Rechercher sur ce blogue

Aucun message portant le libellé Code criminel - Article 487. Afficher tous les messages
Aucun message portant le libellé Code criminel - Article 487. Afficher tous les messages

jeudi 7 mai 2026

En raison de la nature intrinsèquement coercitive de l'exécution d'un mandat de perquisition, une détention psychologique peut survenir, obligeant ainsi les policiers à être attentifs aux signes indiquant que les occupants ne se sentent pas libres et à les informer clairement de leur liberté de mouvement

R. v. O'Brien, 2023 ONCA 197

Lien vers la décision


[37]      I accept the trial judge’s conclusion that the s. 9 breach was of minimal seriousness. There is no basis on the evidence for inferring that the police intentionally set out to detain Mr. O’Brien or acted negligently in doing so. I would say, however, that given the inherently coercive nature of warrant execution, and the reaffirmation in R. v. Lafrance2022 SCC 32, 416 C.C.C. (3d) 183, that psychological detention can occur during the execution of search warrants, police officers who assume control over occupants in order to secure the scene of a search should pay closer attention to whether there are objectively reasonable indications that those persons may consider themselves to be detained than the police officers did in this case. It is a simple matter to explain to occupants why they are being directed, and to notify them when and where they are free to go.

samedi 25 avril 2026

L’exécution d’un mandat de perquisition n’est pas assujettie à un délai automatique d’un jour, mais doit plutôt s’effectuer dans un délai raisonnable en fonction des circonstances propres à chaque affaire.

Cyr-Larivière c. R., 2026 QCCA 325

Lien vers la décision


[15]      Par ailleurs, l’appelante soulève un moyen qui n’a pas été présenté au procès. Une fois le mandat de perquisition signé, les policiers ont attendu sept jours avant de l’exécuter. Le mandat ne fixait aucun délai explicite. Toutefois, l’appelante plaide maintenant que la perquisition était illégale et abusive parce qu’exécutée après l’expiration de la période de validité implicite du mandat. S’appuyant sur l’arrêt R. c. Saint2017 ONCA 491, et sur une référence à cet arrêt dans R. c. Samuels2024 ONCA 786, par. 28, elle soutient que le mandat devait être exécuté le jour même de son émission.

[16]      Certes, l’exécution tardive du mandat de perquisition peut soulever des interrogations. Il est établi qu’un mandat doit être exécuté rapidement alors que les renseignements sur la base desquels il est émis sont encore valables. Un mandat qui ne prévoit pas de délai explicite comporte assurément l’exigence implicite que la perquisition soit exécutée en temps utile. Cependant, il est douteux, à tout le moins, que l’arrêt Saint impose un délai d’un jour dans tous les cas. Dans cette affaire, l’accusé plaidait que le mandat de perquisition en question avait une durée d’exécution illimitée, parce qu’il ne comportait pas de date d’exécution précise, ce qui le rendait invalide. En rejetant cet argument, la Cour d’appel de l’Ontario a notamment estimé qu’il était possible, sur la base de l’affidavit et des circonstances de l’affaire, d’inférer que la date d’exécution du mandat était le jour même de sa délivrance. En particulier, l’affidavit spécifiait la date envisagée pour la perquisition et celle-ci a été autorisée et exécutée à cette même date. Ainsi, la Cour se livrait à un examen contextuel, et non à l’énoncé d’une règle d’application générale fixant à un jour le délai d’exécution d’un mandat de perquisition. Selon ce qui appert de la jurisprudence et de la doctrine, le mandat doit plutôt être exécuté dans un délai raisonnable compte tenu des circonstances spécifiques de l’affaire : R. c. Coull, 33 CCC (3d) 186, 1986 CanLII 4753 (C.A.C.B.), par 12; Martin Vauclair, Tristan Desjardins et Pauline Lachance, Traité général de preuve et de procédure pénales 2025, 32e éd., Montréal, Yvon Blais, 2025, par. 13.79; James A. Fontana et David Keeshan, The Law of Search and Seizure in Canada, 13e éd., Toronto, LexisNexis, 2024, p. 358-360.

jeudi 12 mars 2026

Le processus de soumission successive des demandes de mandat à deux juges différents, avec divulgation complète de la première décision et des motifs de refus, ne constitue pas du "judge shopping"

R. v. Bond, 2021 ONCA 730

Lien vers la décision


[22]      As set out in the Facts section of this judgment, on December 27, 2016, the police applied twice for search warrants relating to two properties and one vehicle.

[23]      At 2:32 p.m., the Justice of the Peace refused to authorize the warrants, giving four reasons in support.

[24]      At 5:20 p.m., the justice of the Ontario Court of Justice authorized the warrants, without reasons.

[25]      At trial, the appellant raised this issue, labelling it “impermissible judge-shopping”. The trial judge dealt with it in a footnote:

The defence argued that taking the second request to [the justice at the Ontario Court of Justice] was impermissible judge-shopping. Police disclosed the prior request to the Justice of the Peace, including the rejection and reasons for the rejection, when they made the request of [the second application judge]. This is not impermissible judge-shopping: it was within [the second application judge’s] discretion to decide the warrant request, and he did so on full and fair information: R. v. Campbell[2014] OJ No. 6541 (SCJ), per McMahon J.

[26]      The appellant submits that the trial judge erred in reaching this conclusion. His position on this issue is succinctly summarized in his factum, at para. 58:

Judge shopping strikes at the core of our judicial system. The concept undermines the high level of confidence that is placed in our judicial system, where the decision of a judicial officer is final and binding unless and until it has been overturned by a higher court. Section 487(2) of the Criminal Code provides that a “justice” may issue a warrant. The Criminal Code defines a “justice” as a Justice of the Peace or a judge of the provincial court. Therefore, [the justice at the Ontario Court of Justice] cannot be considered a higher court than [the] Justice of the Peace … By applying for successive warrants on the same information to a different judge of the same court, the police committed impermissible judge-shopping. [Emphasis added.]

[27]      I do not accept this submission, including the emphasized conclusion.

[28]      I begin by observing that I do not think that there should be a bright-line rule that the police cannot make a second application for a warrant if the first application is rejected. It needs to be recalled that there is no appeal from the initial refusal: see R. v. Campbell[2014] O.J. No. 6541 (S.C.), at para. 40.

[29]      On this point, I agree with what Thackray J.A. said in R. v. Duchcherer2006 BCCA 171, at para. 29:

The procedure of applying successively for search warrants cannot reasonably be said, as such, to be an abuse of process or a “subversion” of the judicial system. Within the process there can, of course, be abuses that would lead to such a finding. It will be a fact driven decision in each case whether the circumstances amount to an abuse of process. 

[30]      My second contextual observation is that the second judge considering whether to grant the search warrant is not sitting in appeal of the first judge’s decision nor in review of that judge’s decision by way of prerogative writ. As Thackray J.A. said in Duchcherer, at para. 17, “where a judge knows of the previous application to a justice of the peace for a search warrant, but exercises his own discretion, it is a hearing de novo, not a review of the decision of the justice of the peace.”: see also R. v. Colbourne (2001), 2001 CanLII 4711 (ON CA), 157 C.C.C. (3d) 273 (Ont. C.A.), at para. 41.

[31]      This court in Colbourne, at para. 42 began to address the issue of whether a warrant could be granted on a second application. I agree with Doherty J.A. that “had the second information been the same as the first information, the initial refusal would have played a much more significant role in how the second Justice of the Peace exercised his or her discretion.” While it does play a role and should be considered by the second application judge, the fact a warrant request has been rejected is not determinative to the second request. This is supported by Doherty J.A.’s further reasoning in Colbourne, at para. 42, that he “need not decide whether I would go so far as to say that two applications based on the same information are improper even if full disclosure of the initial refusal is made.”

[32]      Turning to the merits of the appellant’s submission on this issue, in my view, the disclosure to the second application judge of the previous refusal and the reasons for that refusal ensured the openness and transparency of the process that the appellant submits was lacking. Those factors were endorsed by McMahon J. in Campbell, at para. 56:

In submitting the materials the officer should ensure the ITO includes the particulars of the earlier refusal, including the time, name of the judicial officer, and the reasons of refusal.

A copy of any reason or endorsement provided by the judicial officer who refused the warrant should be an appendix to the ITO.

[33]      As the trial judge noted in the footnote dealing with the judge-shopping issue, the police complied with these factors. The second application judge, who issued the search warrant, was fully apprised of the previous application, its timing, the fact that it had been rejected, and the reasons for the rejection. He was well-positioned to consider the application de novo.

[34]      McMahon J. in Campbell also identified another factor to consider, namely that no specific officer should be selecting individually any reviewing judge; instead, the second judicial officer should be the one on call. I note that the appellant does not allege that this factor is in play in this case.

[35]      In conclusion, like McMahon J. in Campbell, at para. 58, “I do not accept the argument that allowing successive search warrant applications on the same materials would amount to judge-shopping and would be a reason not to allow for such procedure”. Each case will need to be addressed on its own facts. In this case, the trial judge did not err by affirming the validity of the second search warrant.

jeudi 26 février 2026

L'horizon temporel pour exécuter un mandat de perquisition selon la Cour d'Appel de l'Ontario

R. v. Samuels, 2024 ONCA 786

Lien vers la décision


[28]      First, since Det. Veal already had grounds to obtain a search warrant for the apartment by September 1, 2020, he could have prepared and submitted the application for the warrant before the appellant was arrested. Even if it was reasonable for Det. Veal and his superiors to want to delay the apartment search until after the appellant had been arrested, “[t]here is no statutory time limit for the execution of conventional search warrants”: R. v. Jodoin2018 ONCA 638, at para. 18. A search warrant with no express execution date must be executed on the same day that it is issued, but a justice of the peace can also specify “a range of dates”: R. v. Saint, 2017 ONCA 491, 353 C.C.C. (3d) 467, at paras. 1, 19-21. Since Det. Veal’s grounds for believing that drugs were in the apartment were not particularly time-sensitive, he could have submitted his search warrant application on September 1, but asked the issuing justice to extend the execution period long enough to give the police time to first find and arrest the appellant. Indeed, Det. Veal agreed at trial that he knew he could have requested a 24-hour execution window.

jeudi 12 février 2026

Les 5 questions qui doivent généralement trouver réponse pour qu'un juge puisse émettre une autorisation judiciaire

R. v. Adams, 2004 CanLII 12093 (NL PC)

Lien vers la décision


[24]  Generally speaking, there are five main questions which the issuing justice must ensure that an information to obtain a search warrant provides reasonable grounds to answer before he or she agrees to issue a search warrant:

1. that the items specified exist;

2. that the items specified will be found in the place to be searched at the time of the search;

3. that the offence alleged has been, or will be, (depending on the type of search warrant being sought) committed;

4. that the items specified will afford evidence of the offence alleged; and

5. that the place to be searched is the location where the items will be located.

[25]  In R. v. Colby[1999] S.J. No. 915 (Q.B.), at paragraph 10, the essential elements of a C.D.S.A. warrant were described as follows:

...There must be reasonable and probable grounds for believing that the items to be searched for and seized are then in the place for which the warrant is to issue.  If that were not the case police relying on extremely outdated information, could seek and obtain a warrant to search a dwelling house.  Such was not the intention of the legislators.

Le procureur peut conseiller l'affiant dans la rédaction de son affidavit à l'appui d'une autorisation judiciaire sollicitée pour qu'il réponde aux normes établies par la jurisprudence

R. v. Ebanks, 2009 ONCA 851

Lien vers la décision


[49] While the Crown agent should help the affiant present the evidence in a clear and concise manner and point out any flaws, inconsistencies or ambiguities in the affidavit, he or she should not become an investigator and engage in a wholesale review of the file. This would blur the line between the mutually independent functions of the police and the Crown, each of whom properly maintains a distinct role in the criminal justice system.

L’autorisation de perquisitionner dans un lieu emporte celle de fouiller les espaces et contenants se trouvant dans ce lieu

R. v. Charles, 2012 ONSC 2001

Lien vers la décision


[61]           Defence counsel argued that the police had no power under the search warrant to open the safe, but rather were required to apply for a second warrant to examine its contents.  I disagree.  The search warrant empowered the police to search the apartment and its contents.  If, in the course of that search, they encountered a desk, they were empowered to look inside the desk.  That would include opening the drawers of the desk and looking inside those drawers.  They would not be required to get a new warrant if a desk drawer was locked.  The warrant provides them with all the authority they need to look inside the locked drawer.  There is nothing about a safe that makes it any different from a locked drawer.  There is every reason to believe that a person who is believed to be a drug dealer, who is found to have crack cocaine and a large amount of cash on his person, and who has a safe in his closet, is likely to have placed either drugs or proceeds or both in the safe.  Indeed, there is every reason to believe that is why he would have acquired a safe in the first place.


*** Note de l'auteur de ce blog: ce passage est cité avec approbation par R. c. Vu, 2013 CSC 60, par 39 ***

Principes régissant les mandats de perquisition et commentaires sur les fouilles d'ordinateurs

R. v Townsend, 2017 ONSC 3435



Warrants

[53]           Prior to examining computer searches, a brief discussion of warrants is of benefit.  The face of the warrant is the document that empowers police to search a particular location for particular evidence:  Re Times Square Book Store and the Queen1985 CanLII 170 (ON CA), 21 C.C.C. (3d) 503; R. v. Parent1989 CanLII 217 (YK CA), 47 C.C.C. (3d) 385; R. v. Ricciardi2017 ONSC 2788R. v. Merritt2017 ONSC 80.  The section of the warrant document known as the “Information to Obtain” provides an issuing justice the grounds to either grant or deny the police the right to search the location described on the face of the warrant for certain evidence.  However, the ITO is not part of the warrant that a searching officer is expected to examine.  Instead, the searching officer is only required to familiarize themselves with the face of the warrant in order to understand the parameters of the search.[4]  As a result of this interplay between the face of the warrant and the ITO, the face of the warrant is expected to satisfy what is known as the “fellow officer” test – that is, would a fellow officer be able to understand the items sought and the location to be searched as a result of reviewing the face of the warrant: R. v. Raferty2012 ONSC 703 at para 103.

[54]           In RicciardiDi Luca J. reviewed the guiding principles dealing with search warrants, searches pursuant thereto, and judicial review thereof. At paragraphs 12 to 17, Di Luca J. reviewed the law regarding the issuing of search warrants. At paragraphs 18 to 20, he then reviewed the law as it applies to the role of the reviewing judge:

                                    On a review, the role of reviewing judge is not substitute his or her view for that of the issuing justice. Rather, the role is to assess whether, on the basis of the material before the issuing justice as amplified and excised on review, the authorizing or issuing justice could have issued the warrant; see R. v. Sadikov, supra, at paras. 83-89, R. v. Ebanks, 2009 ONCA 851R. v. Lao, 2013 ONCS 285 and R. v. Morelli, supra, at para. 40-41. As Watt J.A. explains in R. v. Mahmood, 2011 ONCA 693 at para 99:

      A reviewing judge does not substitute his or her view for that of the justice who issues the warrant. Rather, the reviewing judge considers the record before the issuing justice, but amplified by evidence adduced on the hearing to correct minor technical errors in drafting the ITO, to determine whether there remains sufficient credible and reliable evidence to permit the justice to issue the warrant.

                        The review is conducted based on the whole of the ITO using a common sense approach to all the circumstances. The review is not an exercise in picking apart the drafting of the ITO looking for minor imperfections, misstatements or omissions. While the police are required to draft an ITO as precisely and clearly as possible, they are not expected to spell things out as clearly as counsel. They are also not required to include every detail, no matter how minute, of the police investigation. The question is ultimately whether the core substance of the ITO could support issuance of the warrant; see R. v. Morelli at para 167, R.v. Lubell and the Queen (1973), 1983 CanLII 3587 (ON SC)6 C.C.C. (3d) 296 (Ont. H.C.) at p. 190, Re Chapman and the Queen (1983), 6 C.C.C. (3d) 296 (Ont. H.C.) at p. 297, R. v. Ngyuen, supra, at para. 58, R v. Araujo (2000. 2000 SCC 65 (CanLII)149 C.C.C. (3d) 449 (S.C.C.) and R.v. Persaud, 2016 ONSC 6815 at para. 64.

                        The excision exercise requires that any unlawfully obtained evidence be removed from consideration in assessing the sufficiency of grounds in an ITO, see R. v. Grant (1993), 1993 CanLII 68 (SCC)84 C.C.C. (3d) 173 (S.C.C.)R. v. Plant (1993), 1993 CanLII 70 (SCC)84 C.C.C. (3d) 203 (SCC) and R. v. Wiley 91993), 1993 CanLII 69 (SCC)84 C.C.C. (3d) 161 (SCC). While the continued validity of the automatic exclusion approach has been criticized, it remains the law; see R. v. Jasser, 2014 ONSC 6052 at paras. 26-34.

Computer Searches and Warrants

[55]           Special interests are at play when the Courts examine the searches of computers.  Computers carry immense vaults of personal and biographical information.  The search of this information is, by definition, highly invasive.  As Fish J. stated in R. v. Morelli2010 SCC 8[2010] 1 S.C.R. 253, at para 105:

As I mentioned at the outset, it is difficult to imagine a more intrusive invasion of privacy than the search of one's home and personal computer. Computers often contain our most intimate correspondence. They contain the details of our financial, medical, and personal situations. They even reveal our specific interests, likes, and propensities, recording in the browsing history and cache files the information we seek out and read, watch, or listen to on the Internet.

[56]           Typically, the right to search a location also provides the police with the right to search the receptacles within that location.  Unsurprisingly, given the heightened importance associated with the search of computers, the Supreme Court of Canada in Vu held that computers are different than other receptacles.  The Court stated at paras 40 to 45:

It is difficult to imagine a more intrusive invasion of privacy than the search of a personal or home computer: Morelli, at para. 105; R. v. Cole2012 SCC 53[2012] 3 S.C.R. 34, at para. 3. Computers are "a multi-faceted instrumentality without precedent in our society": A. D. Gold, "Applying Section 8 in the Digital World: Seizures and Searches", prepared for the 7th Annual Six-Minute Criminal Defence Lawyer (June 9, 2007), at para. 3 (emphasis added). Consider some of the distinctions between computers and other receptacles.

First, computers store immense amounts of information, some of which, in the case of personal computers, will touch the "biographical core of personal information" referred to by this Court in R. v. Plant1993 CanLII 70 (SCC)[1993] 3 S.C.R. 281, at p. 293. The scale and variety of this material makes comparison with traditional storage receptacles unrealistic. We are told that, as of April 2009, the highest capacity commercial hard drives were capable of storing two terabytes of data. A single terabyte can hold roughly 1,000,000 books of 500 pages each, 1,000 hours of video, or 250,000 four-minute songs. Even an 80-gigabyte desktop drive can store the equivalent of 40 million pages of text: L. R. Robinton, "Courting Chaos: Conflicting Guidance from Courts Highlights the Need for Clearer Rules to Govern the Search and Seizure of Digital Evidence" (2010), 12 Yale J.L. & Tech. 311 at pp. 321-22. In light of this massive storage capacity, the Ontario Court of Appeal was surely right to find that there is a significant distinction between the search of a computer and the search of a briefcase found in the same location. As the court put it, a computer "can be a repository for an almost unlimited universe of information": R. v. Mohamad (2004), 2004 CanLII 9378 (ON CA)69 O.R. (3d) 481, at para. 43.

Second, as the appellant and the intervener the Criminal Lawyers' Association (Ontario) point out, computers contain information that is automatically generated, often unbeknownst to the user. A computer is, as A.D. Gold put it, a "fastidious record keeper" (para. 6). Word-processing programs will often automatically generate temporary files that permit analysts to reconstruct the development of a file and access information about who created and worked on it. Similarly, most browsers used to surf the Internet are programmed to automatically retain information about the websites the user has visited in recent weeks and the search terms that were employed to access those websites. Ordinarily, this information can help a user retrace his or her cybernetic steps. In the context of a criminal investigation, however, it can also enable investigators to access intimate details about a user's interests, habits, and identity, drawing on a record that the user created unwittingly: O. S. Kerr, "Searches and Seizures in a Digital World" (2005), 119 Harv. L. Rev. 531, at pp. 542-43. This kind of information has no analogue in the physical world in which other types of receptacles are found.

Third, and related to this second point, a computer retains files and data even after users think that they have destroyed them.

                        

Computers thus compromise the ability of users to control the information that is available about them in two ways: they create information without the users' knowledge and they retain information that users have tried to erase. These features make computers fundamentally different from the receptacles that search and seizure law has had to respond to in the past.

Fourth, limiting the location of a search to "a building, receptacle or place" (s. 487(1) of the Code) is not a meaningful limitation with respect to computer searches. As I have discussed earlier, search warrants authorize the search for and seizure of things in a "building, receptacle or place" and "permit the search of receptacles such as a filing cabinets, within that place…. The physical presence of the receptacle upon the premises permits the search": Fontana and Keeshan, at p. 1181 (italics in original; underling added). Ordinarily, then, police will not have access to items that are not physically present in the building, receptacle or place for which a search has been authorized. While documents accessible in a filing cabinet are always at the same location as the filing cabinet, the same is not true of information that can be accessed through a computer. The intervener the Canadian Civil Liberties Association notes that, when connected to the Internet, computers serve as portals to an almost infinite amount of information that is shared between different users and is stored almost anywhere in the world. Similarly, a computer that is connected to a network will allow police to access information on other devices. Thus, a search of a computer connected to the Internet or a network gives access to information and documents that are not in any meaningful sense at the location for which the search is authorized.

These numerous and striking differences between computers and traditional "receptacles" call for distinctive treatment under s. 8 of the Charter. The animating assumption of the traditional rule -- that if the search of a place is justified, so is the search of receptacles found within it -- simply cannot apply with respect to computer searches.

[57]           The Supreme Court of Canada then considered whether or not a properly authorized warrant to search required search parameters. In holding that search parameters were not constitutionally required, the Court stated at paras 53 and 54 of Vu:

The intervener the British Columbia Civil Liberties Association (“B.C.C.L.A.”) submits that, in addition to a requirement that searches of computers be specifically authorized by a warrant, this Court should also find that these warrants must, as a rule, set out detailed conditions, sometimes called "ex ante conditions" or "search protocols", under which the search may be carried out. According to the B.C.C.L.A., search protocols are necessary because they allow authorizing justices to limit the way in which police carry out their searches, protecting certain areas of a computer from the eyes of the investigators. The Crown and intervening Attorneys General oppose this sort of requirement, arguing that it is contrary to principle and impractical. While I am not convinced that these sorts of special directions should be rejected as a matter of principle, my view is that they are not, as a general rule, constitutionally required and that they would not have been required in this case.

While I propose, in effect, to treat computers in some respects as if they were a separate place of search necessitating distinct prior authorization, I am not convinced that s. 8 of the Charter requires, in addition, that the manner of searching a computer must always be spelled out in advance. That would be a considerable extension of the prior authorization requirement and one that in my view will not, in every case, be necessary to properly strike the balance between privacy and effective law enforcement….

[58]           However, the Court did indicate at paras 61 and 62 that parameters may be preferable in certain situations:

By now it should be clear that my finding that a search protocol was not constitutionally required in this case does not mean that once police had the warrant in hand, they had a licence to scour the devices indiscriminately. They were bound, in their search, to adhere to the rule that the manner of the search must be reasonable. Thus, if, in the course of their search, the officers realized that there was in fact no reason to search a particular program or file on the device, the law of search and seizure would require them not to do so.

Although I do not find that a search protocol was required on the particular facts of this case, authorizing justices must assure themselves that the warrants they issue fulfil the objectives of prior authorization as established in Hunter. They also have the discretion to impose conditions to ensure that they do. If, for example, an authorizing justice were faced with confidential intellectual property or potentially privileged information, he or she might find it necessary and practical to impose limits on the manner in which a computer could be searched. In some cases, authorizing justices may find it practical to impose conditions when police first request authorization to search. In others, they might prefer a two-stage approach where they would first issue a warrant authorizing the seizure of a computer and then have police return for an additional authorization to search the seized device. This second authorization might include directions concerning the manner of search. Moreover, I would not foreclose the possibility that our developing understanding of computer searches and changes in technology may make it appropriate to impose search protocols in a broader range of cases in the future. Without expressing any firm opinion on these points, it is conceivable that proceeding in this way may be appropriate in some circumstances.

[59]           The Ontario Court of Appeal had considered the “license to scour” a computer described in Vu, in R. v. Jones, 2011 ONCA 632, 107 O.R. (3d) 241.  In Jones, the police seized a computer and searched pursuant to a broadly worded warrant.  In searching the computer, the police analyst discovered child pornography.  The police relied upon the initial warrant to conduct a further search.  The Crown argued on appeal that a computer was an indivisible item and that once police had authority to search the computer, the police could search the entire computer. 

[60]           Blair J.A., writing for the Court, rejected this argument and stated at paragraph 50: 

The police have available to them the necessary software, technology and expertise to enable them to tailor their searches in a fashion that will generate the information they seek, if it exists, while at the same time minimizing the intrusion on the computer user's privacy rights in other information stored on the computer. Sergeant Rumnyak testified that the EnCase software used in this case permits the police to view all data and all files contained on the computer but that the police do not normally look at all files in the course of an investigation; they focus on those they think will generate the evidence they are looking for. That is as it should be.

Le dédommagement à la victime doit toujours être envisagé lors de la détermination de la peine

En raison de la nature intrinsèquement coercitive de l'exécution d'un mandat de perquisition, une détention psychologique peut survenir, obligeant ainsi les policiers à être attentifs aux signes indiquant que les occupants ne se sentent pas libres et à les informer clairement de leur liberté de mouvement

R. v. O'Brien, 2023 ONCA 197 Lien vers la décision [ 37 ]        I accept the trial judge’s conclusion that the s. 9 breach was of minim...