Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Law

Developing A Privacy Code Of Practice For Connected And Automated Vehicles, Rajen Akula Dec 2019

Developing A Privacy Code Of Practice For Connected And Automated Vehicles, Rajen Akula

Canadian Journal of Law and Technology

Connected and autonomous vehicles (‘‘CAVs”) can collect, store, process and transmit vast amounts of data. Understanding the use (and potential misuse) of this data, particularly when that data is about an identifiable individual within the meaning of data protection law, is regarded critical to the success of this new mode of transportation. However, what constitutes personal information in relation to coneccted and automated vehicle data on a case-by-case basic. This presents a policy challenge for the government and creates uncertainty for businesses wishing to make use of this data.


Ethical Hacking By Alana Maurushat, Laura Ellyson Dec 2019

Ethical Hacking By Alana Maurushat, Laura Ellyson

Canadian Journal of Law and Technology

Book Review of Ethical Hacking by Alana Maurushat (Ottawa: University of Ottawa Press, 2019).


Privacy Law Issues In Public Blockchains: An Analysis Of Blockchain, Pipeda, The Gdpr, And Proposals For Compliance, Noah Walters Dec 2019

Privacy Law Issues In Public Blockchains: An Analysis Of Blockchain, Pipeda, The Gdpr, And Proposals For Compliance, Noah Walters

Canadian Journal of Law and Technology

Proponents of blockchain proclaim that the technology’s greatest innovation is trust. Blockchain create trust by serving as an indispensable ledger (a central point of truth), for all stakeholders to a transaction. Instead of companies managing and reconciling records of the same transaction in privately held databases, both sides of a transaction are recorded simultaneously on a shared ledger — the blockchain. As a result, the crypto economic environment is characterized by the decentralized coordination of business processes and transactions. Proponents of crypto-economics regard decentralized coordination as an opportunity for new forms of economic innovation, forms designed to increase value for …


Privacy And Connected Objects, Nicolas Karsenti Jun 2019

Privacy And Connected Objects, Nicolas Karsenti

Canadian Journal of Law and Technology

Our society perennially seeks to multiply its connectivity in the name of greater efficiency. Over the past few years, several devices that had previously been quite basic have been made ‘‘smarter” in order to facilitate a consumer’s life. A recent study highlights that some of the most common reasons for using ‘‘smart” objects are home automation and remote control. Thus, convenience is driving companies, particularly appliance makers, to connect their devices to the internet in order to make them ‘‘smart”. These range from intelligent thermostats, smart fridges, connected pacemakers, smart watches and personal assistants (PAs) such as Alexa, Siri or …


Big Brother Riding Shotgun: Internal Surveillance Of Semi-Autonomous Vehicles And Its Effects On The Reasonable Expectation Of Privacy, Tunca Bolca Jun 2019

Big Brother Riding Shotgun: Internal Surveillance Of Semi-Autonomous Vehicles And Its Effects On The Reasonable Expectation Of Privacy, Tunca Bolca

Canadian Journal of Law and Technology

The makers of autonomous vehicles (AVs) claim that their vehicles will reduce traffic accidents by 90 per cent and save millions of lives. Although this is yet to be proven, even if these new generation cars are made to be everything that the carmakers claim, accidents will still happen. Now, as the technology is progressing, governments and scholars are trying to come up with solutions to many legal, ethical and sociological problems the AVs will bring along.


Law And The “Sharing Economy”: Regulating Online Market Platforms By Derek Mckee, Finn Makela & Teresa Scassa, John D. Gregory Jun 2019

Law And The “Sharing Economy”: Regulating Online Market Platforms By Derek Mckee, Finn Makela & Teresa Scassa, John D. Gregory

Canadian Journal of Law and Technology

No abstract provided.


Digital Evidence: A Practitioner’S Handbook By Gerald Chan & Susan Magotiaux, Robert J. Currie Jun 2019

Digital Evidence: A Practitioner’S Handbook By Gerald Chan & Susan Magotiaux, Robert J. Currie

Canadian Journal of Law and Technology

No abstract provided.


Moving On From The Ombuds Model For Data Protection In Canada, Teresa Scassa Jun 2019

Moving On From The Ombuds Model For Data Protection In Canada, Teresa Scassa

Canadian Journal of Law and Technology

Both the Personal Information Protection and Electronic Documents Act (PIPEDA) and the Privacy Act adopt an ombuds model when it comes to addressing complaints by members of the public. This model is also present in other data protection laws, including public sector data protection laws at the provincial level, as well as personal health information protection legislation. The focus of this short paper is the model adopted in PIPEDA and its ongoing suitability. PIPEDA was designed to apply across the full range of private sector actors and is increasingly under strain in the big data society. These factors may make …


Moneyball In The Era Of Biometrics: Who Has Ownership Rights Over The Biometric Data Of Professional Athletes?, Christopher Casher Jan 2019

Moneyball In The Era Of Biometrics: Who Has Ownership Rights Over The Biometric Data Of Professional Athletes?, Christopher Casher

Dalhousie Journal of Legal Studies

The 2003 release of Michael Lewis’s book, Moneyball, brought into the mainstream a new paradigm for professional sports management: the use of statistical analysis to identify currently undervalued athletes in an effort to gain a competitive advantage. This pressure to accurately value athletes has led, in part, to the widespread collection of professional athletes’ biometric data. While biometric data can create many benefits, its misuse can lead to detrimental outcomes for the athletes, including inequitable contract negotiations, loss of potential revenue from monetization of said data, and a loss of privacy. Thus, this paper seeks to determine who holds the …


Privacy And Legal Automation: The Dmca As A Case Study, Jonathon Penney Jan 2019

Privacy And Legal Automation: The Dmca As A Case Study, Jonathon Penney

Articles, Book Chapters, & Popular Press

Advances in artificial intelligence, machine learning, computing capacity, and big data analytics are creating exciting new possibilities for legal automation. At the same time, these changes pose serious risks for civil liberties and other societal interests. Yet, existing scholarship is narrow, leaving uncertainty on a range of issues, including a glaring lack of systematic empirical work as to how legal automation may impact people’s privacy and freedom. This article addresses this gap with an original empirical analysis of the Digital Millennium Copyright Act (DMCA), which today sits at the forefront of algorithmic law due to its automated enforcement of copyright …


When Law Frees Us To Speak, Jonathon Penney, Danielle Citron Jan 2019

When Law Frees Us To Speak, Jonathon Penney, Danielle Citron

Articles, Book Chapters, & Popular Press

A central aim of online abuse is to silence victims. That effort is as regrettable as it is successful. In the face of cyber harassment and sexual privacy invasions, women and marginalized groups retreat from online engagement. These documented chilling effects, however, are not inevitable. Beyond its deterrent function, law has an equally important expressive role. In this article, we highlight law’s capacity to shape social norms and behavior through education. We focus on a neglected dimension of law’s expressive role—its capacity to empower victims to express their truths and engage with others. Our argument is theoretical and empirical. We …


When Law Frees Us To Speak, Danielle Citron, Jonathon Penney Jan 2019

When Law Frees Us To Speak, Danielle Citron, Jonathon Penney

Articles, Book Chapters, & Popular Press

A central aim of online abuse is to silence victims. That effort is as regrettable as it is successful. In the face of cyber harassment and sexual privacy invasions, women and marginalized groups retreat from online engagement. These documented chilling effects, however, are not inevitable. Beyond its deterrent function, law has an equally important expressive role. In this article, we highlight law’s capacity to shape social norms and behavior through education. We focus on a neglected dimension of law’s expressive role—its capacity to empower victims to express their truths and engage with others. Our argument is theoretical and empirical. We …