A persistent critique in surveillance studies has been that privacy is a limited, legalistic and highly individualized concept, ill-suited to address contemporary practices of surveillance. Recent Canadian Charter cases seem to confirm that critique, permitting police access to a wide range of information that many would argue is precisely the kind of information gathered through emerging forms of surveillance. However, this paper suggests that instead of jettisoning privacy we should instead seek a richer legal understanding of privacy. In particular, I argue that the historical roots of our constitutional privacy jurisprudence are rule of law ideas. Many of the core values of the rule of law have implicitly shaped our legal definition of ...
With the recent recognition of the new tort of "intrusion upon seclusion", Canadian privacy law has ...
This article considers how existing literature on privacy recognizes, constructs and otherwise impli...
Law enforcement uses surveillance to gather evidence about suspects. This is facilitated by advances...
A persistent critique in surveillance studies has been that privacy is a limited, legalistic and hig...
Individuals enjoy privacy in their person, in their personal spaces, and also in their biographical ...
This thesis explores the emergence of s. 2(b) of the Charter as a response to privacy breaches flowi...
Citizens deserve to know, and in some cases need to know, what their governments — including their c...
Ambient surveillance technologies are a new ambush set on the path toward conceptualization of priva...
The problem of privacy today is no longer—if it ever was—a distinctly legal problem. On the contrary...
Rapid technological change, the advent of Big Data, and the creation of society-wide government surv...
An overemphasis on technology among Canadian privacy scholars has neglected other important historic...
When criminal justice scholars think of privacy, they think of the Fourth Amendment. But lately its ...
Privacy law, to the extent that it regulates state information practices, wears two “public” hats. T...
The steady expansion in the use of surveillance technologies by the state and private sector represe...
This dissertation is concerned with surveillance, which refers to the monitoring and supervision of ...
With the recent recognition of the new tort of "intrusion upon seclusion", Canadian privacy law has ...
This article considers how existing literature on privacy recognizes, constructs and otherwise impli...
Law enforcement uses surveillance to gather evidence about suspects. This is facilitated by advances...
A persistent critique in surveillance studies has been that privacy is a limited, legalistic and hig...
Individuals enjoy privacy in their person, in their personal spaces, and also in their biographical ...
This thesis explores the emergence of s. 2(b) of the Charter as a response to privacy breaches flowi...
Citizens deserve to know, and in some cases need to know, what their governments — including their c...
Ambient surveillance technologies are a new ambush set on the path toward conceptualization of priva...
The problem of privacy today is no longer—if it ever was—a distinctly legal problem. On the contrary...
Rapid technological change, the advent of Big Data, and the creation of society-wide government surv...
An overemphasis on technology among Canadian privacy scholars has neglected other important historic...
When criminal justice scholars think of privacy, they think of the Fourth Amendment. But lately its ...
Privacy law, to the extent that it regulates state information practices, wears two “public” hats. T...
The steady expansion in the use of surveillance technologies by the state and private sector represe...
This dissertation is concerned with surveillance, which refers to the monitoring and supervision of ...
With the recent recognition of the new tort of "intrusion upon seclusion", Canadian privacy law has ...
This article considers how existing literature on privacy recognizes, constructs and otherwise impli...
Law enforcement uses surveillance to gather evidence about suspects. This is facilitated by advances...