2014-REPORT-Cybermisogyny.Pdf

2014-REPORT-Cybermisogyny.Pdf

#CyberMisogyny Using and strengthening Canadian legal responses to gendered hate and harassment online June 2014 #CyberMisogyny: Using and strengthening Canadian legal responses to gendered hate and harassment online June 2014 Produced by West Coast LEAF We are grateful to the Law Foundation of BC for their funding of this project. We are also grateful to the anti-violence workers, youth organizations, students, lawyers, advocates and community members who provided their insight and expertise in the preparation of this report. The opinions in this report, and any errors, are those of West Coast LEAF and do not reflect the views of the funders or publishers of this report. The contents of this report may not be commercially reproduced, but any other reproduction with attribution to West Coast LEAF is encouraged. This report explains the law in general. It is not intended to provide specific legal advice on individual legal problems, and should not be relied upon as legal advice. Information is current as of May 2014. Cataloguing data available from Library and Archives Canada Design by Nadene Rehnby, Hands on Publications 555 — 409 Granville Street Vancouver, BC, V6C 1T2 604.684.8772 | toll free 1.866.737.7716 [email protected] westcoastleaf.org CONTENTS OVERVIEW ................................................................................................................................................................................5 INTRODUCTION ..........................................................................................................................................................................6 CHAPTER 1 “REVENGE PORN” AND THE NON-CONSENSUAL DISTRIBUTION OF INTIMATE IMAGES ...... 10 Bill C-13, the Protecting Canadians from Online Crime Act ........................................................12 Reasonable Expectation of Privacy .............................................................................................................14 Recklessness ..............................................................................................................................................................14 Consent ........................................................................................................................................................................15 Using and Strengthening Existing Laws to Address “Revenge Porn” and Other Forms of Online Harassment and Abuse ..................................................................16 Criminal Options .....................................................................................................................................16 Criminal Harassment (s. 264) ...........................................................................................................................16 Extortion (s. 346) .....................................................................................................................................................18 Intimidation (s. 423) ..............................................................................................................................................19 Uttering Threats (s. 264.1) .................................................................................................................................20 Voyeurism (s. 162) ..................................................................................................................................................20 Obscene Publication (s. 163) ...........................................................................................................................21 Unauthorized Use of a Computer (s. 342.1 & 342.2) .........................................................................21 Mischief in Relation to Data (s. 430(1.1)) ..................................................................................................22 Identity Theft and Identity Fraud (ss. 402.1, 402.2 and 403) ........................................................22 False Messages (s. 372(1))..................................................................................................................................23 Defamatory Libel (ss. 300 and 301) .............................................................................................................24 Restitution for Victims of Crime.....................................................................................................................25 Civil Remedies ..........................................................................................................................................26 Nova Scotia’s Cyberbullying Safety Act ........................................................................................................27 Defamation ................................................................................................................................................................28 Invasion of Privacy .................................................................................................................................................30 Intentional Infliction of Mental Suffering ................................................................................................31 Appropriation of Personality ...........................................................................................................................32 Copyright Law ..........................................................................................................................................................33 Jurisdictional Challenges .....................................................................................................................34 CHAPTER 2 TEEN “SEXTING” AND SEXUALIZED ONLINE BULLYING ................................................................... 36 Using and Strengthening Existing Laws to Address Youth “Sexting” and Sexualized Online Bullying ........................................................38 Sexting and Canada’s Child Pornography Laws...........................................................................38 Exceptions to the Application of the Child Pornography Laws ................................................40 Youth and Consensual Sharing of Intimate Images ..........................................................................41 Youth and Non-Consensual Distribution of Intimate Images .....................................................43 Human Rights Law and the Responsibility of Schools ..............................................................44 International Human Rights Law .................................................................................................................44 Domestic Human Rights Law and the Responsibility of Schools ............................................46 CHAPTER 3 ONLINE SEXUAL EXPLOITATION OF CHILDREN AND YOUTH ........................................................ 51 Using and Strengthening Existing Laws to Protect Children and Teens from Sexual Exploitation .................................................................................................53 Child Pornography (s. 163.1) ...........................................................................................................................53 Internet Luring of a Child (s. 172.1) .............................................................................................................55 Sexual Exploitation (ss. 151-153) ..................................................................................................................57 Making Sexually Explicit Material Available to a Child (s. 171.1) ...............................................58 Protecting Youth in the Justice System ....................................................................................................58 CHAPTER 4 CYBERSTALKING ............................................................................................................................................ 60 Using and Strengthening Existing Laws to Address Cyberstalking ......................................63 Criminal Harassment (s. 264) ...........................................................................................................................63 Harassing and Indecent telephone calls (ss. 372(2) and (3)) .......................................................64 Invasion of Privacy (ss. 184-193)....................................................................................................................64 Restraining Orders/Protection Orders and Peace Bonds ..............................................................65 CHAPTER 5 HATE SPEECH AND ADVOCATING GENDER-BASED VIOLENCE ONLINE .................................... 68 Using and Strengthening Existing Laws to Address Gender-Based Hate Speech Online .................................................................................72 Advocating Genocide and Criminal Hate Speech (ss. 318 and 319) ......................................72 Hate Speech and the Canadian Human Rights Act ....................................................................75 Responsibility of ISPs and Social Media Platforms .....................................................................77 CONCLUSION ........................................................................................................................................................................... 80 APPENDIX LIST OF RECOMMENDATIONS .................................................................................................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    88 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us