2023 IL 128300
IN THE
SUPREME COURT
OF
THE STATE OF ILLINOIS
(Docket No. 128300)
MATT CHAPMAN, Appellee, v. THE CHICAGO
DEPARTMENT OF FINANCE, Appellant.
Opinion filed May 18, 2023.
JUSTICE HOLDER WHITE delivered the judgment of the court, with opinion.
Chief Justice Theis and Justices Neville, Overstreet, Cunningham, Rochford,
and O’Brien concurred in the judgment and opinion.
OPINION
¶1 Plaintiff, Matt Chapman, filed a request pursuant to the Freedom of Information
Act (FOIA) (5 ILCS 140/1 et seq. (West 2018)), seeking certain information
utilized by defendant, the Chicago Department of Finance. Defendant denied the
request, identifying the requested information as exempt from disclosure under
section 7(1)(o) of FOIA. Id. § 7(1)(o).
¶2 Plaintiff filed a complaint, alleging defendant violated FOIA by failing to
disclose the records and asking the Cook County circuit court to order their
production. The court agreed with plaintiff and ordered defendant to produce the
records. The First District affirmed. 2022 IL App (1st) 200547, ¶ 1.
¶3 Now on appeal, defendant argues (1) section 7(1)(o) of FOIA expressly
exempts the requested records from disclosure and (2) it demonstrated clear and
convincing evidence that disclosure would jeopardize the security of its system. We
reverse and remand with directions.
¶4 BACKGROUND
¶5 In August 2018, plaintiff submitted a FOIA request to defendant for certain
records pertaining to the Citation Administration and Adjudication System
(CANVAS), developed by IBM for the City of Chicago in 2002 for the enforcement
of parking, red-light, and speed-camera tickets. After a ticket has been issued, it is
loaded into the CANVAS system, which defendant uses to issue notices and for
payment purposes.
¶6 Specifically, plaintiff sought an “index of the tables and columns within each
table of CANVAS” and asked for the “column data type as well.” Further,
plaintiff’s request stated the following:
“Per the CANVAS specification, the database in question is Oracle, so the
below SQL query will likely yield the records pursuant to this request:
select utc.column_name as colname, uo.object_name as tablename,
utc.data_type
from user_objects uo
join user_tab_columns utc on uo.object_name = utc.table_name where
uo.object_type = ‘TABLE’ ”
Plaintiff indicated the requested documents would be made available to the general
public and that the request was not being made for commercial purposes.
-2-
¶7 Defendant denied the request, stating the records were exempt from disclosure
pursuant to section 7(1)(o) of FOIA (5 ILCS 140/7(1)(o) (West 2018)). Section
7(1)(o) exempts the following:
“Administrative or technical information associated with automated data
processing operations, including but not limited to software, operating
protocols, computer program abstracts, file layouts, source listings, object
modules, load modules, user guides, documentation pertaining to all logical and
physical design of computerized systems, employee manuals, and any other
information that, if disclosed, would jeopardize the security of the system or its
data or the security of materials exempt under this Section.” Id.
Defendant stated the request for a copy of tables or columns within each table of
CANVAS could, if disseminated, jeopardize the security of the systems of the City
of Chicago.
¶8 In November 2018, plaintiff filed suit, alleging his request concerned
nonexempt public records and defendant had willfully and intentionally violated
FOIA by failing to produce the requested records. Thereafter, plaintiff filed a
motion for partial summary judgment, and defendant filed a cross-motion for
summary judgment.
¶9 In its cross-motion, defendant argued plaintiff’s broad and open-ended request
would “provide a detailed roadmap of the entire CANVAS system to the public”
and, if released, “would not only provide information about how the CANVAS
system was designed but would also facilitate cyber-attacks.” The circuit court
denied both motions.
¶ 10 In January 2020, the circuit court held a trial on plaintiff’s complaint. Before
the trial began, defendant argued the information plaintiff requested constituted a
“file layout” or “source listing,” both of which are expressly exempt from
disclosure under section 7(1)(o) without regard to whether disclosure would
jeopardize the security of the system. The court disagreed “as a matter of law,”
stating the phrase “if disclosed[,] would jeopardize [the] security of the system or
its data or the security of the material[s] exempt under this [S]ection,” qualifies
every term that precedes it, including “file layouts” and “source listings.” Thus, the
-3-
only issue for trial was whether disclosure of the information would jeopardize the
security of the system.
¶ 11 On defendant’s behalf, Bruce Coffing testified he was the chief information
security officer for the City of Chicago. He indicated his familiarity with the
CANVAS system, which contains sensitive information pertinent to constituents
who have received tickets relating to parking, speed-light cameras, red-light
cameras, booting, and towing. Coffing stated that information includes, among
other things, first and last names of the primary and secondary vehicle owners,
driver’s license numbers, addresses, handicap-parking status, the ticket issuer, and
payment method.
¶ 12 Coffing testified he is responsible for protecting the CANVAS system from
cyberattacks. One of the ways to defend against such attacks includes limiting the
information known about a system, so that hackers have to be “more noisy” when
attempting an attack and thereby alerting security defenses that an attack is
underway. If an attack is conducted by someone with knowledge of the system,
“their activity may blend in and look like normal activity in the system.” Coffing
stated releasing the requested information would undermine the layer defense
strategy by “providing more information for a threat actor to perform
[reconnaissance] again to more precisely tailor their attack.”
¶ 13 Coffing testified that plaintiff’s request concerned file layouts and source
listings. He stated file layouts include “table names and column names,” which is
“the information that the database management system uses to create the structure
of the database.” “Source listings” include instructions to “the database
management system on how to do something to setup the database, the tables, the
columns within each of those tables and the data types that those columns
represent.”
¶ 14 Coffing stated that, if a threat actor knew the file layouts or source listings, he
or she could use that knowledge to “perform [reconnaissance] on a target or a
system and in this case would use this information to more precisely craft their
attacks, again to limit the noise that they would make to limit the likelihood of them
being detected.”
-4-
¶ 15 Coffing also testified releasing the information requested by plaintiff could
facilitate a type of attack known as a structured query language (SQL) injection,
which would force the system to do something it is not designed to do. In such an
instance, the injection acts as “a window into the system and then it uses this
vulnerability to attempt to make the system do something that the threat actor wants
the system to do.” Coffing stated an SQL injection could be used against the
CANVAS system to gain access and modify information, such as payment on a
ticket, or delete data to make the system unusable.
¶ 16 On cross-examination, Coffing acknowledged plaintiff’s FOIA request did not
seek actual data, such as a person’s driver’s license number, but instead sought a
listing of the tables in the CANVAS database and the fields and columns within
those tables. However, Coffing explained that disclosure of the requested records
would “disclose how the database management system constructs the database that
contains the data used, stored and processed by the CANVAS system.”
¶ 17 When asked by the circuit court to assume the general public knows what
information is being collected, e.g., first and last names, citation number, vehicle
information, and date and type of citations, Coffing testified that knowing the
specific field name could allow someone to precisely craft an attack to make less
noise and go undetected. For example, Coffing stated a field name could be “L
underscore name” or “last underscore name,” but not knowing which one could
lead to inaccurate guesses and thereby alert the system that a threat actor is in the
environment.
¶ 18 In plaintiff’s case, Thomas Ptacek testified he worked in the field of information
and software security. Describing himself as a “vulnerability researcher,” he
acknowledged he hacks systems for a living. Ptacek understood plaintiff’s FOIA
request as seeking “the schema of the database that backs the CANVAS application,
the tables and the columns of those tables.”
¶ 19 Ptacek described “schema” as a term of art referring to “all of the fields and the
databases that sit behind these applications,” According to Ptacek, “schema
information would be of marginal value to an attacker.” Moreover, disclosing the
requested records would not produce the source code for the CANVAS system,
which would provide a collection of instructions that tells the CANVAS application
how to function.
-5-
¶ 20 Ptacek could not think of a way in which publicly “disclosing the schema would
jeopardize the security” of a system or make it easier to carry out an SQL injection
attack. Instead, he stated one of the first things he would get from an SQL injection
attack would be the schema itself. Ptacek did testify that, if a hacker breached a
database, knowledge of the schema would be “of value in that it would allow [the
hacker] to select” the application to target. However, he stated that, if the schema
is publicly available, it is not considered a vulnerability to the system. He stated
“schemas are not file layouts” or source listings.
¶ 21 On cross-examination, Ptacek testified he has never worked with the CANVAS
system and he did not know the source code, architecture, or security configurations
of the system. He stated that having the schema has some value to the hacker in
helping to plan for an attack. For example, if Ptacek wanted to target Social Security
numbers, having the schema would help “isolate the systems” that contained Social
Security information so he would not “have to take the time to attack lots of other
applications.” But he stated knowing the schema would not prevent noise during a
hacking attempt, as opposed to knowing the source code, which would help him be
“substantially less noisy.”
¶ 22 Following closing arguments, the circuit court found defendant had not met its
burden of proof under section 7(1)(o) of FOIA. The court found persuasive Ptacek’s
testimony that knowledge of the schema would not in any way provide a threat
actor an advantage in attacking a system like CANVAS. The court entered
judgment in favor of plaintiff and against defendant. The court also ordered
defendant to produce the requested records by February 10, 2020. Following
defendant’s posttrial motion, the court stayed its order to produce the requested
records pending the outcome of an appeal.
¶ 23 On appeal, defendant made no argument that the requested information
constituted a “source listing.” Instead, defendant maintained the requested
information was exempt from disclosure because it constituted a “ ‘file layout’ ”
and its dissemination “ ‘would jeopardize’ ” the security of the CANVAS system
and database. 2022 IL App (1st) 200547, ¶ 1. The First District disagreed and
affirmed. First, without determining whether the information plaintiff requested
was a “ ‘file layout’ ” or “ ‘any other information,’ ” the court found that, under the
plain language of section 7(1)(o), the reasonable meaning of “ ‘if disclosed, would
-6-
jeopardize’ ” applies to every item listed, not only to the catchall phrase of “ ‘and
any other information.’ ” Id. ¶ 32. Second, the First District found the circuit court’s
finding that defendant failed to demonstrate by clear and convincing evidence that
the exemption from disclosure provided in section 7(1)(o) applied to plaintiff’s
FOIA request was not against the manifest weight of the evidence. Id. ¶ 38. Thus,
the court held defendant must provide the information plaintiff requested because
the information was not exempt from disclosure under section 7(1)(o) of FOIA. Id.
¶ 42.
¶ 24 In March 2022, defendant petitioned this court for leave to appeal, and we
allowed that petition. Ill. S. Ct. R. 315 (eff. Oct. 1, 2021).
¶ 25 ANALYSIS
¶ 26 Defendant raises two issues on appeal. First, defendant argues the plain
language of section 7(1)(o) of FOIA expressly exempts the records plaintiff
requested from disclosure. Second, defendant argues that section 7(1)(o) requires a
public body to show only a possibility of harm to a data system’s security and that
it showed that disclosure of the requested records would jeopardize CANVAS’s
security.
¶ 27 I. Standard of Review
¶ 28 The first issue requires us to construe section 7(1)(o) of FOIA. Issues of
statutory interpretation are reviewed de novo. Rushton v. Department of
Corrections, 2019 IL 124552, ¶ 13. “ ‘The fundamental rule of statutory
interpretation is to ascertain and give effect to the legislature’s intent, and the best
indicator of that intent is the statutory language, given its plain and ordinary
meaning.’ ” International Ass’n of Fire Fighters, Local 50 v. City of Peoria, 2022
IL 127040, ¶ 12 (quoting Dew-Becker v. Wu, 2020 IL 124472, ¶ 12). In interpreting
a statute, this “court may consider the reason for the law, the problems sought to be
remedied, the purposes to be achieved, and the consequences of construing the
statute one way or another.” In re Appointment of Special Prosecutor, 2019 IL
122949, ¶ 23.
-7-
¶ 29 A statute must be viewed as a whole, and “this court construes words and
phrases not in isolation but relative to other pertinent statutory provisions.” In re
Julie M., 2021 IL 125768, ¶ 27. Moreover, statutory provisions should be read so
that no term is rendered superfluous or meaningless. Id. “When the plain language
of the statute is clear and unambiguous, the legislative intent that is discernible from
this language must prevail, and no resort to other interpretative aids is necessary.”
In re Marriage of Kates, 198 Ill. 2d 156, 163 (2001).
¶ 30 II. The Public Policy Behind FOIA
¶ 31 In conducting our review, we are mindful that, pursuant to FOIA, “public
records are presumed to be open and accessible.” Illinois Education Ass’n v. Illinois
State Board of Education, 204 Ill. 2d 456, 462 (2003) (citing Lieber v. Board of
Trustees of Southern Illinois University, 176 Ill. 2d 401, 407 (1997)). Section 1 of
FOIA prescribes the public policy of Illinois and legislative intent of FOIA. 5 ILCS
140/1 (West 2018). Section 1 states, in part, as follows:
“The General Assembly hereby declares that it is the public policy of the
State of Illinois that access by all persons to public records promotes the
transparency and accountability of public bodies at all levels of government. It
is a fundamental obligation of government to operate openly and provide public
records as expediently and efficiently as possible in compliance with this Act.
This Act is not intended to cause an unwarranted invasion of personal
privacy, nor to allow the requests of a commercial enterprise to unduly burden
public resources, or to disrupt the duly-undertaken work of any public body
independent of the fulfillment of any of the fore-mentioned rights of the people
to access to information.” Id.
¶ 32 “All records in the custody or possession of a public body are presumed to be
open to inspection or copying.” Id. § 1.2. A public body must comply with a proper
request for information unless one of the statutory exemptions in section 7 applies.
Lieber, 176 Ill. 2d at 407. This court has noted these “exemptions ‘are to be read
narrowly.’ ” Mancini Law Group, P.C. v. Schaumburg Police Department, 2021 IL
126675, ¶ 16 (quoting Lieber, 176 Ill. 2d at 407). “In the event a public body asserts
that a record is exempt from such disclosure, the public body bears the burden of
-8-
proving by clear and convincing evidence that the record is exempt.” Id.; 5 ILCS
140/1.2 (West 2018).
¶ 33 III. Section 7(1)(o) and File Layouts
¶ 34 Section 7 of FOIA sets forth a series of exemptions to disclosure and provides,
in relevant part:
“(1) When a request is made to inspect or copy a public record that contains
information that is exempt from disclosure under this Section, but also contains
information that is not exempt from disclosure, the public body may elect to
redact the information that is exempt. The public body shall make the remaining
information available for inspection and copying. Subject to this requirement,
the following shall be exempt from inspection and copying:
***
(o) Administrative or technical information associated with automated
data processing operations, including but not limited to software, operating
protocols, computer program abstracts, file layouts, source listings, object
modules, load modules, user guides, documentation pertaining to all logical
and physical design of computerized systems, employee manuals, and any
other information that, if disclosed, would jeopardize the security of the
system or its data or the security of materials exempt under this Section.” 5
ILCS 140/7(1)(o) (West 2018).
¶ 35 Defendant argues the plain language of section 7(1)(o) establishes a per se
exemption for file layouts. We agree.
¶ 36 We begin by noting this court has found a per se rule applies to most of the
exemptions set forth in section 7. Mancini, 2021 IL 126675, ¶ 30. Thus, “[w]here
the public body claims that a requested document falls within one of these
specifically enumerated categories and is able to prove that claim, no further inquiry
by the court is necessary.” Lieber, 176 Ill. 2d at 408.
¶ 37 The exemption at issue in section 7(1)(o) is narrow in its focus—dealing with
administrative or technical information associated with automated data processing
-9-
operations. The statute specifically lists 10 items that are included within that focus,
including file layouts. While the phrase “including but not limited to” indicates the
list that follows is illustrative and not exhaustive (People v. Perry, 224 Ill. 2d 312,
328 (2007)), the inclusion of these 10 specific items evinces the legislature’s intent
that they be expressly exempt from disclosure, i.e., the harm that would follow from
disclosure of the listed items is presumed. Had the General Assembly intended to
require the government agency to show disclosure of information would jeopardize
the security of its system, the list of specific items would have been unnecessary.
¶ 38 In addition to listing the specific categories of information that are exempt, the
legislature also included the catchall category of “any other information that, if
disclosed, would jeopardize the security of the system or its data or the security of
materials exempt under this Section.” 5 ILCS 140/7(1)(o) (West 2018). The catchall
phrase simply shows the legislature understood it could not specifically list every
item that might fall within the exemption’s scope and allowed for the protection of
the system should it be proved that disclosure of a nonlisted item, i.e., any other
information, would jeopardize its security. See People v. Newton, 2018 IL 122958,
¶ 17 (finding the statutory catchall showed the legislature’s recognition that it
would not be possible to specifically list all places used primarily for religious
worship).
¶ 39 In its analysis, the appellate court did not address the entirety of section
7(1)(o)’s exemption. However, a plain reading of the exemption as a whole
confirms our conclusion that file layouts are expressly exempt. The last part of
section 7(1)(o) mentions “materials exempt under this Section,” thereby indicating
the legislature’s intent that the previously listed items are indeed exempt. To find
otherwise would render the phrase “materials exempt under this Section”
superfluous. See Slepicka v. Illinois Department of Public Health, 2014 IL 116927,
¶ 14 (“Each word, clause and sentence of a statute must be given a reasonable
construction, if possible, and should not be rendered superfluous.”).
¶ 40 With the foregoing in mind, the reasonable, commonsense interpretation of
section 7(1)(o) that gives meaning to the listed items, the catchall, and the entire
exemption as a whole leads to the conclusion that file layouts are exempt from
disclosure. While it is true that, under FOIA, public records are presumed to be
open and accessible, the legislature has specifically provided for a narrow
- 10 -
exemption with respect to administrative or technical information associated with
automated data processing operations. The exemption in section 7(1)(o) is focused
on the security of the government body’s data system, and reading the exemption
to require a hearing to determine whether disclosure would jeopardize the security
of that system every time a file layout is requested would only weaken the specific
exemption.
¶ 41 We note section 5 of FOIA requires a public body to “maintain and make
available for inspection and copying a reasonably current list of all types or
categories of records under its control,” which “shall be reasonably detailed in order
to aid persons in obtaining access to public records pursuant to this Act.” 5 ILCS
140/5 (West 2018). Thus, section 5 provides the public with knowledge of what
records are available and what can be obtained. However, the purpose of FOIA is
not to put the security of the government’s automated data processing operations at
risk of unnecessary harm, and section 7(1)(o) provides a narrow and reasonable
exemption to protect those operations, especially from the harm threatened by
cyberattacks. Accordingly, we hold file layouts are per se exempt from disclosure.
¶ 42 IV. Plaintiff’s Requested Records
¶ 43 Having found that file layouts are expressly exempt from disclosure under
section 7(1)(o) without a showing that disclosure would jeopardize the security of
the system, we need not address defendant’s second issue. Instead, the question
now becomes whether the records requested by plaintiff constitute file layouts.
Plaintiff argues his requested “schema” does not fall within the definition of a file
layout. Defendant, however, suggests dictionary definitions establish the requested
records fall under the exemption. We agree with defendant.
¶ 44 File layouts are not defined in the statute. In such an instance, “this court has
held it is appropriate to refer to a dictionary to ascertain the meaning of otherwise
undefined words or phrases.” Skaperdas v. Country Casualty Insurance Co., 2015
IL 117021, ¶ 18 (citing Lacey v. Village of Palatine, 232 Ill. 2d 349, 363 (2009));
see also Rosenbach v. Six Flags Entertainment Corp., 2019 IL 123186, ¶ 32 (stating
this court may consult dictionaries to ascertain the plain and ordinary meaning of
an undefined statutory term).
- 11 -
¶ 45 In his FOIA request, plaintiff sought an “index of the tables and columns within
each table of CANVAS” and asked for the “column data type as well.” “File layout”
has been defined as the “description of the arrangement of the data in a file.”
McGraw-Hill Dictionary of Scientific & Technical Terms (6th ed. 2003), available
at https://encyclopedia2.thefreedictionary.com/file+layout (last visited Apr. 10,
2023) [https://perma.cc/7JRF-MB62]. We find this definition encompasses the
records requested by plaintiff.
¶ 46 Plaintiff, however, argues that the records he requested constituted “database
schema” and not file layouts. “Schema” is defined as “a structured framework or
plan: outline.” Merriam-Webster Online Dictionary, https://www.merriam-
webster.com/dictionary/schema (last visited Apr. 11, 2023) [https://perma.cc/
JU96-57T7]. Considering the definitions of both “file layout” and “schema,” we
find a difference in name only. Just as a file layout is the arrangement of data in a
file, a schema is the framework or outline of a database.
¶ 47 As we have found the records requested by plaintiff are file layouts within the
meaning of section 7(1)(o) of FOIA, those records are exempt from disclosure.
Accordingly, the judgments of the circuit court and the appellate court are hereby
reversed. We remand the cause to the circuit court for entry of judgment in favor of
defendant and against plaintiff.
¶ 48 CONCLUSION
¶ 49 For the foregoing reasons, we reverse the judgments of the circuit court and the
appellate court and remand to the circuit court with directions to enter judgment in
favor of defendant.
¶ 50 Judgments reversed.
¶ 51 Cause remanded with directions.
- 12 -