Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Privacy Law

Twenty Years After Krieger V Law Society Of Alberta: Law Society Discipline Of Crown Prosecutors And Government Lawyers, Andrew Flavelle Martin Oct 2023

Twenty Years After Krieger V Law Society Of Alberta: Law Society Discipline Of Crown Prosecutors And Government Lawyers, Andrew Flavelle Martin

Articles, Book Chapters, & Popular Press

Krieger v. Law Society of Alberta held that provincial and territorial law societies have disciplinary jurisdiction over Crown prosecutors for conduct outside of prosecutorial discretion. The reasoning in Krieger would also apply to government lawyers. The apparent consensus is that law societies rarely exercise that jurisdiction. But in those rare instances, what conduct do Canadian law societies discipline Crown prosecutors and government lawyers for? In this article, I canvass reported disciplinary decisions to demonstrate that, while law societies sometimes discipline Crown prosecutors for violations unique to those lawyers, they often do so for violations applicable to all lawyers — particularly …


Reasonable Expectations Of Privacy In An Era Of Drones And Deepfakes: Expanding The Supreme Court Of Canada’S Decision In R V Jarvis, Suzie Dunn, Kristen Mj Thomasen Jan 2021

Reasonable Expectations Of Privacy In An Era Of Drones And Deepfakes: Expanding The Supreme Court Of Canada’S Decision In R V Jarvis, Suzie Dunn, Kristen Mj Thomasen

Articles, Book Chapters, & Popular Press

Perpetrators of Technology-Facilitated gender-based violence are taking advantage of increasingly automated and sophisticated privacy-invasive tools to carry out their abuse. Whether this be monitoring movements through stalker-ware, using drones to non-consensually film or harass, or manipulating and distributing intimate images online such as deep-fakes and creepshots, invasions of privacy have become a significant form of gender-based violence. Accordingly, our normative and legal concepts of privacy must evolve to counter the harms arising from this misuse of new technology. Canada’s Supreme Court recently addressed Technology-Facilitated violations of privacy in the context of voyeurism in R v Jarvis (2019). The discussion of …


Dispute Settlement Under The African Continental Free Trade Area Agreement: A Preliminary Assessment, Olabisi D. Akinkugbe Nov 2020

Dispute Settlement Under The African Continental Free Trade Area Agreement: A Preliminary Assessment, Olabisi D. Akinkugbe

Articles, Book Chapters, & Popular Press

The African Continental Free Trade Area Agreement (AfCFTA) will add a new dispute settlement system to the plethora of judicial mechanisms designed to resolve trade disputes in Africa. Against the discontent of Member States and limited impact the existing highly legalized trade dispute settlement mechanisms have had on regional economic integration in Africa, this paper undertakes a preliminary assessment of the AfCFTA Dispute Settlement Mechanism (DSM). In particular, the paper situates the AfCFTA-DSM in the overall discontent and unsupportive practices of African States with highly legalized dispute settlement systems and similar WTO-Styled DSMs among other shortcomings. Notwithstanding the transplantation of …


Legal Risks Of Adversarial Machine Learning Research, Ram Shankar Siva Kumar, Jonathon Penney, Bruce Schneier, Kendra Albert Jan 2020

Legal Risks Of Adversarial Machine Learning Research, Ram Shankar Siva Kumar, Jonathon Penney, Bruce Schneier, Kendra Albert

Articles, Book Chapters, & Popular Press

Adversarial machine learning is the systematic study of how motivated adversaries can compromise the confidentiality, integrity, and availability of machine learning (ML) systems through targeted or blanket attacks. The problem of attacking ML systems is so prevalent that CERT, the federally funded research and development center tasked with studying attacks, issued a broad vulnerability note on how most ML classifiers are vulnerable to adversarial manipulation. Google, IBM, Facebook, and Microsoft have committed to investing in securing machine learning systems. The US and EU are likewise putting security and safety of AI systems as a top priority.

Now, research on adversarial …


More Than 'Revenge Porn' Civil Remedies For The Nonconsensual Distribution Of Intimate Images, Suzie Dunn, Alessia Petricone-Westwood Jan 2018

More Than 'Revenge Porn' Civil Remedies For The Nonconsensual Distribution Of Intimate Images, Suzie Dunn, Alessia Petricone-Westwood

Articles, Book Chapters, & Popular Press

The non-consensual distribution of intimate images, or “revenge porn” as it is colloquially known, is a growing phenomenon in the digital era that has devastated the lives of countless individuals. Targets of this conduct have suffered both short and long-lasting harms that have had serious repercussions on their mental health, physical well-being, and safety. Once their intimate images have been shared without their consent, they can face damage to their personal and professional reputations. There are reported cases where individuals have lost their jobs, have had to relocate, were stalked and harassed, experienced some form of emotional trauma, and had …


Book Review Of Passion: An Essay On Personality , Richard F. Devlin Frsc Jan 1985

Book Review Of Passion: An Essay On Personality , Richard F. Devlin Frsc

Articles, Book Chapters, & Popular Press

Passion is a cogently structured, compel Jingly argued and seductively enthralling masterpiece which, in years to come, will undoubtedly stand out as an inspirational source for many who seek social transformation. Unger's style, in this essay at least, is lucid and inviting. Substantively, Passion demonstrates not only the depth of his penetrating intellect but also his command of an array of' disciplines. Unger's polymathy is all the more impressive when we remember that ours is an era in which idiosyncratic specialization is the norm.