Professional Documents
Culture Documents
PROFITING FROM
PEER PRODUCTION
23 27
contents
www.commonlaw.uottawa.ca/tech
WELCOME
BIENVENUE
Our law school yet again received more
applications than any other in Canada, and
many applicants tell us that they chose, and
Cette année encore, notre faculté de droit a reçu
plus de demandes d’admission que toutes les
autres au Canada, et bon nombre de candidats
often applied only to, the University of Ottawa déclarent avoir fait une demande à l’Université
because of our Law & Technology program. It d’Ottawa (certains disent, en fait, n’avoir fait
is true that the program has aucune autre demande ailleurs) en raison du
grown by leaps and bounds, programme de Droit et technologie. Il est vrai
and the accomplishments of the last few years que notre programme a connu une croissance
are extraordinary by any standard. The only spectaculaire et que nos réalisations des dernières
public interest, internet and technology law années sont extraordinaires à bien des égards.
clinic in Canada (CIPPIC), unique technology En effet, nous avons en outre mis sur pied la
law internships, and a world-class Faculty seule clinique d’intérêt public et de politique
that is truly second to none. d’Internet du Canada (CIPPIC), organisé des stages
exclusifs en droit des technologies et réuni un
corps professoral de renommée mondiale.
2 TECHLAW //
TECHLAW:
THE LAW & TECHNOLOGY MAGAZINE
TECHLAW:
BULLETIN DE DROIT ET TECHNOLOGIE
VOLUME 5, ISSUE 1 VOLUME 5, NUMÉRO 1
The University of Ottawa Technology Law Newsletter is published seasonally Le Bulletin de droit et technologie de l’Université d’Ottawa est publié de façon
by the University of Ottawa’s Faculty of Law. The opinions expressed in this saisonnière par la Faculté de droit de l’Université d’Ottawa. Les opinions
newsletter are solely those of the contributors and are not necessarily those of exprimées dans ce bulletin reflètent la pensée des auteurs seulement et pas
the editor, sponsors, the University of Ottawa or its employees. nécessairement celle de la rédaction, des commanditaires, de l’Université
d’Ottawa ou de son personnel.
Some Rights Reserved. This newsletter is licensed under the Creative
Commons Attribution-NoDerivs-NonCommercial Licence. To view a copy of Certains droits réservés. Ce bulletin fait l’objet d’une licence Creative
this licence, visit: creativecommons.org/ licenses/by-nc-nd/2.5/ca Commons de style attribution – pas de travaux dérivés – utilisation non
commerciale. La licence est publiée à l’adresse creativecommons.org/licenses/
Comments: Readers are invited to submit their comments and suggestions by-nc-nd/2.5/ca.
to the Editor.
Commentaires : La rédaction serait heureuse de recevoir les commentaires et
This newsletter is available free-of-charge online at http://www.commonlaw. suggestions des lecteurs et lectrices.
uottawa.ca/tech. To unsubscribe to this newsletter, send an email to
techlaw@uottawa.ca. If you were forwarded the newsletter by a friend and Ce bulletin est offert gratuitement en ligne à l’adresse http://www.commonlaw.
would like to subscribe, send an email to the same address. uottawa.ca/tech. Si vous désirez vous désabonner de ce bulletin, veuillez envoyer
un message électronique à techlaw@uottawa.ca. Si vous avez reçu ce bulletin par
Disclaimer: This newsletter is for informational purposes only. It is not l’intermédiaire d’un ami ou d’une amie et que vous aimeriez vous y abonner,
intended to be a complete statement of the law, nor is it intended to provide veuillez envoyer un message électronique à la même adresse.
legal advice. No person should act or rely upon the information in this
newsletter without seeking professional legal consultation. Avertissement : Ce bulletin cherche uniquement à vous renseigner et non à
vous fournir un exposé complet de l’état du droit ou un avis juridique. Nous
déconseillons à quiconque d’agir en se fiant sur les renseignements publiés
dans ce bulletin et sans obtenir une opinion juridique professionnelle.
Open access provides free public access through the websites for Open Access Law
to scholarly literature and promotes the Canada, http://www.openaccesslawcanada.ca
dissemination of this scholarship, which (in English), and Libre accès au droit Canada,
benefits the author, the law review, and the http://www.libreaccesaudroitcanada.ca (en
public. Some of the benefits of open access Français). The resources include a Canadian
for scholarly publication are to permit quick Model Publishing Agreement, which has
dissemination of scholarship, to increase been specifically tailored to Canadian law,
access to research for educational purposes, and is available as a template for law reviews
to increase awareness of research among the to adopt. //
public, to allow authors to receive com -
ments and feedback in a timely manner, and Open access for legal
to facilitate global scholarly conversations.
Open access for legal scholarship enhances scholarship enhances
the profile of the law review, with increased
citation and visibility, and raises awareness
of the institution hosting the law review.
the profile of the law
Law reviews that join the Open Access
Law Canada program promise to take the
review, with increased
least restrictive licence consistent with the
law reviews’ needs, to send the authors an
citation and visibility,
electronic copy of the final version of their
article, and to provide public access to the
and raises awareness of
law review’s standard publishing contract so
authors can consult the publication agree- the institution hosting
ment before submitting their articles. Law
reviews are not required to set up an online the law review.
archive of articles or publish online. They
just need to agree that the authors can post Professor Elizabeth Judge is project
electronic copies of their articles to scholarly leader for Open Access Law Canada,
websites so people can access the articles http://www.openaccesslawcanada.ca/, an
even if they don’t have a subscription to a initiative launched this year to assist
legal database. Canadian law reviews to move to an open
The Open Access Law Canada program access publication model, which permits
provides a number of resources to encourage authors to archive their law review articles in
open access archiving, which are available publicly accessible scholarly websites.
4 TECHLAW //
LE PROGRAMME
LIBRE ACCÈS
Lancé en juin 2005, dans le cadre du projet de droit d’auteur sur l’héritage scientifique commun,
http://sciencecommons.org/ projects/publishing/ index.html, le programme Libre accès au droit
Canada cherche à promouvoir le libre accès à la recherche érudite dans une grande diversité de
champs des sciences et des sciences sociales, y compris le droit. Le projet de droit d’auteur sur
la recherche érudite (Scholar’s Copyright Project) veut faciliter l’accès au savoir en éliminant les
obstacles technologiques, économiques et juridiques qui, traditionnellement, ont limité l’accès
aux travaux érudits. Le programme Libre accès au droit, dont fait partie le projet Libre accès au
droit Canada, préconise plus particulièrement le libre accès à la recherche savante en droit.
Le libre accès est l’accès public gratuit aux aux personnes qui ne sont pas abonnées à Professeure Elizabeth Judge est la directrice
travaux d’érudition. Il favorise la diffusion des bases de données juridiques. du projet Libre accès au droit Canada,
des recherches, ce qui est avantageux pour Le programme Libre accès au droit http://www.libreaccesaudroitcanada.ca, mis
l’auteur, les revues juridiques et le grand Canada fournit des ressources diverses sur en œuvre cette année pour aider les revues de
public. Certaines retombées positives sont la ses sites Web, en anglais à l’adresse droit canadiennes à faire le passage vers le
diffusion rapide de la recherche, un plus http://www. openaccesslawcanada.ca et en modèle de la publication en libre accès, lequel
vaste accès à la recherche à des fins éduca- français à l’adresse http://www. libreacce- permet à l’auteure ou auteur [auteur]
tives, une plus grande sensibilisation du saudroitcanada.ca pour encourager l’archivage d’archiver ses articles parus dans une revue
public à la recherche, l’obtention plus simul- en libre accès. Parmi ces ressources, il y a un juridique sur des sites Web accessibles au
tanée de commentaires et d’observations sur modèle canadien d’entente de publication, grand public.
la recherche et la facilitation des échanges conçu dans l’optique particulière du droit
entre universitaires dans le monde. Le libre canadien. Ce modèle est mis à la disposition
accès à la recherche érudite en droit des revues de droit qui aimeraient s’en
rehausse le profil des revues juridiques, qui inspirer et l’adopter. //
sont ainsi plus fréquemment citées et plus
visibles. Par ricochet, l’établissement qui en
assure la publication se fait mieux connaître. Le libre accès à la
Les revues de droit qui participent au
programme Libre accès au droit Canada recherche érudite en
s’engagent à utiliser une licence aussi peu
restrictive que possible en tenant compte
des besoins de la revue, à fournir aux
droit rehausse le profil
auteurs une copie électronique de la version
finale de leur article et à offrir un accès
des revues juridiques,
public au contrat type de publication de leur
revue afin que les auteurs puissent consulter
qui sont ainsi plus
l’entente de publication avant de soumettre
un article. Les revues de droit n’ont aucune
fréquemment citées
obligation de tenir des archives électro -
niques des articles ou de publier les articles et plus visibles.
en ligne. Il leur suffit de permettre aux
auteurs de publier leurs articles sur des sites
Web savants afin de les rendre accessibles
6 TECHLAW //
Littering the
INFORMATION
SUPERHIGHWAY
The study of technology law is inherently a forward-looking process.
Consumers are encouraged to consider present technology obsolete
as they too, look forward to future developments. Rarely are the
complete lifecycles taken into account when the devices of years past
are overshadowed byglittering technologies lurking just around the
corner. In the process, old equipment is routinely moved into closets,
under beds, to China or wherever it will stay out of sight.
This past spring, a group of law students started taking a closer
look at what happens to all this high tech trash. Ashley Deathe and
Jeremy Hessing-Lewis, two third year common law students, organ-
ized The Integrated Circuit: A Symposium on Electronic Waste in
Canada in search of some answers. The project was the first partner-
ship between the Law & Technology Students Association (LTSS)
and the Environmental Law Students Association (ELSA) and
brought together electronics manufacturers, recyclers and the
consumers stuck in between. The keynote address was given by
Elizabeth Grossman, author of High Tech Trash: Digital Devices,
Hidden Toxics, and Human Health.
The symposium was accompanied by a successful e-waste drive
collecting a large amount of used electronics from students and staff
alike. The event attracted regional and campus wide media atten-
tion. The success prompted both student societies to plan on
making it an annual event. //
8 TECHLAW //
The University
of Ottawa Law
& Technology
Journal UOLTJ
The University of Ottawa Law & Technology
Journal (UOLTJ) published two issues last
year, continuing its tradition of featuring
interdisciplinary law and technology schol-
arship by an international roster of authors.
A special issue devoted to privacy, anonymity,
and identity had eleven contributions from
Canadian and US authors tackling subjects
such as anonymity in behavioural research,
children’s online privacy, the right to privacy
and terrorism law in Canada, racial profiling,
privacy in virtual communities, privacy
classifications, and cyber-security for online
user information without privacy erosion. The
second issue considered internet content
regulation in Australia, commercialization
of university research, a comparison of
Canadian and European internet jurisdiction
principles, the law of the hyperlink, Canadian
copyright and P2P sharing, TRIPS and climate
change, patent law and non-coding DNA,
and electronic commerce norms. This year,
the Journal includes articles on open access
law, cybercrime, privacy under civil law, and
Fichte and copyright theory.
10 TECHLAW //
Profiting
from peer Jeremy De Beer
production
Viacom’s billion-dollar lawsuit against YouTube1 has gene-
rated a lot of buzz in the legal and high-tech communities.
Pundits around the world have weighed in on YouTube’s
potential liabilities, though ultimately it will be the American
courts that settle those issues. Since the list of plaintiffs
has grown to include Britain’s Football Association Premier
League, the U.S. National Music Publishers Association and
others seeking certification as a class action, the prospect
for settlements satisfactory to all parties is slim.
1
Viacom International Inc. et. al. v. YouTube Inc. et. al., Civil Action No. 1:07-cv-02103 (LLS) (FM) (S.D.N.Y).
like this. How would things play would things play out north of the border?
In Canada, firms’ potential liabilities are
determined by different principles than in the
out north of the border? U.S.. There are, however, some similarities.
Canadian copyright law, like American law,
grants exclusive reproduction and perform-
ance/communication rights for audio, visual
While the courts consider the case, it is If no settlement is reached, the outcome and audio-visual content. It isn’t clear how
worthwhile to reflect on the broader conse- of this case will depend mainly on the appli- other aspects of the Canadian Copyright Act
quences of this kind of litigation for the cation of the safe harbour system under the might apply here, including provisions
networked information economy. At the end Digital Millenium Copyright Act (DMCA).2 pertaining to distribution rights, adaptation
of the day, lawsuits like this are only good for Pursuant to § 512 a firm hosting allegedly rights, synchronization rights and so on. But
lawyers. Consumers, creators and content infringing material at the direction of its user it is safe to say that in both jurisdictions there
owners would be far better off to focus on is not liable for infringement if it complies are a number of different grounds on which a
streamlining licensing solutions rather than with ‘notice-and-takedown’ procedures. But prima facie case for direct infringement could
stubbornly litigating disagreements. to get immunity, the host can’t know about be made. That is, it is likely that YouTube
Let me first say a few words about the the infringement or even be aware of could be held liable for its own infringing
case itself and the U.S. legal environment. circumstances from which infringement is activities, including reproducing and
YouTube is being sued for direct and indirect apparent. Moreover, the host can’t receive communicating copyright-protected works.
copyright infringement. Viacom alleges that financial benefits directly from the infringe- The key differences between Canada and
YouTube directly reproduces, performs and ment in a situation where it has the right and the U.S. boil down to the nuances of indirect
distributes its copyright-protected content. ability to control its user’s activity. infringement—liability for other people’s
It also alleges that YouTube is secondarily There’s much debate about what all that infringements—and applicable defences.
liable for users’ infringements on three means, and little precedent to go on. Canadian law imposes liability for authorizing
grounds: contributory, vicarious and indu- Opinion divided on YouTube’s prospects for acts of infringement, but not for simply con-
cing copyright infringement. a successful defence in the U.S.. tributing to, benefiting from or inducing them.
La poursuite d’un milliard de dollars matière d’octroi de licences plutôt que de s’intéressent à la production entre pairs
intentée par Viacom contre YouTube a s’acharner à vouloir régler leurs différends consiste à envisager les possibilités d’octroi de
suscité une grande effervescence dans le devant les tribunaux. licences, y compris incluant d’éventuelles
monde juridique comme dans l’univers de la Dans cet article, Jeremy de Beer après avoir mégatransactions entre les magnats de l’indus-
technologie de pointe. Les sommités du envisagé la tournure que prendrait, au Canada, trie, des licences générales collectives et des
monde entier se sont prononcées quant aux une poursuite comme celle qui oppose Viacom initiatives comme les « Creative Commons ».
possibles responsabilités de YouTube, bien à YouTube, se penche sur les économies engen- Ces stratégies nécessitent des concessions de
que le règlement du différend revienne drées par la production par les pairs. Les part et d’autre du litige entourant les droits
ultimement aux tribunaux américains. Les entreprises se rendent compte qu’il y beaucoup d’auteurs, mais ces concessions se révéleront
perspectives de règlements satisfaisants d’argent en jeu et prennent en marche le train très avantageuses, puisqu’elles réduiront
pour toutes les parties sont amoindries par des contenus produits par des pairs. substantiellement les dommages collatéraux
l’ajout, à la liste des plaignants, de la Le chevauchement de l’économie com - pour ceux qui choisissent de souscrire à une
« Football Association Premier League » mer ciale et de l’économie de partage économie parallèle de partage. À long terme,
britan nique, de l’« U.S. National Music engendre son lot de tensions. On distingue c’est sans doute l’intérêt public qui en tirerait
Publishers Association » et d’autres organi- difficilement les contenus piratés de ceux le plus d’avantages. //
smes cherchant à exercer un recours collectif. qui sont fournis par des pairs. C’est une
À l’heure où les tribunaux étudient cette tâche ardue que d’effectuer un tri dans un tel Professeur Jeremy de Beer est membre du groupe
affaire, il est opportun de réfléchir aux éventail de contenus. Qui plus est, comme Droit et technologie. Il donne le cours de
conséquences plus étendues de tels litiges de nombreuses entreprises œuvrant dans ce Musique numérisée, dont la description figure
sur l’économie de l’information en réseau. Tout domaine souffrent d’une certaine forme de dans cette revue. Son étude sur l’obtention de
compte fait, des poursuites de ce genre ne schizophrénie, l’économie de l’information en licences pour les œuvres orphelines, pour le
profitent qu’aux avocats. Il serait plus avan- réseau comporte toute une gamme d’intérêts compte de la Commission du droit d’auteur du
tageux pour les consommateurs, pour les qui se recoupent. Canada sera publiée prochainement.
créateurs et pour les propriétaires de contenu Le professeur de Beer conclut qu’une
de viser des solutions de rationalisation en bonne option pour les entreprises qui
12 TECHLAW //
Australian law is also different than intellectual property laws of most countries. What sort of remedial action might be
American law, in that it too incorporates the If this seems anomalous, consider required? Well, the Court hinted that upon
concept of authorization. Yet, despite the Columbia law professor Tim Wu’s analogy. notice of infringing content, the host might
legal diffe rences, the Federal Court of Wu explains that if the internet were a be required to “take it down.”
Australia and the U.S. Supreme Court red-light district, Napster, Kazaa and Canadian legislators might have adopted
reached roughly similar conclusions about Grokster would be the pimps while YouTube a different approach. In 2005, Bill C-60 was
liability for indirect infringement in the would be the hotel. introduced to reform parts of Canadian
Kazaa and Grokster cases respectively.3 A Canadian safe harbour for hosts and copyright law. Though the Bill died before
It does not follow, however, that a transmitters is found in paragraph 2.4(1)(b) passing into law, it would have established a
Canadian court would reach the same result. of the Copyright Act. It provides that persons ‘notice-and-notice’ system. That means a
The leading Canadian case on liability for who only supply “the means of telecommuni- firm notified of alleged infringement could
authorizing infringement is CCH v. LSUC.4 cation necessary for another person to so have escaped liability by forwarding the
In it the Chief Justice of Canada, writing for a communicate” are not themselves parties to notice to its customer. Though less strict
unanimous Supreme Court, explicitly rejected the communication. The leading case on this than a ‘notice-and-takedown’ or ‘notice-
the principles of Australian law upon which point is SOCAN v. CAIP, 5 in which the and-termination’ regime, it has been
the Kazaa decision was based, saying: “The Supreme Court of Canada considered reported to be nonetheless effective. The Bill
[Australian] approach to authorization shifts whether internet service providers were liable also would have immunized network services
the balance in copyright too far in favour of to pay a tariff (SOCAN’s Tariff 22) for the from all liability for caching, including commu-
the owner’s rights and unnecessarily inter- online communication of musical works. The nications and reproductions.
feres with the proper use of copyrighted Court held they were not. An intermediary The U.S. litigation against YouTube
works for the good of society as a whole.” To falls within the safe harbour so long as it should provoke Canadians to ask another
be held liable based on conventional principles “confines itself to providing ‘a conduit’ for question when designing legislative reforms:
of Canadian copy right law the alleged information communicated by others.” The What exactly is a network service? Bill C-60
authorizer must sanction, countenance and use of techniques to improve the efficiency of would have provided a safe harbour for
approve the infringement. And even if a communications, such as caching, does not firms “providing services related to the oper-
defendant could be said to authorize users’ affect intermediaries’ legal liability. ation of the Internet or other digital
activities, courts must presume they do so only Unlike the U.S. provision, however, the network.” A firm that “provides digital
insofar as it is in accordance with the law. Canadian safe harbour does not apply to memory in which another person stores a
One way YouTube’s users might act activities other than communication. A work or other subject-matter” would have
legally is by making fair uses of copyright- service provider or host might still be liable also been protected. But would this have
protected content. In this respect, Canadian for reproductions that occur when content covered YouTube? Should it have?
law is less forgiving than American law. Most is cached. (Canadian broadcasters have liti- Yale law professor Yochai Benkler
notably, there is no clearly established gated and lobbied unsuccessfully against a observes that a networked rather than
parody defence in Canada. Nevertheless, the copyright tariff requiring payments for industrial information economy “holds great
distinction between ‘fair use’ in the U.S. and ephemeral reproductions.) Or, a service practical promise: as a dimension of indi-
‘fair dealing’ in Canada isn’t particularly provider or host might be held to authorize vidual freedom; as a platform for better
important to the outcome of this case, given the infringing acts of its customers. democratic participation; as a medium to
that much of the content on YouTube falls SOCAN v. CAIP also dealt with that ques- foster a more critical and self-reflective
outside the scope of this defence. Yes, there tion. The Court found that “when massive culture; and … as a mechanism to achieve
is ample non-infringing content, but there is amounts of non-copyrighted material are improvements in human development
also much material that is clearly illegal. accessible to the end user, it is not possible everywhere.”6
Moreover, firms that actually host or to impute … an authority to download Lawrence Lessig treats this ‘second
transmit copyright-infringing content are copyrighted material as opposed to non- economy’ as distinct from and complemen-
treated differently from firms that merely copyrighted material.” However, Justice’s tary to the traditional one based on quid pro
contribute to or induce infringement. Binnie’s obiter dicta suggests that copyright quo transactions. 7 Yet there seems to be
Perhaps surprisingly, hosts and interme- liability may exist if a service provider has increasing convergence between the two
diaries are less likely to be liable, due to the notice of infringing material on its system economies. Commercial entities are scram-
availability of safe harbour provisions in the and “fails to take remedial action.” bling to capitalize on the sharing economy.
7
Lawrence Lessig, “On the Economies of Culture” Lessig Blog (28 September 2006), online: Lessig Blog <http://www.lessig.org/blog/archives/003550.shtml>.
8
Rishab Aiyer Ghosh, “Economic impact of open source software on innovation and the competitiveness of the Information and Communications Technology (ICT)
sector in the EU” (20 November 2006), online: EUROPA European Commission <http://ec.europa.eu/enterprise/ict/policy/doc/2006-11-20-flossimpact.pdf>.
14 TECHLAW //
It doesn’t help matters that many of the firms operating in this
environment suffer from a sort of schizophrenia. News Corporation
owns MySpace... The networked information economy involves
a web of overlapping interests.
property rights-holders. Many professional Discou raging or resisting consumers’ be reached with conglomerates representing
artists and producers endorse their fans’ creativity can be ineffective and, in some multiple subsidiary labels, studios or networks.
social media networks. The networked cases, counter productive. Even merely Another way to deal with such content might
information eco nomy involves a web of encouraging consumer creativity, as opposed be collective blanket licensing, either on a
overlapping interests. to enabling it, may leave revenue-generating voluntary or compulsory basis. Collective
So what can the YouTube case teach us opportunities untapped. blanket licensing could also work well to
about legal strategies for profiting from Obviously, one of the primary challenges enable the creation of a wide range of deriva-
peer-produced content in this complex envi- firms face is to balance competing sentiments tive works. For many other creative works,
ronment? And by ‘profit,’ I mean both direct and strategies. The typical tension is between individual creators might enter into express
and indirect financial returns as well as the publicity viral marketing provides and the agreements; though the host or provider will
social, cultural and democratic gains achiev- control needed to monetize momentum. One normally stipulate take-it-or-leave-it licensing
able through systems of peer-production. of the advantages of most countries’ safe terms through clickwrap contracts. In some
The cutting-edge business literature harbour provisions is that they allow copyright circumstances, Creative Commons or similar
refers to several alternative market strategies owners some of the best of both worlds. licenses might be appropriate.
that may be preferential to costly legal Content owners can tolerate certain uses of These strategies require concessions from
battles. Authors of a recent study on mana- their works while prohibiting others. When both sides of the copyright debate. Rights-
gerial approaches reveal that a firm’s attitude consumers’ behaviour becomes cause for holders will be required to relax legal and
toward consumer innovation can be either discomfort, copyright owners can complain. technological control over their creations
positive or negative while its actions can be Unfortunately, many firms find it difficult and tolerate certain uses of their intellectual
either active or passive.9 Differentiating on to take advantage of the flexibilities offered property. Distributors will have to accept the
these two axes, the authors classify firms under safe harbour schemes. For large legitimacy of copyright concerns and perhaps
into four categories, depending on whether corporate copyrights-holders, notifications pay for activities that should arguably be free.
they discourage, resist, encourage or enable might be ineffective. Though the specifically These trade-offs among private parties
creative consumers. Firms that discourage identified infringing work may be removed, are, however, worth the price. In this way,
creativity have a negative attitude, which another copy of the same work may reappear creators of all sorts will experience increased
they assert only passively. Resisting firms, by within days or hours. The giant game of profits, distributors and other intermediaries
contrast, share a negative attitude but take whack-a-mole can be tedious and costly. will be able to build innovative business
active steps to restrain consumer creativity. Recipients of such notifications might models and society will benefit from a more
A positive attitude differentiates firms that also find it onerous to comply with their democratic and participatory culture.
encourage or enable consumer creativity, legal obligations. Though automation might Perhaps most importantly, this strategy
but only enablers act overtly to facilitate help, where value judgments are appro- for capitalizing on creative consumers in the
consumers’ behaviour. priate, automation can be highly problematic. traditional economy will minimize collateral
The best business models involve coope- Given the lack of judicial or quasi-judicial damage upon those who wish to participate
ration between incumbent copyrights-holders, oversight, unsubstantiated notifications in the parallel sharing economy. And, in the
innovative entrepreneurs and independent might result in the unwarranted removal of long term, the public interest will perhaps
peer producers. For instance, The BBC actively non-infringing content. be the greatest beneficiary of all. //
enables consumer creativity through its A better option, therefore, is to embrace
‘Creative Archive’ project. Bands like the licensing possibilities. Options include mega- Professor Jeremy de Beer is a member of the
Barenaked Ladies are also building success by deals between powerhouse players, voluntary Law & Technology group. He teaches Digital
embracing peer-production. They have collective blanket licenses and initiatives like Music, profiled elsewhere in this magazine. His
enabled fan remixes by selling the raw tracks the Creative Commons. For mainstream study of orphan works licensing at the Copy-
behind their recordings, encouraged fans to music, movies and television programs posted right Board of Canada will be published soon.
capture and share concerts and released music in their entirety, large-scale agreements might
videos incorporating social media celebrities.
There is no single strategy that suits all
firms dealing with peer-produced content. Bands like the Barenaked Ladies are also building success by
Nevertheless, the models being implemented
by the likes of the Barenaked Ladies and the embracing peer-production. They have enabled fan remixes and
BBC offer significant and generally underap-
preciated benefits to all stakeholders. released music videos incorporating social media celebrities.
9
Pierre R. Berthon et al., “When Customers Get Clever: Managerial Approaches to Dealing with Creative Consumers” (2007) 50 Business Horizons 39 at 44-45.
Four years ago, a team of around a dozen After four years of creative and ground- The Revealed “I” conference was preceded
privacy experts based at uOttawa and else- breaking research, funding for the project by a day long student conference, The
where received one of the largest-ever grants will come to an end in March, 2008. To cele- Student “I”: A student conference on privacy
from the Social Sciences and Humanities brate and disseminate some of their and identity , on October 25 th, 2007.
Research Council to study the impact of remaining research outcomes, the members Graduate and undergraduate students from
identification technologies on our identities, of ID Trail hosted a major, multi-disciplinary around the world presented their own peer-
and on our ability to remain anonymous. conference on October 26-27th, 2007 at the reviewed research on project related themes.
Directed by Ian Kerr, Canada Research University of Ottawa. This event, the third Three students from ID Trail were
Chair in Ethics, Law and Technology, On the major conference of the project, was entitled selected to present their work: Cynthia
Identity Trail (www.idtrail.org) has brought The Revealed “I”: A conference on privacy Aoki, Jennifer Barrigar and Katie Black.
together researchers from North American and identity. It featured speakers from across Cynthia’s presentation investigated the legal
and European academic, public, private, Canada, the United States and Europe and and ethical implications of memory damp-
and not-for-profit sectors. With the goal of brought together policy makers, academics, ening drugs on identity, recently proposed
developing an interdisciplinary dialogue public interest and civil rights advocates, by some as a form of therapy for post trau-
and getting academic results out in plain and technologists for a two day discussion matic distress disorder. Katie’s presentation
language to policy makers and the broader on the nature, value and place of anonymity, examined the implementation of Canada’s
public, the team has undertaken three identity and authentication in our net - No-Fly List and its effects on privacy and
different approaches to issues of privacy, worked society. broader issues of social justice. Jennifer
anonymity and identity. The first is a social The Revealed “I” conference and a previous presented on the use of reputation systems
science and humanities perspective, the international workshop held in Bologna, in online dating environments and their
second addresses legal and policy questions, Italy, were also the basis for a scholarly perpetuation of gendered inequality.
and the third explores the technologies book, Anonymity, Privacy and Identity in a Even though the project itself will come to
themselves. Networked Society: Lessons from the an end next March, all of the researchers
During the past four years, ID Trail has Identity Trail, the first book published by associated with the project will continue to
quadrupled to more than 50 researchers, Oxford University Press to be licensed under a contribute their knowledge, expertise, and
including a distinguished array of aca - Creative Commons licence, allowing anybody passion in further understanding the impact
demics, practitioners and members of to share the content for non-commercial of privacy, anonymity and identity on today’s
public interest organizations, as well as purposes. This book follows The Contours networked society. //
dozens of graduate and undergraduate of Privacy (Cambridge Scholars Publishing)
students from various dis ciplines and as the second book to be published by ID
universities. Together, they have produced Trail, both making a global contribution to
dozens of peer-reviewed academic articles, the literature on privacy, surveillance, iden-
three special journal issues and a series of tity and authentication.
online educational resources for children
and adults. They have also participated in
more than 100 presentations at numerous
conferences and community events.
16 TECHLAW //
LL.M. EN DROIT
ET TECHNOLOGIE
Par l’entremise du groupe de droit et technologie, la Faculté de droit
de l’Université d’Ottawa offre un programme exclusif de maîtrise en
droit (LL.M.) avec concentration en droit et technologie. Cette
concentration comporte des cours spécialisés, des expériences
pratiques et la possibilité de réaliser des recherches de deuxième
cycle novatrices, en anglais comme en français. L’Université
d’Ottawa étant située dans la capitale canadienne des technologies,
CONCENTRATION IN
ce programme joue un rôle clé dans la formation de juristes spéciali-
sés en droit des technologies, qui exercent maintenant leur
Corps Professoral
Through the Law & Technology group, the University of Ottawa Il s’agit du plus important corps professoral dans le domaine du
Faculty of Law offers a unique LL.M. with a Concentration in Law & droit des technologies au Canada.
Technology. The Concentration offers specialized courses, practical
experience and the opportunity to conduct innovative graduate Vous aurez pour professeurs des spécialistes reconnus sur la scène
level research in English and French. From its location in Canada’s nationale et internationale dans des domaines novateurs comme la
technology capital, the program has been instrumental in producing propriété littéraire et artistique, les marques de commerce, les
technology law practitioners who now occupy all facets of the tech- brevets, le droit de l’Internet, le commerce électronique, le droit à la
nology law fields. vie privée, la cybersécurité, la cybercriminalité, la déontologie de
l’information, la gouvernance de l’Internet et la justice sociale.
Faculty
The largest Canadian law faculty dedicated to technology law issues. Modules
• Programme d’études : Le programme comporte deux sémi-
Learn from recognized national and international experts in naires d’études supérieures spécialisés, Techno-théorie et
the innovative areas of: Copyright; Trademark; Patent; Internet Law; Techno-régulation, un mémoire ou un projet de recherche
E-Commerce; Privacy; Open Source; Cyber-security; Cybercrime; en droit des technologies, un stage, de même que des cours
Biotech nology, Information Ethics; Internet Governance; and au choix dans les domaines de la médiatique, de la propriété
Social Justice. intellectuelle et du commerce électronique.
• Stages : auprès de cabinets juridiques d’importance,
Modules d’entreprises spécialisées dans la technologie, des services
• Curriculum: The curriculum includes two specialized grad- gouvernementaux d’élaboration des politiques ou de
uate seminars, Technopolicy and Techno pru dence , a groupes d’intérêt public.
research paper or technology law project, internship, and • Clinique d’intérêt public et de politique d’Internet du
elective courses from the areas of new media, intellectual Canada : bénévolat ou stage à la CIPPIC, la clinique
property and e-commerce. juridique canadienne de pointe en matière de droit des
• Internships: With leading Canadian law firms, technology technologies.
companies, government policy departments or public • Revue de droit et technologie de l’Université d’Ottawa :
interest groups. bénévolat ou stage à la RDTUO, périodique spécialisé en
• Canadian Internet Policy and Public Interest Clinic: droit des technologies.
Volunteer or intern at CIPPIC, Canada’s foremost technology law • Colloques internationaux, série de conférences bimensuelles
clinic. et séminaires spéciaux.
• University of Ottawa Law & Technology Journal:
Volunteer or intern at the UOLTJ, an academic law review Admission
specializing in law and technology jurisprudence. Pour être admissibles au programme de maîtrise en droit, les candi-
• International Conferences, Bi-weekly Speaker Series and dats doivent détenir un diplôme de droit de premier cycle d’une
Special Lectures. université canadienne, obtenu avec une moyenne satisfaisante, ou
un diplôme de droit équivalent, obtenu à l’étranger, moyennant des
Admission résultats jugés comparables. Pour plus de renseignements, veuillez
In order to be considered for admission to the Master of Laws communiquer avec le bureau des Études supérieures de la Faculté
program, applicants must have an undergraduate law degree from a de droit : adresse Internet :
Canadian university with a satisfactory average or an equivalent
foreign law degree with comparable results. For more information http://www.llmlld.uottawa.ca/fra/maitrise/admission.htm/
please contact the Faculty of Law Graduate Studies office: courriel : llmlld@uottawa.ca téléphone : 613-562-5774
télécopieur : 613-562-5341 //
Internet: http://www.llmlld.uottawa.ca/eng/master/admission.htm
Email: llmlld@uottawa.ca Telephone: 613.562.5774
Fax: 613.562.5341 //
18 TECHLAW //
Digital Music,
with Professor
Jeremy de Beer
de Beer’s Digital Music course is a unique
multi-national and multi-disciplinary survey
of the global digital music scene. Together
the class canvasses aspects of the law in
Canada, the States, Europe, Australia,
Asia and Africa. As well as having a
cross-continental scope, we analyze
timely issues through many different
lenses, by taking into account legal,
com mercial, techno logical and
social pers pec tives. The overarching
objective is to think broadly about the
TECHNOLOGY
policies affecting the future of digital
music and, ultimately, the creation and
LAW INTERNSHIP
consumption of our own culture. // The internship provides students with the opportunity to spend one
day per week in a technology law environment. Through readings,
observation, and work assignments, students will gain insight into
Musique numérique, avec le daily practice and policy issues for lawyers working in the tech-
professeur Jeremy de Beer nology law field. This popular course is available to both
undergraduate and graduate students as an elective course and
Le cours « Musique numérique » du professeur de Beer comporte un tour students are assigned a grade of satisfactory / non-satisfactory.
d’horizon multinational et pluridisciplinaire de la scène mondiale en matière The Technology Law Internship program has spanned four
de musique numérique. Les étudiants examineront ensemble diverses cities – Ottawa, Montreal, Toronto, and Washington, DC. With more
facettes de la loi au Canada, aux États-Unis, en Europe, en Australie, en Asie than two dozen internship partners, students have the opportunity
et en Afrique. Tout en procédant à une comparaison de ce qui se fait sur les to intern at major law firms, business, governmental and non-
différents continents, nous analysons des questions d’actualité sous un governmental organizations, CIPPIC and the University of Ottawa
certain nombre de points de vue, en fonction de leurs aspects juridiques, Law & Technology Journal. //
commerciaux, technologiques et sociaux. L’objectif général consiste à
susciter une réflexion d’ensemble quant aux politiques qui auront des réper-
cussions sur l’avenir de la musique numérique et, conséquemment, sur la
création et la consommation de notre propre culture. //
STAGES EN DROIT
DES TECHNOLOGIES
Le stage permet à l’étudiant ou à l’étudiante de passer une journée
par semaine dans un milieu spécialisé en droit des technologies et
d’acquérir ainsi, par le biais de lectures, d’observations et de tâches
qui lui sont confiées, une expérience de la pratique et des questions
de politiques auxquelles font face quotidiennement les juristes
The Canadian Internet Policy and Public Interest Clinic œuvrant dans le domaine du droit des technologies. Ce cours
(CIPPIC) was established in fall of 2003 at the University of optionnel populaire est offert aux étudiants de premier cycle et aux
Ottawa, Faculty of Law, Common Law Section. CIPPIC seeks to études supérieures. La note attribuée est exprimée de la façon suiv-
ensure balance in policy and law-making processes on issues ante : satisfaisant/ non satisfaisant.
that arise as a result of new technologies. Upper year law Le programme de stages en droit des technologies est réalisable
students work under the supervision of the Clinic director on dans quatre villes : Ottawa, Montréal, Toronto et Washington, DC.
projects and cases involving the intersection of law, technology Grâce à la collaboration de plus de vingt-quatre partenaires, ces stages
and the public interest. CIPPIC Summer Fellowship peuvent s’effectuer auprès de grands cabinets, d’entreprises, d’orga-
Program is now open to Canadian law students who have nismes gouvernementaux et non gouvernementaux, de la CIPPIC et
completed at least two years of law school. For more informa- de la Revue de droit et technologie de l’Université d’Ottawa. //
tion and current news visit: http://www.cippic.ca //
L’OPTION EN DROIT
ET TECHNOLOGIE
Il n’est pas nécessaire de vous spécialiser en Droit et technologie pour suivre des cours de D
& T. En fait, des cours comme « Introduction à la propriété intellectuelle » sont recom-
mandés à tout étudiant envisageant la pratique du droit. Toutefois, certains étudiants du
baccalauréat en droit suivent de nombreux cours en Droit et technologie et veulent se voir
reconnaître officiellement cette spécialisation. La Faculté de droit offre donc à ces étudiants
l’« option en Droit et technologie ».
Pour se voir reconnaître l’option en Droit et technologie, les étudiants doivent obtenir
18 crédits de cours dans ce domaine, dont le cours d’« Introduction à la propriété intellectuelle »,
de même que l’un de nos stages. Leur mémoire de recherche doit également être rédigé dans
le cadre de l’un des cours de l’option ou d’un cours de recherche dirigée.
Veuillez vous adresser au bureau des Affaires académiques pour obtenir la liste des
exigences liées à l’option. Pour obtenir des renseignements complémentaires ou pour vous
inscrire au L.L.B. avec option en Droit et technologie, veuillez vous adresser à un respon-
sable des Affaires académiques. //
20 TECHLAW //
TECHLAW // 01/08 // v5.1 21
Conférence Deirdre G. Martin
commémorative Memorial Lecture
Deirdre G. Martin in Privacy Law
en matière de droit
relatif au respect de The Law & Technology Group is honoured to host
later this year the first annual Deirdre G. Martin
22 TECHLAW //
The EPIDEMIC of
Lost and Stolen Data:
Are Custodians of Data Liable in Negligence
for Breaches of Data Security?
Jennifer A. Chandler*
* Professor Chandler’s full length article on the thieves open new service accounts or
this topic is forthcoming in Volume 23(2) obtain new credit in the victim’s name. This
of the Banking and Finance Law Review. can ruin a victim’s credit rating and expose
Professor Chandler gratefully acknowledges him or her to harassment from collections
Borden Ladner Gervais LLP’s support for agencies. In a smaller number of cases,
her research assistant David Quayat victims such as law enforcement personnel,
through its Research Fellowship Program have expressed the fear that the compromise
in the preparation of the full length article. of personal information such as home
addresses exposes them to the risk of phys-
Unfortunately the choice of the term ical danger. The economic harm caused by
“epidemic” to describe the problem of data widespread fraud is not visited solely upon
security breaches at major data custodians the people whose data is misused. Where
such as banks, large retailers and govern- the losses are absorbed by banks or by the
ment agencies is not an overstatement. The merchants who accept the fraudulent credit
informal tallies maintained by websites such card purchases, the costs are passed on
as “The Privacy Rights Clearinghouse” 1 broadly through higher prices.
necessarily understate the problem as they This problem has begun to attract the
are limited to those data breaches that are attention of legislators, academics and class
publicly known and which affect Americans. action lawyers. There is a growing body of
Nonetheless, it paints an impressive picture decided cases in the United States dealing
of over 160 million records of sensitive with civil liability for breaches of data secu-
personal information lost or stolen since rity, and multiple actions are pending in both
2005. Canadians are also clearly affected. In Canada and the United States. These lawsuits
January, 2007, TJX Companies Inc. announced have been brought on behalf of various kinds
a security breach affecting millions of of plaintiffs. First, the people whose data has
records in Canada, the United Kingdom, been compromised have sought to recover
Ireland, the United States and Puerto Rico. the costs of monitoring or repairing their
In the same month, Talvest Mutual Funds credit or of obtaining identity theft insurance.
announced the loss of 470,000 Canadian Merchants who suffer credit card chargebacks
client records. Undoubtedly the losses are as a result of fraudulent purchases made
higher given that some breaches are not using compromised credit cards have claimed
disclosed, and some data custodians may be these losses. Financial institutions have
unaware that they have taken place. attempted to recover the costs associated with
The primary concern associated with the responding with mass cancellation and reis-
compromise of this data is that it can be suing of payment cards. The plaintiffs have
used for identity fraud. In some cases, identity argued that the defendants (including major
thieves drain existing accounts or make retailers, financial institutions, universities
fraudulent credit card purchases. In others, and government) have been careless in
24 TECHLAW //
identity fraud, they may have difficulty in
persuading a court that the loss is recover-
able in negligence. The courts have
controlled quite carefully what forms of “pure
economic loss” (i.e., loss that does not flow
from physical damage to person or property)
may be recovered in negligence claims.
Another interesting, if legalistic, problem
may face plaintiffs in the Canadian lawsuits.
The Supreme Court of Canada ruled years ago
that where the government puts in place Even where the identity theft involved the
through legislation a comprehensive proce-
dure to deal with a particular problem, the specific information known to have been
courts cannot develop a parallel remedy
in common law. 4 As a result, a Canadian stolen from the defendant and occurred
defendant could argue that plaintiffs must
bring their complaint regarding inadequate reasonably soon after the breach of security,
data security safeguards to the Privacy
Commissioner of Canada under the Personal courts have refused to find causation.
Infor mation Protection and Electronic
Documents Act.5 This Act provides a reason-
ably comprehensive set of data security established cause of action (i.e., negligence) actors to bear the costs of
obliga tions as well as an enforcement to a new context. They may also argue that their own carelessness in
mechanism, and may eventually give rise to a only provincial legislation can foreclose the order to encourage a
claim for damages before the Federal Court. development of a common law remedy since reasonable level of care to
The difficulty facing plaintiffs is that it is civil remedies fall within provincial jurisdic- be taken. Unfortunately,
unlikely that the class action mechanism is tion under the Canadian Constitution. Since the courts have so far
compatible with the scheme set out by the Act. these arguments have not, to my knowledge, found negligence law to be poorly-equipped
As a result, the plaintiffs, whose individual been tested, their success before the courts to deal with the problem. We shall see if they
losses may be fairly small, may lack the incen- is uncertain. are able to adapt the doctrines to meet the
tive to vindicate their rights by pursuing the In sum, we are facing a real problem with problem or whether the legislature or industry
matter alone through to the Federal Court. significant consequences for individuals organizations will step forward. //
They may find it worthwhile only if they are whose personal information is com pro -
able to do so via a class action that gathers mised as well as with considerable economic Professor Jennifer Chandler is a member of
together all similarly affected individuals. repercussions for everyone. For various the Law & Technology group. Her research is
Plaintiffs may seek to refute the argument reasons, data custodians seem to face inade- currently focused on medical-legal problems
that they are limited to the procedures set quate incentives to maintain reasonably as well as liability issues related to identity
out in the Act by noting that they are not effective data security safeguards. As a result, theft and data security.
invoking a new common law cause of the problem is unlikely to go away. Tort law
action, but are simply seeking to apply an has been used in the past to cause careless
4
Board of Governors of Seneca College of Applied Arts & Technology v. Bhadauria, [1981] 2 S.C.R. 181.
5
S.C. 2000, c.5.
y a, aux Etats-Unis, un nombre croissant de peut faire valoir des arguments raisonnables frais de leur propre manque de vigilance,
procès liés à la responsabilité civile pour en matière de théorie de la négligence et de afin de favoriser l’adoption de mesures de
atteinte à la sécurité de renseignements politiques publiques, pour inciter les sécurité appropriées. Malheureusement, les
personnels, et de nombreuses poursuites tribunaux à se montrer plus réceptifs quant à tribunaux ont jusqu’ici constaté que le droit
sont étalement en attente devant les ces allégations dans certains cas. de la négligence ne comportait guère les
tribunaux, au Canada comme aux Etats- Dans cet article, la professeure Jennifer dispo sitions nécessaires pour régler
Unis. Les plaignants invoquent la négligence Chandler soutient que pour diverses adéquatement le problème de l’atteinte à la
des défendeurs (y compris des géants du raisons, les dépositaires de renseignements sécurité des renseignements personnels. //
commerce de détail, des institutions finan- personnels seraient peu motivés à maintenir La professeure Jennifer Chandler est membre
cières, des universités et des gouvernements) des mesures de sécurité raisonnablement du groupe Droit et technologie. Ses recherches
dans le traitement de données sensibles, ce efficaces en ce qui a trait à ces données. Par actuelles sont axées sur les problèmes
qui, disent-ils, en a occasionné la perte ou le conséquent, le problème n’est pas près de médico-légaux, de même que sur les ques-
vol. Jusqu’ici, toutefois, les allégations de disparaître. Dans le passé, on a déjà recouru tions de responsabilité liées au vol d’identité
négligence émises par les plaignants ont été au droit de la responsabilité délictuelle pour et à la protection des données.
déboutées pour la plupart, même si l’on obliger les parties négligentes à assumer les
i
Privacy Rights Clearinghouse www.privacyrights.org/ar/chrondatabreaches.htm.
SÉRIE DE CONFÉRENCES
The Privacy Network actively works to
en droit des technologies
identify and champion the development of Grâce à une généreuse contribution du cabinet Torys, s.r.l. en
academic led Privacy Enhancing Technology septembre 2002, à laquelle s’est ajouté un montant équivalent
research projects and match them with offert par le Réseau ontarien de recherches sur le commerce
interested corporate partners. The results of électronique (RORCÉ), la Faculté de droit a mis en place la
the productized and commercialized privacy Série de conférences Torys, s.r.l., en droit des technologies.
technology research will contribute to the Depuis ce temps, la Faculté a accueilli, dans sa salle multimédia
development of an increased pool of informed de Téléapprentissage du pavillon Fauteux, des spécialistes
and insightful technical tools, solutions and canadiens et étrangers. La série est diffusée sur le Web et toutes
knowledge available for the benefit of busi- les conférences sont archivées sur le site Web du programme,
ness, consumers and regulators. afin d’en permettre la consultation publique. Cette activité, qui
The Privacy Network operates a commu- s’étend sur toute l’année universitaire, à laquelle on ne peut
nity based self-service information and prendre part que debout, attire des praticiens et praticiennes,
research portal at www.theprivacynet- des fonctionnaires, des chefs d’industrie et des universitaires de
work.org that promotes collaborative la région d’Ottawa. On peut consulter l’horaire et les
solution and application development. The archives sur le site Web du programme. //
Privacy Network Portal provides a useful
platform for users to form Communities
along a variety of privacy topics and develop
and maintain Solutions and Projects within
such Communities – with the intent of
developing new privacy solutions collabora-
tively or enhance and grow existing solutions,
tools and best practices. //
26 TECHLAW //
LE DÉTERMINISME
GÉNÉTIQUE?
La discrimination légitimée
et les répercussions des tests
individuels pour le public
Professeure Karen Eltis
1
Les personnes de couleur avaient un quotient intellectuel inférieur à la moyenne. CTV.ca News Staff, « Quebec Radio Shrink Sparks Complaints of Racism », 29 septembre 2005, à
l’adresse : <http:// www.ctv.ca/servlet/ArticleNews/story/CTVNews/20050928/mailloux_defends_ 050928/20050928?hub=Canada> (consulté pour la dernière fois le 21 septembre 2007).
GENETIC DETERMINISM
AND DISCRIMINATION:
A Call to Re-Orient Prevailing Human Rights
Discourse to Better Comport with the Public
Implications of Individual Genetic Testing
Professor Karen Eltis
“Privacy Abstract:
Genetic testing can not only provide infor-
could haplessly be used to make general
assumptions about entire ethic or gender
considerations no mation about diseases but also respecting
their prevalence in ethnic, gender or other
groups. In this manner, genetic information
can directly influence identity impacting
longer arise out of vulnerable populations. While offering the
promise of significant therapeutic benefits
and perhaps even reframing conceptions of
group rights and dimensions of self-identi-
particular individual and serving to highlight our commonality,
genetic information also raises a number of
fication, thus importing constitutional scrutiny
on questions of dignity and discrimination
problems; rather, sensitive human rights issues touching on
identity and the perception thereof, as well
in particular. Is there a risk of collective
stigmatization deriving from discrete testing
they express associal
the possibility of discrimination and
stigma. Moreover, the stoicism with
of self-identified individuals? Would such
stigmatization impinge on individual dignity
conflicts affecting which the public tends to greet such data is
of particular relevance to its eventual impact
by the exogenous imposition of ethnic or
gender/sexual identity? If so what norms can
everyone.”i on rights in the genomics age. It stands to
reason that the results of individual screenings
most adequately respond if and when indivi-
dual and group interests diverge? //
i
Spiros Simitis, “Reviewing Privacy in an Information Society”, 135 U. PA. L. REV. 707, 709 (1987).
28 TECHLAW //
développement de l’intelligence2. Bien que des conclusions générales sur l’ensemble naturel des tests génétiques inappropriés, de
cette affirmation puisse paraître flatteuse à d’un groupe ethnique ou sexuel. toute évidence, les répercussions sociales
prime abord, quiconque connaît un tant soit Les ramifications publiques de l’informa- qui en résultent sont susceptibles de
peu l’histoire du peuple juif saisit tion génétique démontrent la nécessité porter atteinte aux droits des groupes, et
immédiatement que de telles allusions (au d’études multidisciplinaires approfondies plus particulièrement à leur droit à l’égalité
caractère exceptionnel ou au « génie » mani- offrant une réponse juridique éclairée, car et à la dignité.
feste des Juifs) servent uniquement à manifestement certaines formes de recherche C’est précisément le raisonnement fondé
alimenter le racisme3. peuvent comporter des risques sociaux plus sur la dignité qui semble le plus en harmonie
Enfin, même l’ancien président de importants que l’éclectisme des donneuses avec la protection des renseignements
l’Université Harvard a été invité à démis- et des donneurs de spécimens biologiques. susceptibles d’engendrer la diffamation à
sionner après s’être prononcé sur la À titre d’exemple, songeons à l’étude des l’égard d’un groupe.
soi-disant « infériorité » des femmes en prédispositions comportementales – en Pour compliquer encore les choses, il est
mathématiques et en sciences en raison de particulier la prédisposition à la violence – fort plausible que les intérêts des individus
leur bagage génétique inné. Dans cette et à son intersection avec l’ethnicité et le appartenant à des groupes divers divergent de
même veine, soulignons que les données sexe. Il va sans dire que ce genre d’études ceux du groupe lui-même dans le contexte
« scientifiques » qui fondent les prétentions risque d’avoir des répercussions importantes génétique. Cela remet donc en question la
de ce biologiste de formation rendent ses sur le fonctionnement du système pénal. présomption fréquente de l’intersection entre
propos particulièrement consternants. Déjà, aux États-Unis des condamnés à mort les intérêts des membres individuels et de la
Si les débats juridiques ont été limités invoquent la défense « du mauvais sang », collectivité d’un groupe minoritaire, que le
jusqu’ici à déterminer si l’information prétendant que leur comportement criminel droit semble tenir pour acquis.
génétique constitue une forme exception- est la conséquence d’un gène qui les prédis- Perçu sous cet angle, même le « critère du
nelle de renseignements personnels, pose à la violence et que ce comportement bienfait thérapeutique », que proposent la
justifiant donc un traitement normatif est indépendant de leur volonté. plupart des éthiciens qui préconisent les
distinct, la discussion s’est faite presque S’il est vrai que « [TRADUCTION] le préju- tests génétiques uniquement s’ils sont béné-
exclusivement dans le contexte des assur- dice résultant des tests ciblant des groupes fiques pour la santé du sujet, semble peu
ances et de l’emploi ou, plus précisément, vulnérables (ethniques ou autres) particuliers pertinent dans ce contexte, car même si l’in-
dans la perspective des individus soumis au dépasse le seul individu et porte atteinte à des dividu en tire un avantage véritable, les
criblage génétique. groupes sociaux en entier », comme le résultats du test risquent d’encourager le
Mais qu’en est-il des personnes appar- suggèrent Jin et coll. (Yale), est-ce que des développement de stéréotypes nuisibles
tenant à que ce la Cour suprême du Canada mesures législatives, mêmes particulières, pour le groupe avec lequel est associé l’indi-
appelle « les groupes historiquement conçues dans le cadre de « [TRADUCTION] vidu assujetti au test.
vulnérables? ». Chose étonnante, les réper- notre système actuel de protection des Pour résumer la nature du problème
cussions publiques de l’ethnicité et du sexe humains sujets de recherche centrée sur l’indi- abordé ici : premièrement, le débat actuel
vus à travers le prisme du savoir génomique vidu, […] peuvent offrir une protection sur l’information génétique est confiné
ont à peine fait l’objet d’études. adéquate » par rapport aux conséquences des presque entièrement à ses ramifications
Pourtant il devient de plus en plus tests génétiques pour le public? sur la santé et la vie privée; deuxièmement,
manifeste que le risque de discrimination Mon intention est de susciter une le débat part habituellement de la présomp-
génétique transcende la sphère des préoccu- réflexion sur ce sujet précis. Cette probléma- tion que les intérêts d’un individu et de
pations personnelles – et, il va sans dire, le tique se prête mieux à une analyse fondée son groupe social sont identiques, ce qui
contexte étroit de l’assurance et de l’emploi. sur les droits de la personne (en particulier n’est pas toujours le cas; enfin, le débat
Les exemples précités relativement à l’intelli- sur la dignité) qu’à la législation spécifique semble oublier le stoïcisme avec lequel le
gence présumée de certaines cohortes ou ad hoc4. public en général accueille les données
démontrent bien, de fait, comment les résul- De plus, bien que le droit à la vie privée scientifiques et l’effet unique de la science
tats de tests individuels peuvent servir à tirer ait été qualifié comme étant l’enjeu le plus sur la culture populaire.
2
G. Cochran, J. Hardy et H. Harpending, « Natural History of Ashkenazi Intelligence », Journal of Biosocial Science 35, nº 5 (2006): 659-693, à l’adresse :
<http://homepage.mac.com/harpend/. Public/AshkenaziIQ.jbiosocsci.pdf> (consulté pour la dernière fois le 21 septembre 2007).
3
Voir J. A. Barondess, « Care of the Medical Ethos, with Some Comments on Research: Reflections after the Holocaust », Perspectives in Biology and Medicine 43, nº 3 (2000): 308-324.
Selon Green et coll.:, « Historically, genetic information has been used to discriminate against individuals and groups, particularly Jews and other minorities. » H. Markel, « The Stigma
of Disease: Implications of Genetic Screening », American Journal of Medicine 93, nº 2 (1992): 209-215.
4
Argumentation élaborée dans K. Eltis, « Genetic Determinism and Discrimination: A call to Reorient Prevailing Human Rights Discourse to Better Comport with the Public
Implications of Genetic Testing » 35 J.L. Med. & Ethics 282 (2007).
30 TECHLAW //
The Law & Technology group at the University
of Ottawa prides itself in having the leading
program in Canada researching the legal and
social issues at the crossroads of law and
technology. An important part of this mission
has been assembling a group of faculty
unmatched at any other law school in
the country.
Professor Jane Bailey
Jane Bailey is an assistant professor at the University of Ottawa
Faculty of Law. She currently teaches in the areas of cyber-
This year, we added two professors to our ranks. feminism, contracts and civil procedure and has also taught
Professor Marina Pavlovic, and Dr. Teresa Scassa. regulation of internet communications. Her research focuses on
the intersections between law, equality, privacy and tech-
Marina Pavlovic nology, including in relation to online self-exposure, hate
LL.B. (Belgrade, Serbia), LL.M. (Ottawa) propaganda and child pornography. Her recent publications include:
“Confronting Collective Harm: Technology’s Transformative Impact on Child
LL.D. (Candidate, Ottawa)
Pornography” (2007) 56 UNBLJ 65; and “Seizing Control?: The Experience
Professor Pavlovic joined the Common Law English Program in
Capture Experiments of Ringley and Mann” (2007) 9 Ethics and Information
July 2007. She is currently completing her LL.D. dissertation at
Technology (co-authored with Ian Kerr). Her forthcoming publications include:
uOttawa, working under the supervision of Dr. Daniel Gervais.
“Life in the Fishbowl: Feminist Interrogations of Webcamming” in On the Identity
Prior to joining uOttawa as an Assistant Professor, Professor
Trail: Anonymity, Privacy and Identity in a Networked Society, Ian Kerr, Carole
Pavlovic acted as an in-house counsel for a telecommunication company in
Lucock and Valerie Steeves, eds.; “Framed By Section 8: Constitutional Protection
Belgrade (Serbia); as an of-counsel with a law firm in Salzburg (Austria), where she
of Privacy in Canada” (2008) Canadian Journal of Criminology and Criminal
practiced in the area of international commercial arbitration; and was a part-time
Justice; “What’s So Cyber About It?: Reflections on Cyberfeminism’s Contribution
professor at the Common Law Section (2004-2007). Professor Pavlovic is also the
to Legal Studies” (2007) 19 CJWL (co-authored with Adrienne Telford); “Missing
Managing Editor of the University of Ottawa Law & Technology Journal. Her
Privacy through Individuation: The Treatment of Privacy in the Canadian Case
teaching focus is dispute resolution, and her research interests include dispute reso-
Law on Hate, Obscenity and Child Pornography” (2008) 31 Dalhousie Law
lution, comparative law, conflict of laws, and technology regulation and policy. //
Journal; and “Unreliable Data, Decontextualized Sorting & Invidious Discrimination:
Conceptualizing the Collective Privacy Violation of Harmful Speech Through
Data Management Concepts” (2008) 31 Dalhousie Law Journal. //
Dr. Teresa Scassa
Canada Research Chair in Information Law
Dr. Scassa joined the Law & Technology faculty in September, Professor Jennifer Chandler
2007 and is the Canada Research Chair in Information Law. She Professor Chandler is continuing her work looking at the
holds undergraduate law degrees in civil and common law from manner in which courts address disputes involving technology.
McGill University, as well as an LL.M. and an S.J.D. from the She is currently conducting major case studies involving vaccina-
University of Michigan. She taught at Dalhousie Law School for tion and psycho-physiological measurement technologies (e.g.
15 years before joining the faculty of law at the University of Ottawa as a full functional magnetic resonance imaging of the brain as well as
professor in July 2007. She has taught a range of subjects including Intellectual polygraph testing). She is also completing work relating to the
Property, Law and Technology, Public Law, Administrative Law, and Professional permissible limits of self-help in response to identity theft.
Responsibility. She is a member of the Nova Scotia Barristers’ Society. She is co-editor Professor Chandler is also teaching a new course in medical-legal problems as well
of the Canadian Journal of Law and Technology, and co-author of the recent book as continuing her teaching in legal philosophy for the information age and tort law.
Electronic Commerce and Internet Law in Canada, (CCH Canadian Ltd.). Her research Professor Chandler recently published “The Autonomy of Technology: Do
and scholarship is primarily in the areas of intellectual property law, law and technology, courts control technology or do they just legitimize its social acceptance?” in the
and privacy. She has written articles on a range of topics in theses areas. // Bulletin of Science Technology & Society; “Liability for Breaches of Data Security”
in the Banking and Finance Law Review; “A Right to Reach an Audience: An
Approach to Intermediary Bias on the Internet” in the Hofstra Law Review; and
coauthored a chapter titled “Legal Challenges of Online Reputation Systems” in
Ronggong Song, Larry Korba and George Yee, eds, Trust in eServices: Technologies,
Practices and Challenges. //
32 TECHLAW //
Professor Elizabeth F. Judge Philippa Lawson
Dr. Elizabeth F. Judge, associate professor, specializes in intellectual Philippa Lawson is the director of Canada’s only technology law
property, law and literature, and privacy. She is a founding clinic, located at the University of Ottawa, Faculty of Law. Prior
editor and the Editor-in-Chief and Faculty Advisor for the to starting up CIPPIC in 2003, she was Senior Counsel with the
University of Ottawa Law & Technology Journal, project leader Public Interest Advocacy Centre in Ottawa, Canada, where she
for Open Access Law Canada, and the co-author of Intellectual represented consumer groups in court and regulatory proceedings,
Property: The Law in Canada. Her research focuses on interdis- multi-stakeholder working groups, and other policy-making
ciplinary law and literature scholarship, especially intersections between copyright forums from 1991 to 2003. Ms. Lawson is a nationally recognized public interest
and authorship. Her current research, supported by the Social Sciences and advocate, and has worked with Canadian and international consumer organizations
Humanities Research Council of Canada, studies eighteenth-century fan fiction of since the early 1990s on many initiatives involving telecommunications, privacy
iconic fictional characters in the emerging genre of the eighteenth-century British and consumer protection in the online environment. She is currently a co-investigator
novel, the history of copyright law, and legal and literary ideas of originality and on the SSHRC-funded “On The Identity Trail” project (see www.idtrail.org), and is
authorship. Her recent publications include “Intellectual Property Law as an the lead investigator for the research project “Legal and Policy Approaches to
Internal Limit on Intellectual Property Rights and Autonomous Source of Liability Identity Theft” funded by the Ontario Research Network on Electronic Commerce
for Intellectual Property Owners” in the Bulletin of Science, Technology and Society (ORNEC). As Director of CIPPIC, Ms. Lawson’s work focuses on training students in
and “Kidnapped and Counterfeit Characters: Eighteenth-Century Fan Fiction, effective advocacy, producing relevant online resources, and ensuring that the public
Copyright Law, and Custodial Interests in Fictional Characters” in Originality and interest is robustly represented in government policy development and law-making
Intellectual Property in the French and English Enlightenment, ed. Reginald processes on issues involving new technologies.
McGinnis (Routledge, 2008). // Recent publications include On the Data Trail: How Detailed Information About
You ends up in the Hands of Organizations with whom You have no Relationship
(April 2006); Compliance with Canadian Data Protection Laws; Are Retailers
Andy Kaplan-Myrth Measuring Up? (April 2006), and Approaches to Security Breach Notification: A
Andy Kaplan-Myrth is the Manager of the Law & Technology White Paper (Jan.2007). //
group. He has a background in Mathematics and holds an M.A.
in Linguistics and Cognitive Science from Yale University. Andy
has an interest in public policy and education about legal issues Professor Valerie Steeves
related to the internet and other technologies. After earning his Valerie Steeves is an Assistant Professor in the Department of
LL.B. in the Law & Technology program at the University of Criminology. One of her main areas of research is the impact of
Ottawa and articling at a national firm, Andy returned to the Faculty as the group’s new technologies on children’s privacy. Her recent publications
Manager. Andy is also a Project Lead for Creative Commons Canada and last year include two book chapters on online playgrounds: “The
co-authored the Podcasting Legal Guide for Canada with Kathleen Simmons. // Watched Child: Surveillance in Three Online Playgrounds”,
Proceedings of the International Conference on the Rights of
the Child (Montreal: Wilson Lafleur, forthcoming 2008); and
Professor Ian Kerr “Who’s Minding the Kids?: Online Surveillance of Tinys and Tweeneys”, coauthored
with Ian Kerr, A Sociedade Vigilante: Ensaios sobre Privacidade, IdentificaÁ„o e
Ian Kerr is the Canada Research Chair in Ethics, Law &
Vigil‚ncia. Frois, Catarina (org.) (Lisboa: Imprensa de CiÍncias Sociais, 2008). She
Technology. He holds a three way appointment in the Faculties
has also written about the effectiveness of the current legislative framework to
of Law and Medicine and the Department of Philosophy at the
protect children’s privacy in “Closing the Barn Door: The Effect of Parental
University of Ottawa. Dr. Kerr teaches in the areas of moral
Supervision on Canadian Children’s Online Privacy,” coauthored with Cheryl
philosophy and applied ethics, internet and ecommerce law,
Webster (Bulletin of Science, Technology & Society, 2008) and “Broken Doors:
contract law and legal theory, and has published writings in
Strategies for Drafting Privacy Policies Kids Can Understand,” coauthored with
academic books and journals on the ethical and legal aspects of digital copyright,
Jacquelyn Burkell and Anca Micheti ( Office of the Privacy Commissioner of
automated electronic commerce, artificial intelligence, cybercrime, nanotech-
Canada: 2007). Professor Steeves also sits on a number of committees dealing
nology, internet regulation, ISP and intermediary liability, online defamation,
with law and technology issues, including the Canadian Standards Association
pre-natal injuries and unwanted pregnancies. His current program of research
Technical Committee on Privacy and the American Association for the
includes an examination of the impact of the human-machine merger on existing
Advancement of Science Committee on Scientific Freedom and Responsibility. //
regimes of regulation, and how we ought to regulate such mergers taking into
account the various social and ethical issues they raise. He is co-editing, with
Valerie Steeves and Carole Lucock, a book titled On the Identity Trail: Anonymity,
Privacy and Identity in a Networked Society (Oxford University Press), which will
articulate the themes and questions that have emerged as a result of his SSHRC
project’s investigations over the past four years. Dr. Kerr recently published a book
chapter on emerging health technologies in Canada Health Law and Policy, 3rd edition,
as well as a two journal articles: “Seizing Control?: The Experience Capture
Experiments of Ringley & Mann” in Ethics and Information Technology, with Jane
Bailey, and “Emanations, Snoop Dogs and Reasonable Expectation of Privacy” in
Criminal Law Quarterly, with Jena McGill. //
LAW +
TECHNOLOGY
Créé en 1998, le programme de droit et tech-
nologie de la Faculté de droit de l’Université
d’Ottawa est un programme d’avant-garde,
unique en son genre au Canada. On y offre des
cours spécialisés, des expériences pratiques et la
possibilité de mener des recherches novatrices,
tant au premier cycle qu’aux cycles supérieurs.
L’Université d’Ottawa est située dans la capitale canadienne des technologies et son
programme de droit et technologie constitue un noyau vital sur le plan de l’information
juridique et de l’expertise dans le domaine de l’élaboration de politiques et de décisions
judiciaires au Canada. Ce programme a joué un rôle clé dans la formation de juristes
spécialisés en droit et technologie qui exercent maintenant leur profession dans tous les
domaines du droit des technologies. //