What’s the Justification for Warrantless Access to Customer Information?
November 7, 2011
Share this post
2 Comments
Law Bytes
Episode 199: Boris Bytensky on the Criminal Code Reforms in the Online Harms Act
byMichael Geist
April 15, 2024
Michael Geist
April 8, 2024
Michael Geist
March 25, 2024
Michael Geist
March 18, 2024
Michael Geist
March 11, 2024
Michael Geist
Search Results placeholder
Recent Posts
- Debating the Online Harms Act: Insights from Two Recent Panels on Bill C-63
- The Law Bytes Podcast, Episode 199: Boris Bytensky on the Criminal Code Reforms in the Online Harms Act
- AI Spending is Not an AI Strategy: Why the Government’s Artificial Intelligence Plan Avoids the Hard Governance Questions
- The Law Bytes Podcast, Episode 198: Richard Moon on the Return of the Section 13 Hate Speech Provision in the Online Harms Act
- Tweets Are Not Enough: Why Combatting Relentless Antisemitism in Canada Requires Real Leadership and Action
That’s because their justification is misleading.
This has been going around for a long time now. This isn’t going to add anything more to stopping any physical crimes or stopping these terrorist attacks that don’t exist which we’ve apparently been getting hit by. The thing I don’t like the most is that they just don’t come out and say it – they want to closely monitor everyone to put into force the new copyright bills.
It looks pretty obvious. The information stored is personal information about the internet account holder. Any criminals would most likely take note of these laws and do what they can to avoid them or shield themselves, if they really wanted it enough.
They spot someone doing something they don’t like, demand the personal information, slap a fine down. (Un)Lawful Access in a nutshell.
@Robert E.
I couldn’t agreed more. They NEED this in order to give C-11 teeth since anyone can see by itself C-11 in unenforceable. Together they form some of the best IP enforcement legislation American big media money can buy. Will it do them any good? I wager it’ll be even less effective than the DMCA.
Offshore servers, VPN connections and IP obfuscation networks such as TOR and i2p will become very popular. These days, I do very little which might be considered illegal, but hell will freeze over before I’ll make it easy for them to spy on me.