Rechercher sur ce blogue

Aucun message portant le libellé Informatique et droit criminel. Afficher tous les messages
Aucun message portant le libellé Informatique et droit criminel. Afficher tous les messages

jeudi 12 février 2026

Principes régissant les mandats de perquisition et commentaires sur les fouilles d'ordinateurs

R. v Townsend, 2017 ONSC 3435



Warrants

[53]           Prior to examining computer searches, a brief discussion of warrants is of benefit.  The face of the warrant is the document that empowers police to search a particular location for particular evidence:  Re Times Square Book Store and the Queen1985 CanLII 170 (ON CA), 21 C.C.C. (3d) 503; R. v. Parent1989 CanLII 217 (YK CA), 47 C.C.C. (3d) 385; R. v. Ricciardi2017 ONSC 2788R. v. Merritt2017 ONSC 80.  The section of the warrant document known as the “Information to Obtain” provides an issuing justice the grounds to either grant or deny the police the right to search the location described on the face of the warrant for certain evidence.  However, the ITO is not part of the warrant that a searching officer is expected to examine.  Instead, the searching officer is only required to familiarize themselves with the face of the warrant in order to understand the parameters of the search.[4]  As a result of this interplay between the face of the warrant and the ITO, the face of the warrant is expected to satisfy what is known as the “fellow officer” test – that is, would a fellow officer be able to understand the items sought and the location to be searched as a result of reviewing the face of the warrant: R. v. Raferty2012 ONSC 703 at para 103.

[54]           In RicciardiDi Luca J. reviewed the guiding principles dealing with search warrants, searches pursuant thereto, and judicial review thereof. At paragraphs 12 to 17, Di Luca J. reviewed the law regarding the issuing of search warrants. At paragraphs 18 to 20, he then reviewed the law as it applies to the role of the reviewing judge:

                                    On a review, the role of reviewing judge is not substitute his or her view for that of the issuing justice. Rather, the role is to assess whether, on the basis of the material before the issuing justice as amplified and excised on review, the authorizing or issuing justice could have issued the warrant; see R. v. Sadikov, supra, at paras. 83-89, R. v. Ebanks, 2009 ONCA 851R. v. Lao, 2013 ONCS 285 and R. v. Morelli, supra, at para. 40-41. As Watt J.A. explains in R. v. Mahmood, 2011 ONCA 693 at para 99:

      A reviewing judge does not substitute his or her view for that of the justice who issues the warrant. Rather, the reviewing judge considers the record before the issuing justice, but amplified by evidence adduced on the hearing to correct minor technical errors in drafting the ITO, to determine whether there remains sufficient credible and reliable evidence to permit the justice to issue the warrant.

                        The review is conducted based on the whole of the ITO using a common sense approach to all the circumstances. The review is not an exercise in picking apart the drafting of the ITO looking for minor imperfections, misstatements or omissions. While the police are required to draft an ITO as precisely and clearly as possible, they are not expected to spell things out as clearly as counsel. They are also not required to include every detail, no matter how minute, of the police investigation. The question is ultimately whether the core substance of the ITO could support issuance of the warrant; see R. v. Morelli at para 167, R.v. Lubell and the Queen (1973), 1983 CanLII 3587 (ON SC)6 C.C.C. (3d) 296 (Ont. H.C.) at p. 190, Re Chapman and the Queen (1983), 6 C.C.C. (3d) 296 (Ont. H.C.) at p. 297, R. v. Ngyuen, supra, at para. 58, R v. Araujo (2000. 2000 SCC 65 (CanLII)149 C.C.C. (3d) 449 (S.C.C.) and R.v. Persaud, 2016 ONSC 6815 at para. 64.

                        The excision exercise requires that any unlawfully obtained evidence be removed from consideration in assessing the sufficiency of grounds in an ITO, see R. v. Grant (1993), 1993 CanLII 68 (SCC)84 C.C.C. (3d) 173 (S.C.C.)R. v. Plant (1993), 1993 CanLII 70 (SCC)84 C.C.C. (3d) 203 (SCC) and R. v. Wiley 91993), 1993 CanLII 69 (SCC)84 C.C.C. (3d) 161 (SCC). While the continued validity of the automatic exclusion approach has been criticized, it remains the law; see R. v. Jasser, 2014 ONSC 6052 at paras. 26-34.

Computer Searches and Warrants

[55]           Special interests are at play when the Courts examine the searches of computers.  Computers carry immense vaults of personal and biographical information.  The search of this information is, by definition, highly invasive.  As Fish J. stated in R. v. Morelli2010 SCC 8[2010] 1 S.C.R. 253, at para 105:

As I mentioned at the outset, it is difficult to imagine a more intrusive invasion of privacy than the search of one's home and personal computer. Computers often contain our most intimate correspondence. They contain the details of our financial, medical, and personal situations. They even reveal our specific interests, likes, and propensities, recording in the browsing history and cache files the information we seek out and read, watch, or listen to on the Internet.

[56]           Typically, the right to search a location also provides the police with the right to search the receptacles within that location.  Unsurprisingly, given the heightened importance associated with the search of computers, the Supreme Court of Canada in Vu held that computers are different than other receptacles.  The Court stated at paras 40 to 45:

It is difficult to imagine a more intrusive invasion of privacy than the search of a personal or home computer: Morelli, at para. 105; R. v. Cole2012 SCC 53[2012] 3 S.C.R. 34, at para. 3. Computers are "a multi-faceted instrumentality without precedent in our society": A. D. Gold, "Applying Section 8 in the Digital World: Seizures and Searches", prepared for the 7th Annual Six-Minute Criminal Defence Lawyer (June 9, 2007), at para. 3 (emphasis added). Consider some of the distinctions between computers and other receptacles.

First, computers store immense amounts of information, some of which, in the case of personal computers, will touch the "biographical core of personal information" referred to by this Court in R. v. Plant1993 CanLII 70 (SCC)[1993] 3 S.C.R. 281, at p. 293. The scale and variety of this material makes comparison with traditional storage receptacles unrealistic. We are told that, as of April 2009, the highest capacity commercial hard drives were capable of storing two terabytes of data. A single terabyte can hold roughly 1,000,000 books of 500 pages each, 1,000 hours of video, or 250,000 four-minute songs. Even an 80-gigabyte desktop drive can store the equivalent of 40 million pages of text: L. R. Robinton, "Courting Chaos: Conflicting Guidance from Courts Highlights the Need for Clearer Rules to Govern the Search and Seizure of Digital Evidence" (2010), 12 Yale J.L. & Tech. 311 at pp. 321-22. In light of this massive storage capacity, the Ontario Court of Appeal was surely right to find that there is a significant distinction between the search of a computer and the search of a briefcase found in the same location. As the court put it, a computer "can be a repository for an almost unlimited universe of information": R. v. Mohamad (2004), 2004 CanLII 9378 (ON CA)69 O.R. (3d) 481, at para. 43.

Second, as the appellant and the intervener the Criminal Lawyers' Association (Ontario) point out, computers contain information that is automatically generated, often unbeknownst to the user. A computer is, as A.D. Gold put it, a "fastidious record keeper" (para. 6). Word-processing programs will often automatically generate temporary files that permit analysts to reconstruct the development of a file and access information about who created and worked on it. Similarly, most browsers used to surf the Internet are programmed to automatically retain information about the websites the user has visited in recent weeks and the search terms that were employed to access those websites. Ordinarily, this information can help a user retrace his or her cybernetic steps. In the context of a criminal investigation, however, it can also enable investigators to access intimate details about a user's interests, habits, and identity, drawing on a record that the user created unwittingly: O. S. Kerr, "Searches and Seizures in a Digital World" (2005), 119 Harv. L. Rev. 531, at pp. 542-43. This kind of information has no analogue in the physical world in which other types of receptacles are found.

Third, and related to this second point, a computer retains files and data even after users think that they have destroyed them.

                        

Computers thus compromise the ability of users to control the information that is available about them in two ways: they create information without the users' knowledge and they retain information that users have tried to erase. These features make computers fundamentally different from the receptacles that search and seizure law has had to respond to in the past.

Fourth, limiting the location of a search to "a building, receptacle or place" (s. 487(1) of the Code) is not a meaningful limitation with respect to computer searches. As I have discussed earlier, search warrants authorize the search for and seizure of things in a "building, receptacle or place" and "permit the search of receptacles such as a filing cabinets, within that place…. The physical presence of the receptacle upon the premises permits the search": Fontana and Keeshan, at p. 1181 (italics in original; underling added). Ordinarily, then, police will not have access to items that are not physically present in the building, receptacle or place for which a search has been authorized. While documents accessible in a filing cabinet are always at the same location as the filing cabinet, the same is not true of information that can be accessed through a computer. The intervener the Canadian Civil Liberties Association notes that, when connected to the Internet, computers serve as portals to an almost infinite amount of information that is shared between different users and is stored almost anywhere in the world. Similarly, a computer that is connected to a network will allow police to access information on other devices. Thus, a search of a computer connected to the Internet or a network gives access to information and documents that are not in any meaningful sense at the location for which the search is authorized.

These numerous and striking differences between computers and traditional "receptacles" call for distinctive treatment under s. 8 of the Charter. The animating assumption of the traditional rule -- that if the search of a place is justified, so is the search of receptacles found within it -- simply cannot apply with respect to computer searches.

[57]           The Supreme Court of Canada then considered whether or not a properly authorized warrant to search required search parameters. In holding that search parameters were not constitutionally required, the Court stated at paras 53 and 54 of Vu:

The intervener the British Columbia Civil Liberties Association (“B.C.C.L.A.”) submits that, in addition to a requirement that searches of computers be specifically authorized by a warrant, this Court should also find that these warrants must, as a rule, set out detailed conditions, sometimes called "ex ante conditions" or "search protocols", under which the search may be carried out. According to the B.C.C.L.A., search protocols are necessary because they allow authorizing justices to limit the way in which police carry out their searches, protecting certain areas of a computer from the eyes of the investigators. The Crown and intervening Attorneys General oppose this sort of requirement, arguing that it is contrary to principle and impractical. While I am not convinced that these sorts of special directions should be rejected as a matter of principle, my view is that they are not, as a general rule, constitutionally required and that they would not have been required in this case.

While I propose, in effect, to treat computers in some respects as if they were a separate place of search necessitating distinct prior authorization, I am not convinced that s. 8 of the Charter requires, in addition, that the manner of searching a computer must always be spelled out in advance. That would be a considerable extension of the prior authorization requirement and one that in my view will not, in every case, be necessary to properly strike the balance between privacy and effective law enforcement….

[58]           However, the Court did indicate at paras 61 and 62 that parameters may be preferable in certain situations:

By now it should be clear that my finding that a search protocol was not constitutionally required in this case does not mean that once police had the warrant in hand, they had a licence to scour the devices indiscriminately. They were bound, in their search, to adhere to the rule that the manner of the search must be reasonable. Thus, if, in the course of their search, the officers realized that there was in fact no reason to search a particular program or file on the device, the law of search and seizure would require them not to do so.

Although I do not find that a search protocol was required on the particular facts of this case, authorizing justices must assure themselves that the warrants they issue fulfil the objectives of prior authorization as established in Hunter. They also have the discretion to impose conditions to ensure that they do. If, for example, an authorizing justice were faced with confidential intellectual property or potentially privileged information, he or she might find it necessary and practical to impose limits on the manner in which a computer could be searched. In some cases, authorizing justices may find it practical to impose conditions when police first request authorization to search. In others, they might prefer a two-stage approach where they would first issue a warrant authorizing the seizure of a computer and then have police return for an additional authorization to search the seized device. This second authorization might include directions concerning the manner of search. Moreover, I would not foreclose the possibility that our developing understanding of computer searches and changes in technology may make it appropriate to impose search protocols in a broader range of cases in the future. Without expressing any firm opinion on these points, it is conceivable that proceeding in this way may be appropriate in some circumstances.

[59]           The Ontario Court of Appeal had considered the “license to scour” a computer described in Vu, in R. v. Jones, 2011 ONCA 632, 107 O.R. (3d) 241.  In Jones, the police seized a computer and searched pursuant to a broadly worded warrant.  In searching the computer, the police analyst discovered child pornography.  The police relied upon the initial warrant to conduct a further search.  The Crown argued on appeal that a computer was an indivisible item and that once police had authority to search the computer, the police could search the entire computer. 

[60]           Blair J.A., writing for the Court, rejected this argument and stated at paragraph 50: 

The police have available to them the necessary software, technology and expertise to enable them to tailor their searches in a fashion that will generate the information they seek, if it exists, while at the same time minimizing the intrusion on the computer user's privacy rights in other information stored on the computer. Sergeant Rumnyak testified that the EnCase software used in this case permits the police to view all data and all files contained on the computer but that the police do not normally look at all files in the course of an investigation; they focus on those they think will generate the evidence they are looking for. That is as it should be.

lundi 13 octobre 2025

La fourchette des peines en matière d'activités de piratage informatique perpétrées dans un but de lucre

R. c. Desgagnés, 2025 QCCQ 549

Lien vers la décision


[1]         À l’issue d’un procès, le délinquant est déclaré coupable de diverses infractions reliées à l’utilisation frauduleuse d’un ordinateur. Essentiellement, il s’est introduit de façon illicite dans les comptes courriel, Facebook et iCloud des vingt victimes et y a téléchargé du contenu privé.  

[109]     En effet, dans la majorité de ces affaires, les activités de piratage informatique sont perpétrées dans un but de lucre, s’accompagnent d’infractions de fraude ou d’extorsion et ont occasionné des pertes économiques importantes[54]. Les peines infligées varient entre huit mois et sept ans d’emprisonnement. Dans deux de celles-ci, les délinquants sont condamnés à des peines de 12 mois d’emprisonnement à purger dans la collectivité[55].

samedi 16 août 2025

Comment apprécier la fouille accessoire à l'arrestation d'une clé USB?

R. v. Balendra, 2019 ONCA 68

Lien vers la décision


[35]      I agree with the appellant that it is clear, since the decision of this Court in R. v. Tuduce2014 ONCA 547, 314 C.C.C. (3d) 429, that he had a reasonable expectation of privacy in the contents of the USB key found in his pocket.

[37]      In Tuduce, at paras. 71-75, Gillese J.A. considered the privacy interests implicated in USB keys found in a person’s possession:

First, a USB key can store a significant amount of data. USB keys commonly hold anywhere from one to ten gigabytes of data, and USB keys with a storage capacity of over one terabyte exist. It seems likely that their storage capacities will only increase over time.

Second, data can be left on a USB key without a user’s knowledge. This data includes information about the date and time a file was created or modified and information about the user who created or modified that file.

Third, a user does not have complete control over which files an investigator will be able to find on a USB key. Data can be salvaged from a USB key through forensic analysis even after a user has deleted or “saved over” it.

It is true that a USB key is not a home computer or a cell phone. Thus, it may not always contain personal information, like a list of contacts, the contents of past communications, and information about an individual’s web searching habits.

On the other hand, however, a person’s personal USB key arguably engages more serious privacy interests than a work computer. The two key reasons why individuals have a somewhat diminished reasonable expectation of privacy in a work computer are that a work computer is not actually owned by the employee who uses it, and the employee’s use of the work computer is often subject to terms and conditions imposed by the employer: R. v. Cole2012 SCC 53 (CanLII), [2012] 3 S.C.R. 34, at paras. 49-52 and 92. Neither of these considerations apply to personal digital storage devices like USB key.

[38]      Here, the USB key was found in the appellant’s pocket. That fact, combined with the potential personal contents of such a device, is sufficient to establish that the appellant had a reasonable expectation of privacy in the USB key: R. v. Mann2004 SCC 52, [2004] 3 S.C.R. 59, at para. 56. It is not necessary for the purposes of this appeal to define the level or intensity of that interest relative to other such devices with any further precision.

(2)         Was the search of the USB key reasonable?

[39]      Having found that the appellant did have a reasonable expectation of privacy in the contents of the USB key, I turn now to the question of whether Sgt. Humber’s search of the key on the evening of the appellant’s arrest was reasonable as a search incident to arrest.

[40]      The Supreme Court of Canada reviewed the law applicable to the scope of searches incident to arrest in the context of cell phones in R. v. Fearon, 2014 SCC 77, [2014] 3 S.C.R. 621. Cromwell J., writing for the majority, wrote of the need to recognize, on the one hand, the high potential invasion of privacy inherent in the search of a cell phone, and, on the other, the importance that cell phones may play with respect to law enforcement objectives. At para. 83, Cromwell J. set out four conditions with which a search of a cell phone incident to arrest should comply in order to be lawful:

1.            The arrest itself must be lawful;

2.            The search must be “truly” incidental to arrest, and have a valid law enforcement purpose in (a) protecting the police, the accused or the public; (b) preserving evidence; or (c) discovering evidence, including locating additional suspects, in situations in which the investigation will be stymied or significantly hampered absent the ability to promptly search the cell phone incident to arrest;

3.            The nature and extent of the search must be tailored to the purpose of the search; and

4.            The police must take detailed notes of what they have examined on the device and how it was searched.

[41]      The three valid law enforcement purposes identified by Cromwell J. are drawn from the Supreme Court’s previous decisions in Cloutier v. Langlois1990 CanLII 122 (SCC), [1990] 1 S.C.R. 158, and R. v. Caslake1998 CanLII 838 (SCC), [1998] 1 S.C.R. 51. In Caslake, the Court clarified, with respect to the “discovering evidence” purpose, that “if the justification for the search is to find evidence, there must be some reasonable prospect of securing evidence of the offence for which the accused is being arrested”: at para. 22 (emphasis in original).

[42]      This restrictive approach to the “discovering evidence” purpose was affirmed by Cromwell J. in Fearon, though he added three additional restrictions in the context of cell phone searches. First, where the purpose of the search is to discover evidence, it will only be lawful if the investigation will be stymied or significantly hampered absent the ability to promptly search the cell phone incident to arrest. The rationale for this restriction is that it strikes the proper balance between law enforcement objectives and privacy interests, in light of the nature and vast range of personal information that a cell phone might hold. Second, where a search is conducted for any valid purpose, both the nature and extent of the search must be tailored to that purpose. Finally, officers must take detailed notes of what they have examined on a cell phone, in order to help them focus their search and to permit effective after-the-fact judicial review. See R. v. Tsekouras2017 ONCA 290, 353 C.C.C. (3d) 349, at paras. 89-94.

[44]       With respect, I agree with the appellant that the trial judge erred on this point. It is clear from Caslake and Fearon that the requirement that the search be “truly incidental” to the charge for which an accused has been arrested is to be strictly interpreted. At para. 76 of Fearon, Cromwell J., having stated that the requirement that the search of a cell phone be truly incidental to arrest should be “strictly applied”, continued:

…it is not enough that a cell phone search in general terms is truly incidental to the arrest. Both the nature and the extent of the search performed on the cell phone must be truly incidental to the particular arrest for the particular offence. [Emphasis added.]

[46]      The test for determining whether a search is incidental to arrest has both a subjective and an objective component. While Sgt. Humber subjectively believed his look at the USB key was incident to the appellant’s arrest, this belief was not objectively reasonable because the officer was not looking for information relating to the stolen van charge but rather to the investigation that was superseding it with respect to which no charges had yet been laid. Put another way, he was not (subjectively) aware that the initial arrest did not (objectively) authorize him to look at the USB key in order to find evidence of impersonation or fraud.

[47]      This is very similar to the facts in Caslake. In that case, the officer would objectively have had a lawful basis for a search incident to arrest that led to the discovery of a nine-pound bag of marijuana in the appellant’s car. However, subjectively, the officer had not been searching for evidence incident to the arrest, but rather was doing so in compliance with an RCMP policy requiring that the contents of an impounded car be inventoried. As a result, the Supreme Court found that the search did not fall within the bounds of a search incident to arrest, although it admitted the evidence pursuant to s. 24(2) of the Charter.

[49]      In short, I find that the first search of the USB key was not objectively reasonable because it was not conducted to find evidence of the particular offences for which the appellant had been arrested. Had it been related to those offences, the search would still not be justified because the investigation would not have been stymied or significantly hampered absent the search incident to arrest. 

[50]      The fact that the search was not objectively incidental to arrest is sufficient to address its reasonableness on those grounds. However, I disagree with the appellant’s argument that the search could not have been valid because it was conducted a number of hours after his arrest. While there are temporal limits to a search incident to arrest, there is no “firm deadline” that defines this limit. Rather, as Lamer C.J. stated in Caslake, at para. 24:

As a general rule, searches that are truly incidental to arrest will usually occur within a reasonable period of time after that arrest. A substantial delay does not mean that the search is automatically unlawful, but it may cause the court to draw an inference that the search is not sufficiently connected to the arrest.

[51]      Here, Sgt. Humber inserted the USB key into a computer later during the same day, and during the same shift. This was within a reasonable period of time after the arrest. There was no problem with the temporal nexus to the arrest in itself in the circumstances of this case.

[52]      I would also not attach great weight in the circumstances of this case to Sgt. Humber’s failure to take detailed notes when he first looked at the contents of the USB key on March 13. He spent about 10-30 minutes looking at it and determined that it contained a long list of credit card numbers, a driver’s licence template, and the image of a driver’s license with a photograph of an unidentified person. In these circumstances, the need for detailed notes does not appear to be as strong as was the case of the cell phone at issue in Fearon. Cell phones frequently have many apps and icons, and one may see a great deal of categories of information whose contents range across a wide number of subjects. In this case, the USB key contents were narrower in range and it is clear that while Sgt. Humber did not take notes, he remembered the nature of what he saw.

Il n'y a aucune distinction entre une clé USB et d’autres dispositifs informatiques qui stockent des données dans l'appréciation de l'expectative de vie privée

Croisetière c. R., 2022 QCCA 980

Lien vers la décision


[78]      À mon avis, et avec égards, il est déraisonnable de conclure que la bonne foi de la policière pouvait, dans les circonstances, écarter la règle énoncée dans l’arrêt R. c. Fearon2014 CSC 77 (CanLII), [2014] 3 R.C.S. 621, rendue plus de 30 mois auparavant. La juge a eu tort de faire reposer la conduite de la policière sur la bonne foi. En l’espèce, l’erreur est déraisonnable et révèle une méconnaissance de l’étendue de ses pouvoirs et du droit : R. c. Grant2009 CSC 32 (CanLII), [2009] 2 R.C.S. 353, par. 75, 133 ; R. c. Tim2022 CSC 12, par. 85.

[79]      Il est aussi douteux que la policière aurait découvert les photographies. La juge ne s’en explique pas et la preuve démontre plutôt que la possession de pédopornographie n’était pas une préoccupation des policiers avant la découverte d’images sur la clé. L’intérêt pour les ordinateurs et autres supports numériques n’avait jamais effleuré l’esprit de la policière qui n’avait jamais demandé à saisir autre chose que le téléphone cellulaire en lien avec les photographies concernant le plaignant. Dans un second temps, le mandat pour les obtenir était tout aussi vicié par la fouille illégale de la clé USB et ne pouvait autrement, dans les circonstances, se justifier. Les faits ne permettent pas d’établir avec certitude que les éléments de preuve auraient été découverts sans violation de la Charte : R. c. Grant2009 CSC 32 (CanLII), [2009] 2 R.C.S. 353, par. 122 ; R. c. Tim2022 CSC 12, par. 94.

[80]      L’arrêt Fearon précise qu’une fouille sans mandat d’une clé USB est possible si elle est strictement accessoire à l’arrestation et que les policiers conservent des notes détaillées de la fouille et des raisons pour le faire : R. c. Fearon2014 CSC 77 (CanLII), [2014] 3 R.C.S. 621, par. 4, 82. Toutefois, l’État doit expliquer pourquoi la fouille ne pouvait pas être effectuée après l’obtention d’un mandat : R. c. Fearon, [2014] 3 R.C.S. 621, par. 80. La Cour suprême rappelle que, sauf lorsque l’enquête en serait paralysée ou sérieusement entravée, un mandat est nécessaire. Autrement, l’atteinte importante à la vie privée l’emporte sur l’objectif de la découverte d’éléments de preuve : R. c. Fearon, [2014] 3 R.C.S. 621, par. 80.  L’absence d’urgence sera, en principe, fatale : R. c. Fearon, [2014] 3 R.C.S. 621, par. 81.

[81]      Comme la Cour d’appel de l’Ontario, je ne crois pas utile de faire des distinctions entre une clé USB et d’autres dispositifs informatiques qui stockent des données : R. v. Tuduce2014 ONCA 547R. v. Balendra2019 ONCA 68.

[82]      Je suis d’avis que la violation elle-même était grave tout comme son incidence sur les droits de l’appelant. Ce dernier a raison de souligner les préoccupations particulières en matière de respect de la vie privée que soulèvent la saisie et la fouille des appareils qui stockent des données : R. c. Vu2013 CSC 60 (CanLII), [2013] 3 R.C.S. 657; R. c. Fearon2014 CSC 77 (CanLII), [2014] 3 R.C.S. 621; R. c. Morelli2010 CSC 8 (CanLII), [2010] 1 R.C.S. 253. 

[83]      Rien dans la preuve n’indique qu’avant la fouille illégale, les policiers avaient l’intention de fouiller la clé et les ordinateurs de l’appelant. Négliger d’obtenir un mandat pour fouiller une clé USB dans ses circonstances est de nature à miner à long terme l’intégrité du système de justice et de la confiance du public à son égard. La preuve des photographies devait être exclue : R. c. Reilly2021 CSC 38R. c. Stairs2022 CSC 11, par. 158R. c. Tim2022 CSC 12, par. 75 et 98; R. c. Le2019 CSC 34 (CanLII), [2019] 2 R.C.S. 692, par. 141-142 ; R. c. McGuffie2016 ONCA 365, par. 62-63 ; R. c. Stevens2016 QCCA 1707, par. 89 ; R. c. Cormier2021 QCCA 620, par. 24.



Le dédommagement à la victime doit toujours être envisagé lors de la détermination de la peine

Comment apprécier l'horodatage d'une preuve vidéo

R. v. Hernandez-Viera, 2025 ONCA 626 Lien vers la décision [ 5 ]           In his first ground of appeal Mr. Hernandez-Viera argues that the...