SlideShare une entreprise Scribd logo
1  sur  42
Télécharger pour lire hors ligne
McCarthy Tétrault Advance™
                                                  Building Capabilities for Growth




                       Toronto Computer Lawyers Group
                      The Year in Review: Developments in
                            Computer, Internet and
                         E-Commerce Law (2010-2011)

Barry B. Sookman
bsookman@mccarthy.ca
416-601-7949                                                     June 15, 2011
McCarthy Tétrault LLP / mccarthy.ca                                         10398714
                                                                                       1
Privacy




McCarthy Tétrault LLP / mccarthy.ca
                                                2
Citi Cards Canada Inc. v. Pleasance, 2011 ONCA 3


            ¬ “Personal information” is defined in s. 2(1) of the Act. It
              “means information about an identifiable individual.”
            ¬ “This is a very elastic definition, and should be interpreted in
              that fashion to give effect to the purpose of the Act. There
              can be no doubt that financial information pertaining to a
              debtor, collected and used by a financial institution in the
              course of a mortgage transaction – including the particulars
              of, and the balance owing on the debtor’s mortgage – is
              “information about an identifiable individual.” Current
              mortgage balances are not information that is publicly
              available.”




McCarthy Tétrault LLP / mccarthy.ca
                                                                                 3
Leon’s Furniture Limited v. Alberta (Information and
 Privacy Commissioner), 2011 ABCA 94
     ¬      The “identifiable individual” term has two components. Firstly, the individual
            must be “identifiable”. Generic and statistical information is thereby excluded,
            and the personal information (here the relevant number) must have some
            precise connection to one individual. Secondly, the information must relate to
            an individual. Information that relates to objects or property is, on the face of
            the definition, not included. The key to the definition is the word “identifiable”.
     ¬      “Further, to be “personal” in any reasonable sense the information must be
            directly related to the individual; the definition does not cover indirect or
            collateral information. Information that relates to an object or property does not
            become information “about” an individual, just because some individual may
            own or use that property.”
     ¬      Driver’s licence numbers are PI but licence plate numbers are not.
     ¬      “The respondent [Privacy Commissioner] is not empowered to direct an
            organization to change the way it does business, just because the respondent
            thinks he has identified a better way. So long as the business is being
            conducted reasonably, it does not matter that there might also be other
            reasonable ways of conducting the business.”

McCarthy Tétrault LLP / mccarthy.ca
                                                                                                  4
State Farm Mutual Automobile Insurance Company
 v. Privacy Commissioner of Canada, 2010 FC 736

     ¬     Is the collection of evidence by an insurer acting for one of its insured in the
           defence of a third party tort action a “commercial activity” within the meaning
           of PIPEDA?
     ¬     “I conclude that, on a proper construction of PIPEDA, if the primary activity or
           conduct at hand, in this case the collection of evidence on a plaintiff by an
           individual defendant in order to mount a defence to a civil tort action, is not a
           commercial activity contemplated by PIPEDA, then that activity or conduct
           remains exempt from PIPEDA even if third parties are retained by an
           individual to carry out that activity or conduct on his or her behalf. The primary
           characterization of the activity or conduct in issue is thus the dominant factor
           in assessing the commercial character of that activity or conduct under
           PIPEDA, not the incidental relationship between the one who seeks to carry
           out the activity or conduct and third parties. In this case, the insurer-
           insured and attorney-client relationships are simply incidental to the primary
           non-commercial activity or conduct at issue, namely the collection of evidence
           by the defendant Ms. Vetter in order to defend herself in the civil tort action
           brought against her by Mr. Gaudet.”

McCarthy Tétrault LLP / mccarthy.ca
                                                                                                5
Nammo v. TransUnion of Canada Inc., 2010 FC 1284

          ¬ “TransUnion’s suggestion that a breach may be found only if an
            organization’s accuracy practices fall below industry standards is
            also untenable.” “There is no defence of practical necessity set out
            in PIPEDA.”
          ¬ “PIPEDA does not require that personal information be completely
            accurate, complete, and up-to-date; rather, it requires that personal
            information be as accurate, complete, and up-to-date “as is
            necessary for the purposes for which it is to be used.” Thus, it is
            the use that the information is put to that dictates the degree of
            accuracy, completeness, and currency the information must have...
            Informed, reliable and objective decisions require that the
            information on which the decisions are based meets a high
            standard of accuracy, completeness and currency.”




McCarthy Tétrault LLP / mccarthy.ca
                                                                                    6
Damage Awards Under PIPEDA

        ¬ Nammo v. TransUnion of Canada Inc., 2010 FC 1284
          “In Vancouver (City) v Ward, 2010 SCC 27, the Supreme Court...
          addressed the different goals of awarding damages for
          a Charter breach; these include compensation, for which loss is
          relevant, but also vindication and deterrence, for which loss is not a
          determinative factor.”
        ¬ “In my view, the same reasoning applies to a breach of PIPEDA, which
          is quasi-constitutional legislation.... Applying the Supreme Court’s
          reasoning in Ward to PIPEDA applications before this Court indicates
          that both the question of whether damages should be awarded and the
          question of the quantum of damages should be answered with regard
          to whether awarding damages would further the general objects of
          PIPEDA and uphold the values it embodies. Furthermore, deterring
          future breaches and the seriousness or egregiousness of the breach
          would be factors to consider.”



McCarthy Tétrault LLP / mccarthy.ca
                                                                                   8
McCarthy Tétrault LLP / mccarthy.ca
                                      9
Can claims be brought for losses arising from
 privacy breaches?
     ¬     In re Hannaford Bros. Co. Customer Data Security Breach Litigation 4 A.3d 492
           (Sup, Ct. Me. 2010) (Data breach where customer data was stolen. No claim for
           time spent to avoid foreseeable harm w/o physical harm, economic loss, or identity
           theft.) Also, Paul v Providence Health System 240 P.3d 1110 (2010)
     ¬     Doe 1 v. AOL LLC 719 F.Supp.2d 1102 (N.D.Cal. 2010) (Data breach. “the Court is
           persuaded that Plaintiffs' allegations are sufficient to demonstrate standing for
           purposes of seeking injunctive relief. The Complaint alleges that AOL engages in a
           practice and policy of storing search queries containing confidential information, and
           that it has taken no steps to ensure that such information is not disclosed again in
           the future.”)
     ¬     LaCourt v. Specific Media, Inc. 2011 WL 1661532 (C.D.Cal. Apr. 28, 2011)
           (Collecting browsing histories. “Ultimately, the Court probably would decline to say
           that it is categorically impossible for Plaintiffs to allege some property interest that
           was compromised by Defendant's alleged practices.”
     ¬     Claridge v. RockYou, Inc. 2011 WL 1361588 (N.D.cal. Apr. 11, 2011) (Data
           breach. “although the court has doubts about plaintiff's ultimate ability to prove his
           damages theory in this case, the court finds plaintiff's allegations of harm sufficient
           at this stage to allege a generalized injury in fact.”)

McCarthy Tétrault LLP / mccarthy.ca
                                                                                                      10
Jones v. Tsige, 2011 ONSC 1475

          ¬ The central issue in this case is whether there is a tort for invasion of
            privacy.
          ¬ “While it is certainly the case that in Euteneier, the plaintiff was not
            suing on the basis of an intentional tort, the extent to which privacy
            rights are enforceable at law was squarely before the court for
            purposes of determining the content of the duty of care owed by the
            police to the plaintiff while in custody. In my view, the inescapable
            conclusion, put quite plainly by the Court of Appeal in paragraph 63
            of that decision, is that 'there is no “free standing' right to
            ...privacy...at common law.””
          ¬ “I would also note that this is not an area of law that requires “judge-
            made” rights and obligations. Statutory schemes that govern
            privacy issues are, for the most part, carefully nuanced and
            designed to balance practical concerns and needs in an industry-
            specific fashion.”


McCarthy Tétrault LLP / mccarthy.ca
                                                                                        11
CTB v. News Group Newspapers Ltd & Anor [2011]
EWHC 1326 (QB)
     ¬     “Mr Spearman argues ...that in effect privacy injunctions (and no doubt other forms
           of injunction also) have ceased to serve any useful purpose in the age of the
           Internet. Not only can information be put out on various networks from within this
           jurisdiction, but it can obviously be done also by anyone who wishes in other
           jurisdictions.”
     ¬      ”Should the court buckle every time one of its orders meets widespread
           disobedience or defiance?”
     ¬      ”the law nowadays is required to protect information in respect of which there is
           a reasonable expectation of privacy...” “It is fairly obvious that wall-to-wall
           excoriation in national newspapers, whether tabloid or "broadsheet", is likely to be
           significantly more intrusive and distressing for those concerned than the availability
           of information on the Internet or in foreign journals to those, however many, who
           take the trouble to look it up. Moreover, with each exposure of personal information
           or allegations, whether by way of visual images or verbally, there is a new intrusion
           and occasion for distress or embarrassment. Mr Tomlinson argues accordingly that
           "the dam has not burst". For so long as the court is in a position to prevent some of
           that intrusion and distress, depending upon the individual circumstances, it may be
           appropriate to maintain that degree of protection. The analogy with King Canute to
           some extent, therefore, breaks down.”

McCarthy Tétrault LLP / mccarthy.ca
                                                                                                    12
City of Ontario, Cal. v. Quon, 130 S. Ct. 2619
     Do employees have reasonable expectations of privacy in work owned
     devices?
        ¬ “Rapid changes in the dynamics of communication and information
          transmission are evident not just in the technology itself but in what
          society accepts as proper behavior. As one amici brief notes, many
          employers expect or at least tolerate personal use of such equipment by
          employees because it often increases worker efficiency.”
        ¬       ”Cell phone and text message communications are so pervasive that
               some persons may consider them to be essential means or necessary
               instruments for self-expression, even self-identification. That might
               strengthen the case for an expectation of privacy... And employer
               policies concerning communications will of course shape the reasonable
               expectations of their employees, especially to the extent that such
               policies are clearly communicated.”
        ¬ “A broad holding concerning employees' privacy expectations vis-à-vis
          employer-provided technological equipment might have implications for
          future cases that cannot be predicted.”

McCarthy Tétrault LLP / mccarthy.ca
                                                                                        13
R. v. Cole, 2011 ONCA 218




                “I conclude that the appellant had a reasonable
                expectation of privacy from state intrusion in the
                personal use of his work computer and in the
                contents of his personal files on its hard drive.
                However, his expectation of privacy was modified. He
                had no expectation of privacy with respect to access
                to his hard drive by his employer’s technician for the
                limited purpose of maintaining the technical integrity
                of the school’s information network and the laptop.”




McCarthy Tétrault LLP / mccarthy.ca
                                                                         14
Sparks v. Dubé, 2011 NBQB 40

          ¬ Court made a preservation order and injunction compelling
            Erica Sparks: 1) to preserve the entire contents of her personal web
            page(s) on Facebook, and 2) to participate in making copies.
          ¬ Plaintiff’s lawyer was ordered to contact the plaintiff and, without
            disclosing the nature of the subject matter schedule a meeting with
            her at a location convenient to access and download data from the
            Internet and reduce it to usable form.
          ¬       Upon meeting with the plaintiff the solicitor had to apprise her of the
                 terms and conditions of the order.
          ¬       Immediately upon disclosure of the terms and conditions of the
                 order the plaintiff, in the presence of the solicitor, was required to
                 create permanent tangible records of her web page(s) on Facebook.
          ¬ Order made ex parte!




McCarthy Tétrault LLP / mccarthy.ca
                                                                                            20
Bill C-28 Fighting Internet and Wireless Spam Act
     ¬      FISA will impede start-up businesses from launching in Canada.
     ¬      FISA will impede Canadian businesses from developing new marketing
            models over the Internet.
     ¬      FISA will deter suppliers of service providers, including outsourcing and cloud
            service providers, from operating with or maintaining facilities in Canada.
     ¬      FISA will deter foreign businesses from offering their products to Canadians
            via the Internet, mobile and other communications networks.
     ¬      FISA will impose costs and restrictions on Canadian businesses that their
            competitors outside Canada will not have to bear.
     ¬      FISA contains very strong incentives for Canadian businesses to confess
            wrong-doing, even in cases of questionable or trivial conduct, thereby
            tarnishing the reputation of legitimate businesses in circumstances where the
            offending conduct is not significant.
     ¬      FISA will chill legitimate commercial speech and thereby undermine
            fundamental values protected by the Charter of Rights and Freedoms. See
            Rethinking FISA, http://www.barrysookman.com/2011/05/25/rethinking-fisa/

McCarthy Tétrault LLP / mccarthy.ca
                                                                                              22
New UK Cookie Regulations
  ¬      Privacy and Electronic Communications Regulations put into place on May 26, 2011 to
         implement EU “Cookie Directive”.
  ¬      6 (1) Subject to paragraph (4), a person shall not store or gain access to information
         stored, in the terminal equipment of a subscriber or user unless the requirements of
         paragraph (2) are met.
  ¬      (2) The requirements are that the subscriber or user of that terminal equipment (a) is
         provided with clear and comprehensive information about the purposes of the storage of, or
         access to, that information; and (b) has given his or her consent.
  ¬      (3) Where an electronic communications network is used by the same person to store or
         access information in the terminal equipment of a subscriber or user on more than one
         occasion, it is sufficient for the purposes of this regulation that the requirements of
         paragraph (2) are met in respect of the initial use.
  ¬      “(3A) For the purposes of paragraph (2), consent may be signified by a subscriber who
         amends or sets controls on the internet browser which the subscriber uses or by using
         another application or programme to signify consent.
  ¬      (4) Paragraph (1) shall not apply to the technical storage of, or access to, information (a)
         for the sole purpose of carrying out the transmission of a communication over an
         electronic communications network; or (b) where such storage or access is strictly
         necessary for the provision of an information society service requested by the subscriber
         or user.

McCarthy Tétrault LLP / mccarthy.ca
                                                                                                        25
New UK Cookie Regulations

     ¬ ICO Guidelines @ http://ow.ly/5gJnT
     ¬ Organizations have 12 months to phase in the new system, but are
       expected to take steps to comply within this period.
     ¬ “At present, most browser settings are not sophisticated enough to allow
       you to assume that the user has given their consent to allow your website
       to set a cookie. Also, not everyone who visits your site will do so using a
       browser. They may, for example, have used an application on their mobile
       device. So, for now we are advising organisations which use cookies or
       other means of storing information on a user’s equipment that they have to
       gain consent some other way.“
     ¬ Standards may be different in other jurisdictions where company has an
       “establishment”.
     ¬ Third-party cookies create special issues – ICO requires that users be
       made aware of what is being collected and by whom.



McCarthy Tétrault LLP / mccarthy.ca
                                                                                     26
Developments in India

        ¬     New privacy regs issued in April 2011 and prescribed how PI may be collected
              and used by virtually all organizations in India
        ¬     Regs appear to apply to info of both Indian residents and foreign nationals
        ¬     This means that transaction or sales calls must conform to Indian standards
        ¬     Appears to apply to controllers, processors and intermediaries touching PI
        ¬     Sensitive PI involves heightened obligations, including prior consent by letter,
              fax, or e-mail
                ¬ No exceptions on basis of necessity
                ¬ Right to withdraw consent
        ¬     Officer must be nominated to deal with grievances
        ¬     Security control measures must be documented and may be audited
        ¬     Subjects have right to review and correct data
        ¬     Failure to comply can result in jail term of up to 3 years or fine of approx. $4,500




McCarthy Tétrault LLP / mccarthy.ca
                                                                                                     27
Contracts and Electronic
                                    Agreements




McCarthy Tétrault LLP / mccarthy.ca
                                                         28
Seidel v. TELUS Communications Inc., 2011 SCC 15

    ¬ Issue: whether British Columbia Business Practices and Consumer
      Protection Act (BPCPA) renders arbitration clause void.
    ¬      The choice to restrict or not restrict arbitration clauses in consumer
          contracts is a matter for the legislature.
    ¬ Absent legislative intervention, the courts will generally give effect to the
      terms of a commercial contract freely entered into, even a contract of
      adhesion, including an arbitration clause.
    ¬ Section 172 is clearly designed to encourage private enforcement in
      the public interest. It was open to the legislature to prefer the vindication
      and denunciation available through a well-publicized court action to promote
      adherence to consumer standards.
    ¬ The legislature understood that the policy objectives of s. 172, would not be
      well served by a series of isolated low-profile, private and confidential
      arbitrations.
    ¬ All other causes of action including breach of Trade Practices Act and
      common law claims subject to arbitration clause.
McCarthy Tétrault LLP / mccarthy.ca
                                                                                      29
AT&T Mobility LLC v. Conception, 2011 WL 1561956
(U.S. Sup. Ct. 2011)

            ¬     Issue: whether AT&T’s consumer contracts requiring
                  arbitration and precluding class arbitration were enforceable
                  under the US the FAA.
            ¬ Court reversed 9th Circuit which held such clauses
              unconscionable, overruling California’s Discover Bank rule.
            ¬ “The overarching purpose of the FAA...is to ensure the
              enforcement of arbitration agreements according to their terms
              so as to facilitate streamlined proceedings. Requiring the
              availability of classwide arbitration interferes with fundamental
              attributes of arbitration and thus creates a scheme inconsistent
              with the FAA.”



McCarthy Tétrault LLP / mccarthy.ca
                                                                                  30
Evans v. Linden Research, Inc., 2011 WL 339212
(E.D.Pa. 2011)
     ¬     Validity of forum selection and arbitration clauses.
     ¬     “[F]or any claim related to this Agreement or our Service, excluding claims for
           injunctive or other equitable relief, where the total amount sought is less than
           ten thousand U.S. Dollars ($10,000 USD), either we or you may elect at any
           point in or during a dispute or proceeding to resolve the claim through binding
           nonappearance-based arbitration.... [T]he arbitration shall be conducted at the
           option of the party seeking relief, by telephone, online or based solely on
           written submissions.... [T]he arbitration shall not involve any personal
           appearance by the parties or witnesses unless otherwise mutually agreed by
           the parties ... [A]ny judgment on the award rendered by the arbitrator may be
           entered in any court of competent jurisdiction.”
     ¬     Clause valid because:
              ¬ Either party had option to elect arbitration for claims under $10k.
              ¬ There was no requirement to appear in the selected venue as claims could
                be adjudicated by phone, on-line, or by written submission.
              ¬ The arbitrator was not a preselected mandatory arbitrator.

McCarthy Tétrault LLP / mccarthy.ca
                                                                                              31
St-Arnaud v. Facebook Inc., 2011 QCCS 1506
    ¬     With respect to paragraph 3 of article 3148 C.C.Q., the grounds that a
          damage was suffered in Quebec would give jurisdiction to the Superior
          Court of Quebec even though Facebook has no link to Quebec, other than
          the fact that the website is accessible in Quebec.
    ¬     “You will resolve any claim, cause of action or dispute ("claim") you have
          with us arising out of or relating to this Statement or Facebook exclusively
          in a state or federal court located in Santa Clara County.”
    ¬     “It is obvious that all Users agreed to be continually bound by Facebook's
          Terms of Use. St-Arnaud could only gain initial access to the website by
          clicking on an icon labelled "Sign Up" where immediately below it was
          clearly written. By clicking Sign Up, Users indicate that they have
          read and agreed to the Terms of Use and Privacy Policy... Once St-
          Arnaud joined the website, every time he wanted to log into it, he would
          need to either remain logged in or access the website login page, which
          always includes a link to the Terms. Moreover, every time St-Arnaud would
          access the website, he would find a link to the Terms at the bottom of every
          page available onFacebook, including his own personal page....The
          Jurisdiction Clause is binding upon St-Arnaud and the Members of the
          Group.”

McCarthy Tétrault LLP / mccarthy.ca
                                                                                         32
Grosvenor v. Qwest Communications Intern., Inc.,
2010 WL 3906253 (D. Colo. 2010)
         ¬ “The Qwest Subscriber Agreement and the Arbitration Clause do
           not appear on the same scroll down box or page as the “I Accept”
           and the “I Do Not Accept” buttons...the Subscriber Agreement is
           referenced by the Legal Agreements page but it is not expressly
           incorporated into the Clickwrap Agreement”.
         ¬ “As presented, the Clickwrap Agreement does not clearly
           incorporate the Subscriber Agreement by reference and to reach
           the arbitration clause requires the user to leave the installation
           program, log onto the Internet (if possible), navigate to the proper
           page, and read the Subscriber Agreement, then return to the
           installation program's scroll down window to read the remaining
           ten pages of the High-Speed Internet Modem Installation Legal
           Agreement before choosing whether to agree to the terms... This
           creates an ambiguity regarding recourse in the event of a dispute.
           These circumstances demonstrate a genuine issue of fact.”


McCarthy Tétrault LLP / mccarthy.ca
                                                                                  33
Roling v. E*Trade Securities, LLC, 756 F. Supp. 2d
1179 (N.D. Cal. 2010)


             ¬ Is a term in an online brokerage agreement that permits
               E*TRADE to modify its fee structure at any time by posting
               a modified structure on its Web site and requires customers
               to check E*Trade's website for modifications enforceable?
             ¬ “In sum, E*Trade is unable to cite to any case, whether
               under New York law or California law, that undercuts
               plaintiffs' allegation that a contractual provision that allows
               a party to unilaterally change the terms of the contract
               without notice is unenforceable.”




McCarthy Tétrault LLP / mccarthy.ca
                                                                                 35
Patco Const. Co., Inc. v. People’s United Bank,
 2011 WL 2174507 (D.Me. May 27, 2011)

        “In addition, by virtue of the posting online of the Modified eBanking
        Agreement, Patco effectively agreed to monitor its commercial accounts
        daily. While Patco protests that it did not actually ever see the Modified
        eBanking Agreement and thus was never properly notified of its existence
        or bound by it... the Bank reserved the right, in the Original eBanking
        Agreement, to modify the terms and conditions of that agreement at any
        time effective upon publication...There is no dispute that Patco reviewed
        and agreed to the terms of the Original eBanking Agreement....The online
        publication of the Modified eBanking Agreement hence was binding
        upon Patco. See, e.g., Harold H. Huggins Realty, Inc. v. FNC, Inc., 575
        F.Supp. 2d 696, 708 (D.Md. 2008) (unilateral modification of Internet-based
        service contract held effective when prior agreements permitted
        modification at any time and stated that modifications would be effective
        after they were posted for 30 days).”



McCarthy Tétrault LLP / mccarthy.ca
                                                                                      36
Is violation of website terms or computer use policy
a criminal or civil offense?

      ¬ Computer Fraud and Abuse Act (CFAA) and States laws e.g. California
        Computer Crime Law, Cal. Penal Code §502.
      ¬ Accessing a protected computer (website) “knowingly” without
        authorization, or exceeding authorized access to a protected computer,
        involves a risk of violating a number of federal and state statutes creating
        penal sanctions and private causes of action.
      ¬ U.S. v. Nosal 2011 WL 1585600 (9th. Cir. Apr 28, 2011) (“under the CFAA,
        an employee accesses a computer in excess of his or her authorization
        when that access violates the employer's access restrictions, which may
        include restrictions on the employee's use of the computer or of the
        information contained in that computer.”) Also,United Stats v. Rodriguez,
        628 F. 3d 1258, (11th Cir. 2010)
      ¬ Facebook, Inc. v. Power Ventures, Inc. 2010 WL 3291750 (N.D.cal.2010)
        (Requires something more e.g. circumvention of technical or code based
        barriers.)

McCarthy Tétrault LLP / mccarthy.ca
                                                                                       37
Distinct Fortune Ltd. v. Hyndland Investment Co. Ltd.
[2010] HKEC 2013

        ¬ Does SMS message satisfy HK Conveyancing and Properties
          Ordinance.
        ¬ The plaintiff submitted that the CPO should be given an updated
          construction by making allowances for social and technological changes;
          that SMS was in a visible form and was a personal way of
          communication by electronic means; that the principal function of a
          “signature” is to demonstrate an authenticating intention of the signor
          and the sending of an SMS should constitute the signing of it by the
          sender.
        ¬      ”On the question of signature, I think the SMS is not a signed
              document... I agree with leading counsel of the defendant that there is
              not even the expression of “(sd.)”. If the clicking of the send button
              would amount to the signing of the SMS, then all SMS and emails are
              signed documents. This cannot be right.”



McCarthy Tétrault LLP / mccarthy.ca
                                                                                        41
Contract and License Issues




McCarthy Tétrault LLP / mccarthy.ca
                                              43
De Beers UK Ltd. v. Atos Origin It Services UK Ltd.
[2010] EWHC 3276 (16 December 2010)

        ¬ “In my judgment, the demands made by Atos, particularly in the e-mail of
          2 June 2008, did not reflect its contractual entitlement and, in putting
          them forward, it was not undertaking to continue to perform the Contract.
          For a start, what Atos was willing to do was "to complete the project on a
          time and materials basis at our own internal standard rates". That is an
          expression of an intention to complete the work on different terms, not
          upon the terms originally agreed. Second, this offer was itself subject,
          amongst other things, to DB's agreement to waive any claim that it may
          have against Atos in relation to Atos's delivery to date. That also was
          something upon which Atos had no right to insist.
        ¬ The fact that Atos repeatedly asserted its willingness and wish to
          complete the project is neither here nor there. There is a very significant
          difference between being willing to complete a project, and being willing
          to fulfil a contract. Atos may have been genuinely prepared to do the
          former, on its own terms, but that was itself inconsistent with a
          willingness to do the latter.”

McCarthy Tétrault LLP / mccarthy.ca
                                                                                        44
Baidu, Inc. v. Register.com, Inc., 2010 WL
2900313 (S.D.N.Y.2010)
  ¬ Will limitation of liability clauses be effective to exclude damages resulting
    from cyber-attacks?
  ¬ “New York courts will decline to enforce a contractual limitation or waiver of
    liability clause when there is wilful or grossly negligent or recklessly indifferent
    conduct.”
  ¬ Baidu alleged sufficient facts to give rise to a plausible claim of gross
    negligence or recklessness:
           ¬ Register failed to follow its own security protocols and essentially handed
             over control of Baidu's account to an unauthorized Intruder, who engaged
             in cyber vandalism.
           ¬ Register failed to follow its own security protocol.
  ¬ “The attack by the Intruder was reasonably foreseeable—it was precisely
    because these cyber attacks are foreseeable that the security measures were
    adopted... Baidu... did not waive its claims for gross negligence or
    recklessness.”
McCarthy Tétrault LLP / mccarthy.ca
                                                                                           48
Patents and Trade-marks




McCarthy Tétrault LLP / mccarthy.ca
                                                  50
Amazon.com, Inc. v. Attonrey General of Canada,
 2010 FC 1011

       ¬      Commissioner had ignored “fundamental differences between the foreign
             and the domestic regimes” as they pertained to patents and ignored
             “Canadian legal principles altogether”.
       ¬ Commissioner has no discretion to deviate from the Canadian patent law
         and its interpretation by the Courts.
       ¬ The Commissioner erred in adopting a policy role inconsistent with
         established Canadian legal principles.
       ¬     The Commissioner’s reasons for excluding business method patents can
             no longer be a barrier to obtaining a patent for a business method in
             Canada.
       ¬ There is no requirement that eligible subject matter exhibit a “technical
         character” or that it support a “technical contribution”.



McCarthy Tétrault LLP / mccarthy.ca
                                                                                      51
Microsoft Crop. V I4I Limited Partnership 564
 U.S. __ (2011)


          ¬ The Court rejects Microsoft’s contention that a defendant need only
            persuade the jury of a patent invalidity defense by a preponderance of
            the evidence. There, tracing nearly a century of case law, the Court
            stated, inter alia, that “there is a presumption of [patent] validity [that
            is] not to be overthrown except by clear and cogent evidence”.
          ¬ New evidence supporting an invalidity defense may carry more weight
            in an infringement action than evidence previously considered by the
            PTO.
          ¬ The Court is in no position to judge the comparative force of the
            parties’ policy arguments as to the wisdom of the clear and
            convincing-evidence standard that Congress adopted.




McCarthy Tétrault LLP / mccarthy.ca
                                                                                          52
Board of Trustees of Leland Stanford Junior University v.
Roche Molecular Systems, Inc., 563 U.S. ___(2011)

      ¬       ”Since 1790, the patent law has operated on the premise that rights in an
             invention belong to the inventor. The question here is whether the
             University and Small Business Patent Procedures Act of 1980—
             commonly referred to as the Bayh–Dole Act—displaces that norm and
             automatically vests title to federally funded inventions in federal
             contractors. We hold that it does not.”
      ¬ “Stanford's reading of the phrase “invention of the contractor” to mean “all
        inventions made by the contractor's employees” is plausible enough in the
        abstract; it is often the case that whatever an employee produces in the
        course of his employment belongs to his employer. No one would claim
        that an autoworker who builds a car while working in a factory owns that
        car. But, as noted, patent law has always been different: We have
        rejected the idea that mere employment is sufficient to vest title to an
        employee's invention in the employer. Against this background, a
        contractor's invention—an “invention of the contractor”—does not
        automatically include inventions made by the contractor's employees.”

McCarthy Tétrault LLP / mccarthy.ca
                                                                                          54
Copyright




McCarthy Tétrault LLP / mccarthy.ca
                                                  59
Upcoming in Supreme Court


       Supreme Court granted leave to appeal:
               ¬ Tariff 22 – is a download a communication to the public.
               ¬ Tariff 22 – is an internet preview a fair dealing for
                 research purposes.
               ¬ K-12 –fair dealing in the K-12 educational sector.




McCarthy Tétrault LLP / mccarthy.ca
                                                                            63
Harmony Consulting Ltd. v. G.A. Foss Transport Ltd.,
2011 FC 340
    ¬     Computer programs that are dictated by the operating system or reflect common
          programming practices are not original expression and will not receive copyright protection.
    ¬     Compilation of computer program elements can be protected by copyright.
    ¬     Minor fixes to a program which are not original are not protected by copyright.
    ¬     Program features developed using MS Access “wizard” not original or protectable.
    ¬     A nunc pro tunc copyright assignment does not satisfy the writing requirements for
          assignments where there was no original intention to transfer the copyright.
    ¬     Section 13(3) of (which vests copyright in works to employers) applies to officers, directors
          and employees.
    ¬     Use of software, without more, outside the scope of a license e.g., more seats than
          licensed, is not copyright infringement.
    ¬     Making modifications to software which include opening a file, making changes and
          resaving the file is not a reproduction.
    ¬     Making a back-up copy does not involve making a reproduction.
    ¬     How many errors can one court judgment contain?


McCarthy Tétrault LLP / mccarthy.ca
                                                                                                          64
Google v Copiepresse et al, Brussels Court of
 Appeal (9th Chamber) May 5, 2011

        The decision canvasses many issues including
                 ¬ the choice of law to apply to evaluate the claims of infringement,
                 ¬ whether Google’s caching of news articles is infringement,
                 ¬ whether the transmission of article titles and short extracts violates
                   the reproduction and communication to the public rights,
                 ¬ whether Google News violates the moral rights of authors,
                 ¬ whether statutory fair dealing defenses apply,
                 ¬ whether Google can rely on implied licenses from publishers and
                   authors to publish Google News, and
                 ¬ whether intermediary safe harbors are available under Belgium law
                   for providers of these services. See, Is Google News legal?
                   http://www.barrysookman.com/2011/05/17/is-google-news-legal/


McCarthy Tétrault LLP / mccarthy.ca
                                                                                            72
Kernal Records Oy v. Mosley, 2011 WL 2223422
(S.D.Fla. Jun. 7, 2011)

            “We hold that publishing AJE on a website in Australia was an
            act tantamount to global and simultaneous publication of the
            work, bringing AJE within the definition of a “United States
            work” under § 101(1)(C) and subject to § 411(a)'s registration
            requirement. Gallefoss elected to publish AJE on the Internet
            and the legal consequences of that decision must apply.
            Plaintiff was therefore required to register AJE prior to seeking
            judicial enforcement of its copyright rights.”




McCarthy Tétrault LLP / mccarthy.ca
                                                                                76
Slides available @ barrysookman.com and
          mccarthy.ca




McCarthy Tétrault LLP / mccarthy.ca
                                                    78
VANCOUVER                            MONTRÉAL
            Suite 1300, 777 Dunsmuir Street      Suite 2500
            P.O. Box 10424, Pacific Centre       1000 De La Gauchetière Street West
            Vancouver BC V7Y 1K2                 Montréal QC H3B 0A2
            Tel: 604-643-7100                    Tel: 514-397-4100
            Fax: 604-643-7900                    Fax: 514-875-6246
            Toll-Free: 1-877-244-7711            Toll-Free: 1-877-244-7711

            CALGARY                              QUÉBEC
            Suite 3300, 421 7th Avenue SW        Le Complexe St-Amable
            Calgary AB T2P 4K9                   1150, rue de Claire-Fontaine, 7e étage
            Tel: 403-260-3500                    Québec QC G1R 5G4
            Fax: 403-260-3501                    Tel: 418-521-3000
            Toll-Free: 1-877-244-7711            Fax: 418-521-3099
                                                 Toll-Free: 1-877-244-7711
            TORONTO
            Box 48, Suite 5300                   UNITED KINGDOM & EUROPE
            Toronto Dominion Bank Tower          125 Old Broad Street, 26th Floor
            Toronto ON M5K 1E6                   London EC2N 1AR
            Tel: 416-362-1812                    UNITED KINGDOM
            Fax: 416-868-0673                    Tel: +44 (0)20 7489 5700
            Toll-Free: 1-877-244-7711            Fax: +44 (0)20 7489 5777

            OTTAWA
            Suite 200, 440 Laurier Avenue West
            Ottawa ON K1R 7X6
            Tel: 613-238-2000
            Fax: 613-563-9386
            Toll-Free: 1-877-244-7711




McCarthy Tétrault LLP / mccarthy.ca
                                                                                          79

Contenu connexe

En vedette

Sookman ryerson conference
Sookman ryerson conferenceSookman ryerson conference
Sookman ryerson conferencebsookman
 
Google Seearch Results
Google Seearch ResultsGoogle Seearch Results
Google Seearch Resultsvincentwalshe
 
Capitulo1. CENGEL
Capitulo1. CENGELCapitulo1. CENGEL
Capitulo1. CENGELMayra Leal
 
Sookman osgoode technology_focus_internet_and_it.ppt
Sookman osgoode technology_focus_internet_and_it.pptSookman osgoode technology_focus_internet_and_it.ppt
Sookman osgoode technology_focus_internet_and_it.pptbsookman
 
Sookman law society_copyright_2012_conference
Sookman law society_copyright_2012_conferenceSookman law society_copyright_2012_conference
Sookman law society_copyright_2012_conferencebsookman
 
Protecting Your Consumer Product and Retail Brand in the Social Media Era
Protecting Your Consumer Product and Retail Brand in the Social Media EraProtecting Your Consumer Product and Retail Brand in the Social Media Era
Protecting Your Consumer Product and Retail Brand in the Social Media EraElder C. Marques
 
Wally hill lexpert casl messaging provisions and challenges
Wally hill lexpert   casl messaging provisions and challengesWally hill lexpert   casl messaging provisions and challenges
Wally hill lexpert casl messaging provisions and challengesbsookman
 
Sookman casl and universities
Sookman casl and universitiesSookman casl and universities
Sookman casl and universitiesbsookman
 
Sookman law society IP in social media
Sookman law society IP in social mediaSookman law society IP in social media
Sookman law society IP in social mediabsookman
 
Oliver borgers lexpert misleading advertising
Oliver borgers lexpert misleading advertisingOliver borgers lexpert misleading advertising
Oliver borgers lexpert misleading advertisingbsookman
 
ALAI Canada: Colloque Annual
ALAI Canada: Colloque AnnualALAI Canada: Colloque Annual
ALAI Canada: Colloque Annualbsookman
 
Offsets in Defence Procurement in Canada - Considerations
Offsets in Defence Procurement in Canada - ConsiderationsOffsets in Defence Procurement in Canada - Considerations
Offsets in Defence Procurement in Canada - ConsiderationsBrenda Swick
 

En vedette (12)

Sookman ryerson conference
Sookman ryerson conferenceSookman ryerson conference
Sookman ryerson conference
 
Google Seearch Results
Google Seearch ResultsGoogle Seearch Results
Google Seearch Results
 
Capitulo1. CENGEL
Capitulo1. CENGELCapitulo1. CENGEL
Capitulo1. CENGEL
 
Sookman osgoode technology_focus_internet_and_it.ppt
Sookman osgoode technology_focus_internet_and_it.pptSookman osgoode technology_focus_internet_and_it.ppt
Sookman osgoode technology_focus_internet_and_it.ppt
 
Sookman law society_copyright_2012_conference
Sookman law society_copyright_2012_conferenceSookman law society_copyright_2012_conference
Sookman law society_copyright_2012_conference
 
Protecting Your Consumer Product and Retail Brand in the Social Media Era
Protecting Your Consumer Product and Retail Brand in the Social Media EraProtecting Your Consumer Product and Retail Brand in the Social Media Era
Protecting Your Consumer Product and Retail Brand in the Social Media Era
 
Wally hill lexpert casl messaging provisions and challenges
Wally hill lexpert   casl messaging provisions and challengesWally hill lexpert   casl messaging provisions and challenges
Wally hill lexpert casl messaging provisions and challenges
 
Sookman casl and universities
Sookman casl and universitiesSookman casl and universities
Sookman casl and universities
 
Sookman law society IP in social media
Sookman law society IP in social mediaSookman law society IP in social media
Sookman law society IP in social media
 
Oliver borgers lexpert misleading advertising
Oliver borgers lexpert misleading advertisingOliver borgers lexpert misleading advertising
Oliver borgers lexpert misleading advertising
 
ALAI Canada: Colloque Annual
ALAI Canada: Colloque AnnualALAI Canada: Colloque Annual
ALAI Canada: Colloque Annual
 
Offsets in Defence Procurement in Canada - Considerations
Offsets in Defence Procurement in Canada - ConsiderationsOffsets in Defence Procurement in Canada - Considerations
Offsets in Defence Procurement in Canada - Considerations
 

Similaire à Sookman tclg year_in_review_2011

Above Compliance – Navigating the Cybersecurity Landscape and Officer & Direc...
Above Compliance – Navigating the Cybersecurity Landscape and Officer & Direc...Above Compliance – Navigating the Cybersecurity Landscape and Officer & Direc...
Above Compliance – Navigating the Cybersecurity Landscape and Officer & Direc...Shawn Tuma
 
Data Breach White Paper
Data Breach White PaperData Breach White Paper
Data Breach White PaperTodd Ruback
 
Data Breach White Paper
Data Breach White PaperData Breach White Paper
Data Breach White Paperspencerharry
 
Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and M...
Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and M...Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and M...
Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and M...Shawn Tuma
 
Statz, Inc. Privacy Comments (FTC Feb. 2011)
Statz, Inc. Privacy Comments (FTC Feb. 2011)Statz, Inc. Privacy Comments (FTC Feb. 2011)
Statz, Inc. Privacy Comments (FTC Feb. 2011)Glenn Manishin
 
IICJ Article Trade Secret Mediation
IICJ Article Trade Secret MediationIICJ Article Trade Secret Mediation
IICJ Article Trade Secret MediationErica Bristol
 
Venable Sponsored Workshop 2
Venable Sponsored Workshop 2Venable Sponsored Workshop 2
Venable Sponsored Workshop 2adtech_fan
 
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data LossLeadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data LossShawn Tuma
 
Cybersecurity: What the GC and CEO Need to Know
Cybersecurity: What the GC and CEO Need to KnowCybersecurity: What the GC and CEO Need to Know
Cybersecurity: What the GC and CEO Need to KnowShawn Tuma
 
Commercial bail works - An Ongoing Research Report
Commercial bail works - An Ongoing Research ReportCommercial bail works - An Ongoing Research Report
Commercial bail works - An Ongoing Research ReportDerek Nelson
 
Cybersecurity & Data Protection: What the GC & CEO Need to Know
Cybersecurity & Data Protection: What the GC & CEO Need to KnowCybersecurity & Data Protection: What the GC & CEO Need to Know
Cybersecurity & Data Protection: What the GC & CEO Need to KnowShawn Tuma
 
Contract Law Drafting ExerciseJuliana Williams, .docx
Contract Law Drafting ExerciseJuliana Williams, .docxContract Law Drafting ExerciseJuliana Williams, .docx
Contract Law Drafting ExerciseJuliana Williams, .docxdonnajames55
 
Legal Issues Impacting Data Center Owners, Operators & Users
Legal Issues Impacting Data Center Owners, Operators & UsersLegal Issues Impacting Data Center Owners, Operators & Users
Legal Issues Impacting Data Center Owners, Operators & Usersjyates
 
John Darer of 4Structures in Stamford, CT
John Darer of 4Structures in Stamford, CTJohn Darer of 4Structures in Stamford, CT
John Darer of 4Structures in Stamford, CTJohn Darer
 
Darer Structured Settlement White Paper on Secondary Market Constructive Solu...
Darer Structured Settlement White Paper on Secondary Market Constructive Solu...Darer Structured Settlement White Paper on Secondary Market Constructive Solu...
Darer Structured Settlement White Paper on Secondary Market Constructive Solu...John Darer CLU ChFC MSSC CeFT RSP CLTC
 
Legal Issues Impacting Data Center Owners, Operators and Users
Legal Issues Impacting Data Center Owners, Operators and UsersLegal Issues Impacting Data Center Owners, Operators and Users
Legal Issues Impacting Data Center Owners, Operators and UsersMMMTechLaw
 
Leadership Through the Firestorm - Legal Counsel's Role in Guiding Through Cy...
Leadership Through the Firestorm - Legal Counsel's Role in Guiding Through Cy...Leadership Through the Firestorm - Legal Counsel's Role in Guiding Through Cy...
Leadership Through the Firestorm - Legal Counsel's Role in Guiding Through Cy...Shawn Tuma
 
Scott Moulton scanning case RE: U.S.D.C. Georgia NMAP
Scott Moulton scanning case  RE: U.S.D.C. Georgia   NMAPScott Moulton scanning case  RE: U.S.D.C. Georgia   NMAP
Scott Moulton scanning case RE: U.S.D.C. Georgia NMAPDavid Sweigert
 

Similaire à Sookman tclg year_in_review_2011 (20)

Above Compliance – Navigating the Cybersecurity Landscape and Officer & Direc...
Above Compliance – Navigating the Cybersecurity Landscape and Officer & Direc...Above Compliance – Navigating the Cybersecurity Landscape and Officer & Direc...
Above Compliance – Navigating the Cybersecurity Landscape and Officer & Direc...
 
Data Breach White Paper
Data Breach White PaperData Breach White Paper
Data Breach White Paper
 
Data Breach White Paper
Data Breach White PaperData Breach White Paper
Data Breach White Paper
 
Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and M...
Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and M...Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and M...
Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and M...
 
Ftc privacy comments
Ftc privacy commentsFtc privacy comments
Ftc privacy comments
 
Statz, Inc. Privacy Comments (FTC Feb. 2011)
Statz, Inc. Privacy Comments (FTC Feb. 2011)Statz, Inc. Privacy Comments (FTC Feb. 2011)
Statz, Inc. Privacy Comments (FTC Feb. 2011)
 
IICJ Article Trade Secret Mediation
IICJ Article Trade Secret MediationIICJ Article Trade Secret Mediation
IICJ Article Trade Secret Mediation
 
Venable Sponsored Workshop 2
Venable Sponsored Workshop 2Venable Sponsored Workshop 2
Venable Sponsored Workshop 2
 
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data LossLeadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
 
Cybersecurity: What the GC and CEO Need to Know
Cybersecurity: What the GC and CEO Need to KnowCybersecurity: What the GC and CEO Need to Know
Cybersecurity: What the GC and CEO Need to Know
 
Commercial bail works - An Ongoing Research Report
Commercial bail works - An Ongoing Research ReportCommercial bail works - An Ongoing Research Report
Commercial bail works - An Ongoing Research Report
 
Cybersecurity & Data Protection: What the GC & CEO Need to Know
Cybersecurity & Data Protection: What the GC & CEO Need to KnowCybersecurity & Data Protection: What the GC & CEO Need to Know
Cybersecurity & Data Protection: What the GC & CEO Need to Know
 
Contract Law Drafting ExerciseJuliana Williams, .docx
Contract Law Drafting ExerciseJuliana Williams, .docxContract Law Drafting ExerciseJuliana Williams, .docx
Contract Law Drafting ExerciseJuliana Williams, .docx
 
Legal Issues Impacting Data Center Owners, Operators & Users
Legal Issues Impacting Data Center Owners, Operators & UsersLegal Issues Impacting Data Center Owners, Operators & Users
Legal Issues Impacting Data Center Owners, Operators & Users
 
John Darer of 4Structures in Stamford, CT
John Darer of 4Structures in Stamford, CTJohn Darer of 4Structures in Stamford, CT
John Darer of 4Structures in Stamford, CT
 
Darer Structured Settlement White Paper on Secondary Market Constructive Solu...
Darer Structured Settlement White Paper on Secondary Market Constructive Solu...Darer Structured Settlement White Paper on Secondary Market Constructive Solu...
Darer Structured Settlement White Paper on Secondary Market Constructive Solu...
 
Legal Issues Impacting Data Center Owners, Operators and Users
Legal Issues Impacting Data Center Owners, Operators and UsersLegal Issues Impacting Data Center Owners, Operators and Users
Legal Issues Impacting Data Center Owners, Operators and Users
 
Cloud Security Law Issues--an Overview
Cloud Security Law Issues--an OverviewCloud Security Law Issues--an Overview
Cloud Security Law Issues--an Overview
 
Leadership Through the Firestorm - Legal Counsel's Role in Guiding Through Cy...
Leadership Through the Firestorm - Legal Counsel's Role in Guiding Through Cy...Leadership Through the Firestorm - Legal Counsel's Role in Guiding Through Cy...
Leadership Through the Firestorm - Legal Counsel's Role in Guiding Through Cy...
 
Scott Moulton scanning case RE: U.S.D.C. Georgia NMAP
Scott Moulton scanning case  RE: U.S.D.C. Georgia   NMAPScott Moulton scanning case  RE: U.S.D.C. Georgia   NMAP
Scott Moulton scanning case RE: U.S.D.C. Georgia NMAP
 

Plus de bsookman

Sookman primetime presentation
Sookman primetime presentationSookman primetime presentation
Sookman primetime presentationbsookman
 
Sookman Toronto Computer Lawyers' Group: The Year in Review 2015-2016
Sookman Toronto Computer Lawyers' Group: The Year in Review 2015-2016Sookman Toronto Computer Lawyers' Group: The Year in Review 2015-2016
Sookman Toronto Computer Lawyers' Group: The Year in Review 2015-2016bsookman
 
Copyright and Technological Neutrality: CBC v Sodrac
Copyright and Technological Neutrality: CBC v SodracCopyright and Technological Neutrality: CBC v Sodrac
Copyright and Technological Neutrality: CBC v Sodracbsookman
 
Sookman tclg 2015_year_in_review_slides
Sookman tclg 2015_year_in_review_slidesSookman tclg 2015_year_in_review_slides
Sookman tclg 2015_year_in_review_slidesbsookman
 
Sookman lsuc 2015_copyright_year in review
Sookman lsuc 2015_copyright_year in reviewSookman lsuc 2015_copyright_year in review
Sookman lsuc 2015_copyright_year in reviewbsookman
 
Sookman tclg 2013 to 2014 (1)
Sookman tclg 2013 to 2014 (1)Sookman tclg 2013 to 2014 (1)
Sookman tclg 2013 to 2014 (1)bsookman
 
Dan glover casl computer software_mc_t_lexpert
Dan glover casl computer software_mc_t_lexpertDan glover casl computer software_mc_t_lexpert
Dan glover casl computer software_mc_t_lexpertbsookman
 
Michael fekete and howard fohr lexpert casl computer programs provisions and ...
Michael fekete and howard fohr lexpert casl computer programs provisions and ...Michael fekete and howard fohr lexpert casl computer programs provisions and ...
Michael fekete and howard fohr lexpert casl computer programs provisions and ...bsookman
 
Monica papendick lexpert casl challenges in financial institutuions
Monica papendick lexpert casl challenges in financial institutuionsMonica papendick lexpert casl challenges in financial institutuions
Monica papendick lexpert casl challenges in financial institutuionsbsookman
 
Sookman lexpert casl_slides
Sookman lexpert casl_slidesSookman lexpert casl_slides
Sookman lexpert casl_slidesbsookman
 
Sookman oba casl._slides
Sookman oba casl._slidesSookman oba casl._slides
Sookman oba casl._slidesbsookman
 
Sookman lsuc copyright_year_in_review_2013_final
Sookman lsuc copyright_year_in_review_2013_finalSookman lsuc copyright_year_in_review_2013_final
Sookman lsuc copyright_year_in_review_2013_finalbsookman
 
Bloom sookman lsuc 2013 copyright year-in-review
Bloom sookman lsuc   2013 copyright year-in-reviewBloom sookman lsuc   2013 copyright year-in-review
Bloom sookman lsuc 2013 copyright year-in-reviewbsookman
 
Sookman justice canada_keynote
Sookman justice canada_keynoteSookman justice canada_keynote
Sookman justice canada_keynotebsookman
 
Sookman montreal bar_casl_talk
Sookman montreal bar_casl_talkSookman montreal bar_casl_talk
Sookman montreal bar_casl_talkbsookman
 
Challenges Faced by Legal in Global technology Companies
Challenges Faced by Legal in Global technology CompaniesChallenges Faced by Legal in Global technology Companies
Challenges Faced by Legal in Global technology Companiesbsookman
 
Docs #12847612-v1-osgoode ugc-symposium
Docs #12847612-v1-osgoode ugc-symposiumDocs #12847612-v1-osgoode ugc-symposium
Docs #12847612-v1-osgoode ugc-symposiumbsookman
 
Sookman oba confernece_using_social_media
Sookman oba confernece_using_social_mediaSookman oba confernece_using_social_media
Sookman oba confernece_using_social_mediabsookman
 
Sookman federal circuit_internet_and_copyright_
Sookman federal circuit_internet_and_copyright_Sookman federal circuit_internet_and_copyright_
Sookman federal circuit_internet_and_copyright_bsookman
 
Sookman tclg year_in_review_2013
Sookman tclg year_in_review_2013Sookman tclg year_in_review_2013
Sookman tclg year_in_review_2013bsookman
 

Plus de bsookman (20)

Sookman primetime presentation
Sookman primetime presentationSookman primetime presentation
Sookman primetime presentation
 
Sookman Toronto Computer Lawyers' Group: The Year in Review 2015-2016
Sookman Toronto Computer Lawyers' Group: The Year in Review 2015-2016Sookman Toronto Computer Lawyers' Group: The Year in Review 2015-2016
Sookman Toronto Computer Lawyers' Group: The Year in Review 2015-2016
 
Copyright and Technological Neutrality: CBC v Sodrac
Copyright and Technological Neutrality: CBC v SodracCopyright and Technological Neutrality: CBC v Sodrac
Copyright and Technological Neutrality: CBC v Sodrac
 
Sookman tclg 2015_year_in_review_slides
Sookman tclg 2015_year_in_review_slidesSookman tclg 2015_year_in_review_slides
Sookman tclg 2015_year_in_review_slides
 
Sookman lsuc 2015_copyright_year in review
Sookman lsuc 2015_copyright_year in reviewSookman lsuc 2015_copyright_year in review
Sookman lsuc 2015_copyright_year in review
 
Sookman tclg 2013 to 2014 (1)
Sookman tclg 2013 to 2014 (1)Sookman tclg 2013 to 2014 (1)
Sookman tclg 2013 to 2014 (1)
 
Dan glover casl computer software_mc_t_lexpert
Dan glover casl computer software_mc_t_lexpertDan glover casl computer software_mc_t_lexpert
Dan glover casl computer software_mc_t_lexpert
 
Michael fekete and howard fohr lexpert casl computer programs provisions and ...
Michael fekete and howard fohr lexpert casl computer programs provisions and ...Michael fekete and howard fohr lexpert casl computer programs provisions and ...
Michael fekete and howard fohr lexpert casl computer programs provisions and ...
 
Monica papendick lexpert casl challenges in financial institutuions
Monica papendick lexpert casl challenges in financial institutuionsMonica papendick lexpert casl challenges in financial institutuions
Monica papendick lexpert casl challenges in financial institutuions
 
Sookman lexpert casl_slides
Sookman lexpert casl_slidesSookman lexpert casl_slides
Sookman lexpert casl_slides
 
Sookman oba casl._slides
Sookman oba casl._slidesSookman oba casl._slides
Sookman oba casl._slides
 
Sookman lsuc copyright_year_in_review_2013_final
Sookman lsuc copyright_year_in_review_2013_finalSookman lsuc copyright_year_in_review_2013_final
Sookman lsuc copyright_year_in_review_2013_final
 
Bloom sookman lsuc 2013 copyright year-in-review
Bloom sookman lsuc   2013 copyright year-in-reviewBloom sookman lsuc   2013 copyright year-in-review
Bloom sookman lsuc 2013 copyright year-in-review
 
Sookman justice canada_keynote
Sookman justice canada_keynoteSookman justice canada_keynote
Sookman justice canada_keynote
 
Sookman montreal bar_casl_talk
Sookman montreal bar_casl_talkSookman montreal bar_casl_talk
Sookman montreal bar_casl_talk
 
Challenges Faced by Legal in Global technology Companies
Challenges Faced by Legal in Global technology CompaniesChallenges Faced by Legal in Global technology Companies
Challenges Faced by Legal in Global technology Companies
 
Docs #12847612-v1-osgoode ugc-symposium
Docs #12847612-v1-osgoode ugc-symposiumDocs #12847612-v1-osgoode ugc-symposium
Docs #12847612-v1-osgoode ugc-symposium
 
Sookman oba confernece_using_social_media
Sookman oba confernece_using_social_mediaSookman oba confernece_using_social_media
Sookman oba confernece_using_social_media
 
Sookman federal circuit_internet_and_copyright_
Sookman federal circuit_internet_and_copyright_Sookman federal circuit_internet_and_copyright_
Sookman federal circuit_internet_and_copyright_
 
Sookman tclg year_in_review_2013
Sookman tclg year_in_review_2013Sookman tclg year_in_review_2013
Sookman tclg year_in_review_2013
 

Dernier

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dashnarutouzumaki53779
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 

Dernier (20)

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dash
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 

Sookman tclg year_in_review_2011

  • 1. McCarthy Tétrault Advance™ Building Capabilities for Growth Toronto Computer Lawyers Group The Year in Review: Developments in Computer, Internet and E-Commerce Law (2010-2011) Barry B. Sookman bsookman@mccarthy.ca 416-601-7949 June 15, 2011 McCarthy Tétrault LLP / mccarthy.ca 10398714 1
  • 3. Citi Cards Canada Inc. v. Pleasance, 2011 ONCA 3 ¬ “Personal information” is defined in s. 2(1) of the Act. It “means information about an identifiable individual.” ¬ “This is a very elastic definition, and should be interpreted in that fashion to give effect to the purpose of the Act. There can be no doubt that financial information pertaining to a debtor, collected and used by a financial institution in the course of a mortgage transaction – including the particulars of, and the balance owing on the debtor’s mortgage – is “information about an identifiable individual.” Current mortgage balances are not information that is publicly available.” McCarthy Tétrault LLP / mccarthy.ca 3
  • 4. Leon’s Furniture Limited v. Alberta (Information and Privacy Commissioner), 2011 ABCA 94 ¬ The “identifiable individual” term has two components. Firstly, the individual must be “identifiable”. Generic and statistical information is thereby excluded, and the personal information (here the relevant number) must have some precise connection to one individual. Secondly, the information must relate to an individual. Information that relates to objects or property is, on the face of the definition, not included. The key to the definition is the word “identifiable”. ¬ “Further, to be “personal” in any reasonable sense the information must be directly related to the individual; the definition does not cover indirect or collateral information. Information that relates to an object or property does not become information “about” an individual, just because some individual may own or use that property.” ¬ Driver’s licence numbers are PI but licence plate numbers are not. ¬ “The respondent [Privacy Commissioner] is not empowered to direct an organization to change the way it does business, just because the respondent thinks he has identified a better way. So long as the business is being conducted reasonably, it does not matter that there might also be other reasonable ways of conducting the business.” McCarthy Tétrault LLP / mccarthy.ca 4
  • 5. State Farm Mutual Automobile Insurance Company v. Privacy Commissioner of Canada, 2010 FC 736 ¬ Is the collection of evidence by an insurer acting for one of its insured in the defence of a third party tort action a “commercial activity” within the meaning of PIPEDA? ¬ “I conclude that, on a proper construction of PIPEDA, if the primary activity or conduct at hand, in this case the collection of evidence on a plaintiff by an individual defendant in order to mount a defence to a civil tort action, is not a commercial activity contemplated by PIPEDA, then that activity or conduct remains exempt from PIPEDA even if third parties are retained by an individual to carry out that activity or conduct on his or her behalf. The primary characterization of the activity or conduct in issue is thus the dominant factor in assessing the commercial character of that activity or conduct under PIPEDA, not the incidental relationship between the one who seeks to carry out the activity or conduct and third parties. In this case, the insurer- insured and attorney-client relationships are simply incidental to the primary non-commercial activity or conduct at issue, namely the collection of evidence by the defendant Ms. Vetter in order to defend herself in the civil tort action brought against her by Mr. Gaudet.” McCarthy Tétrault LLP / mccarthy.ca 5
  • 6. Nammo v. TransUnion of Canada Inc., 2010 FC 1284 ¬ “TransUnion’s suggestion that a breach may be found only if an organization’s accuracy practices fall below industry standards is also untenable.” “There is no defence of practical necessity set out in PIPEDA.” ¬ “PIPEDA does not require that personal information be completely accurate, complete, and up-to-date; rather, it requires that personal information be as accurate, complete, and up-to-date “as is necessary for the purposes for which it is to be used.” Thus, it is the use that the information is put to that dictates the degree of accuracy, completeness, and currency the information must have... Informed, reliable and objective decisions require that the information on which the decisions are based meets a high standard of accuracy, completeness and currency.” McCarthy Tétrault LLP / mccarthy.ca 6
  • 7. Damage Awards Under PIPEDA ¬ Nammo v. TransUnion of Canada Inc., 2010 FC 1284 “In Vancouver (City) v Ward, 2010 SCC 27, the Supreme Court... addressed the different goals of awarding damages for a Charter breach; these include compensation, for which loss is relevant, but also vindication and deterrence, for which loss is not a determinative factor.” ¬ “In my view, the same reasoning applies to a breach of PIPEDA, which is quasi-constitutional legislation.... Applying the Supreme Court’s reasoning in Ward to PIPEDA applications before this Court indicates that both the question of whether damages should be awarded and the question of the quantum of damages should be answered with regard to whether awarding damages would further the general objects of PIPEDA and uphold the values it embodies. Furthermore, deterring future breaches and the seriousness or egregiousness of the breach would be factors to consider.” McCarthy Tétrault LLP / mccarthy.ca 8
  • 8. McCarthy Tétrault LLP / mccarthy.ca 9
  • 9. Can claims be brought for losses arising from privacy breaches? ¬ In re Hannaford Bros. Co. Customer Data Security Breach Litigation 4 A.3d 492 (Sup, Ct. Me. 2010) (Data breach where customer data was stolen. No claim for time spent to avoid foreseeable harm w/o physical harm, economic loss, or identity theft.) Also, Paul v Providence Health System 240 P.3d 1110 (2010) ¬ Doe 1 v. AOL LLC 719 F.Supp.2d 1102 (N.D.Cal. 2010) (Data breach. “the Court is persuaded that Plaintiffs' allegations are sufficient to demonstrate standing for purposes of seeking injunctive relief. The Complaint alleges that AOL engages in a practice and policy of storing search queries containing confidential information, and that it has taken no steps to ensure that such information is not disclosed again in the future.”) ¬ LaCourt v. Specific Media, Inc. 2011 WL 1661532 (C.D.Cal. Apr. 28, 2011) (Collecting browsing histories. “Ultimately, the Court probably would decline to say that it is categorically impossible for Plaintiffs to allege some property interest that was compromised by Defendant's alleged practices.” ¬ Claridge v. RockYou, Inc. 2011 WL 1361588 (N.D.cal. Apr. 11, 2011) (Data breach. “although the court has doubts about plaintiff's ultimate ability to prove his damages theory in this case, the court finds plaintiff's allegations of harm sufficient at this stage to allege a generalized injury in fact.”) McCarthy Tétrault LLP / mccarthy.ca 10
  • 10. Jones v. Tsige, 2011 ONSC 1475 ¬ The central issue in this case is whether there is a tort for invasion of privacy. ¬ “While it is certainly the case that in Euteneier, the plaintiff was not suing on the basis of an intentional tort, the extent to which privacy rights are enforceable at law was squarely before the court for purposes of determining the content of the duty of care owed by the police to the plaintiff while in custody. In my view, the inescapable conclusion, put quite plainly by the Court of Appeal in paragraph 63 of that decision, is that 'there is no “free standing' right to ...privacy...at common law.”” ¬ “I would also note that this is not an area of law that requires “judge- made” rights and obligations. Statutory schemes that govern privacy issues are, for the most part, carefully nuanced and designed to balance practical concerns and needs in an industry- specific fashion.” McCarthy Tétrault LLP / mccarthy.ca 11
  • 11. CTB v. News Group Newspapers Ltd & Anor [2011] EWHC 1326 (QB) ¬ “Mr Spearman argues ...that in effect privacy injunctions (and no doubt other forms of injunction also) have ceased to serve any useful purpose in the age of the Internet. Not only can information be put out on various networks from within this jurisdiction, but it can obviously be done also by anyone who wishes in other jurisdictions.” ¬ ”Should the court buckle every time one of its orders meets widespread disobedience or defiance?” ¬ ”the law nowadays is required to protect information in respect of which there is a reasonable expectation of privacy...” “It is fairly obvious that wall-to-wall excoriation in national newspapers, whether tabloid or "broadsheet", is likely to be significantly more intrusive and distressing for those concerned than the availability of information on the Internet or in foreign journals to those, however many, who take the trouble to look it up. Moreover, with each exposure of personal information or allegations, whether by way of visual images or verbally, there is a new intrusion and occasion for distress or embarrassment. Mr Tomlinson argues accordingly that "the dam has not burst". For so long as the court is in a position to prevent some of that intrusion and distress, depending upon the individual circumstances, it may be appropriate to maintain that degree of protection. The analogy with King Canute to some extent, therefore, breaks down.” McCarthy Tétrault LLP / mccarthy.ca 12
  • 12. City of Ontario, Cal. v. Quon, 130 S. Ct. 2619 Do employees have reasonable expectations of privacy in work owned devices? ¬ “Rapid changes in the dynamics of communication and information transmission are evident not just in the technology itself but in what society accepts as proper behavior. As one amici brief notes, many employers expect or at least tolerate personal use of such equipment by employees because it often increases worker efficiency.” ¬ ”Cell phone and text message communications are so pervasive that some persons may consider them to be essential means or necessary instruments for self-expression, even self-identification. That might strengthen the case for an expectation of privacy... And employer policies concerning communications will of course shape the reasonable expectations of their employees, especially to the extent that such policies are clearly communicated.” ¬ “A broad holding concerning employees' privacy expectations vis-à-vis employer-provided technological equipment might have implications for future cases that cannot be predicted.” McCarthy Tétrault LLP / mccarthy.ca 13
  • 13. R. v. Cole, 2011 ONCA 218 “I conclude that the appellant had a reasonable expectation of privacy from state intrusion in the personal use of his work computer and in the contents of his personal files on its hard drive. However, his expectation of privacy was modified. He had no expectation of privacy with respect to access to his hard drive by his employer’s technician for the limited purpose of maintaining the technical integrity of the school’s information network and the laptop.” McCarthy Tétrault LLP / mccarthy.ca 14
  • 14. Sparks v. Dubé, 2011 NBQB 40 ¬ Court made a preservation order and injunction compelling Erica Sparks: 1) to preserve the entire contents of her personal web page(s) on Facebook, and 2) to participate in making copies. ¬ Plaintiff’s lawyer was ordered to contact the plaintiff and, without disclosing the nature of the subject matter schedule a meeting with her at a location convenient to access and download data from the Internet and reduce it to usable form. ¬ Upon meeting with the plaintiff the solicitor had to apprise her of the terms and conditions of the order. ¬ Immediately upon disclosure of the terms and conditions of the order the plaintiff, in the presence of the solicitor, was required to create permanent tangible records of her web page(s) on Facebook. ¬ Order made ex parte! McCarthy Tétrault LLP / mccarthy.ca 20
  • 15. Bill C-28 Fighting Internet and Wireless Spam Act ¬ FISA will impede start-up businesses from launching in Canada. ¬ FISA will impede Canadian businesses from developing new marketing models over the Internet. ¬ FISA will deter suppliers of service providers, including outsourcing and cloud service providers, from operating with or maintaining facilities in Canada. ¬ FISA will deter foreign businesses from offering their products to Canadians via the Internet, mobile and other communications networks. ¬ FISA will impose costs and restrictions on Canadian businesses that their competitors outside Canada will not have to bear. ¬ FISA contains very strong incentives for Canadian businesses to confess wrong-doing, even in cases of questionable or trivial conduct, thereby tarnishing the reputation of legitimate businesses in circumstances where the offending conduct is not significant. ¬ FISA will chill legitimate commercial speech and thereby undermine fundamental values protected by the Charter of Rights and Freedoms. See Rethinking FISA, http://www.barrysookman.com/2011/05/25/rethinking-fisa/ McCarthy Tétrault LLP / mccarthy.ca 22
  • 16. New UK Cookie Regulations ¬ Privacy and Electronic Communications Regulations put into place on May 26, 2011 to implement EU “Cookie Directive”. ¬ 6 (1) Subject to paragraph (4), a person shall not store or gain access to information stored, in the terminal equipment of a subscriber or user unless the requirements of paragraph (2) are met. ¬ (2) The requirements are that the subscriber or user of that terminal equipment (a) is provided with clear and comprehensive information about the purposes of the storage of, or access to, that information; and (b) has given his or her consent. ¬ (3) Where an electronic communications network is used by the same person to store or access information in the terminal equipment of a subscriber or user on more than one occasion, it is sufficient for the purposes of this regulation that the requirements of paragraph (2) are met in respect of the initial use. ¬ “(3A) For the purposes of paragraph (2), consent may be signified by a subscriber who amends or sets controls on the internet browser which the subscriber uses or by using another application or programme to signify consent. ¬ (4) Paragraph (1) shall not apply to the technical storage of, or access to, information (a) for the sole purpose of carrying out the transmission of a communication over an electronic communications network; or (b) where such storage or access is strictly necessary for the provision of an information society service requested by the subscriber or user. McCarthy Tétrault LLP / mccarthy.ca 25
  • 17. New UK Cookie Regulations ¬ ICO Guidelines @ http://ow.ly/5gJnT ¬ Organizations have 12 months to phase in the new system, but are expected to take steps to comply within this period. ¬ “At present, most browser settings are not sophisticated enough to allow you to assume that the user has given their consent to allow your website to set a cookie. Also, not everyone who visits your site will do so using a browser. They may, for example, have used an application on their mobile device. So, for now we are advising organisations which use cookies or other means of storing information on a user’s equipment that they have to gain consent some other way.“ ¬ Standards may be different in other jurisdictions where company has an “establishment”. ¬ Third-party cookies create special issues – ICO requires that users be made aware of what is being collected and by whom. McCarthy Tétrault LLP / mccarthy.ca 26
  • 18. Developments in India ¬ New privacy regs issued in April 2011 and prescribed how PI may be collected and used by virtually all organizations in India ¬ Regs appear to apply to info of both Indian residents and foreign nationals ¬ This means that transaction or sales calls must conform to Indian standards ¬ Appears to apply to controllers, processors and intermediaries touching PI ¬ Sensitive PI involves heightened obligations, including prior consent by letter, fax, or e-mail ¬ No exceptions on basis of necessity ¬ Right to withdraw consent ¬ Officer must be nominated to deal with grievances ¬ Security control measures must be documented and may be audited ¬ Subjects have right to review and correct data ¬ Failure to comply can result in jail term of up to 3 years or fine of approx. $4,500 McCarthy Tétrault LLP / mccarthy.ca 27
  • 19. Contracts and Electronic Agreements McCarthy Tétrault LLP / mccarthy.ca 28
  • 20. Seidel v. TELUS Communications Inc., 2011 SCC 15 ¬ Issue: whether British Columbia Business Practices and Consumer Protection Act (BPCPA) renders arbitration clause void. ¬ The choice to restrict or not restrict arbitration clauses in consumer contracts is a matter for the legislature. ¬ Absent legislative intervention, the courts will generally give effect to the terms of a commercial contract freely entered into, even a contract of adhesion, including an arbitration clause. ¬ Section 172 is clearly designed to encourage private enforcement in the public interest. It was open to the legislature to prefer the vindication and denunciation available through a well-publicized court action to promote adherence to consumer standards. ¬ The legislature understood that the policy objectives of s. 172, would not be well served by a series of isolated low-profile, private and confidential arbitrations. ¬ All other causes of action including breach of Trade Practices Act and common law claims subject to arbitration clause. McCarthy Tétrault LLP / mccarthy.ca 29
  • 21. AT&T Mobility LLC v. Conception, 2011 WL 1561956 (U.S. Sup. Ct. 2011) ¬ Issue: whether AT&T’s consumer contracts requiring arbitration and precluding class arbitration were enforceable under the US the FAA. ¬ Court reversed 9th Circuit which held such clauses unconscionable, overruling California’s Discover Bank rule. ¬ “The overarching purpose of the FAA...is to ensure the enforcement of arbitration agreements according to their terms so as to facilitate streamlined proceedings. Requiring the availability of classwide arbitration interferes with fundamental attributes of arbitration and thus creates a scheme inconsistent with the FAA.” McCarthy Tétrault LLP / mccarthy.ca 30
  • 22. Evans v. Linden Research, Inc., 2011 WL 339212 (E.D.Pa. 2011) ¬ Validity of forum selection and arbitration clauses. ¬ “[F]or any claim related to this Agreement or our Service, excluding claims for injunctive or other equitable relief, where the total amount sought is less than ten thousand U.S. Dollars ($10,000 USD), either we or you may elect at any point in or during a dispute or proceeding to resolve the claim through binding nonappearance-based arbitration.... [T]he arbitration shall be conducted at the option of the party seeking relief, by telephone, online or based solely on written submissions.... [T]he arbitration shall not involve any personal appearance by the parties or witnesses unless otherwise mutually agreed by the parties ... [A]ny judgment on the award rendered by the arbitrator may be entered in any court of competent jurisdiction.” ¬ Clause valid because: ¬ Either party had option to elect arbitration for claims under $10k. ¬ There was no requirement to appear in the selected venue as claims could be adjudicated by phone, on-line, or by written submission. ¬ The arbitrator was not a preselected mandatory arbitrator. McCarthy Tétrault LLP / mccarthy.ca 31
  • 23. St-Arnaud v. Facebook Inc., 2011 QCCS 1506 ¬ With respect to paragraph 3 of article 3148 C.C.Q., the grounds that a damage was suffered in Quebec would give jurisdiction to the Superior Court of Quebec even though Facebook has no link to Quebec, other than the fact that the website is accessible in Quebec. ¬ “You will resolve any claim, cause of action or dispute ("claim") you have with us arising out of or relating to this Statement or Facebook exclusively in a state or federal court located in Santa Clara County.” ¬ “It is obvious that all Users agreed to be continually bound by Facebook's Terms of Use. St-Arnaud could only gain initial access to the website by clicking on an icon labelled "Sign Up" where immediately below it was clearly written. By clicking Sign Up, Users indicate that they have read and agreed to the Terms of Use and Privacy Policy... Once St- Arnaud joined the website, every time he wanted to log into it, he would need to either remain logged in or access the website login page, which always includes a link to the Terms. Moreover, every time St-Arnaud would access the website, he would find a link to the Terms at the bottom of every page available onFacebook, including his own personal page....The Jurisdiction Clause is binding upon St-Arnaud and the Members of the Group.” McCarthy Tétrault LLP / mccarthy.ca 32
  • 24. Grosvenor v. Qwest Communications Intern., Inc., 2010 WL 3906253 (D. Colo. 2010) ¬ “The Qwest Subscriber Agreement and the Arbitration Clause do not appear on the same scroll down box or page as the “I Accept” and the “I Do Not Accept” buttons...the Subscriber Agreement is referenced by the Legal Agreements page but it is not expressly incorporated into the Clickwrap Agreement”. ¬ “As presented, the Clickwrap Agreement does not clearly incorporate the Subscriber Agreement by reference and to reach the arbitration clause requires the user to leave the installation program, log onto the Internet (if possible), navigate to the proper page, and read the Subscriber Agreement, then return to the installation program's scroll down window to read the remaining ten pages of the High-Speed Internet Modem Installation Legal Agreement before choosing whether to agree to the terms... This creates an ambiguity regarding recourse in the event of a dispute. These circumstances demonstrate a genuine issue of fact.” McCarthy Tétrault LLP / mccarthy.ca 33
  • 25. Roling v. E*Trade Securities, LLC, 756 F. Supp. 2d 1179 (N.D. Cal. 2010) ¬ Is a term in an online brokerage agreement that permits E*TRADE to modify its fee structure at any time by posting a modified structure on its Web site and requires customers to check E*Trade's website for modifications enforceable? ¬ “In sum, E*Trade is unable to cite to any case, whether under New York law or California law, that undercuts plaintiffs' allegation that a contractual provision that allows a party to unilaterally change the terms of the contract without notice is unenforceable.” McCarthy Tétrault LLP / mccarthy.ca 35
  • 26. Patco Const. Co., Inc. v. People’s United Bank, 2011 WL 2174507 (D.Me. May 27, 2011) “In addition, by virtue of the posting online of the Modified eBanking Agreement, Patco effectively agreed to monitor its commercial accounts daily. While Patco protests that it did not actually ever see the Modified eBanking Agreement and thus was never properly notified of its existence or bound by it... the Bank reserved the right, in the Original eBanking Agreement, to modify the terms and conditions of that agreement at any time effective upon publication...There is no dispute that Patco reviewed and agreed to the terms of the Original eBanking Agreement....The online publication of the Modified eBanking Agreement hence was binding upon Patco. See, e.g., Harold H. Huggins Realty, Inc. v. FNC, Inc., 575 F.Supp. 2d 696, 708 (D.Md. 2008) (unilateral modification of Internet-based service contract held effective when prior agreements permitted modification at any time and stated that modifications would be effective after they were posted for 30 days).” McCarthy Tétrault LLP / mccarthy.ca 36
  • 27. Is violation of website terms or computer use policy a criminal or civil offense? ¬ Computer Fraud and Abuse Act (CFAA) and States laws e.g. California Computer Crime Law, Cal. Penal Code §502. ¬ Accessing a protected computer (website) “knowingly” without authorization, or exceeding authorized access to a protected computer, involves a risk of violating a number of federal and state statutes creating penal sanctions and private causes of action. ¬ U.S. v. Nosal 2011 WL 1585600 (9th. Cir. Apr 28, 2011) (“under the CFAA, an employee accesses a computer in excess of his or her authorization when that access violates the employer's access restrictions, which may include restrictions on the employee's use of the computer or of the information contained in that computer.”) Also,United Stats v. Rodriguez, 628 F. 3d 1258, (11th Cir. 2010) ¬ Facebook, Inc. v. Power Ventures, Inc. 2010 WL 3291750 (N.D.cal.2010) (Requires something more e.g. circumvention of technical or code based barriers.) McCarthy Tétrault LLP / mccarthy.ca 37
  • 28. Distinct Fortune Ltd. v. Hyndland Investment Co. Ltd. [2010] HKEC 2013 ¬ Does SMS message satisfy HK Conveyancing and Properties Ordinance. ¬ The plaintiff submitted that the CPO should be given an updated construction by making allowances for social and technological changes; that SMS was in a visible form and was a personal way of communication by electronic means; that the principal function of a “signature” is to demonstrate an authenticating intention of the signor and the sending of an SMS should constitute the signing of it by the sender. ¬ ”On the question of signature, I think the SMS is not a signed document... I agree with leading counsel of the defendant that there is not even the expression of “(sd.)”. If the clicking of the send button would amount to the signing of the SMS, then all SMS and emails are signed documents. This cannot be right.” McCarthy Tétrault LLP / mccarthy.ca 41
  • 29. Contract and License Issues McCarthy Tétrault LLP / mccarthy.ca 43
  • 30. De Beers UK Ltd. v. Atos Origin It Services UK Ltd. [2010] EWHC 3276 (16 December 2010) ¬ “In my judgment, the demands made by Atos, particularly in the e-mail of 2 June 2008, did not reflect its contractual entitlement and, in putting them forward, it was not undertaking to continue to perform the Contract. For a start, what Atos was willing to do was "to complete the project on a time and materials basis at our own internal standard rates". That is an expression of an intention to complete the work on different terms, not upon the terms originally agreed. Second, this offer was itself subject, amongst other things, to DB's agreement to waive any claim that it may have against Atos in relation to Atos's delivery to date. That also was something upon which Atos had no right to insist. ¬ The fact that Atos repeatedly asserted its willingness and wish to complete the project is neither here nor there. There is a very significant difference between being willing to complete a project, and being willing to fulfil a contract. Atos may have been genuinely prepared to do the former, on its own terms, but that was itself inconsistent with a willingness to do the latter.” McCarthy Tétrault LLP / mccarthy.ca 44
  • 31. Baidu, Inc. v. Register.com, Inc., 2010 WL 2900313 (S.D.N.Y.2010) ¬ Will limitation of liability clauses be effective to exclude damages resulting from cyber-attacks? ¬ “New York courts will decline to enforce a contractual limitation or waiver of liability clause when there is wilful or grossly negligent or recklessly indifferent conduct.” ¬ Baidu alleged sufficient facts to give rise to a plausible claim of gross negligence or recklessness: ¬ Register failed to follow its own security protocols and essentially handed over control of Baidu's account to an unauthorized Intruder, who engaged in cyber vandalism. ¬ Register failed to follow its own security protocol. ¬ “The attack by the Intruder was reasonably foreseeable—it was precisely because these cyber attacks are foreseeable that the security measures were adopted... Baidu... did not waive its claims for gross negligence or recklessness.” McCarthy Tétrault LLP / mccarthy.ca 48
  • 32. Patents and Trade-marks McCarthy Tétrault LLP / mccarthy.ca 50
  • 33. Amazon.com, Inc. v. Attonrey General of Canada, 2010 FC 1011 ¬ Commissioner had ignored “fundamental differences between the foreign and the domestic regimes” as they pertained to patents and ignored “Canadian legal principles altogether”. ¬ Commissioner has no discretion to deviate from the Canadian patent law and its interpretation by the Courts. ¬ The Commissioner erred in adopting a policy role inconsistent with established Canadian legal principles. ¬ The Commissioner’s reasons for excluding business method patents can no longer be a barrier to obtaining a patent for a business method in Canada. ¬ There is no requirement that eligible subject matter exhibit a “technical character” or that it support a “technical contribution”. McCarthy Tétrault LLP / mccarthy.ca 51
  • 34. Microsoft Crop. V I4I Limited Partnership 564 U.S. __ (2011) ¬ The Court rejects Microsoft’s contention that a defendant need only persuade the jury of a patent invalidity defense by a preponderance of the evidence. There, tracing nearly a century of case law, the Court stated, inter alia, that “there is a presumption of [patent] validity [that is] not to be overthrown except by clear and cogent evidence”. ¬ New evidence supporting an invalidity defense may carry more weight in an infringement action than evidence previously considered by the PTO. ¬ The Court is in no position to judge the comparative force of the parties’ policy arguments as to the wisdom of the clear and convincing-evidence standard that Congress adopted. McCarthy Tétrault LLP / mccarthy.ca 52
  • 35. Board of Trustees of Leland Stanford Junior University v. Roche Molecular Systems, Inc., 563 U.S. ___(2011) ¬ ”Since 1790, the patent law has operated on the premise that rights in an invention belong to the inventor. The question here is whether the University and Small Business Patent Procedures Act of 1980— commonly referred to as the Bayh–Dole Act—displaces that norm and automatically vests title to federally funded inventions in federal contractors. We hold that it does not.” ¬ “Stanford's reading of the phrase “invention of the contractor” to mean “all inventions made by the contractor's employees” is plausible enough in the abstract; it is often the case that whatever an employee produces in the course of his employment belongs to his employer. No one would claim that an autoworker who builds a car while working in a factory owns that car. But, as noted, patent law has always been different: We have rejected the idea that mere employment is sufficient to vest title to an employee's invention in the employer. Against this background, a contractor's invention—an “invention of the contractor”—does not automatically include inventions made by the contractor's employees.” McCarthy Tétrault LLP / mccarthy.ca 54
  • 37. Upcoming in Supreme Court Supreme Court granted leave to appeal: ¬ Tariff 22 – is a download a communication to the public. ¬ Tariff 22 – is an internet preview a fair dealing for research purposes. ¬ K-12 –fair dealing in the K-12 educational sector. McCarthy Tétrault LLP / mccarthy.ca 63
  • 38. Harmony Consulting Ltd. v. G.A. Foss Transport Ltd., 2011 FC 340 ¬ Computer programs that are dictated by the operating system or reflect common programming practices are not original expression and will not receive copyright protection. ¬ Compilation of computer program elements can be protected by copyright. ¬ Minor fixes to a program which are not original are not protected by copyright. ¬ Program features developed using MS Access “wizard” not original or protectable. ¬ A nunc pro tunc copyright assignment does not satisfy the writing requirements for assignments where there was no original intention to transfer the copyright. ¬ Section 13(3) of (which vests copyright in works to employers) applies to officers, directors and employees. ¬ Use of software, without more, outside the scope of a license e.g., more seats than licensed, is not copyright infringement. ¬ Making modifications to software which include opening a file, making changes and resaving the file is not a reproduction. ¬ Making a back-up copy does not involve making a reproduction. ¬ How many errors can one court judgment contain? McCarthy Tétrault LLP / mccarthy.ca 64
  • 39. Google v Copiepresse et al, Brussels Court of Appeal (9th Chamber) May 5, 2011 The decision canvasses many issues including ¬ the choice of law to apply to evaluate the claims of infringement, ¬ whether Google’s caching of news articles is infringement, ¬ whether the transmission of article titles and short extracts violates the reproduction and communication to the public rights, ¬ whether Google News violates the moral rights of authors, ¬ whether statutory fair dealing defenses apply, ¬ whether Google can rely on implied licenses from publishers and authors to publish Google News, and ¬ whether intermediary safe harbors are available under Belgium law for providers of these services. See, Is Google News legal? http://www.barrysookman.com/2011/05/17/is-google-news-legal/ McCarthy Tétrault LLP / mccarthy.ca 72
  • 40. Kernal Records Oy v. Mosley, 2011 WL 2223422 (S.D.Fla. Jun. 7, 2011) “We hold that publishing AJE on a website in Australia was an act tantamount to global and simultaneous publication of the work, bringing AJE within the definition of a “United States work” under § 101(1)(C) and subject to § 411(a)'s registration requirement. Gallefoss elected to publish AJE on the Internet and the legal consequences of that decision must apply. Plaintiff was therefore required to register AJE prior to seeking judicial enforcement of its copyright rights.” McCarthy Tétrault LLP / mccarthy.ca 76
  • 41. Slides available @ barrysookman.com and mccarthy.ca McCarthy Tétrault LLP / mccarthy.ca 78
  • 42. VANCOUVER MONTRÉAL Suite 1300, 777 Dunsmuir Street Suite 2500 P.O. Box 10424, Pacific Centre 1000 De La Gauchetière Street West Vancouver BC V7Y 1K2 Montréal QC H3B 0A2 Tel: 604-643-7100 Tel: 514-397-4100 Fax: 604-643-7900 Fax: 514-875-6246 Toll-Free: 1-877-244-7711 Toll-Free: 1-877-244-7711 CALGARY QUÉBEC Suite 3300, 421 7th Avenue SW Le Complexe St-Amable Calgary AB T2P 4K9 1150, rue de Claire-Fontaine, 7e étage Tel: 403-260-3500 Québec QC G1R 5G4 Fax: 403-260-3501 Tel: 418-521-3000 Toll-Free: 1-877-244-7711 Fax: 418-521-3099 Toll-Free: 1-877-244-7711 TORONTO Box 48, Suite 5300 UNITED KINGDOM & EUROPE Toronto Dominion Bank Tower 125 Old Broad Street, 26th Floor Toronto ON M5K 1E6 London EC2N 1AR Tel: 416-362-1812 UNITED KINGDOM Fax: 416-868-0673 Tel: +44 (0)20 7489 5700 Toll-Free: 1-877-244-7711 Fax: +44 (0)20 7489 5777 OTTAWA Suite 200, 440 Laurier Avenue West Ottawa ON K1R 7X6 Tel: 613-238-2000 Fax: 613-563-9386 Toll-Free: 1-877-244-7711 McCarthy Tétrault LLP / mccarthy.ca 79