Appeared in the Toronto Star on November 8, 2014 as Why Canada Needs a Fourth Wireless Player Last year’s explosive battle over the potential entry of wireless giant Verizon into the Canadian market may be a distant memory, but the debate over the state of wireless competition remains very much […]
Archive for November, 2014
The Standing Senate Committee on Legal and Constitutional Affairs began its hearings on Bill C-13, the lawful access/cyberbullying bill last week with an appearance from several law enforcement representatives. The Ontario Provincial Police was part of the law enforcement panel and was asked by Senator Tom McInnis, a Conservative Senator from Nova Scotia, about what other laws are needed to address cyberbullying. Scott Naylor of the OPP responded (official transcript not yet posted online):
If the bag was open and I could do anything, the biggest problem that I see in the world of child sexual exploitation is anonymity on the Internet. When we get our driver’s licence we’re required to get our picture taken for identification. When you get a mortgage you have to sign and provide identification. When you sign up for the Internet, there is absolutely no requirement for any kind of non-anonymity qualifier. There are a lot of people who are hiding behind the Internet to do all kinds of crime, including cybercrime, fraud, sexual exploitation and things along those lines.
The Internet is moving so quickly that law enforcement cannot keep up. If there were one thing that I would ask for discussion on is that there has to be some mechanism of accountability for you to sign on to an Internet account that makes it like a digital fingerprint that identifies it to you sitting behind the computer or something at that time. There are mechanisms to do it, but the Internet is so big and so vast at this point, and it’s worldwide, I’m not sure how that could happen, but that would certainly assist everybody. In that way I can make a digital qualification that that’s the person that I’m talking to. If I had one choice, that’s what I would ask for.
The Commissioner for Complaints for Telecommunications Services released his annual report yesterday resulting in a wide range of interpretations with some citing improved customer service due to an overall decline in complaints, others focusing on declining customer service owing to an increase in complaints from misleading contractual terms, and yet others pointing to the CRTC Wireless Code as the reason behind the overall decline in complaints.
Despite some improvement in service, the most notable aspect of the report is a review of compliance with the wireless code. With the code now fully operational, there is simply no excuse for carrier non-compliance. Yet the data suggests that there are numerous confirmed breaches. Bell is easily the most notable company when it comes to failure to comply with the code: when you combine Bell Canada, Virgin Mobile (which it owns), and Northern Tel (which it now also owns), 2/3 of the confirmed breaches all come from the same source. In other words, every few weeks, Bell Canada or one of its companies had a confirmed breach of the wireless code.
Canadian Centre for Ethics in Public Affairs: Michael Geist “The Internet: Do We Really Have no Privacy and Should We Just Get Over it?”
In this talk, I gave a talk in response to Scott McNealy’s statement “You have no privacy. Get over it.”
My column this week on warrantless access to personal information under Canadian law noted that Bill S-4, the Digital Privacy Act, will expand the likelihood warrantless disclosures between private organizations. As I posted recently:
Bill S-4 proposes that:
“an organization may disclose personal information without the knowledge or consent of the individual… if the disclosure is made to another organization and is reasonable for the purposes of investigating a breach of an agreement or a contravention of the laws of Canada or a province that has been, is being or is about to be committed and it is reasonable to expect that disclosure with the knowledge or consent of the individual would compromise the investigation;
Unpack the legalese and you find that organizations will be permitted to disclose personal information without consent (and without a court order) to any organization that is investigating a contractual breach or possible violation of any law. This applies both past breaches or violations as well as potential future violations. Moreover, the disclosure occurs in secret without the knowledge of the affected person (who therefore cannot challenge the disclosure since they are not aware it is happening).