Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 13 of 13

Full-Text Articles in Law

Wired Identities: Retention And Destruction Of Personal Health Information In An Electronic World, Elaine Gibson Oct 2015

Wired Identities: Retention And Destruction Of Personal Health Information In An Electronic World, Elaine Gibson

Dalhousie Law Journal

This article examines the issue of the retention and destruction of personal health information. While legislation in Canada shows some attention to the issue of retaining health records, very little consideration has been given to their destruction. As technological advances have made indefinite retention feasible, serious privacy issues are now being raised by the lack of a standard related to the destruction of health records. The author argues that this issue needs to be explicitly addressed. The author analyzes this problem by looking at issues of autonomy, public good, inequality, and privacy as a social good before offering thoughts on …


"Three Parent Babies": Techniques Explained, Objections Examined, Rebecca Carr Jun 2015

"Three Parent Babies": Techniques Explained, Objections Examined, Rebecca Carr

Canadian Journal of Law and Technology

The UK Parliament has approved regulations, which come into force in October 2015, that permit the use of new treatment techniques to prevent the transmission of serious mitochondrial diseases from women to their children. The introduction of these techniques—which are not currently carried out in any country in the world—will fly in the face of the opposition that has been raised since discussions to permit clinical applications of the techniques first arose. After outlining some background to the techniques, this article briefly examines three of the objections that have been made against them: that the safety and effectiveness of the …


Leaving Dumb Phones Behind: A Commentary On The Warrantless Searches Of Smartphone Data Granted In R. V. Fearon, Jordan Fine Jun 2015

Leaving Dumb Phones Behind: A Commentary On The Warrantless Searches Of Smartphone Data Granted In R. V. Fearon, Jordan Fine

Canadian Journal of Law and Technology

Given the incredible rate of smartphone technological evolution, is it about time the Supreme Court of Canada devised a special test to give law enforcement agents significantly more power to search through phone data without a warrant upon arrest of a suspect? In R. v. Fearon, the majority did just that. But this article argues the opposite is true: the increasing potential for immense privacy infringements when police search powerful and constantly evolving technological devices demands a greater limitation to police powers.

In recent cases, the Supreme Court has agreed with the position that limitations are needed concerning computers. Additionally, …


Freedom Of Expression, Discrimination, And The Internet: Legislative Responses And Judicial Reactions, Talia Joundi Jun 2015

Freedom Of Expression, Discrimination, And The Internet: Legislative Responses And Judicial Reactions, Talia Joundi

Canadian Journal of Law and Technology

In Part I of this article, I argue that cyber racism is inextricably linked with systemic discrimination. The definition of systemic discrimination relied on was first provided by Judge Abella in the Report of the Royal Commission on Equality in Employment (Abella Report), which states that systemic discrimination points to practices or attitudes that can result in inequality of opportunity for individuals or groups. The Supreme Court of Canada has since adopted this definition, and in some instances, has acknowledged that systemic problems require systemic remedies. The purpose of this discussion is to demonstrate how situating cyber racism within the …


International Law Enforcement Access To User Data: A Survival Guide And Call For Action, Kate Westmoreland, Gail Kent Jun 2015

International Law Enforcement Access To User Data: A Survival Guide And Call For Action, Kate Westmoreland, Gail Kent

Canadian Journal of Law and Technology

Effectively accessing and using online evidence is a critical part of modern investigations and prosecutions, but also has significant implications for users’ privacy. The current system of international sharing of online data in criminal matters is a patchwork of domestic and international law that is slow, uncertain, and not well understood. This article provides an overview of the current system for foreign governments seeking user data from US-based Internet companies. After describing the way in which the system currently operates, it identifies problems with the system, and outlines the reform efforts that are beginning to emerge.


Possession Of "Extreme" Pornography: Where's The Harm?, Jonathan Clough Jun 2015

Possession Of "Extreme" Pornography: Where's The Harm?, Jonathan Clough

Canadian Journal of Law and Technology

For decades, the traditional Western liberal approach to obscene material has been that while the availability of such material may be restricted, individuals are free to possess it so long as they do not distribute to others. Prior to the advent of the Internet, traditional means of control were effective in limiting the availability of such material. However, free of traditional restrictions the Internet allows easy access to a vast array of pornographic material, some of which challenges the most liberal of societies including images of child abuse, sexual violence, bestiality, and necrophilia.

In 2008, the UK became one of …


Privacy Protection For Mobile Health (Mhealth) In Nigeria: A Consideration Of The Eu Regime For Data Protection As A Conceptual Model For Reforming Nigeria's Privacy Legislation, Olufunke Olawumi Salami Jan 2015

Privacy Protection For Mobile Health (Mhealth) In Nigeria: A Consideration Of The Eu Regime For Data Protection As A Conceptual Model For Reforming Nigeria's Privacy Legislation, Olufunke Olawumi Salami

LLM Theses

The use of mobile technologies to provide and deliver healthcare is known as Mobile Health. Nigeria is one of the countries witnessing a profound use of these technologies. While discussions have focused on the potentials of this technologies to address the challenges in the health system, nothing is said about the risks from unauthorized disclosure or misuse of health information provided by users. This becomes worse when Nigeria's laws do not offer adequate protection. As Mobile Health is a novelty to Nigeria, this thesis looks to relevant international standards on privacy protection. It does this by examining the European regime …


The Cycles Of Global Telecommunication Censorship And Surveillance, Jonathon Penney Jan 2015

The Cycles Of Global Telecommunication Censorship And Surveillance, Jonathon Penney

Articles, Book Chapters, & Popular Press

Internet censorship and surveillance is on the rise globally and cyber-warfare increasing in scope and intensity. To help understand these new threats commentators have grasped at historical analogies often with little regard for historical complexity or international perspective. Unfortunately, helpful new works on telecommunications history have focused primarily on U.S. history with little focus on international developments. There is thus a need for further internationally oriented investigation of telecommunications technologies, and their history. This essay attempts to help fill that void, drawing on case studies wherein global telecommunications technologies have been disrupted or censored — telegram censorship and surveillance, high …


An Introduction To The Intellectual Property Law Implications Of 3d Printing, Michael Rimock Jan 2015

An Introduction To The Intellectual Property Law Implications Of 3d Printing, Michael Rimock

Canadian Journal of Law and Technology

Put simply, 3D printing allows people to print physical objects that are scanned, downloaded, or created digitally. There are an astonishing number of uses, benefits, and advantages associated with 3D printing. However, as with any new technology with so much potential, 3D printing presents a number of threats and challenges to many who benefit from the way manufacturing currently operates. While 3D printers will likely have a tremendous economic and socio- cultural impact, the following will provide an overview of some of its implications relating to intellectual property law. I will begin by briefly discussing the history of 3D printing …


"Records Management Law" - A Necessary Major Field Of The Practice Of Law, Ken Chasse Jan 2015

"Records Management Law" - A Necessary Major Field Of The Practice Of Law, Ken Chasse

Canadian Journal of Law and Technology

‘‘Records management law” will be a necessary area of specialization because: (1) electronic records are now produced by most commercial, communication, transmission of data, and social, formal, and semi-formal interactions; (2) therefore they are the foundation of many kinds of legislation; (3) records are the most frequently used kind of evidence in legal proceedings; and, (4) electronic records are as important to daily living as are motor vehicles, and will become more important. But the legal infrastructure of statutes, guidelines, and case law that controls the use of electronic records as evidence is very inadequate because it ignores these facts: …


Technological Neutrality Explained & Applied To Cbc V. Sodrac, Cameron J. Hutchison Jan 2015

Technological Neutrality Explained & Applied To Cbc V. Sodrac, Cameron J. Hutchison

Canadian Journal of Law and Technology

This article explores technological neutrality in the factual context of CBC v. SODRAC, heard before the Supreme Court of Canada in March of 2015 with decision pending at the time of publication. After outlining the history of the case in the first part, this article concludes with an application of the principle of technological neutrality, as non-interference, to the case. The only result coherent with the Supreme Court’s prior case law is to not treat non-usable or dormant incidental copies as reproductions under the Act. The status of permanent copies that serve a useful and identifiable purpose, e.g. archived copies, …


Signing Your Next Deal With Your Twitter @Username: The Legal Uses Of Identity-Based Cryptography, Jillian Friedman Jan 2015

Signing Your Next Deal With Your Twitter @Username: The Legal Uses Of Identity-Based Cryptography, Jillian Friedman

Canadian Journal of Law and Technology

This article will look at the legal framework for electronic signatures under Canadian law and through the UNCITRAL Model Law on Electronic Signatures and evaluate the potential use of identity-based cryptography as a type of electronic signature. While most jurisdictions permit electronic signatures to replace their handwritten predecessors, the criteria of validity for an electronic signature range from liberal to restrictive. Public key infrastructure (PKI) cryptography schemes are considered to meet the juridical conditions of a legal signature under more rigorous legislation that requires an electronic signature to possess certain security attributes. In common law jurisdictions, digital signature schemes such …


Law As An Ally Or Enemy In The War On Cyberbullying: Exploring The Contested Terrain Of Privacy And Other Legal Concepts In The Age Of Technology And Social Media, A. Wayne Mackay Jan 2015

Law As An Ally Or Enemy In The War On Cyberbullying: Exploring The Contested Terrain Of Privacy And Other Legal Concepts In The Age Of Technology And Social Media, A. Wayne Mackay

Articles, Book Chapters, & Popular Press

This article focuses on the role and limits of law as a response to cyberbullying. The problem of cyberbullying engages many of our most fundamental legal concepts and provides an interesting case study. Even when there is general agreement that the problem merits a legal response, there are significant debates about what that response should be. Which level and what branch of government can and should best respond? What is the most appropriate legal process for pursuing cyberbullies—traditional legal avenues or more creative restorative approaches? How should the rights and responsibilities of perpetrators, victims and even bystanders be balanced? Among …