Hostname: page-component-76fb5796d-zzh7m Total loading time: 0 Render date: 2024-04-25T20:55:24.980Z Has data issue: false hasContentIssue false

Internet Service Providers as Privacy Custodians

Published online by Cambridge University Press:  26 November 2018

Mike Zajko*
Affiliation:
Assistant Professor Department of History & Sociology Irving K. Barber School of Arts & SciencesUniversity of British Columbia, Okanagan, BCmike.zajko@ubc.ca

Abstract

This article examines the role of internet service providers (ISPs) as guardians of personal information and protectors of privacy, with a particular focus on how telecom companies in Canada have historically negotiated these responsibilities. Communications intermediaries have long been expected to act as privacy custodians by their users, while simultaneously being subject to pressures to collect, utilize, and disclose personal information. As service providers gain custody over increasing volumes of highly-sensitive information, their importance as privacy custodians has been brought into starker relief and explicitly recognized as a core responsibility.

Some ISPs have adopted a more positive orientation to this responsibility, actively taking steps to advance it, rather that treating privacy protection as a set of limitations on conduct. However, commitments to privacy stewardship are often neutralized through contradictory legal obligations (such as mandated surveillance access) and are recurrently threatened by commercial pressures to monetize personal information.

Résumé

En examinant le rôle des fournisseurs de services Internet (FSI) à titre de gardiens des informations personnelles et protecteurs de la vie privée, cet article met en exergue la manière dont les entreprises de télécommunications au Canada ont, historiquement, négocié ces responsabilités. Les systèmes de communication intermédiaires sont, depuis longtemps, supposés agir tels des gardiens de la vie privée, et ce, tout en étant soumis à des pressions relatives à la collecte, l’utilisation et la divulgation de renseignements personnels. Au fur et à mesure que les fournisseurs de services acquièrent la garde de volumes croissants d’informations extrêmement sensibles, leur importance en tant que gardiens de la vie privée a été mis en relief et a été explicitement reconnue comme une responsabilité essentielle. Certains FSI ont adopté une orientation plus positive vis-à-vis de cette responsabilité, prenant activement des mesures pour promouvoir la protection de la vie privée plutôt que de la traiter comme un ensemble de limitations des conduites. Cependant, les engagements en matière de protection de la vie privée sont souvent neutralisés par des obligations légales contradictoires (telles que l’accès de surveillance obligatoire) et sont régulièrement menacés par des pressions commerciales visant la monétisation d’informations personnelles.

Type
Articles
Copyright
Copyright © Canadian Law and Society Association / Association Canadienne Droit et Société 2018 

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

References

Abdelnour, Samer, Hasselbladh, Hans, and Kallinikos, Jannis. 2017. “Agency and Institutions in Organization Studies.” Organization Studies 38 (12): 1775–92.CrossRefGoogle Scholar
Angus Reid Institute. 2018. “Un-Liking Facebook: 3-in-4 Canadian users say data mining scandal will change how they use the platform.” Angus Reid Institute, March 26. http://angusreid.org/facebook-cambridge-analytica-tech/.Google Scholar
Balkin, Jack M. 2016. “Information fiduciaries and the first amendment.” U.C. Davis Law Review 49 (4): 11831234.Google Scholar
BCCLA. 2012. “Moving Towards a Surveillance Society: Proposals to expand ‘Lawful Access’ in Canada.” BC Civil Liberties Association, January 13. http://www.bccla.org/wp-content/uploads/2012/03/2012-BCCLA-REPORT-Moving-toward-a-surveillance-society.pdf.Google Scholar
Behar, Rose. 2018. “Here’s How Bell, Rogers and Telus Profit from Your Mobile Subscriber Data.” MobileSyrup, May 18. https://mobilesyrup.com/2018/05/18/bell-telus-rogers-sell-location-data-third-parties-enstream/.Google Scholar
Birnhack, Michael D., and Elkin-Koren, Niva. 2003. “The Invisible Handshake: The reemergence of the state in the digital environment.” Virginia Journal of Law and Technology 8 (2): 157.Google Scholar
Blackburn, Shelly. 2013. “Proud of Our Commitment to Privacy in Canada.” TELUS Blog, August 7. http://blog.telus.com/public-policy/proud-of-our-commitment-to-privacy-in-canada/.Google Scholar
Braga, Matthew. 2016. “Canadian Telecoms Push Back on Proposed Police Powers.” CBC News, December 20. http://www.cbc.ca/news/technology/rogers-teksavvy-itac-cwta-bill-c51-national-security-1.3903930.Google Scholar
Bronskill, Jim. 2014. “Feds Were Worried as Telecom Firm Planned to Go Public on Police Access to Canadians’ Phone Calls and Emails, Memo Shows.” National Post, December 1. http://news.nationalpost.com/news/canada/feds-were-worried-as-telecom-firms-planned-to-go-public-on-police-access-to-canadians-phone-calls-and-emails-memo-shows.Google Scholar
Burns, John. 1969. “58 Wiretaps Last Year, Mackey Says.” Globe and Mail, June 27, 1969.Google Scholar
Canadian Committee on Corrections. 1969. Recommendations of the Canadian Committee on Corrections [Ouimet Report]. Ottawa: The Queen’s Printer.http://johnhoward.ca/wp-content/uploads/2016/12/1969-HV-8395-A6-C33-1969-Ouimet.pdf.Google Scholar
Cavoukian, Ann. 2011. “Lawful Access.” The Globe and Mail, December 6, sec. Letter to the Editor.Google Scholar
CBC News. 2009. “ISPs Must Help Police Snoop on Internet under New Bill.” June 18. http://www.cbc.ca/news/technology/isps-must-help-police-snoop-on-internet-under-new-bill-1.817756.Google Scholar
CCAICE. 2005. “Canadian Coalition Against Internet Child Exploitation Releases National Action Plan,” May 11. https://www.cybertip.ca/app/en/media_release_ccaice_action_plan.Google Scholar
Clement, Andrew, and Obar, Jonathan A.. 2016. “Keeping Internet Users in the Know or in the Dark: An analysis of the data privacy transparency of Canadian internet carriers.” Journal of Information Policy 6: 294331.CrossRefGoogle Scholar
Cohen, Stanley A. 1982. “Invasion of Privacy: Police and electronic surveillance in Canada.” McGill Law Journal 27 (November): 619–75.Google Scholar
Cornfield, David A. 1967. “The Right to Privacy in Canada.” Faculty of Law Review (University of Toronto) 25: 103–20.Google Scholar
CRTC. 2009. “Telecom Regulatory Policy 2009-723.” Canadian Radio-television and Telecommunications Commission, November 25. http://www.crtc.gc.ca/eng/archive/2009/2009-723.htm.Google Scholar
de Beer, Jeremy F., and Clemmer, Christopher D.. 2009. “Global Trends in Online Copyright Enforcement: A Non-Neutral Role for Network Intermediaries?” Jurimetrics 49 (4): 375409.Google Scholar
Distributel. 2013. “Motion Record of Distributel Communications Limited.” http://www.scribd.com/doc/124826637/Motion-Record-of-Distributel-Communications-Limited.Google Scholar
Dobby, Christine. 2012. “TekSavvy Illegal Downloading: Judge Awards More Time to Warn Clients.” Financial Post, December 17. http://business.financialpost.com/2012/12/17/judge-gives-teksavvy-more-time-to-warn-customers-of-illegal-downloading-copyright-case/.Google Scholar
Dobby, Christine.2015. “Bell Canada to Revamp Online Ad Program to Allow Upfront Consent.” The Globe and Mail, April 13. http://www.theglobeandmail.com/report-on-business/bell-canada-to-revamp-online-ad-program-to-allow-upfront-consent/article23901505/.Google Scholar
Dobby, Christine.2016. “Ontario Court Rules Police Orders Breached Cellphone Users’ Charter Rights.” The Globe and Mail, January 14. http://www.theglobeandmail.com/report-on-business/industry-news/the-law-page/court-sides-with-telecoms-in-landmark-cellphone-privacy-case/article28180968/.Google Scholar
Edwards, Lilian. 2011. “Role and Responsibility of the Internet Intermediaries in the Field of Copyright and Related Rights.” Report. Geneva: WIPO. http://www.wipo.int/export/sites/www/copyright/en/doc/role_and_responsibility_of_the_internet_intermediaries_final.pdf.Google Scholar
Fraser, David. 2016. “Tower Dump Case Raises Troubling Questions about Law Enforcement and Privacy.” Canadian Privacy Law Blog, January 18. http://blog.privacylawyer.ca/2016/01/tower-dump-case-raises-troubling.html.Google Scholar
Freeze, Colin, Dobby, Christine, and Wingrove, Josh. 2014. “TekSavvy, Rogers Break Silence over Government Requests for Data.” The Globe and Mail, June 5. http://www.theglobeandmail.com/technology/tech-news/teksavvy-opens-books-on-government-data-requests/article18999107/.Google Scholar
Fung, Brian. 2016. “Internet Providers Want to Know More about You than Google Does, Privacy Groups Say.” The Washington Post, January 20. https://www.washingtonpost.com/news/the-switch/wp/2016/01/20/your-internet-provider-is-turning-into-a-data-hungry-tech-company-consumer-groups-warn/.Google Scholar
Gaudrault, Marc. 2012. “Why We Are Not Opposing Motion on Monday.” DSLReports Forums: TekSavvy. http://www.dslreports.com/forum/r27824891-Why-we-are-not-opposing-motion-on-Monday.Google Scholar
Geist, Michael.2016. “Why Your Telecom Must Defend Your Right to Privacy.” The Toronto Star, January 25. http://www.thestar.com/business/2016/01/25/why-your-telecom-must-defend-your-right-to-privacy-geist.html.Google Scholar
Goldsmith, Jack L., and Wu, Tim. 2006. Who Controls the Internet?: Illusions of a Borderless World. Oxford: Oxford University Press.Google Scholar
Government of Canada. 2002. “Lawful Access—Consultation Document,” August 25. http://www.justice.gc.ca/eng/cons/la-al/consult.html.Google Scholar
Haggart, Blayne. 2014. Copyfight: The Global Politics of Digital Copyright Reform. Toronto: University of Toronto Press.CrossRefGoogle Scholar
Handa, Sunny, Birbilas, Laurie, and Di Fazio, Justina. 2015. “Bill C-13: Cyberbullying Bill Introduces New Lawful Access Measures.” Blakes Bulletin, January 23. http://www.blakes.com/English/Resources/Bulletins/Pages/Details.aspx?BulletinID=2057.Google Scholar
Henderson, Peter. 2014. “Bell Defends Targeted Ad Program as ‘Transparent.’” The Wire Report, April 30. http://www.thewirereport.ca/news/2014/04/30/bell-defends-targeted-ad-program-as-%E2%80%98transparent%E2%80%99/28217.Google Scholar
House of Commons Standing Committee on Access to Information, Privacy and Ethics. 13 February 2007. “Transcript of Meeting No. 30, February 13, 2007.” http://www.parl.gc.ca/HousePublications/Publication.aspx?DocId=2695445&Language=E&Mode=1.Google Scholar
Hubbard, Robert W., Brauti, Peter M., and Fenton, Scott K.. 2015. Wiretapping and Other Electronic Surveillance: Law and Procedure. Toronto: Thomson Reuters.Google Scholar
Ibbitson, John. 2012. “How the Toews-Sponsored Internet Surveillance Bill Quietly Died.” The Globe and Mail, May 15. http://www.theglobeandmail.com/news/politics/how-the-toews-sponsored-internet-surveillance-bill-quietly-died/article4179310/.Google Scholar
Industry Canada. 2015. “Transparency Reporting Guidelines,” June 30. http://www.ic.gc.ca/eic/site/smt-gst.nsf/eng/sf11057.htmlGoogle Scholar
Karadeglija, Anja. 2014. “Telecoms Don’t Give Out Customer Info ‘Willy-Nilly’: Bell Ombudsman.” The Wire Report, May 2. http://www.thewirereport.ca/news/2014/05/02/telecoms-don%E2%80%99t-give-out-customer-info-%E2%80%98willy-nilly%E2%80%99-bell-ombudsman/28229.Google Scholar
Kerr, Ian. 2002. “In the Year 2000: Me and my ISP.” In Personal Relationships of Dependence and Interdependence in Law, ed. Law Commission of Canada, 78119. Vancouver, BC: UBC Press.Google Scholar
Kerr, Ian, and Cameron, Alex. 2006. “NYMITY, P2P & ISPS: Lessons from BMG Canada Inc. v. John Doe.” In Privacy and Technologies of Identity: A Cross-Disciplinary Conversation, ed. Strandburg, Katherine J. and Raicu, Daniela Stan, 269–94. New York: Springer.CrossRefGoogle Scholar
Kerr, Ian, and Gilbert, Daphne. 2004. “The Role of ISPs in the Investigation of Cybercrime.” In Information Ethics in the Electronic Age: Current Issues in Africa and the World, ed. Mendina, Tom and Britz, Johannes J., 163–72. Jefferson, NC: Mcfarland & Company.Google Scholar
Lawson, Philippa. 2011. “Bill C-12 and ‘Lawful Authority’ under PIPEDA.” Slaw, November 23. http://www.slaw.ca/2011/11/23/bill-c-12-and-lawful-authority/.Google Scholar
Lawson, Philippa, and O’Donoghue, Mary. 2009. “Approaches to Consent in Canadian Data Protection Law.” In Lessons from the Identity Trail: Anonymity, Privacy and Identity in a Networked Society, ed. Kerr, Ian, Lucock, Carole, and Steeves, Valerie, 2342. Oxford: Oxford University Press. https://www.idtrail.org/files/ID%20Trail%20Book/9780195372472_kerr_02.pdf.Google Scholar
Ling, Justin. 2014. “For Canada’s Spies, Your Data Is Just a Phone Call Away.” Vice—Motherboard, May 15. http://motherboard.vice.com/read/canadian-spies-can-look-at-your-user-data-consequence-free.Google Scholar
Lithwick, Dara. 2014. “Legislative Summary of Bill S-4: An Act to Amend the Personal Information Protection and Electronic Documents Act and to Make a Consequential Amendment to Another Act.” Library of Parliament, June 11. http://www.parl.gc.ca/Content/LOP/LegislativeSummaries/41/2/s4-e.pdf.Google Scholar
Martin, Michèle. 1991. Hello, Central?: Gender, Technology, and Culture in the Formation of Telephone Systems. Montreal: McGill-Queen’s Press.Google Scholar
McKenna, Alain. 2011. “Téléchargement de The Hurt Locker : Des internautes canadiens poursuivis.” La Presse, November 28. http://techno.lapresse.ca/nouvelles/internet/201111/28/01-4472247-telechargement-de-the-hurt-locker-des-internautes-canadiens-poursuivis.php.Google Scholar
Mediacaster. 2011. “Canadian ISPs to Deliver Customer Information in Hurt Locker Lawsuit.” Mediacaster Magazine, September 9. https://web.archive.org/web/20111103084359/http://www.mediacastermagazine.com/news/canadian-isps-to-deliver-customer-information-in-hurt-locker-lawsuit/1000575650/.Google Scholar
MediaSmarts. n.d. “MediaSmarts.” http://mediasmarts.ca/.Google Scholar
Miller, Claire Cain. 2014. “Revelations of N.S.A. Spying Cost U.S. Tech Companies.” The New York Times , March 21. http://www.nytimes.com/2014/03/22/business/fallout-from-snowden-hurting-bottom-line-of-tech-companies.html.Google Scholar
Molinaro, Dennis. 2017. “‘In the Field of Espionage, There’s No Such Thing as Peacetime’: The Official Secrets Act and the Picnic Wiretapping Program.” Canadian Historical Review 93 (3): 457–82.CrossRefGoogle Scholar
Morin, Suzanne. 2011. “Updated: Business Disclosure of Personal Information to Law Enforcement Agencies: PIPEDA and the CNA Letter of Request Protocol.” Privacy Pages, November. http://www.cba.org/cba/newsletters-sections/pdf/2011-11-privacy1.pdf.Google Scholar
Neocleous, Mark. 2008. Critique of Security. Edinburgh: Edinburgh University Press.CrossRefGoogle Scholar
Nesbitt, Scott. 2003. “Rescuing the Balance? An Assessment of Canada’s Proposal to Limit ISP Liability for Online Copyright Infringement.” Canadian Journal of Law and Technology 2: 115–28.Google Scholar
Nevis Consulting Group. 2003. “Summary of Submissions to the Lawful Access Consultation,” August 6. http://canada.justice.gc.ca/eng/cons/la-al/sum-res/index.html.Google Scholar
O’Brien, Greg. 2013. “Independent ISP Distributel Fighting Moviemakers over Customer Privacy,” February 14. http://www.cartt.ca/news/15099/Cable-Telecom/Independent-ISP-Distributel-fighting-moviemakers-over-customer-privacy.html.Google Scholar
OECD. 1980. “OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data.” http://www.oecd.org/sti/ieconomy/oecdguidelinesontheprotectionofprivacyandtransborderflowsofpersonaldata.htm.Google Scholar
Office of the Privacy Commissioner. 2014. “Metadata and Privacy—A Technical and Legal Overview,” October 30. https://www.priv.gc.ca/information/research-recherche/2014/md_201410_e.asp#ftnref27.Google Scholar
Office of the Privacy Commissioner. 2015a. “Any and All Records Including but Not Limited to Memos, Written Notes, Presentations, Emails, Reports & Correspondence Prepared for or by Privacy Commissioner Daniel Therrien Concerning the OPC’s Investigation into the RCMP’s Use of Warrantless Requests for Canadians’ Personal Information and the OPC’s Subsequent Report on Same from August 1, 2014 to November 1, 2014.” A-2014-00158. http://paroxysms.ca/csis_random/csis_cyberwar.pdf.Google Scholar
Office of the Privacy Commissioner. 2015b. “Results of Commissioner Initiated Investigation into Bell’s Relevant Ads Program,” April 7. https://www.priv.gc.ca/cf-dc/2015/2015_001_0407_e.asp.Google Scholar
Office of the Privacy Commissioner. 2017. “2016 Survey of Canadians on Privacy,” January 26. https://www.priv.gc.ca/en/opc-actions-and-decisions/research/explore-privacy-research/2016/por_2016_12/#fig16.Google Scholar
Pacienza, Angela. 2004. “Cdn Recording Industry Begins Legal Fight to Stop Music Uploaders.” Canadian Press, February 16.Google Scholar
Parsons, Christopher. 2015. “Stuck on the Agenda: Drawing Lessons from the Stagnation of ‘Lawful Access’ Legislation in Canada.” In Law, Privacy and Surveillance in Canada in the Post-Snowden Era, ed. Geist, Michael, 257–83. Ottawa: University of Ottawa Press. http://www.ruor.uottawa.ca/bitstream/10393/32424/1/9780776621838_WEB.pdf.Google Scholar
Parsons, Christopher. 2017. “The (In)Effectiveness of Voluntarily Produced Transparency Reports.” Business & Society.Google Scholar
Pollach, Irene. 2011. “Online Privacy as a Corporate Social Responsibility: An Empirical Study.” Business Ethics: A European Review 20 (1): 88102.CrossRefGoogle Scholar
Power, E. Michael. 2013. The Law of Privacy. Markham: LexisNexis.Google Scholar
Public Safety Canada. 2011. “Summary of Public Consultation on Access to Customer Name and Address Information for Public Safety Purposes,” October 22. http://www.publicsafety.gc.ca/prg/ns/sum-conslt-eng.aspx.Google Scholar
Public Safety Canada. 2012. “Records on Government Consultations with Law Enforcement and Justice Officials Concerning the Negative Impact of a Warrant Requirement for Basic Subscriber Information.” A-2011-00255. https://telecomtransparency.org/wp-content/uploads/2015/07/A-2011-00255.pdf.Google Scholar
Public Safety Canada. 2013. “Correspondence from the Public on Bill C-30 from Feb 1 May 10, 2012.” A-2012-00301.Google Scholar
Rabideau, Monique. 1991. “Duarte v. R.: In Fear of Big Brother.” University of Toronto Faculty of Law Review 49: 171–85.Google Scholar
Rogers. 2004. “Written Representations of Rogers Communications Inc.,” March 12. https://cippic.ca/sites/default/files/file-sharing-lawsuits/Rogers_Written_Reps_Mar12.pdf.Google Scholar
Rose, Keith. 2017. “SCC To Weigh In on Fees for Identifying ISP Subscribers: Rogers v. Voltage,” SnIP/ITs, November 24. https://www.canadiantechlawblog.com/2017/11/24/scc-to-weigh-in-on-fees-for-identifying-isp-subscribers-rogers-v-voltage/.Google Scholar
Shaw Communications Inc. 2004. “Written Representations of Shaw Communications Inc.,” March 10. https://cippic.ca/sites/default/files/file-sharing-lawsuits/FurtherWrittenSubmissionsShaw.pdf.Google Scholar
Shaw, Gillian. 2004. “Sharing Music over Internet Not Illegal, Federal Court Rules.” The Vancouver Sun, April 1, sec. News.Google Scholar
Singer, Leo. 2012. “Unwarranted Access?” National, June. http://www.nationalmagazine.ca/Articles/June-2012-Issue/Unwarranted-access.aspx.Google Scholar
Singer, Marcus G. 1965. “Negative and Positive Duties.” The Philosophical Quarterly 15 (59): 97103.CrossRefGoogle Scholar
Solomon, Howard. 2016. “Protect Privacy of Subscribers, but Don’t Stick Us with the Bill, CWTA Tells Ottawa.” Cartt.Ca, December 6. https://cartt.ca/article/protect-privacy-subscribers-don%E2%80%99t-stick-us-bill-cwta-tells-ottawa.Google Scholar
Stoddart, Jennifer, Work, Frank, Denham, Elizabeth, Hamilton, Irene, Bertrand, Anne E., Ring, Ed, Bengts, Elaine Keenan, et al. 2011. “Letter to Public Safety Canada from Canada’s Privacy Commissioners and Ombudspersons on the Current ‘Lawful Access’ Proposals,” March 9. https://www.priv.gc.ca/media/nr-c/2011/let_110309_e.asp.Google Scholar
Stryker, Sheldon. 1980. Symbolic Interactionism: A Social Structural Version. Menlo Park: Benjamin-Cummings.Google Scholar
TELUS. 2016. “Telus WISE.” Telus WISE. http://wise.telus.com/.Google Scholar
Thies, Cameron G., and Breuning, Marijke. 2012. “Integrating Foreign Policy Analysis and International Relations through Role Theory.” Foreign Policy Analysis 8 (1): 14.CrossRefGoogle Scholar
Thompson, Robert. 2004. “Shaw Won’t Breach Privacy to Nab Net Pirates: Music industry taking case to court.” Edmonton Journal, February 14, sec. News.Google Scholar
Toews, Vic. 2012. “House of Commons Debates.” Openparliament.Ca, February 28. https://openparliament.ca/debates/2012/2/28/vic-toews-1/.Google Scholar
Valiquet, Dominique. 2011. “Legislative Summary of Bill C-22: An Act Respecting the Mandatory Reporting of Internet Child Pornography by Persons Who Provide an Internet Service.” February 15. http://www.parl.gc.ca/About/Parliament/LegislativeSummaries/bills_ls.asp?Language=E&ls=c22&Parl=40&Ses=3&source=library_prb.Google Scholar
Woods, Allan. 2014. “Canada Courting U.S. Web Giants in Wake of NSA Spy Scandal.” The Toronto Star, January 9. http://www.thestar.com/news/canada/2014/01/09/us_companies_look_to_canadian_servers_in_wake_of_nsa_spy_scandal.html.Google Scholar
BMG Canada Inc. v John Doe [2004], 3 FCR 241.Google Scholar
R v Rogers Communications [2016]. ONSC 70.Google Scholar
R v Spencer [2014]. SCC 43.Google Scholar
R v TELUS [2013]. 2 SCR 3.Google Scholar
Canadian Security Intelligence Service Act, RSC 1985, c C-23.Google Scholar
Competition Act, RSC 1985, c C-34.Google Scholar
Criminal Code, RSC 1985, c C-46.Google Scholar
Personal Information Protection and Electronic Documents Act, SC 2000, c 5.Google Scholar
Protection of Privacy Act, SC 1973-4, c 50.Google Scholar
BMG Canada Inc. v John Doe [2004], 3 FCR 241.Google Scholar
R v Rogers Communications [2016]. ONSC 70.Google Scholar
R v Spencer [2014]. SCC 43.Google Scholar
R v TELUS [2013]. 2 SCR 3.Google Scholar
Canadian Security Intelligence Service Act, RSC 1985, c C-23.Google Scholar
Competition Act, RSC 1985, c C-34.Google Scholar
Criminal Code, RSC 1985, c C-46.Google Scholar
Personal Information Protection and Electronic Documents Act, SC 2000, c 5.Google Scholar
Protection of Privacy Act, SC 1973-4, c 50.Google Scholar