Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 16 of 16

Full-Text Articles in Law

Towards An Effective Regime Against Online Copyright Infringement In India, Ashwin Ramakrishnan May 2017

Towards An Effective Regime Against Online Copyright Infringement In India, Ashwin Ramakrishnan

LLM Theses

With Internet usage on the rise, it is important for India to establish an effective regulatory regime to combat piracy and mass copyright infringement online. This thesis argues that, in the face of unique legal and cultural challenges specific to India, present laws in the country have failed to do so. Unless and until these challenges are met it will be difficult to have an effective mechanism that deals with online copyright infringement. Countries like the United States, Canada, Ireland, and France have all adopted different regulatory models. However, this thesis argues that each not only have significant limitations on …


Individual Licensing And Consumer Protection, Lucie Guibault Jan 2017

Individual Licensing And Consumer Protection, Lucie Guibault

Articles, Book Chapters, & Popular Press

Copyright law is not primarily directed at consumers. Their interests are therefore only marginally accounted for, as the copyright rules exempt specific uses of works from the right holder’s control. This chapter examines the impact of digital technology on the position of consumers of licensed copyrighted content. While ownership of the physical embodiment of a work does not entail the ownership of the rights in the work, how does copyright law deal with ‘disembodied’ works? Whereas digital content is now commonly distributed on the basis of individual licensing schemes, what does it mean for consumers? Do they have a claim …


War In The Expanse: The Metaphysics Of Cyberspace, Roy Balleste Jan 2017

War In The Expanse: The Metaphysics Of Cyberspace, Roy Balleste

Canadian Journal of Law and Technology

No abstract provided.


The Law Of Cyber Warfare: Restrictions, Opportunities And Loopholes, Nicholas Tsagourias Jan 2017

The Law Of Cyber Warfare: Restrictions, Opportunities And Loopholes, Nicholas Tsagourias

Canadian Journal of Law and Technology

The article considers the applicability of existing international rules on the use of force to cyber attacks and assesses their effectiveness. The author’s conclusion is that the current regime on the use of force fails to capture the particularities of cyber attacks and for this reason he makes some tentative proposals for enhancing security in this area.


Cyber Operations And The Humanization Of International Humanitarian Law: Problems And Prospects, Giacomo Biggio Jan 2017

Cyber Operations And The Humanization Of International Humanitarian Law: Problems And Prospects, Giacomo Biggio

Canadian Journal of Law and Technology

The aim of International Humanitarian Law (‘‘IHL”) is to regulate the conduct of hostilities while, at the same time, balancing the two overarching concepts of military necessity and humanity. While the principle of military necessity allows a party to a conflict to exercise any amount of armed violence which is necessary for the accomplishment of a military purpose, the principle of humanity aims at minimizing the amount of physical violence caused to combatants and the civilian population. From the late 19th century onwards the principle of humanity has progressively eroded the domain of military necessity, influencing the creation and interpretation …


Do They Want To Regulate Online Profiling?, Laura Garcia Vargas Jan 2017

Do They Want To Regulate Online Profiling?, Laura Garcia Vargas

Canadian Journal of Law and Technology

Online profiling or behavioural tracking is the process by which private companies track and gather data about users’ activities in online platforms. The data collected by all the companies is aggregated with the purpose of creating a comprehensive profile about users. Since at least 15 years ago, there have been several attempts to regulate online profiling in order to reduce its privacy implications. In general, these regulations have tried to limit the way the information is used, the type of data that is collected, and impose or suggest the security standards that the companies should take to protect it.

This …


The Dark Web: Some Thoughts For An Educated Debate, Vanessa Henri Jan 2017

The Dark Web: Some Thoughts For An Educated Debate, Vanessa Henri

Canadian Journal of Law and Technology

The ‘‘dark web” is a part of cyberspace that is only accessible through an anonymity software, such as The Onion Router. This encrypted network has prompted important legal challenges. As jurisprudence develops, many factors are at risk of inhibiting users’ right to privacy. Misunderstandings of the dark web’s functioning or myths regarding its veil of anonymity has justified invasive criminal investigations that has threatened users’ right to remain anonymous online. This article discusses these challenges while analyzing current legal developments in the United States and Canada.


Third-Party Services As Potential Sources For Law Enforcement Procurement Of Genomic Data, Katherine Kwong Jan 2017

Third-Party Services As Potential Sources For Law Enforcement Procurement Of Genomic Data, Katherine Kwong

Canadian Journal of Law and Technology

This paper examines two cases studies: Ancestry.com’s experience with law enforcement use of its genetic databases, and 23andMe’s responses to requests for users’ genomic data. Analyzing the responses to law enforcement requests by the two of the largest providers of third-party genomic services provides insight into the struggles third-party genomic services are likely to face and possible future directions for companies facing this type of law enforcement request.


Do Androids Dream Of Bad News?, Heidi Liu Jan 2017

Do Androids Dream Of Bad News?, Heidi Liu

Canadian Journal of Law and Technology

Breaking bad news is one of the toughest things to do in any field dealing with client care. As automation and technology increasingly interweave with human experience, there is growing concern about whether automated agents (‘‘AAs”) would be adequate to perform such a complex emotional act. In this paper, I draw from the literature in psychology and computer science to understand how individuals might react to automated agents (AAs) and address some of the strengths and limitations of AAs. I raise several legal and empirical issues that future designers and users of AAs must consider, including disclosure of and liability …


Can You Hear Me Now? Conceptions Of Privacy In Section 8, Chris Sewrattan Jan 2017

Can You Hear Me Now? Conceptions Of Privacy In Section 8, Chris Sewrattan

Canadian Journal of Law and Technology

This article will examine the different conceptions of privacy that are present in the jurisprudence of s. 8 of the Canadian Charter of Rights and Freedoms. Section 8 guarantees that everyone has the right against unreasonable search and seizure. As a constitutional right, the protection covers the privacy relationship between the state and the individual. It confers privacy over information for which there exists a reasonable expectation of privacy. The article will analyze a taxonomy of four privacy conceptions present in the literature and discuss their presence in s. 8 case law. It will then examine two criticisms that arise …


A Critical Assessment On The Extraterritorial Application Of Human Rights Treaties To Transnational Cyber Surveillance, Wanshu Cong Jan 2017

A Critical Assessment On The Extraterritorial Application Of Human Rights Treaties To Transnational Cyber Surveillance, Wanshu Cong

Canadian Journal of Law and Technology

In this essay, I question the appropriateness of applying the substantive requirements of lawful domestic surveillance developed from international human rights treaties and relevant case law to transnational cyber surveillance. And I argue in the negative. Therefore, for the purpose of this essay, I would not delve into the highly debatable issue of what counts as ‘‘control” in cyber surveillance and which standard of control triggers a state’s jurisdiction. Instead, this essay assumes that a control test was established. In the following section, I shall examine the substantive requirements for states restricting fundamental freedoms drawn on from current human rights …


A Whole New Meaning To Having Our Head In The Clouds: Voice Recognition Technology, The Transmission Of Our Oral Communications To The Cloud And The Ability Of Canadian Law To Protect Us From The Dangers It Presents, Sarit K. Mizrahi Jan 2017

A Whole New Meaning To Having Our Head In The Clouds: Voice Recognition Technology, The Transmission Of Our Oral Communications To The Cloud And The Ability Of Canadian Law To Protect Us From The Dangers It Presents, Sarit K. Mizrahi

Canadian Journal of Law and Technology

Voice recognition technology is now included in modern devices as a matter of course, being used in anything from our cellular telephones, to our televisions, and even the toys of our children. While we may voluntarily interact with some of our devices using this technology, such as conversing with Siri on our iPhones, many of us remain unaware as to the dangerous implications of using voice recognition technology.

Its ability to record some of our most personal conversations allows private companies to eavesdrop on us in an unprecedented manner and amass highly sensitive information about our lives that would have …


The Theoretical Case Against Criminalized Copyright Infringement In Canada, Maria Dugas Jan 2017

The Theoretical Case Against Criminalized Copyright Infringement In Canada, Maria Dugas

Articles, Book Chapters, & Popular Press

Criminalized copyright infringement has existed in Canada for close to a century. It has continued to expand in scope and severity since its first appeared in the Copyright Act, 1921. As Canada approaches 2017’s scheduled review of the Copyright Act, the time has come to ask whether the criminalization of copyright and its enforcement is theoretically justifiable. Yet, Canadian scholarship on criminalized copyright infringement is particularly scarce; there is a noteworthy gap in the existing literature wherein no one has systematically argued against criminalized copyright infringement from a theoretical perspective. This thesis aims to fill that gap, setting out a …


Has The Era Of Privacy Come To An End?, Avner Levin Jan 2017

Has The Era Of Privacy Come To An End?, Avner Levin

Canadian Journal of Law and Technology

This keynote address to the 2016 McGill Law Graduate Conference provides a brief history of privacy before discussing contemporary challenges in the form of increasing technological ability to create, store and process personal information, and powerful advocacy against privacy from both government and the private sector. In order for privacy to survive, a new set of personal information protection principles is required and new ways of enforcing these principles must be developed, which will leverage the power of technology to develop hybrid regulatory/ technological solutions, such as Google’s content removal tool.


The Lawful Access Fallacy: Voluntary Warrantless Disclosures, Customer Privacy, And Government Requests For Subscriber Information, Matthew P. Ponsford Jan 2017

The Lawful Access Fallacy: Voluntary Warrantless Disclosures, Customer Privacy, And Government Requests For Subscriber Information, Matthew P. Ponsford

Canadian Journal of Law and Technology

This paper explores the recent legal, political, privacy, and communications developments surrounding warrantless government requests for basic subscriber information. I assert the current practice remains marred in secrecy and therefore poses a significant threat to Canadian civil liberties and privacy rights.


Privacy And Insurance In Canada, England, And France - How Does The Responsible Insurer Put Guidelines And Procedures In Place For Retaining And Destroying Personal Information, Christopher Whitehead Jan 2017

Privacy And Insurance In Canada, England, And France - How Does The Responsible Insurer Put Guidelines And Procedures In Place For Retaining And Destroying Personal Information, Christopher Whitehead

Canadian Journal of Law and Technology

In this article, I will be discussing records containing personal data or information, and how ‘‘guidelines and procedures” are ‘‘put . . . in place for retaining and destroying [such] information” by private-sector insurers carrying on business in Canada, England, and France. Where I discuss Canada, I use the examples of the law of Ontario — which belongs to the English legal tradition —and of Quebec — whose private law belongs to the French legal tradition. As it happens, these are the two traditions with which I have the most experience relating to personal information.