Ë

Follow our 9 part blog series on Understanding Canadian Cybersecurity Law. In Article 3, Melissa Lukings and Arash Habibi Lashkari focus on cyber security-specific legislation and cybercrime-specific Criminal Code provisions under our existing Canadian federal law.

Read More

Follow our 9 part blog series on Understanding Canadian Cybersecurity Law. In Article 7, Melissa Lukings and Arash Habibi Lashkari discuss the legal issues relating to encrypted online criminal activities, specifically those involving or facilitated by the use of Dark Web browsers and cryptocurrencies (such as TOR and Bitcoin, respectively) which provide anonymity to both parties in an illegal transaction.

Read More

Follow our 9 part blog series on Understanding Canadian Cybersecurity Law. In Article 6, Melissa Lukings and Arash Habibi Lashkari highlight the common law tort of intrusion upon seclusion and the relatively new criminal offences of cyberbullying and the sharing of intimate images.

Read More

Follow our 9 part blog series on Understanding Canadian Cybersecurity Law. In Article 5, Melissa Lukings and Arash Habibi Lashkari focus on Canada’s Anti-Spam Legislation (CASL), the federal law dealing with spam and other electronic threats.

Read More

As cyber-attacks and security breaches become more frequent, the standards and penalties for data privacy regulation in Canada continue to rise. This short article provides a summary of current bills and laws that affect the private sector, including Bill C-11 and Quebec's Bill 64, and the costs of non-compliance with data privacy regulation.

Read More

Ontario is closer to creating its own provincial privacy law that would include a right to privacy and a corporate obligation to report privacy breaches.

Read More

Most organizations understand that they need to protect their data for their own operations, but the proliferation of data protection laws such as the European Union's GDRP and the California Consumer Privacy Act are forcing data keepers to think about the privacy of those whose data they're holding.

Read More

The regulations would have far-reaching implications for tech firms like Amazon, Google, Facebook and Microsoft, which have poured resources into developing the technology.

Read More

By being more mindful of how and where they share PII, employees will deprive cybercriminals of their most useful tool.

Read More

In this blog post, we bring you Data Privacy vs. Data Security and the difference between them both.

Read More