R. c. Gauthier, 1999 IIJCan 10457 (QC C.Q.)
27 En effet, Stéphane Gauthier possédait pour ce qui était du contenu de ses ordinateurs, une expectative de vie privée.
28 Rare est la jurisprudence sur cet aspect particulier.
29 C'est à la lumière des arrêts la R. c. Edwards (1996) 1 RCS p. 128; la R. c. Silveira (1995) 2 RCS p. 297 et la R. c. Evans (1996) 1 RCS p. 8, qui parlent de l'expectative raisonnable de vie privée, que le présent Tribunal peut conclure que le contenu d'un ordinateur, particulièrement les courriels ou E-Mail, les images, les news group, les news rider, sont du domaine de la vie privée où il y a “a reasonable expectation of privacy”, selon les termes de l'arrêt Hunter c. Southam (1984) 2 RCS p. 145.
36 Ici, non seulement la fouille par le gendarme Gagnon était-elle illégale, parce que non autorisée, mais elle était aussi abusive parce qu'il n'avait pas besoin de tout ouvrir les fichiers “J Peg” qui avaient trait aux images; il s'est livré, de fait, à une expédition de pêche.
37 De plus, la lecture des courriels ou E-mail était un accroc flagrant et délibéré au droit qu'avait Stéphane Gauthier à une expectative raisonnable de vie privée.
40 Le Tribunal, faute de jurisprudence canadienne sur les fouilles dans des ordinateurs en rapport avec l'expectative raisonnable de vie privée, s'est inspiré d'une décision américaine rendue le 14 avril 1999 en matière de fouille dans un ordinateur: United States of America v. Patrick Carey # 98-3077 United States Court of Appeal Tenth Circuit:
Seizure of the computer was permitted by the consent to remove property that shall be essential to the proof of any crime, but the agreement did not permit the officer to open the files contained in the computer.
41 Voici l'histoire du cas Carey tel que récité dans le jugement américain:
The computers were taken to the police station and a warrant was obtained by the officers allowing them to search the files on the computers for “names, telephone numbers, ledger receipts, addresses, and other documentary evidence pertaining to the sale and distribution of controlled substances. Detective Lewis and a computer techniciansearched the contents of the computers, first viewing the directories of both computers' hard drives. They then downloaded onto floppy disks and printed the directories. Included in the directories were numerous files with sexually suggestive titles and the label “JPG”.
Undaunted, Detective Lewis continued to explore the directories and encountered some files he“was not familiar with.” Unable to view these files on the computer he was using, he downloaded them to a disk which he placed into another computer. He then was, “immediately” able to view what he later described as a “JPG file.” Upon opening this file, he discovered it contained child pornography.
42 Dans cet arrêt Carey, le policier n'a pas requis de nouveaux mandats de perquisition, et c'est ainsi que la Cour américaine a conclu:
Mr. Carey argues the search of the computers transformed the warrant into a “general warrant” and resulted in a general and illegal search of the computers and their files. The Fourth Amendment requires that a search warrant describe the things to be seized with sufficient particularity to prevent a general exploratory rummaging in a person'sbelongings.
43 Enfin la Cour américaine décide ainsi:
We infer from his testimony Detective Lewis knew he was expanding the scope of his search when he sought to open the JPG files. These circumstances suggest Detective Lewis knew clearly he was acting without judicial authority when he abandoned his search for evidence of drug dealing.
We must conclude Detective Lewisexceeded the scope of the warrant in this case. His seizure of the evidence upon which the charge of conviction was based was a consequence of an unconstitutional general search, and the district court erred by refusing to suppress it.
Aucun commentaire:
Publier un commentaire