Electronic Surveillance: Section 8 and the Evisceration of Part VI
Author | Susan Chapman & Bianca Bell |
Pages | 218-239 |
ElectronicSurveillance
SE CT ION AND
TH E EV I SCE RATI ON O FPA RT V I
Susan Chapman* & Bianca Bell**
Grounded in man’s physical and moral autonomy, privacy is essential for
the well-being of the individual. For this reason alone, it is worthy of
constitutionalprotectionbutitalsohasprofoundsignicancefor
the public order. The restraints imposed on government to pry into the
lives of the citizen go to the essence of a democratic state.
JusticeLaForestinR v Dyment, SCR
A. INTRODUCTION
marksthetenyearanniversaryofthereleaseoftherstgeneration
AppleiPhone While mobile phones and ot hersm artphones certain ly
existedbefore therelease ofthe iPhoneAppleundoubtedly beganthe
fundamentalshiftint hewaythemodernworldwouldinteractTherise
ofthemobilephoneand morespecicallythe smartphonehasforever
changed the nature of commu nications With more Canadian house
holdssubscribing exclusivelyto mobilewireless services percent
than toexclusivelywirel ineielandline telephoneservices per
centthere arenow billionsof textmessages sentper day Canadians
SusanChapmani saPartneratUrselPhill ipsFellowsHopkinsonLLP
BiancaBellisanA ssociateatUrselPhill ipsFellowsHopkinsonLLP
CanadianRadio televisionandTelecommunicat ionsCommissionCommun ica
tionsMonitoringRe portExecutiveSummaryFebruaryonline
wwwcrtcgccaeng publicationsre portspolicy monitoringcmrsht mexi
Electronic Surveillance
areusing theirmobilephonesto sendtextmessagesiMessagesSnap
chatsBlackBerrymessagesFacebo okmessagesKikmess agespictures
and more There is also no question that the elect ronically messaged
conversationis quicklyovertak ingthe oncecommon telephonecal las
thepreferredmethodofcommunicationforanewgeneration
Unsurprisinglymobile phones are now havens for valuable data
includingnotonlythe contentofcommunicationsbutalsothe location
andusagedataassociatedwitht hedeviceDigitaldatai screatedoften
unknowingly andwithouttheu nderstandingthatit mayremainin re
coverableformdespiteaemptstodestroyitFurth erdepen dingo nthe
congurationsand activeconnections ofagivendevice therecouldbe
dataaccessibletothedevicefromot herpeopleothernetworksoreven
othercountriesAllof thi sin form ation isbe comi ngin crea sing lyinv alu
ablein crimina linvestigations andwhile technology has advancedat
anunprecedented pacethelaw concerninghow technologyis usedin
realityandhowthedataitproducesshouldbeprotectedhasmostcer
tainlynot
Common privacy concerns with respect to mobile phones are
whether telecommunications companies wil l store sent and received
messagesif so whethert hosestorage sitescould ever behacked and
thecommunicationsleakedandmoreconcerningwhetherthestorage
sitescouldeverbe accessedbythe policeandused againstsomeonei n
criminal pro ceedings On some electronic platforms the host ass ures
usersthat theirmessagesw illdisappeara ftertwentyfourhours other
companiessuggestthatmessagess entthroughtheirplatforma renever
savedonanyserverandthereforeuntouchablebythepoliceSometele
communications companies on the other ha ndsuggest t hatt hey do
notkeeprecordsoftextmessagesoncethetransmissionprocesshasoc
curredT helandscapeof electroniccommun icationisvaried complex
andstillrapidlyevolvingleavingboththecourtsandtheCriminal Code
scramblingtocatchup
Thi schapte rwhichw illult imately concludet hatthe lawsfailu reto
keeppace withcha ngingtech nologiesisleadi ngtot heevisceration of
the Criminal Co desInvasionofPrivacyprotectionswill rstprovidean
SusanMagotiauxOutofSyncS ectionandTechnologicalAdvance mentinSu
premeCourtJurispr udenceSupreme Court Law ReviewdMagotiaux
Ibid.
Ibid.
Criminal CodeRSCcCCode
To continue reading
Request your trial