•  
  •  
 

Document Type

Article

Abstract

Lawful access—the legal regime that authorizes various methods used by law enforcement to intercept, search, or seize information for investigatory purposes—has been subject to much debate in Canada. However, those debates need a new solution space for the digital age. This must be able to incorporate new technological solutions for minimizing rights infringements and provide new forms of accountability and safeguards against misuse. This is not simply a matter of adopting the popular framework of “privacy by design,” or even a reworked “lawful access by design.” We argue that an appreciation of the challenges of the digital world requires us to rethink our basic constitutional framework. The Canadian constitutional framework for lawful access was set out by the Supreme Court of Canada in Hunter v Southam and was then refined in the subsequent jurisprudence. We argue that this framework is ill-suited to contemporary digital challenges to informational privacy and requires four fundamental shifts. First, this framework’s basic point-of-collection focus needs to shift to the broader life cycle of the data. Second, this framework needs to shift away from its categorical approach to informational privacy, where some categories of information are thought to be inherently more private than others, and instead approach informational privacy in terms of the use-context of the data. Third, this framework needs to shift away from its exclusive focus on procedural safeguards at the point of collection (e.g., the warrant requirement), and consider procedural, legislative, and technical safeguards throughout the life cycle of the data as well. Overall, this framework needs to shift away from a dominant focus on privacy and recognize a broader set of rights and interests at stake in lawful access practices, including the rule of law, equality, and other fundamental freedoms. Once we have a constitutional framework that is better able to address the digital era, then we can more precisely craft new techniques for protecting rights, ensuring accountability, and safeguarding against abuse within this framework. Indeed, we can then see why some of these techniques are constitutional requirements. The payoff for doing so, we argue, is a way of enabling specific justified uses of data by law enforcement, while safeguarding the data against non-justified uses over its life span.

Creative Commons License

Creative Commons License
This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 4.0 License.

3652 Austin Slane.epub (171 kB)
EPUB version (e-reader software required)

Included in

Law Commons

Share

COinS