertwined with the remainder of the document, may be withheld in toto.
However, where only discrete and severable items fall squarely within the definition of
“security records” and are assembled within a larger document, the Public Records Act
and relevant case law require that only the specific security records may be redacted.
Conclusion
{¶50} Upon consideration of the pleadings and attachments, I find that GP Media
has failed to establish by clear and convincing evidence that DPS violated division (B) of
R.C. 149.43 when it denied GP Media’s Request No. 2 for all communication issued or
Case No. 2017-00051-PQ -32- REPORT AND RECOMMENDATION
received by all employees of the OSHP regarding the deployment of Troopers to North
Dakota in 2016. The request was ambiguous, overly broad, and required a search or
research instead of reasonably identifying the records sought. Accordingly, I
recommend that the court issue an order DENYING GP Media’s claim for relief based
on Request No. 2.
{¶51} I further find that GP Media has failed to establish by clear and convincing
evidence that DPS violated division (B) of R.C. 149.43 when it denied GP Media’s
Request No. 4 for any OSHP bylaws or procedures which govern agreements with
EMAC. DPS presented unrebutted evidence that no records responsive to this request
exist. Accordingly, I recommend that the court issue an order DENYING GP Media’s
claim for relief based on Request No. 4.
{¶52} I further find that GP Media has established by clear and convincing
evidence that DPS violated division (B) of R.C. 149.43 when, following their return from
deployment, it withheld the names of the 37 Troopers deployed to North Dakota. I
further find that GP Media has established by clear and convincing evidence that DPS
violated division (B) of R.C. 149.43 when it withheld the EMAC Agreement/REQ-A in its
entirety instead of redacting only the portions that meet the definition of “security record”
in R.C. 149.433(A)(1). Accordingly, I recommend that the court issue an order
GRANTING GP Media’s claim for relief based on Request No. 1, and GRANTING IN
PART GP Media’s claim for relief based on Request No. 3, and which 1) directs the
DPS to provide GP Media with a copy of the EMAC Agreement/REQ-A, subject to
redaction of items indicated in the ATTACHMENT hereto, and 2) provides that
GP Media is entitled to recover from DPS the costs associated with this action, including
the twenty-five dollar filing fee. R.C. 2743.75(F)(3)(b).
{¶53} Pursuant to R.C. 2743.75(F)(2), either party may file a written objection
with the clerk of the Court of Claims of Ohio within seven (7) business days after
receiving this report and recommendation. Any objection shall be specific and state
Case No. 2017-00051-PQ -33- REPORT AND RECOMMENDATION
with particularity all grounds for the objection. A party shall not assign as error on
appeal the court’s adoption of any factual findings or legal conclusions in this report and
recommendation unless a timely objection was filed thereto. R.C. 2743.75(G)(1).
JEFFERY W. CLARK
Special Master
cc.
John C. Greiner
312 Walnut Street, Suite 1800
Cincinnati, Ohio 45202
Morgan A. Linn
1970 West Broad Street, Suite 531
Columbus, Ohio 43223
Heather L. Buchanan
30 East Broad Street, 16th Floor
Columbus, Ohio 43215
Filed April 24, 2017
Sent to S.C. Reporter 6/13/17
Case No. 2017-00051-PQ -34- REPORT AND RECOMMENDATION
ATTACHMENT
Recommended Redactions To REQ-A
The sections and fields of the REQ-A form are listed in the left column (see also
footnote 1). Only fields that have content are listed. In the right column, information is
identified as meeting or not meeting the definition of “security record” in R.C.
149.433(A)(1): a “record that contains information directly used for protecting or
maintaining the security of a public office against attack, interference, or sabotage.”
SECTION I TO BE COMPLETED BY THE REQUESTING STATE
Exercise or Event: New or Amendment #: These fields do not contain
Event information that meets
Date Requesting State R.C. 149.433(A)(1)
State Mission Tracking #: EM Software Tracking #:
Requesting Agency: EMAC Tracking #:
Requesting State REQ-A Contact These fields do not contain
First Name Last Name information that meets
Phone 1: Phone 2: R.C.149.433(A)(1).
Email 1: Email 2: Government email addresses
used
Resource Request These fields do not contain
Mission Type/Source: information that meets
Type/Status: R.C. 149.433(A)(1). Resource
Mission Description: Description shows only
Resource Description: resources requested. No
# Requested evidence details how
# Type withholding this information
protects security of officers
Deployment Dates (Including Travel Days) These fields do not contain
Deployment Date: information that meets
Demobilization Date: R.C. 149.433(A)(1)
Duty Length
Case No. 2017-00051-PQ -35- REPORT AND RECOMMENDATION
Deployment Details These fields do not contain
Work Location/Facilities information that meets
Location/Facility Name R.C. 149.433(A)(1)
Address 1, City, Zip Code
Working Conditions
Comments:
Living Conditions
Comments:
Logistics Comments:
Identify Health & Safety Concerns These fields do not contain
(All Selected Apply) information that meets
No Safety or Health Concerns have been Identified R.C. 149.433(A)(1). Content
Immunizations or Vaccinations are suggested to deploy of Concerns/Remarks is too
Environmental Hazards Exist general to constitute a
Personal Protection Equipment Needed “vulnerability assessment.”
Safety Concerns/Remarks
Requesting State Resource Coordination Contact These fields do not contain
First Name Last Name information that meets
Title Agency R.C. 149.433(A)(1).
Phone 1 Mobile Government email addresses
Email 1 Email 2 used
Staging Area and Point of Contact Location/Facility Name and
POC First Name Last Name Address could assist persons
Phone 1 Phone 2 in creating countermeasures,
Location/Facility Name Exhibit A ¶ 29, so is properly
Address 1 withheld before and during
City Zip Code deployment. After return,
none of this section contains
information that meets
R.C. 149.433(A)(1)
EMAC Authorized Signature These fields do not contain
Name of EMAC Authorized Representative information that meets
Signature of EMAC Authorized Representative R.C. 149.433(A)(1)
Date
Case No. 2017-00051-PQ -36- REPORT AND RECOMMENDATION
SECTION II TO BE COMPLETED BY THE ASSISTING STATE
Assisting State: These fields do not contain
Assisting Agency: information that meets
R.C. 149.433(A)(1)
Offer Description Ex. A ¶¶ 13, 29-32 states that
Mission Start Date: Arrival Date: disclosing equipment to be
Departure Date: Mission End Date: used could mitigate personal
# Mission Days security, both in N.D. and for
Mission Type Type/Status future similar deployment.
Mission Description Resource Description text lines
Resource Description 25-33 may therefore be
# Requested withheld. None of the other
# Type fields contain information that
meets R.C. 149.433(A)(1)
Assisting State REQ-A Contact These fields do not contain
First Name Last Name information that meets
Phone 1: Phone 2: R.C. 149.433(A)(1).
Email 1: Government email address
used
Total Mission Estimated Costs These fields do not contain
Travel: information that meets
Personnel: R.C. 149.433(A)(1)
Equipment:
Commodities:
Other:
ESTIMATED TOTAL COST:
Travel These fields do not contain
Personal Rental Vehicle Government. information that meets
Vehicle Costs: Costs: Vehicle Costs: R.C. 149.433(A)(1)
Air Travel Meals & Tips Meals & Tips
Costs: (Receipt): (Per Diem):
Lodging: Parking Fees: Shipment &
Transportation:
Total:
Case No. 2017-00051-PQ -37- REPORT AND RECOMMENDATION
EMAC Authorized Signature These fields do not contain
Name of EMAC Authorized Representative information that meets
Signature of EMAC Authorized Representative R.C. 149.433(A)(1)
Date:
Personnel Costs These fields do not contain
These column headings above 37 entry rows: ID, information that meets
Name, Reg. Salary Hourly Rate, Fringe Benefit R.C. 149.433(A)(1).
Hourly Rate, Reg. Hours Worked Per Day, OT Salary
Hourly Rate, OT Fringe Benefit Hourly Rate, OT Note: no officer ranks, phone
Hours Worked Per Day, # Days, Total Daily Cost, #’s, or email addresses are
Total Mission Cost entered
Commodity Costs Ex. A ¶¶ 13, 29-32 states that
These column headings above 4 entry rows: ID, disclosing equipment to be
Commodity Description, Cost Per Item, Quantity, used could mitigate personal
Total Costs security, both in N.D. and for
future similar deployment. The
Commodity ID and Description
columns meet
R.C. 149.433(A)(1)
Equipment Costs Ex. A ¶¶ 13, 29-32 states that
These column headings above 1 entry row: ID, disclosing equipment to be
Equipment Description, Cost Per item, Quantity, # used could mitigate personal
Days Used, Total Cost security, both in N.D. and for
future similar deployment. The
Equipment ID and Description
columns meet
R.C. 149.433(A)(1)
Other Costs These fields do not contain
These column headings above 1 entry row: ID, Other information that meets
Description, Cost Per Item, Quantity, # Days Used, R.C. 149.433(A)(1)
Total Cost
Case No. 2017-00051-PQ -38- REPORT AND RECOMMENDATION
SECTION III TO BE COMPLETED BY THE REQUESTING STATE
Date These fields do not contain
Event information that meets
Mission Description: R.C. 149.433(A)(1)
Req. State Tracking #:
EMAC Authorized Signature These fields do not contain
Name of EMAC Authorized Representative information that meets
Signature of EMAC Authorized Representative R.C. 149.433(A)(1)
Date