{"id":3263,"date":"2018-03-12T10:28:56","date_gmt":"2018-03-12T10:28:56","guid":{"rendered":"https:\/\/ccla.org\/?p=3263"},"modified":"2021-09-09T17:54:19","modified_gmt":"2021-09-09T17:54:19","slug":"cyberspace-law-and-web-privacy-violations","status":"publish","type":"post","link":"https:\/\/ccla.org\/fr\/get-informed\/talk-rights\/cyberspace-law-and-web-privacy-violations\/","title":{"rendered":"\u00ab\u00a0Loi sur le cyberespace\u00a0\u00bb et violations de la confidentialit\u00e9 sur le Web"},"content":{"rendered":"\n\t\t<div id=\"fws_6a12d0902d892\"  data-column-margin=\"default\" data-midnight=\"dark\"  class=\"wpb_row vc_row-fluid vc_row\"  style=\"padding-top: 0px; padding-bottom: 0px; \"><div class=\"row-bg-wrap\" data-bg-animation=\"none\" data-bg-animation-delay=\"\" data-bg-overlay=\"false\"><div class=\"inner-wrap row-bg-layer\" ><div class=\"row-bg viewport-desktop\"  style=\"\"><\/div><\/div><\/div><div class=\"row_col_wrap_12 col span_12 dark left\">\n\t<div  class=\"vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding inherit_tablet inherit_phone \"  data-padding-pos=\"all\" data-has-bg-color=\"false\" data-bg-color=\"\" data-bg-opacity=\"1\" data-animation=\"\" data-delay=\"0\" >\n\t\t<div class=\"vc_column-inner\" >\n\t\t\t<div class=\"wpb_wrapper\">\n\t\t\t\t\n\t\t<div id=\"fws_6a12d0902dc63\"  data-column-margin=\"default\" data-midnight=\"dark\"  class=\"wpb_row vc_row-fluid vc_row full-width-section\"  style=\"padding-top: 0px; padding-bottom: 0px; \"><div class=\"row-bg-wrap\" data-bg-animation=\"none\" data-bg-animation-delay=\"\" data-bg-overlay=\"true\"><div class=\"inner-wrap row-bg-layer\" ><div class=\"row-bg viewport-desktop\"  style=\"\"><\/div><\/div><div class=\"row-bg-overlay row-bg-layer\" style=\"background: rgba(0,0,0,0.3); background: linear-gradient(to bottom,rgba(0,0,0,0.3) 0%,rgba(238,238,238,0.01) 100%);  opacity: 0.5; \"><\/div><\/div><div class=\"row_col_wrap_12 col span_12 dark left\">\n\t<div  class=\"vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding inherit_tablet inherit_phone \"  data-padding-pos=\"all\" data-has-bg-color=\"false\" data-bg-color=\"\" data-bg-opacity=\"1\" data-animation=\"\" data-delay=\"0\" >\n\t\t<div class=\"vc_column-inner\" >\n\t\t\t<div class=\"wpb_wrapper\">\n\t\t\t\t<div class=\"divider-wrap\" data-alignment=\"default\"><div style=\"height: 10px;\" class=\"divider\"><\/div><\/div>\n\t\t\t<\/div> \n\t\t<\/div>\n\t<\/div> \n<\/div><\/div>\n\n\t\t\t<\/div> \n\t\t<\/div>\n\t<\/div> \n<\/div><\/div>\n\t\t<div id=\"fws_6a12d0902df29\"  data-column-margin=\"default\" data-midnight=\"dark\" data-top-percent=\"4%\" data-bottom-percent=\"4%\"  class=\"wpb_row vc_row-fluid vc_row full-width-section post-links\"  style=\"padding-top: calc(100vw * 0.04); padding-bottom: calc(100vw * 0.04); \"><div class=\"row-bg-wrap\" data-bg-animation=\"none\" data-bg-animation-delay=\"\" data-bg-overlay=\"false\"><div class=\"inner-wrap row-bg-layer\" ><div class=\"row-bg viewport-desktop\"  style=\"\"><\/div><\/div><\/div><div class=\"row_col_wrap_12 col span_12 dark left\">\n\t<div  class=\"vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding inherit_tablet inherit_phone \"  data-padding-pos=\"all\" data-has-bg-color=\"false\" data-bg-color=\"\" data-bg-opacity=\"1\" data-animation=\"\" data-delay=\"0\" >\n\t\t<div class=\"vc_column-inner\" >\n\t\t\t<div class=\"wpb_wrapper\">\n\t\t\t\t<div class=\"divider-wrap\" data-alignment=\"default\"><div style=\"height: 30px;\" class=\"divider\"><\/div><\/div>\n<div class=\"wpb_text_column wpb_content_element \" >\n\t<div class=\"wpb_wrapper\">\n\t\t<div class=\"entry-meta\">\n<p><span class=\"posted-on\"><time class=\"entry-date published\" datetime=\"2018-03-12T12:00:06-04:00\">March 12, 2018<\/time><\/span><\/p>\n<\/div>\n<div class=\"shapely-content \">\n<p><em>Because the Learn section of TalkRights features content produced by CCLA volunteers and interviews with experts in their own words, opinions expressed here do not necessarily represent the CCLA\u2019s own policies or positions. For official publications, key reports, position papers, legal documentation, and up-to-date news about the CCLA\u2019s work\u00a0<a href=\"https:\/\/ccla.org\/?page_id=27\" target=\"_blank\" rel=\"noopener\">check out the In Focus section of our website.<\/a><\/em><\/p>\n<p>&nbsp;<\/p>\n<p>Amidst the many cyberspace laws that are enacted worldwide to respond to the constant growth of new issues faced in the online world, some of the biggest crimes committed online, including those related to privacy, seem to go unpunished\u00a0<a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftn1\" name=\"_ftnref1\">[1]<\/a>. For instance, in 2014 Yahoo stated that more than 500 million of its user accounts had been hacked and the personal data they contained sold\u00a0<a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftn2\" name=\"_ftnref2\">[2]<\/a>. Yet, although it is alleged that Yahoo had concealed its knowledge of the massive breach and only revealed it two years later in 2016, the consequences faced by the Telecom giant for this massive cybersecurity breach were financial and reputational, not legal<a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftn3\" name=\"_ftnref3\">\u00a0[3]<\/a>. Indeed, enacting proper legislation to regulate online behavior is only half the battle: this is because while new laws are created to face new problems that arise, enforcing cyberspace Law is intrinsically more difficult than the enforcement of \u201ctraditional laws\u201d, for a number of reasons listed below\u00a0<a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftn4\" name=\"_ftnref4\">[4]<\/a>:<\/p>\n<p><strong><u>What is Cyberspace Law?<\/u><\/strong><\/p>\n<p>Cyberspace Law, or \u201cCyberlaw\u201d, is a term that refers to the aggregation of legal issues arising over the Internet\u00a0<a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftn5\" name=\"_ftnref5\">[5]<\/a>. Cyberspace Law regulates many areas including e-commerce (i.e. corporate liability of Internet providers and social media outlets), cyber crimes (crimes committed over the Internet, which in most cases have an impact on the victim\u2019s information privacy) and privacy concerns\u00a0<a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftn6\" name=\"_ftnref6\">[6]<\/a>.<\/p>\n<ol>\n<li><strong><u>Jurisdictional Issues<\/u><\/strong><\/li>\n<\/ol>\n<p>The difficulty in prosecuting online behaviour stems first and foremost from issues pertaining to jurisdiction<a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftn7\" name=\"_ftnref7\">[7]<\/a>. The term \u201cjurisdiction\u201d refers to the authority of a sovereign state to regulate certain conduct<a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftn8\" name=\"_ftnref8\">[8]<\/a>. This is due to the fact that before a law enforcement agency can investigate a cybercrime case, it has to have jurisdiction\u00a0<a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftn9\" name=\"_ftnref9\">[9]<\/a>. Essentially, the challenge when it comes to jurisdiction issues lies in determining which agency or court has the authority in a particular matter to administer justice\u00a0<a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftn10\" name=\"_ftnref10\">[10]<\/a>. This is significant because if a court lacks jurisdiction or is not competent to try a case the proceedings are nullified, no matter how strong the evidence is or how well conducted the case may be\u00a0<a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftn11\" name=\"_ftnref11\">[11]<\/a>.<\/p>\n<p>Conflicts regarding jurisdiction can be based on a number of different things, including: the branch of law (ex: criminal law vs. international law), Type of case (i.e. criminal cases vs. international law cases), the \u201cGrade\u201d (or seriousness) of\u00a0 the offense (i.e. summary offenses vs. indictable offenses), monetary damages (i.e. different courts handle cases based on the minimum or maximum monetary damages that can be obtained from a particular type of lawsuit), and the level of government (i.e. there are separate laws, law enforcement agencies and court systems for the different levels of government, for example, Federal vs. Provincial. Therefore, the difficulty here is determining which laws apply to a particular case or offense based on the level of government)<a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftn12\" name=\"_ftnref12\">[12]<\/a>. Finally, jurisdiction and jurisdiction issues are largely based on the geographical area\u00a0<a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftn13\" name=\"_ftnref13\">[13]<\/a>.<\/p>\n<p>Geographical jurisdiction is one of the most significant factors that make it hard for law enforcement authorities to regulate online behaviour; this is because a particular law enforcement agency or court has jurisdiction only over crimes that take place in the geographic location where the agency or court has authority\u00a0<a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftn14\" name=\"_ftnref14\">[14]<\/a>. This generally includes the location of the perpetrator, the location of the victim, or the location where the crime actually occurred\u00a0<a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftn15\" name=\"_ftnref15\">[15]<\/a>. In the context of the Internet, this can often be much more difficult to determine than in the real world because, as we will elaborate later on, the anonymous aspect of the Internet and the digital nature of the evidence makes it much more difficult for authorities to bring wrongdoers to justice\u00a0<a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftn16\" name=\"_ftnref16\">[16]<\/a>. For instance, determining geographic jurisdiction for cybercrimes when it comes to Cyberspace law is more difficult than for \u201ctraditional\u201d (or \u201cterrestrial\u201d) crimes because often the perpetrator is not in the same city or country as the victim<a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftn17\" name=\"_ftnref17\">[17]<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<p>To determine whether a law agency or court has jurisdiction, it must first determine whether a crime has actually taken place at all; In some cases, there is no law that covers the particular circumstance, and in others, the wrongful action that took place is a civil matter, not a criminal one\u00a0<a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftn18\" name=\"_ftnref18\">[18]<\/a>. For instance, if you entrusted your data to a company (eg. Yahoo and other social media platforms) and this company lost it, although the consequences for one can be disastrous there is no criminal recourse available to the victim\u00a0<a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftn19\" name=\"_ftnref19\">[19]<\/a>. Second, if a criminal offense has occurred, then the next step is to determine what law was violated\u00a0<a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftn20\" name=\"_ftnref20\">[20]<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<p><strong><u>Why is Geographic Jurisdiction Such a Big Problem When it Comes to Legislation?<\/u><\/strong><\/p>\n<p>Geographic jurisdiction is a big problem when it comes to regulating online behaviour because laws differ from country to country, and even from province to province\u00a0<a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftn21\" name=\"_ftnref21\">[21]<\/a>; therefore, an act that\u2019s illegal in one location may not be against the law in another\u00a0<a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftn22\" name=\"_ftnref22\">[22]<\/a>. For instance, if a perpetrator is in a location where what he is doing is not against the law but is a crime in the location where the victim is, it will be difficult (if not impossible) to prosecute him\u00a0<a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftn23\" name=\"_ftnref23\">[23]<\/a>. This is because law enforcement agencies are only authorized to enforce the law within their jurisdictions\u00a0<a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftn24\" name=\"_ftnref24\">[24]<\/a>. For instance, a police officer in Ontario doesn\u2019t have the authority to arrest someone in Quebec, and the Royal Canadian Mounted Police (RCMP) doesn\u2019t have the authority to arrest someone in the United States\u00a0<a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftn25\" name=\"_ftnref25\">[25]<\/a>.<\/p>\n<p>Moreover, certain measures exist in international law that render possible the prosecution of individuals who commit crimes in another country, but the process is difficult, expensive and long to accomplish<a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftn26\" name=\"_ftnref26\">[26]<\/a>. For instance, even though international law does not require countries to surrender a criminal or suspect to another, some countries have what are called \u201cMutual Legal Assistance Treaties\u201d by which they mutually agree to do so<a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftn27\" name=\"_ftnref27\">[27]<\/a>. However, those treaties generally require \u201cdouble criminality\u201d, which means that the action by the perpetrator must be considered a crime in both the jurisdiction where the perpetrator is located and the jurisdiction where the act was committed<a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftn28\" name=\"_ftnref28\">[28]<\/a>. In addition, determining where the act was committed in the online context is another challenge in and by itself<a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftn29\" name=\"_ftnref29\">[29]<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<ol start=\"2\">\n<li><strong><u>Anonymity and Identity<\/u><\/strong><\/li>\n<\/ol>\n<p>Anonymity is also considered to be one of the biggest obstacles against global efforts to regulate online behaviour\u00a0<a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftn30\" name=\"_ftnref30\">[30]<\/a>. Over the Internet, concealing one\u2019s identity is far easier to do than in the real world, which makes it more difficult for law enforcement authorities to track down perpetrators and uncover their identity\u00a0<a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftn31\" name=\"_ftnref31\">[31]<\/a>. When it comes to legislation, this is significant because if the identities of wrongdoers are incapable of being traced, any law that is put into place to hold individuals or businesses accountable for their actions over the Internet, no matter how well crafted or intended, cannot work and is therefore completely useless\u00a0<a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftn32\" name=\"_ftnref32\">[32]<\/a>. At the same time, anonymity is an essential privacy protection, relied upon in particular to human rights defenders, vulnerable groups or individuals in oppressive regimes, and everyday citizens wishing to communicate privately.<\/p>\n<p>&nbsp;<\/p>\n<ol start=\"3\">\n<li><strong><u>Nature of the Evidence (Digital Evidence)<\/u><\/strong><\/li>\n<\/ol>\n<p>The digital nature of the evidence is another factor that makes cyber crimes more difficult to prosecute\u00a0<a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftn33\" name=\"_ftnref33\">[33]<\/a>. Indeed, digital evidence can be easily lost or changed as compared to \u201creal world\u201d evidence\u00a0<a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftn34\" name=\"_ftnref34\">[34]<\/a>. For instance, cyber criminals have greater ability to erase evidence, and investigators can accidentally lose or destroy the evidence simply by examining or trying to access it\u00a0<a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftn35\" name=\"_ftnref35\">[35]<\/a>. At the same time, it is also possible that digital evidence can be restored in some circumstances, and standards can be developed to establish the evidentiary value of digital evidence over time.<\/p>\n<p>The branch of the law that comprises all the rules regarding the presentation of facts and proofs in proceedings before a court, including the rules that determine which evidence is admissible or not, is the law of evidence\u00a0<a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftn36\" name=\"_ftnref36\">[36]<\/a>. In addition, the law of evidence varies across countries and legal systems, which further explains why jurisdiction is such a big problem when it comes to prosecuting wrongful behavior online\u00a0<a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftn37\" name=\"_ftnref37\">[37]<\/a>.<\/p>\n<ol start=\"4\">\n<li><strong><u>Legal Conception and Expectation of Privacy<\/u><\/strong><\/li>\n<\/ol>\n<p>The reliance of some nations on outdated conceptions of privacy can also complicate the prosecution of cybercrimes<a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftn38\" name=\"_ftnref38\">[38]<\/a>. In some countries, the legal conception of privacy is still based (in some respects) on pre-Information Age concepts and precedents that do not reflect our actuality<a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftn39\" name=\"_ftnref39\">[39]<\/a>. For example: in\u00a0<em>California v. Greenwood, 486 U.S. 35 (1988)<\/em>, the defendant\u2019s trash which was left outside on the curb was searched without a warrant and the drug paraphernalia found inside was used as evidence to convict him\u00a0<a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftn40\" name=\"_ftnref40\">[40]<\/a>. The Court of Appeal affirmed that Greenwood\u2019s privacy had not been invaded by the search because \u201cthere was no expectation of privacy for things left [outside] that the public could access, and therefore privacy did not apply to the trash left for the public to see\u201d\u00a0<a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftn41\" name=\"_ftnref41\">[41]<\/a>. Although this ruling took place in 1988 (i.e. before the Internet started becoming accessible to the public in 1991), it still applies to current computer technology and the Internet\u00a0<a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftn42\" name=\"_ftnref42\">[42]<\/a>. Some scholars argue that this significant because it basically means that personal information left out in a public domain or on the Internet, whether it is trash on the curb or a web site for example, is viewed as the same from a legal perspective\u00a0<a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftn43\" name=\"_ftnref43\">[43]<\/a>. Canadian courts, however, are developing a more nuanced view in recent cases<a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftn44\" name=\"_ftnref44\">[44].<\/a><\/p>\n<p><strong><u>Conclusion<\/u><\/strong><\/p>\n<p>Although many countries enact cyberlaws in order to keep up with the development of computer technology and the ever-changing online environment, Cyberspace law is a relatively new field that contains loopholes that, as explained above, can render the application of those laws quite difficult\u00a0<a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftn45\" name=\"_ftnref45\">[45]<\/a>. Furthermore, the concept of \u201creasonable expectation of privacy\u201d is being debated, re-framed, and problematized in light of the changing ways in which information online can be collected, shared, stored, and accessed.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftnref1\" name=\"_ftn1\">[1]<\/a>\u00a0Shinder, Deb. 2011. \u00ab\u00a0What Makes Cybercrime Laws So Difficult To Enforce\u00a0\u00bb.\u00a0<em>Published January 26th 2011 on TechRepublic.com.\u00a0<\/em>Accessed January 4th 2018\u00a0:\u00a0<a href=\"https:\/\/www.techrepublic.com\/blog\/it-security\/what-makes-cybercrime-laws-so-difficult-to-enforce\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.techrepublic.com\/blog\/it-security\/what-makes-cybercrime-laws-so-difficult-to-enforce\/<\/a><\/p>\n<p><a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftnref2\" name=\"_ftn2\">[2]<\/a>\u00a0\u00a0Fiegerman, Seth. 2016. \u201cYahoo Says 500 Million Accounts Stolen\u201d.\u00a0<em>Published September 23<sup>rd<\/sup>\u00a02016 on the CNN official website.\u00a0<\/em>Accessed January 8<sup>th<\/sup>\u00a02017:\u00a0<a href=\"http:\/\/money.cnn.com\/2016\/09\/22\/technology\/yahoo-data-breach\/index.html\" target=\"_blank\" rel=\"noopener\">http:\/\/money.cnn.com\/2016\/09\/22\/technology\/yahoo-data-breach\/index.html<\/a><\/p>\n<p><a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftnref3\" name=\"_ftn3\">[3]<\/a>\u00a0<em>Supra Note 2<\/em><\/p>\n<p><a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftnref4\" name=\"_ftn4\">[4]<\/a>\u00a0Valiquet, Dominique. 2011. \u201cCybercrime: Issues\u201d.\u00a0<em>Library of Parliament<\/em>\u00a0<em>Research Publications, Background Paper<\/em>\u00a0No. 2011-36-E. Published April 5<sup>th<\/sup>\u00a02011 on the Parliament of Canada website. Accessed January 9<sup>th<\/sup>\u00a02018:\u00a0<a href=\"https:\/\/lop.parl.ca\/Content\/LOP\/ResearchPublications\/2011-36-e.htm#a2\" target=\"_blank\" rel=\"noopener\">https:\/\/lop.parl.ca\/Content\/LOP\/ResearchPublications\/2011-36-e.htm#a2<\/a><\/p>\n<p><a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftnref5\" name=\"_ftn5\">[5]<\/a>\u00a0LaManche. 2017. \u00ab\u00a0Lawyer Library\u00a0: Guide to Cyberspace Law\u00a0\u00bb.\u00a0<em>Published on the\u00a0 Legal Match official website.\u00a0<\/em>Accessed January 7th 2017\u00a0:\u00a0<a href=\"https:\/\/www.legalmatch.com\/cyberspace-law-guide.html\" target=\"_blank\" rel=\"noopener\">https:\/\/www.legalmatch.com\/cyberspace-law-guide.html<\/a><\/p>\n<p><a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftnref6\" name=\"_ftn6\">[6]<\/a>\u00a0<em>Supra Note 1<\/em><\/p>\n<p><a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftnref7\" name=\"_ftn7\">[7]<\/a>\u00a0\u00a0Ajayi, E.F.G. 2016. \u201cChallenges to Enforcement of Cyber-crimes Law and Policy\u201d.\u00a0<em>Journal of Internet and Information Systems\u00a0<\/em>Vol. 6 (1). DOI: 10.5897\/JIIS2015.0089. Published August 2016. Accessed January 9th 2018\u00a0:\u00a0<a href=\"https:\/\/ccla.org\/privacy-policy\/\" target=\"_blank\" rel=\"noopener\">http:\/\/www.academicjournals.org\/journal\/JIIS\/article-full-text-pdf\/930ADF960210<\/a>. Page 4.<\/p>\n<p><a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftnref8\" name=\"_ftn8\">[8]<\/a>\u00a0International Telecommunications Union (ITU). 2015. \u201cUnderstanding Cybercrime: Phenomena, Challenges and Legal Response\u201d. Published April 28<sup>th<\/sup>\u00a02015 on the ITU official website. Accessed January 9<sup>th<\/sup>\u00a02018:\u00a0<a href=\"http:\/\/www.itu-ilibrary.org\/science-and-technology\/understanding-cybercrime_pub\/80c0b5e9-en\" target=\"_blank\" rel=\"noopener\">http:\/\/www.itu-ilibrary.org\/science-and-technology\/understanding-cybercrime_pub\/80c0b5e9-en<\/a>. Page 228.<\/p>\n<p><a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftnref9\" name=\"_ftn9\">[9]<\/a>\u00a0<em>Supra Note 7, page 5.<\/em><\/p>\n<p><a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftnref10\" name=\"_ftn10\">[10]<\/a>\u00a0<em>Supra Note 7, page 5.<\/em><\/p>\n<p><a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftnref11\" name=\"_ftn11\">[11]<\/a>\u00a0<em>Supra Note 7, page 4.<\/em><\/p>\n<p><a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftnref12\" name=\"_ftn12\">[12]<\/a>\u00a0<em>Supra Note 1<\/em><\/p>\n<p><a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftnref13\" name=\"_ftn13\">[13]<\/a>\u00a0<em>Supra Note 1<\/em><\/p>\n<p><a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftnref14\" name=\"_ftn14\">[14]<\/a>\u00a0<em>Supra Note 7, page 5.<\/em><\/p>\n<p><a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftnref15\" name=\"_ftn15\">[15]<\/a>\u00a0<em>Supra Note 1<\/em><\/p>\n<p><a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftnref16\" name=\"_ftn16\">[16]<\/a>\u00a0<em>Supra Note 8,\u00a0 pages 80, 227-228.<\/em><\/p>\n<p><a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftnref17\" name=\"_ftn17\">[17]<\/a>\u00a0<em>Supra Note 1<\/em><\/p>\n<p><a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftnref18\" name=\"_ftn18\">[18]<\/a>\u00a0<em>Supra Note 1<\/em><\/p>\n<p><a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftnref19\" name=\"_ftn19\">[19]<\/a>\u00a0<em>Supra Note 2<\/em><\/p>\n<p><a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftnref20\" name=\"_ftn20\">[20]<\/a>\u00a0<em>Supra Note 1<\/em><\/p>\n<p><a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftnref21\" name=\"_ftn21\">[21]<\/a>\u00a0<em>Supra Note 1<\/em><\/p>\n<p><a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftnref22\" name=\"_ftn22\">[22]<\/a>\u00a0<em>Supra Note 1<\/em><\/p>\n<p><a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftnref23\" name=\"_ftn23\">[23]<\/a>\u00a0<em>Supra Note 8, page 235.<\/em><\/p>\n<p><a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftnref24\" name=\"_ftn24\">[24]<\/a>\u00a0<em>Supra Note 7, page 5.<\/em><\/p>\n<p><a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftnref25\" name=\"_ftn25\">[25]<\/a>\u00a0<em>Supra Note 1<\/em><\/p>\n<p><a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftnref26\" name=\"_ftn26\">[26]<\/a>\u00a0<em>Supra Note 5<\/em><\/p>\n<p><a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftnref27\" name=\"_ftn27\">[27]<\/a>\u00a0<em>Supra Note 5<\/em><\/p>\n<p><a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftnref28\" name=\"_ftn28\">[28]<\/a>\u00a0<em>Supra Note 5<\/em><\/p>\n<p><a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftnref29\" name=\"_ftn29\">[29]<\/a>\u00a0<em>Supra Note 5<\/em><\/p>\n<p><a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftnref30\" name=\"_ftn30\">[30]<\/a>\u00a0<em>Supra Note 7, page 4.<\/em><\/p>\n<p><a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftnref31\" name=\"_ftn31\">[31]<\/a>\u00a0<em>Supra Note 7, page 4.<\/em><\/p>\n<p><a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftnref32\" name=\"_ftn32\">[32]<\/a>\u00a0<em>Supra Note 7, page 4.<\/em><\/p>\n<p><a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftnref33\" name=\"_ftn33\">[33]<\/a>\u00a0<em>Supra Note 7, page 7.<\/em><\/p>\n<p><a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftnref34\" name=\"_ftn34\">[34]<\/a>\u00a0<em>Supra Note 7, page 7.<\/em><\/p>\n<p><a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftnref35\" name=\"_ftn35\">[35]<\/a>\u00a0<em>Supra Note 8,\u00a0<\/em>pages 227 and 228.<\/p>\n<p><a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftnref36\" name=\"_ftn36\">[36]<\/a>\u00a0<em>Supra Note 7, page 7.<\/em><\/p>\n<p><a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftnref37\" name=\"_ftn37\">[37]<\/a>\u00a0Debesu, Kahsay and Andualem Eshetu. 2012. \u201cEvidence in Civil and Common Law Legal Systems\u201d.\u00a0<em>Published September 4<sup>th<\/sup>\u00a02012 on the Abyssinia Law official website.\u00a0<\/em>Accessed January 9<sup>th<\/sup>\u00a02018:\u00a0<a href=\"http:\/\/www.abyssinialaw.com\/study-on-line\/item\/934-evidence-in-civil-and-common-law-legal-systems\" target=\"_blank\" rel=\"noopener\">http:\/\/www.abyssinialaw.com\/study-on-line\/item\/934-evidence-in-civil-and-common-law-legal-systems<\/a><\/p>\n<p><a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftnref38\" name=\"_ftn38\">[38]<\/a>\u00a0Subramanian, Ramesh and Steven Sedita. 2006. \u201cAre Cybercrime Laws Keeping Up With the Triple Convergence of Information, Innovation and Technology?\u201d\u00a0<em>Communications of the IIMA<\/em>\u00a0Vol. 6, Issue 1, Article 4. Accessed January 9<sup>th<\/sup>\u00a02018:\u00a0<a href=\"http:\/\/scholarworks.lib.csusb.edu\/ciima\/vol6\/iss1\/4\/\" target=\"_blank\" rel=\"noopener\">http:\/\/scholarworks.lib.csusb.edu\/ciima\/vol6\/iss1\/4\/<\/a>. Page 43.<\/p>\n<p><a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftnref39\" name=\"_ftn39\">[39]<\/a>\u00a0<em>Supra Note 38, page 43.<\/em><\/p>\n<p><a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftnref40\" name=\"_ftn40\">[40]<\/a>\u00a0<em>Supra Note 38, page 43.<\/em><\/p>\n<p><a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftnref41\" name=\"_ftn41\">[41]<\/a>\u00a0<em>Supra Note 38, page 43.<\/em><\/p>\n<p><a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftnref42\" name=\"_ftn42\">[42]<\/a>\u00a0<em>Supra Note 38, page 43.<\/em><\/p>\n<p><a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftnref43\" name=\"_ftn43\">[43]<\/a>\u00a0<em>Supra Note 38, page 43.<\/em><\/p>\n<p><a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftnref44\" name=\"_ftn44\">[44]<\/a>\u00a0See for example\u00a0<em>R v Marakah<\/em>\u00a02017 SCC 59 or\u00a0<em>R v Jones<\/em>\u00a02017 SCC 60.<\/p>\n<p><a href=\"https:\/\/ccla.org\/cyberspace-law-web-privacy-violations\/#_ftnref45\" name=\"_ftn45\">[45]<\/a>\u00a0<em>Supra Note 7, pages 1-2.<\/em><\/p>\n<\/div>\n\t<\/div>\n<\/div>\n\n\n\n\n\t\t\t<\/div> \n\t\t<\/div>\n\t<\/div> \n<\/div><\/div>\n\t\t<div id=\"fws_6a12d0902e835\"  data-column-margin=\"default\" data-midnight=\"dark\"  class=\"wpb_row vc_row-fluid vc_row\"  style=\"padding-top: 0px; padding-bottom: 0px; \"><div class=\"row-bg-wrap\" data-bg-animation=\"none\" data-bg-animation-delay=\"\" data-bg-overlay=\"false\"><div class=\"inner-wrap row-bg-layer\" ><div class=\"row-bg viewport-desktop\"  style=\"\"><\/div><\/div><\/div><div class=\"row_col_wrap_12 col span_12 dark left\">\n\t<div  class=\"vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding inherit_tablet inherit_phone \"  data-padding-pos=\"all\" data-has-bg-color=\"false\" data-bg-color=\"\" data-bg-opacity=\"1\" data-animation=\"\" data-delay=\"0\" >\n\t\t<div class=\"vc_column-inner\" >\n\t\t\t<div class=\"wpb_wrapper\">\n\t\t\t\t\n\t\t<div id=\"fws_6a12d0902eb26\"  data-column-margin=\"default\" data-midnight=\"dark\" data-top-percent=\"1%\" data-bottom-percent=\"1%\"  class=\"wpb_row vc_row-fluid vc_row\"  style=\"padding-top: calc(100vw * 0.01); padding-bottom: calc(100vw * 0.01); \"><div class=\"row-bg-wrap\" data-bg-animation=\"none\" data-bg-animation-delay=\"\" data-bg-overlay=\"false\"><div class=\"inner-wrap row-bg-layer\" ><div class=\"row-bg viewport-desktop\"  style=\"\"><\/div><\/div><\/div><div class=\"row_col_wrap_12 col span_12 dark left\">\n\t<div  class=\"vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding inherit_tablet inherit_phone \"  data-padding-pos=\"all\" data-has-bg-color=\"false\" data-bg-color=\"\" data-bg-opacity=\"1\" data-animation=\"\" data-delay=\"0\" >\n\t\t<div class=\"vc_column-inner\" >\n\t\t\t<div class=\"wpb_wrapper\">\n\t\t\t\t<h3 style=\"color: #ef770e;text-align: left\" class=\"vc_custom_heading vc_do_custom_heading\" >About the Canadian Civil Liberties Association<\/h3>\n<div class=\"wpb_text_column wpb_content_element \" >\n\t<div class=\"wpb_wrapper\">\n\t\t<p>The CCLA is an independent, non-profit organization with supporters from across the country. Founded in 1964, the CCLA is a national human rights organization committed to defending the rights, dignity, safety, and freedoms of all people in Canada.<\/p>\n\t<\/div>\n<\/div>\n\n\n\n<h3 style=\"color: #ef770e;text-align: left\" class=\"vc_custom_heading vc_do_custom_heading\" >For the Media<\/h3>\n<div class=\"wpb_text_column wpb_content_element \" >\n\t<div class=\"wpb_wrapper\">\n\t\t<p>For further comments, please contact us at\u00a0<a href=\"mailto:media@ccla.org\"><u>media@ccla.org<\/u><\/a>.<\/p>\n\t<\/div>\n<\/div>\n\n\n\n<h3 style=\"color: #ef770e;text-align: left\" class=\"vc_custom_heading vc_do_custom_heading\" >For Live Updates<\/h3>\n<div class=\"wpb_text_column wpb_content_element \" >\n\t<div class=\"wpb_wrapper\">\n\t\t<p>Please keep referring to\u00a0<a href=\"https:\/\/ccla.org\/the-latest\/\" rel=\"noopener\">this page<\/a>\u00a0and to our social media platforms. We are on\u00a0<a href=\"https:\/\/www.instagram.com\/cancivlib\/?hl=en\" target=\"_blank\" rel=\"noopener\"><u>Instagram<\/u><\/a>,\u00a0<a href=\"http:\/\/facebook.com\/cancivlib\/\" target=\"_blank\" rel=\"noopener\"><u>Facebook<\/u><\/a>, <a href=\"https:\/\/twitter.com\/cancivlib\" target=\"_blank\" rel=\"noopener\"><u>Twitter<\/u><\/a> and <a href=\"https:\/\/bsky.app\/profile\/cancivlib.bsky.social\" target=\"_blank\" rel=\"noopener\"><u>Blue Sky<\/u><\/a>.<\/p>\n\t<\/div>\n<\/div>\n\n\n\n\n\t\t\t<\/div> \n\t\t<\/div>\n\t<\/div> \n<\/div><\/div>\n\n\t\t\t<\/div> \n\t\t<\/div>\n\t<\/div> \n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>L&#039;Association canadienne des libert\u00e9s civiles (ACLC) contestera l&#039;injonction exceptionnellement large du gouvernement de la Nouvelle-\u00c9cosse limitant les manifestations dans la province.<\/p>","protected":false},"author":14,"featured_media":5981,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[217,158],"tags":[],"class_list":["post-3263","post","type-post","status-publish","format-standard","has-post-thumbnail","category-tr-cases-laws","category-talk-rights"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>\u201cCyberspace Law\u201d And Web Privacy Violations - CCLA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ccla.org\/fr\/sinformer\/droits-de-parole\/cyberspace-law-and-web-privacy-violations\/\" \/>\n<meta property=\"og:locale\" content=\"fr_CA\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u201cCyberspace Law\u201d And Web Privacy Violations - CCLA\" \/>\n<meta property=\"og:description\" content=\"The Canadian Civil Liberties Association (CCLA)\u00a0will challenge the Government of Nova Scotia\u2019s\u00a0exceptionally broad injunction limiting protests in the province.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ccla.org\/fr\/sinformer\/droits-de-parole\/cyberspace-law-and-web-privacy-violations\/\" \/>\n<meta property=\"og:site_name\" content=\"CCLA\" \/>\n<meta property=\"article:published_time\" content=\"2018-03-12T10:28:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-09T17:54:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ccla.org\/wp-content\/uploads\/2019\/03\/tr-privacy-header.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Guest Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Guest Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimation du temps de lecture\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/ccla.org\\\/get-informed\\\/talk-rights\\\/cyberspace-law-and-web-privacy-violations\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ccla.org\\\/get-informed\\\/talk-rights\\\/cyberspace-law-and-web-privacy-violations\\\/\"},\"author\":{\"name\":\"Guest Author\",\"@id\":\"https:\\\/\\\/ccla.org\\\/#\\\/schema\\\/person\\\/f93b5b418cd10a90d35faf4e64816d1c\"},\"headline\":\"\u201cCyberspace Law\u201d And Web Privacy Violations\",\"datePublished\":\"2018-03-12T10:28:56+00:00\",\"dateModified\":\"2021-09-09T17:54:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/ccla.org\\\/get-informed\\\/talk-rights\\\/cyberspace-law-and-web-privacy-violations\\\/\"},\"wordCount\":2474,\"image\":{\"@id\":\"https:\\\/\\\/ccla.org\\\/get-informed\\\/talk-rights\\\/cyberspace-law-and-web-privacy-violations\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ccla.org\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/tr-privacy-header.jpg\",\"articleSection\":[\"Cases and Laws\",\"Talk Rights\"],\"inLanguage\":\"fr-CA\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/ccla.org\\\/get-informed\\\/talk-rights\\\/cyberspace-law-and-web-privacy-violations\\\/\",\"url\":\"https:\\\/\\\/ccla.org\\\/get-informed\\\/talk-rights\\\/cyberspace-law-and-web-privacy-violations\\\/\",\"name\":\"\u201cCyberspace Law\u201d And Web Privacy Violations - CCLA\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ccla.org\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/ccla.org\\\/get-informed\\\/talk-rights\\\/cyberspace-law-and-web-privacy-violations\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/ccla.org\\\/get-informed\\\/talk-rights\\\/cyberspace-law-and-web-privacy-violations\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ccla.org\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/tr-privacy-header.jpg\",\"datePublished\":\"2018-03-12T10:28:56+00:00\",\"dateModified\":\"2021-09-09T17:54:19+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/ccla.org\\\/#\\\/schema\\\/person\\\/f93b5b418cd10a90d35faf4e64816d1c\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/ccla.org\\\/get-informed\\\/talk-rights\\\/cyberspace-law-and-web-privacy-violations\\\/#breadcrumb\"},\"inLanguage\":\"fr-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/ccla.org\\\/get-informed\\\/talk-rights\\\/cyberspace-law-and-web-privacy-violations\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\\\/\\\/ccla.org\\\/get-informed\\\/talk-rights\\\/cyberspace-law-and-web-privacy-violations\\\/#primaryimage\",\"url\":\"https:\\\/\\\/ccla.org\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/tr-privacy-header.jpg\",\"contentUrl\":\"https:\\\/\\\/ccla.org\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/tr-privacy-header.jpg\",\"width\":2000,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/ccla.org\\\/get-informed\\\/talk-rights\\\/cyberspace-law-and-web-privacy-violations\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/ccla.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"GET INFORMED\",\"item\":\"https:\\\/\\\/ccla.org\\\/category\\\/get-informed\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Talk Rights\",\"item\":\"https:\\\/\\\/ccla.org\\\/category\\\/get-informed\\\/talk-rights\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"\u201cCyberspace Law\u201d And Web Privacy Violations\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/ccla.org\\\/#website\",\"url\":\"https:\\\/\\\/ccla.org\\\/\",\"name\":\"CCLA\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/ccla.org\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-CA\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/ccla.org\\\/#\\\/schema\\\/person\\\/f93b5b418cd10a90d35faf4e64816d1c\",\"name\":\"Guest Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b93f74bbad285b8a05223362625bef519ea64919467ad29bf056a5267af7d9eb?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b93f74bbad285b8a05223362625bef519ea64919467ad29bf056a5267af7d9eb?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b93f74bbad285b8a05223362625bef519ea64919467ad29bf056a5267af7d9eb?s=96&d=blank&r=g\",\"caption\":\"Guest Author\"},\"url\":\"https:\\\/\\\/ccla.org\\\/fr\\\/author\\\/guest\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\"Droit du cyberespace et violations de la vie priv\u00e9e sur Internet - ACLC","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ccla.org\/fr\/sinformer\/droits-de-parole\/cyberspace-law-and-web-privacy-violations\/","og_locale":"fr_CA","og_type":"article","og_title":"\u201cCyberspace Law\u201d And Web Privacy Violations - CCLA","og_description":"The Canadian Civil Liberties Association (CCLA)\u00a0will challenge the Government of Nova Scotia\u2019s\u00a0exceptionally broad injunction limiting protests in the province.","og_url":"https:\/\/ccla.org\/fr\/sinformer\/droits-de-parole\/cyberspace-law-and-web-privacy-violations\/","og_site_name":"CCLA","article_published_time":"2018-03-12T10:28:56+00:00","article_modified_time":"2021-09-09T17:54:19+00:00","og_image":[{"width":2000,"height":800,"url":"https:\/\/ccla.org\/wp-content\/uploads\/2019\/03\/tr-privacy-header.jpg","type":"image\/jpeg"}],"author":"Guest Author","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Guest Author","Estimation du temps de lecture":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ccla.org\/get-informed\/talk-rights\/cyberspace-law-and-web-privacy-violations\/#article","isPartOf":{"@id":"https:\/\/ccla.org\/get-informed\/talk-rights\/cyberspace-law-and-web-privacy-violations\/"},"author":{"name":"Guest Author","@id":"https:\/\/ccla.org\/#\/schema\/person\/f93b5b418cd10a90d35faf4e64816d1c"},"headline":"\u201cCyberspace Law\u201d And Web Privacy Violations","datePublished":"2018-03-12T10:28:56+00:00","dateModified":"2021-09-09T17:54:19+00:00","mainEntityOfPage":{"@id":"https:\/\/ccla.org\/get-informed\/talk-rights\/cyberspace-law-and-web-privacy-violations\/"},"wordCount":2474,"image":{"@id":"https:\/\/ccla.org\/get-informed\/talk-rights\/cyberspace-law-and-web-privacy-violations\/#primaryimage"},"thumbnailUrl":"https:\/\/ccla.org\/wp-content\/uploads\/2019\/03\/tr-privacy-header.jpg","articleSection":["Cases and Laws","Talk Rights"],"inLanguage":"fr-CA"},{"@type":"WebPage","@id":"https:\/\/ccla.org\/get-informed\/talk-rights\/cyberspace-law-and-web-privacy-violations\/","url":"https:\/\/ccla.org\/get-informed\/talk-rights\/cyberspace-law-and-web-privacy-violations\/","name":"\"Droit du cyberespace et violations de la vie priv\u00e9e sur Internet - ACLC","isPartOf":{"@id":"https:\/\/ccla.org\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ccla.org\/get-informed\/talk-rights\/cyberspace-law-and-web-privacy-violations\/#primaryimage"},"image":{"@id":"https:\/\/ccla.org\/get-informed\/talk-rights\/cyberspace-law-and-web-privacy-violations\/#primaryimage"},"thumbnailUrl":"https:\/\/ccla.org\/wp-content\/uploads\/2019\/03\/tr-privacy-header.jpg","datePublished":"2018-03-12T10:28:56+00:00","dateModified":"2021-09-09T17:54:19+00:00","author":{"@id":"https:\/\/ccla.org\/#\/schema\/person\/f93b5b418cd10a90d35faf4e64816d1c"},"breadcrumb":{"@id":"https:\/\/ccla.org\/get-informed\/talk-rights\/cyberspace-law-and-web-privacy-violations\/#breadcrumb"},"inLanguage":"fr-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ccla.org\/get-informed\/talk-rights\/cyberspace-law-and-web-privacy-violations\/"]}]},{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/ccla.org\/get-informed\/talk-rights\/cyberspace-law-and-web-privacy-violations\/#primaryimage","url":"https:\/\/ccla.org\/wp-content\/uploads\/2019\/03\/tr-privacy-header.jpg","contentUrl":"https:\/\/ccla.org\/wp-content\/uploads\/2019\/03\/tr-privacy-header.jpg","width":2000,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/ccla.org\/get-informed\/talk-rights\/cyberspace-law-and-web-privacy-violations\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ccla.org\/"},{"@type":"ListItem","position":2,"name":"GET INFORMED","item":"https:\/\/ccla.org\/category\/get-informed\/"},{"@type":"ListItem","position":3,"name":"Talk Rights","item":"https:\/\/ccla.org\/category\/get-informed\/talk-rights\/"},{"@type":"ListItem","position":4,"name":"\u201cCyberspace Law\u201d And Web Privacy Violations"}]},{"@type":"WebSite","@id":"https:\/\/ccla.org\/#website","url":"https:\/\/ccla.org\/","name":"CCLA","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ccla.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-CA"},{"@type":"Person","@id":"https:\/\/ccla.org\/#\/schema\/person\/f93b5b418cd10a90d35faf4e64816d1c","name":"Auteur invit\u00e9","image":{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/secure.gravatar.com\/avatar\/b93f74bbad285b8a05223362625bef519ea64919467ad29bf056a5267af7d9eb?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b93f74bbad285b8a05223362625bef519ea64919467ad29bf056a5267af7d9eb?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b93f74bbad285b8a05223362625bef519ea64919467ad29bf056a5267af7d9eb?s=96&d=blank&r=g","caption":"Guest Author"},"url":"https:\/\/ccla.org\/fr\/author\/guest\/"}]}},"_links":{"self":[{"href":"https:\/\/ccla.org\/fr\/wp-json\/wp\/v2\/posts\/3263","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ccla.org\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ccla.org\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ccla.org\/fr\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/ccla.org\/fr\/wp-json\/wp\/v2\/comments?post=3263"}],"version-history":[{"count":1,"href":"https:\/\/ccla.org\/fr\/wp-json\/wp\/v2\/posts\/3263\/revisions"}],"predecessor-version":[{"id":3264,"href":"https:\/\/ccla.org\/fr\/wp-json\/wp\/v2\/posts\/3263\/revisions\/3264"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ccla.org\/fr\/wp-json\/wp\/v2\/media\/5981"}],"wp:attachment":[{"href":"https:\/\/ccla.org\/fr\/wp-json\/wp\/v2\/media?parent=3263"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ccla.org\/fr\/wp-json\/wp\/v2\/categories?post=3263"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ccla.org\/fr\/wp-json\/wp\/v2\/tags?post=3263"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}