SlideShare a Scribd company logo
1 of 21
Download to read offline
Social Media – Issues and Trends 
CAUS 2014 Academic Program 
September 19, 2014 
Dan Michaluk
Outline 
• Student expression, policy and law 
• Gathering social media evidence 
• And I'll leave you with 
• Other issues and trends 
• Case law citations 
CAUS 2014
Student expression, policy and law 
• In a survey of the non-academic codes of 10 
universities, only two included language that 
referred expressly to the internet or electronic 
communications 
• The problem is governed pursuant to general 
rules about student conduct that are rooted in a 
university's legitimate interests 
CAUS 2014
Student expression, policy and law 
• Are all interests the same? 
CAUS 2014
Student expression, policy and law 
• Are all interests the same? 
A. Interest in complying with legal duties such as those imposed anti-discrimination 
CAUS 2014 
legislation, health and safety legislation and the 
common law of negligence 
B. Interest in otherwise enabling members of the college community 
to use and enjoy the learning and working environment or facilities 
C. Interest in raising funds, recruiting and retaining employees, 
students and co-operative education employers and the general 
interest in establishing and maintaining a strong reputation
Student expression, policy and law 
• Are all interest the same? 
CAUS 2014 
-Connection to university interest will flow 
from an impact on a student's studies or safe 
enjoyment of facilities 
-B and W case from York University 
illustrates 
-It's difficult not to take responsibility
Student expression, policy and law 
• Are all interest the same? 
CAUS 2014 
-This may be evidence of alcohol-related 
misconduct or actionable incivility 
-But what context would make it appropriate 
to take action in response to the publication 
of this image itself? 
-What if this was a student athlete?
Student expression, policy and law 
• Survey shows most reserve rights but exercise 
them carefully 
• 6/10 codes reserved jurisdiction extending to the 
institution's interest in its reputation 
• 2/10 codes referred expressly to reputation 
• 9/10 had student athlete codes 
AND 
• 5/10 had a "personal affairs" limitation 
CAUS 2014
Student expression, policy and law 
• How is the jurisdiction reserved? 
• "Proper functioning of activities of the university" 
• "Real and substantial connection to legitimate 
interests" 
• "[Non-jeopardization of] the university's mission" 
• "Interests are affected" 
CAUS 2014
Student expression, policy and law 
• What have the courts said? 
• Your interest in protecting reputation ranks low in the 
eyes of a judge (or, at least, ranks low against the 
value in expression) 
• It is not reasonable to find expression that is 
justifiable in the context as misconduct 
• Decision-making bodies need to consider words 
spoken and justification and record reasons 
CAUS 2014
Student expression, policy and law 
• Zhang v University of Western Ontario 
CAUS 2014
Student expression, policy and law 
• Pridgen v University of Calgary 
• Application judge and CA find that "injury" encompasses more than physical 
harm – i.e. there is jurisdiction over harm to a natural person's reputation 
• But this can be seen showing how judges struggle with reputation 
• They want to see (on the record) that the decision maker considered (1) the 
meaning of each word and (2) its legitimacy in light of expression rights 
CAUS 2014
Student expression, policy and law 
• Telfer v University of Western Ontario 
CAUS 2014
Gathering social media evidence 
• Who? 
• One person 
• One person likely to be a good witness 
• When? 
• Immediately (it disappears) 
• Pre-confrontation (it disappears) 
• Periodically (duration of publication is relevant) 
CAUS 2014
Gathering social media evidence 
• How? 
• A printout of a screen capture is a poor 
representation of the evidence… 
• … but is usually okay for expression cases 
• Printing doesn’t tell you what is linked to what, so 
take notes 
• Take notes on steps, functionality of tool 
• Sign it and date it 
CAUS 2014
Gathering social media evidence 
• What? 
CAUS 2014
Gathering social media evidence 
CAUS 2014
Gathering social media evidence 
• What? 
• How many people read it? 
• Who read it? 
• How did readers react? 
• And don’t forget… 
• Circumstantial evidence that supports identification 
• What else? 
• Preserve complaints (e-mail, voicemail…) 
CAUS 2014
Other social media issues to watch 
• Governance of university social media use and 
• Proliferation of university accounts 
• CASL risks associated with "direct messages" 
• Legal and ethical constraints on collecting 
evidence from social media 
• Internet monitoring and the standard of care 
• Duties to maligned (but otherwise safe) 
employees 
CAUS 2014
Case law citations 
• B and W (1985), 52 OR (2d) 738 (HC) 
• Canada (Attorney General) v Tipple, 
2011 FC 762 
• Doré v Barreau du Québec, 2012 SCC 12 
• Lee v Ontario (Ministry of Community 
Safety and Correctional Services), [2013] 
OPSGB No 1 (GSB) 
• Lewis v Rancourt, 2013 ONSC 1564 
(CanLII), aff'd 2013 ONCA 701, leave to 
appeal to SCC denied (35676) 
• Pacheco v Dalhousie University, 2005 
NSSC 222 
CAUS 2014 
• Pridgen v University of Calgary, 2010 
ABQB 644 
• Pridgen v University of Calgary, 2012 
ABCA 139 
• Canada (Attorney General) v. Tipple, 
2011 FC 762 
• Tipple v Canada (Attorney General), 
2012 FCA 158 
• Telfer v The University of Western 
Ontario, 2012 ONSC 1287 
• Zhang v The University of Western 
Ontario, 2010 ONSC 6489
Social Media – Issues and Trends 
CAUS 2014 Academic Program 
September 19, 2014 
Dan Michaluk

More Related Content

What's hot

Canadian Association of University Solicitors - Privacy Update 2016
Canadian Association of University Solicitors - Privacy Update 2016Canadian Association of University Solicitors - Privacy Update 2016
Canadian Association of University Solicitors - Privacy Update 2016Dan Michaluk
 
Anatomy Of A Breach: The Good, The Bad & The Ugly
Anatomy Of A Breach: The Good, The Bad & The UglyAnatomy Of A Breach: The Good, The Bad & The Ugly
Anatomy Of A Breach: The Good, The Bad & The UglyResilient Systems
 
Aprio cybersecurity and board information
Aprio cybersecurity and board informationAprio cybersecurity and board information
Aprio cybersecurity and board informationAprio
 
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2TechSoup Canada
 
The Current State of FOI
The Current State of FOIThe Current State of FOI
The Current State of FOIDan Michaluk
 
How your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyHow your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyTechSoup Canada
 
Real World Cybersecurity Tips You Can Use to Protect Your Clients, Your Firm,...
Real World Cybersecurity Tips You Can Use to Protect Your Clients, Your Firm,...Real World Cybersecurity Tips You Can Use to Protect Your Clients, Your Firm,...
Real World Cybersecurity Tips You Can Use to Protect Your Clients, Your Firm,...Shawn Tuma
 
Cyber security series vulnerability assessments
Cyber security series   vulnerability assessmentsCyber security series   vulnerability assessments
Cyber security series vulnerability assessmentsJim Kaplan CIA CFE
 
HHS Ransomware and Breach Guidance - Brad Nigh
HHS Ransomware and Breach Guidance - Brad NighHHS Ransomware and Breach Guidance - Brad Nigh
HHS Ransomware and Breach Guidance - Brad NighFRSecure
 
Gdpr demystified - making sense of the regulation
Gdpr demystified  - making sense of the regulationGdpr demystified  - making sense of the regulation
Gdpr demystified - making sense of the regulationJames Mulhern
 
Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...
Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...
Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...Winston & Strawn LLP
 
What is Information Security and why you should care ...
What is Information Security and why you should care ...What is Information Security and why you should care ...
What is Information Security and why you should care ...James Mulhern
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach CostResilient Systems
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11pdewitte
 
Union access to information
Union access to informationUnion access to information
Union access to informationDan Michaluk
 
[Bucharest] Catching up with today's malicious actors
[Bucharest] Catching up with today's malicious actors[Bucharest] Catching up with today's malicious actors
[Bucharest] Catching up with today's malicious actorsOWASP EEE
 
2021 CNCERT International Partnership Conference: Increasing cybersecurity pr...
2021 CNCERT International Partnership Conference: Increasing cybersecurity pr...2021 CNCERT International Partnership Conference: Increasing cybersecurity pr...
2021 CNCERT International Partnership Conference: Increasing cybersecurity pr...APNIC
 
Something is Phishy: Cyber Scams and How to Avoid Them
Something is Phishy: Cyber Scams and How to Avoid ThemSomething is Phishy: Cyber Scams and How to Avoid Them
Something is Phishy: Cyber Scams and How to Avoid ThemShawn Tuma
 
The Future of Employment Law
The Future of Employment LawThe Future of Employment Law
The Future of Employment LawDan Michaluk
 

What's hot (20)

Canadian Association of University Solicitors - Privacy Update 2016
Canadian Association of University Solicitors - Privacy Update 2016Canadian Association of University Solicitors - Privacy Update 2016
Canadian Association of University Solicitors - Privacy Update 2016
 
Anatomy Of A Breach: The Good, The Bad & The Ugly
Anatomy Of A Breach: The Good, The Bad & The UglyAnatomy Of A Breach: The Good, The Bad & The Ugly
Anatomy Of A Breach: The Good, The Bad & The Ugly
 
Cas cyber prez
Cas cyber prezCas cyber prez
Cas cyber prez
 
Aprio cybersecurity and board information
Aprio cybersecurity and board informationAprio cybersecurity and board information
Aprio cybersecurity and board information
 
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
 
The Current State of FOI
The Current State of FOIThe Current State of FOI
The Current State of FOI
 
How your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyHow your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacy
 
Real World Cybersecurity Tips You Can Use to Protect Your Clients, Your Firm,...
Real World Cybersecurity Tips You Can Use to Protect Your Clients, Your Firm,...Real World Cybersecurity Tips You Can Use to Protect Your Clients, Your Firm,...
Real World Cybersecurity Tips You Can Use to Protect Your Clients, Your Firm,...
 
Cyber security series vulnerability assessments
Cyber security series   vulnerability assessmentsCyber security series   vulnerability assessments
Cyber security series vulnerability assessments
 
HHS Ransomware and Breach Guidance - Brad Nigh
HHS Ransomware and Breach Guidance - Brad NighHHS Ransomware and Breach Guidance - Brad Nigh
HHS Ransomware and Breach Guidance - Brad Nigh
 
Gdpr demystified - making sense of the regulation
Gdpr demystified  - making sense of the regulationGdpr demystified  - making sense of the regulation
Gdpr demystified - making sense of the regulation
 
Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...
Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...
Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...
 
What is Information Security and why you should care ...
What is Information Security and why you should care ...What is Information Security and why you should care ...
What is Information Security and why you should care ...
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach Cost
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
Union access to information
Union access to informationUnion access to information
Union access to information
 
[Bucharest] Catching up with today's malicious actors
[Bucharest] Catching up with today's malicious actors[Bucharest] Catching up with today's malicious actors
[Bucharest] Catching up with today's malicious actors
 
2021 CNCERT International Partnership Conference: Increasing cybersecurity pr...
2021 CNCERT International Partnership Conference: Increasing cybersecurity pr...2021 CNCERT International Partnership Conference: Increasing cybersecurity pr...
2021 CNCERT International Partnership Conference: Increasing cybersecurity pr...
 
Something is Phishy: Cyber Scams and How to Avoid Them
Something is Phishy: Cyber Scams and How to Avoid ThemSomething is Phishy: Cyber Scams and How to Avoid Them
Something is Phishy: Cyber Scams and How to Avoid Them
 
The Future of Employment Law
The Future of Employment LawThe Future of Employment Law
The Future of Employment Law
 

Viewers also liked

Fraud Analytics Techniques Moving Into Security
Fraud Analytics Techniques Moving Into SecurityFraud Analytics Techniques Moving Into Security
Fraud Analytics Techniques Moving Into SecurityBruno Motta Rego
 
Using Social Media for Security Monitoring
Using Social Media for Security MonitoringUsing Social Media for Security Monitoring
Using Social Media for Security MonitoringSysomos
 
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...Ron Steinkamp
 
Fraud Detection with Cost-Sensitive Predictive Analytics
Fraud Detection with Cost-Sensitive Predictive AnalyticsFraud Detection with Cost-Sensitive Predictive Analytics
Fraud Detection with Cost-Sensitive Predictive AnalyticsAlejandro Correa Bahnsen, PhD
 
Proofpoint: Fraud Detection and Security on Social Media
Proofpoint: Fraud Detection and Security on Social MediaProofpoint: Fraud Detection and Security on Social Media
Proofpoint: Fraud Detection and Security on Social MediaDataStax Academy
 
Online Fraud Detection Using Big Data Analytics Webinar
Online Fraud Detection Using Big Data Analytics WebinarOnline Fraud Detection Using Big Data Analytics Webinar
Online Fraud Detection Using Big Data Analytics WebinarDatameer
 
Real-Time Fraud Detection in Payment Transactions
Real-Time Fraud Detection in Payment TransactionsReal-Time Fraud Detection in Payment Transactions
Real-Time Fraud Detection in Payment TransactionsChristian Gügi
 
Fraud Detection presentation
Fraud Detection presentationFraud Detection presentation
Fraud Detection presentationHernan Huwyler
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detectionkalpesh1908
 
Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlDominic Sroda Korkoryi
 

Viewers also liked (12)

Fraud Analytics Techniques Moving Into Security
Fraud Analytics Techniques Moving Into SecurityFraud Analytics Techniques Moving Into Security
Fraud Analytics Techniques Moving Into Security
 
Using Social Media for Security Monitoring
Using Social Media for Security MonitoringUsing Social Media for Security Monitoring
Using Social Media for Security Monitoring
 
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
 
Fraud Detection with Cost-Sensitive Predictive Analytics
Fraud Detection with Cost-Sensitive Predictive AnalyticsFraud Detection with Cost-Sensitive Predictive Analytics
Fraud Detection with Cost-Sensitive Predictive Analytics
 
Proofpoint: Fraud Detection and Security on Social Media
Proofpoint: Fraud Detection and Security on Social MediaProofpoint: Fraud Detection and Security on Social Media
Proofpoint: Fraud Detection and Security on Social Media
 
Online Fraud Detection Using Big Data Analytics Webinar
Online Fraud Detection Using Big Data Analytics WebinarOnline Fraud Detection Using Big Data Analytics Webinar
Online Fraud Detection Using Big Data Analytics Webinar
 
Real-Time Fraud Detection in Payment Transactions
Real-Time Fraud Detection in Payment TransactionsReal-Time Fraud Detection in Payment Transactions
Real-Time Fraud Detection in Payment Transactions
 
Fraud Detection Architecture
Fraud Detection ArchitectureFraud Detection Architecture
Fraud Detection Architecture
 
Fraud Detection presentation
Fraud Detection presentationFraud Detection presentation
Fraud Detection presentation
 
Fraud detection
Fraud detectionFraud detection
Fraud detection
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detection
 
Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & control
 

Similar to Social media – issues and trends caus 2014

CACUSS 2013 - Case Law Review
CACUSS 2013 - Case Law ReviewCACUSS 2013 - Case Law Review
CACUSS 2013 - Case Law ReviewDan Michaluk
 
The Legal Year in Review: Digital Access Cases
The Legal Year in Review: Digital Access CasesThe Legal Year in Review: Digital Access Cases
The Legal Year in Review: Digital Access Cases3Play Media
 
Managing Global Research: Risk, Relationships & Evaluating Outcomes
Managing Global Research: Risk, Relationships & Evaluating OutcomesManaging Global Research: Risk, Relationships & Evaluating Outcomes
Managing Global Research: Risk, Relationships & Evaluating OutcomesSandy Justice
 
Student privacy and your ontario college
Student privacy and your ontario collegeStudent privacy and your ontario college
Student privacy and your ontario collegeDan Michaluk
 
Education law conference, March 2017 - Manchester - What to do when it all go...
Education law conference, March 2017 - Manchester - What to do when it all go...Education law conference, March 2017 - Manchester - What to do when it all go...
Education law conference, March 2017 - Manchester - What to do when it all go...Browne Jacobson LLP
 
Enriching Globalization With Low Cost Tech & Social Media: Serving More than ...
Enriching Globalization With Low Cost Tech & Social Media: Serving More than ...Enriching Globalization With Low Cost Tech & Social Media: Serving More than ...
Enriching Globalization With Low Cost Tech & Social Media: Serving More than ...Michele DeStefano
 
Education law conference, March 2017 - Nottingham - What to do when it all go...
Education law conference, March 2017 - Nottingham - What to do when it all go...Education law conference, March 2017 - Nottingham - What to do when it all go...
Education law conference, March 2017 - Nottingham - What to do when it all go...Browne Jacobson LLP
 
Parent year 12 to 13 transition
Parent year 12 to 13 transitionParent year 12 to 13 transition
Parent year 12 to 13 transitionguerita176
 
Leveraging Campus Policies to Create a Culture of Values and Accountability
Leveraging Campus Policies to Create a Culture of Values and AccountabilityLeveraging Campus Policies to Create a Culture of Values and Accountability
Leveraging Campus Policies to Create a Culture of Values and AccountabilityKyle Brown
 
CDAA QUT Widening Participation Careers Team May 2014
CDAA QUT Widening Participation Careers Team May 2014CDAA QUT Widening Participation Careers Team May 2014
CDAA QUT Widening Participation Careers Team May 2014Your Future Careers Team QUT
 
Parent year 12 to 13 transition
Parent year 12 to 13 transitionParent year 12 to 13 transition
Parent year 12 to 13 transitionguerita176
 
2016_SRA_Justice Caruson Presentation FINAL
2016_SRA_Justice Caruson Presentation FINAL2016_SRA_Justice Caruson Presentation FINAL
2016_SRA_Justice Caruson Presentation FINALSandy Justice
 
Public engagement with postgraduate research june 2013
Public engagement with postgraduate research june 2013Public engagement with postgraduate research june 2013
Public engagement with postgraduate research june 2013VreckaScott
 
Vermette - PP - Chapter 2 - Sociological thinking and research
Vermette - PP - Chapter 2 - Sociological thinking and researchVermette - PP - Chapter 2 - Sociological thinking and research
Vermette - PP - Chapter 2 - Sociological thinking and researchLinda Vermette
 

Similar to Social media – issues and trends caus 2014 (20)

CACUSS 2013 - Case Law Review
CACUSS 2013 - Case Law ReviewCACUSS 2013 - Case Law Review
CACUSS 2013 - Case Law Review
 
The Legal Year in Review: Digital Access Cases
The Legal Year in Review: Digital Access CasesThe Legal Year in Review: Digital Access Cases
The Legal Year in Review: Digital Access Cases
 
The ethics of (not) knowing our students
The ethics of (not) knowing our studentsThe ethics of (not) knowing our students
The ethics of (not) knowing our students
 
Just in Time: Clery Act Tips Before Fall 2019
Just in Time: Clery Act Tips Before Fall 2019Just in Time: Clery Act Tips Before Fall 2019
Just in Time: Clery Act Tips Before Fall 2019
 
Managing Global Research: Risk, Relationships & Evaluating Outcomes
Managing Global Research: Risk, Relationships & Evaluating OutcomesManaging Global Research: Risk, Relationships & Evaluating Outcomes
Managing Global Research: Risk, Relationships & Evaluating Outcomes
 
Student privacy and your ontario college
Student privacy and your ontario collegeStudent privacy and your ontario college
Student privacy and your ontario college
 
Education law conference, March 2017 - Manchester - What to do when it all go...
Education law conference, March 2017 - Manchester - What to do when it all go...Education law conference, March 2017 - Manchester - What to do when it all go...
Education law conference, March 2017 - Manchester - What to do when it all go...
 
Enriching Globalization With Low Cost Tech & Social Media: Serving More than ...
Enriching Globalization With Low Cost Tech & Social Media: Serving More than ...Enriching Globalization With Low Cost Tech & Social Media: Serving More than ...
Enriching Globalization With Low Cost Tech & Social Media: Serving More than ...
 
Education law conference, March 2017 - Nottingham - What to do when it all go...
Education law conference, March 2017 - Nottingham - What to do when it all go...Education law conference, March 2017 - Nottingham - What to do when it all go...
Education law conference, March 2017 - Nottingham - What to do when it all go...
 
Administration and communications
Administration and communicationsAdministration and communications
Administration and communications
 
Parent year 12 to 13 transition
Parent year 12 to 13 transitionParent year 12 to 13 transition
Parent year 12 to 13 transition
 
Leveraging Campus Policies to Create a Culture of Values and Accountability
Leveraging Campus Policies to Create a Culture of Values and AccountabilityLeveraging Campus Policies to Create a Culture of Values and Accountability
Leveraging Campus Policies to Create a Culture of Values and Accountability
 
CDAA QUT Widening Participation Careers Team May 2014
CDAA QUT Widening Participation Careers Team May 2014CDAA QUT Widening Participation Careers Team May 2014
CDAA QUT Widening Participation Careers Team May 2014
 
Boot Camp 2015
Boot Camp 2015Boot Camp 2015
Boot Camp 2015
 
Parent year 12 to 13 transition
Parent year 12 to 13 transitionParent year 12 to 13 transition
Parent year 12 to 13 transition
 
Developing a Good Practice Guide for Student Complaints - Rob Behrens
Developing a Good Practice Guide for Student Complaints - Rob BehrensDeveloping a Good Practice Guide for Student Complaints - Rob Behrens
Developing a Good Practice Guide for Student Complaints - Rob Behrens
 
2016_SRA_Justice Caruson Presentation FINAL
2016_SRA_Justice Caruson Presentation FINAL2016_SRA_Justice Caruson Presentation FINAL
2016_SRA_Justice Caruson Presentation FINAL
 
Public engagement with postgraduate research june 2013
Public engagement with postgraduate research june 2013Public engagement with postgraduate research june 2013
Public engagement with postgraduate research june 2013
 
Prob statement.ppt
Prob statement.pptProb statement.ppt
Prob statement.ppt
 
Vermette - PP - Chapter 2 - Sociological thinking and research
Vermette - PP - Chapter 2 - Sociological thinking and researchVermette - PP - Chapter 2 - Sociological thinking and research
Vermette - PP - Chapter 2 - Sociological thinking and research
 

More from Dan Michaluk

Ecno cyber - 23 June 2023 - djm(137852631.1).pptx
Ecno cyber - 23 June 2023 - djm(137852631.1).pptxEcno cyber - 23 June 2023 - djm(137852631.1).pptx
Ecno cyber - 23 June 2023 - djm(137852631.1).pptxDan Michaluk
 
Critical Issues in School Board Cyber Security
Critical Issues in School Board Cyber SecurityCritical Issues in School Board Cyber Security
Critical Issues in School Board Cyber SecurityDan Michaluk
 
Introduction to FOI law (the law of information)
Introduction to FOI law (the law of information)Introduction to FOI law (the law of information)
Introduction to FOI law (the law of information)Dan Michaluk
 
Higher Education Sexual Violence Presentation
Higher Education Sexual Violence PresentationHigher Education Sexual Violence Presentation
Higher Education Sexual Violence PresentationDan Michaluk
 
Cyber class action claims at an inflection point
Cyber class action claims at an inflection pointCyber class action claims at an inflection point
Cyber class action claims at an inflection pointDan Michaluk
 
The pandemic and privacy
The pandemic and privacyThe pandemic and privacy
The pandemic and privacyDan Michaluk
 
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...
Cyber security for the regulator and regulated  - Ontario Regulatory Authorit...Cyber security for the regulator and regulated  - Ontario Regulatory Authorit...
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...Dan Michaluk
 
Cybersecurity Risk Governance
Cybersecurity Risk GovernanceCybersecurity Risk Governance
Cybersecurity Risk GovernanceDan Michaluk
 
Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?Dan Michaluk
 
The privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsThe privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsDan Michaluk
 
Advocates' Society Tricks of the Trade 2019 - A Privacy Update
Advocates' Society Tricks of the Trade 2019 - A Privacy UpdateAdvocates' Society Tricks of the Trade 2019 - A Privacy Update
Advocates' Society Tricks of the Trade 2019 - A Privacy UpdateDan Michaluk
 
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam CompliancePrivacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam ComplianceDan Michaluk
 
Role of a breach coach
Role of a breach coachRole of a breach coach
Role of a breach coachDan Michaluk
 
PHIPA for school boards
PHIPA for school boardsPHIPA for school boards
PHIPA for school boardsDan Michaluk
 
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam CompliancePrivacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam ComplianceDan Michaluk
 
Finding internet evidence
Finding internet evidenceFinding internet evidence
Finding internet evidenceDan Michaluk
 
Sexual Assault in Higher Education - Law Policy and Practice
Sexual Assault in Higher Education - Law Policy and PracticeSexual Assault in Higher Education - Law Policy and Practice
Sexual Assault in Higher Education - Law Policy and PracticeDan Michaluk
 
Student Conduct Investigations - Examining Evidence and Determining Credibiliity
Student Conduct Investigations - Examining Evidence and Determining CredibiliityStudent Conduct Investigations - Examining Evidence and Determining Credibiliity
Student Conduct Investigations - Examining Evidence and Determining CredibiliityDan Michaluk
 
Cybersecurity and data loss - It's not just about lost USB keys today
Cybersecurity and data loss - It's not just about lost USB keys todayCybersecurity and data loss - It's not just about lost USB keys today
Cybersecurity and data loss - It's not just about lost USB keys todayDan Michaluk
 
Privacy and breaches in health care - a legal update
Privacy and breaches in health care - a legal updatePrivacy and breaches in health care - a legal update
Privacy and breaches in health care - a legal updateDan Michaluk
 

More from Dan Michaluk (20)

Ecno cyber - 23 June 2023 - djm(137852631.1).pptx
Ecno cyber - 23 June 2023 - djm(137852631.1).pptxEcno cyber - 23 June 2023 - djm(137852631.1).pptx
Ecno cyber - 23 June 2023 - djm(137852631.1).pptx
 
Critical Issues in School Board Cyber Security
Critical Issues in School Board Cyber SecurityCritical Issues in School Board Cyber Security
Critical Issues in School Board Cyber Security
 
Introduction to FOI law (the law of information)
Introduction to FOI law (the law of information)Introduction to FOI law (the law of information)
Introduction to FOI law (the law of information)
 
Higher Education Sexual Violence Presentation
Higher Education Sexual Violence PresentationHigher Education Sexual Violence Presentation
Higher Education Sexual Violence Presentation
 
Cyber class action claims at an inflection point
Cyber class action claims at an inflection pointCyber class action claims at an inflection point
Cyber class action claims at an inflection point
 
The pandemic and privacy
The pandemic and privacyThe pandemic and privacy
The pandemic and privacy
 
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...
Cyber security for the regulator and regulated  - Ontario Regulatory Authorit...Cyber security for the regulator and regulated  - Ontario Regulatory Authorit...
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...
 
Cybersecurity Risk Governance
Cybersecurity Risk GovernanceCybersecurity Risk Governance
Cybersecurity Risk Governance
 
Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?
 
The privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsThe privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analytics
 
Advocates' Society Tricks of the Trade 2019 - A Privacy Update
Advocates' Society Tricks of the Trade 2019 - A Privacy UpdateAdvocates' Society Tricks of the Trade 2019 - A Privacy Update
Advocates' Society Tricks of the Trade 2019 - A Privacy Update
 
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam CompliancePrivacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam Compliance
 
Role of a breach coach
Role of a breach coachRole of a breach coach
Role of a breach coach
 
PHIPA for school boards
PHIPA for school boardsPHIPA for school boards
PHIPA for school boards
 
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam CompliancePrivacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam Compliance
 
Finding internet evidence
Finding internet evidenceFinding internet evidence
Finding internet evidence
 
Sexual Assault in Higher Education - Law Policy and Practice
Sexual Assault in Higher Education - Law Policy and PracticeSexual Assault in Higher Education - Law Policy and Practice
Sexual Assault in Higher Education - Law Policy and Practice
 
Student Conduct Investigations - Examining Evidence and Determining Credibiliity
Student Conduct Investigations - Examining Evidence and Determining CredibiliityStudent Conduct Investigations - Examining Evidence and Determining Credibiliity
Student Conduct Investigations - Examining Evidence and Determining Credibiliity
 
Cybersecurity and data loss - It's not just about lost USB keys today
Cybersecurity and data loss - It's not just about lost USB keys todayCybersecurity and data loss - It's not just about lost USB keys today
Cybersecurity and data loss - It's not just about lost USB keys today
 
Privacy and breaches in health care - a legal update
Privacy and breaches in health care - a legal updatePrivacy and breaches in health care - a legal update
Privacy and breaches in health care - a legal update
 

Recently uploaded

Town of Haverhill's Summary Judgment Motion for Declaratory Judgment Case
Town of Haverhill's Summary Judgment Motion for Declaratory Judgment CaseTown of Haverhill's Summary Judgment Motion for Declaratory Judgment Case
Town of Haverhill's Summary Judgment Motion for Declaratory Judgment CaseRich Bergeron
 
Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...
Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...
Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...Rich Bergeron
 
RA. 7432 and RA 9994 Senior Citizen .pptx
RA. 7432 and RA 9994 Senior Citizen .pptxRA. 7432 and RA 9994 Senior Citizen .pptx
RA. 7432 and RA 9994 Senior Citizen .pptxJFSB1
 
Town of Haverhill's Statement of Facts for Summary Judgment on Counterclaims ...
Town of Haverhill's Statement of Facts for Summary Judgment on Counterclaims ...Town of Haverhill's Statement of Facts for Summary Judgment on Counterclaims ...
Town of Haverhill's Statement of Facts for Summary Judgment on Counterclaims ...Rich Bergeron
 
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los Angeles
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los AngelesAre There Any Alternatives To Jail Time For Sex Crime Convictions in Los Angeles
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los AngelesChesley Lawyer
 
Choosing the Right Business Structure for Your Small Business in Texas
Choosing the Right Business Structure for Your Small Business in TexasChoosing the Right Business Structure for Your Small Business in Texas
Choosing the Right Business Structure for Your Small Business in TexasBrandy Austin
 
Power Point Obligations and contracts Article 1313-1327
Power Point Obligations and contracts Article 1313-1327Power Point Obligations and contracts Article 1313-1327
Power Point Obligations and contracts Article 1313-1327bariajenne
 
Ashutosh Yadav v. State of UP 22nd March, 2024 All HC.pdf
Ashutosh Yadav v. State of UP 22nd March, 2024 All HC.pdfAshutosh Yadav v. State of UP 22nd March, 2024 All HC.pdf
Ashutosh Yadav v. State of UP 22nd March, 2024 All HC.pdfVidit Agrawal
 
OMassmann - Investment into the grid and transmission system in Vietnam (2024...
OMassmann - Investment into the grid and transmission system in Vietnam (2024...OMassmann - Investment into the grid and transmission system in Vietnam (2024...
OMassmann - Investment into the grid and transmission system in Vietnam (2024...Dr. Oliver Massmann
 
Illinois Department Of Corrections reentry guide
Illinois Department Of Corrections reentry guideIllinois Department Of Corrections reentry guide
Illinois Department Of Corrections reentry guideillinoisworknet11
 
Town of Haverhill's Motion for Summary Judgment on DTC Counterclaims
Town of Haverhill's Motion for Summary Judgment on DTC CounterclaimsTown of Haverhill's Motion for Summary Judgment on DTC Counterclaims
Town of Haverhill's Motion for Summary Judgment on DTC CounterclaimsRich Bergeron
 
Right to life and personal liberty under article 21
Right to life and personal liberty under article 21Right to life and personal liberty under article 21
Right to life and personal liberty under article 21vasanthakumarsk17
 
Hungarian legislation made by Robert Miklos
Hungarian legislation made by Robert MiklosHungarian legislation made by Robert Miklos
Hungarian legislation made by Robert Miklosbeduinpower135
 
ENG7-Q4-MOD3. determine the worth of ideas mentioned in the text listened to
ENG7-Q4-MOD3. determine the worth of ideas mentioned in the text listened toENG7-Q4-MOD3. determine the worth of ideas mentioned in the text listened to
ENG7-Q4-MOD3. determine the worth of ideas mentioned in the text listened toirenelavilla52178
 
1990-2004 Bar Questions and Answers in Sales
1990-2004 Bar Questions and Answers in Sales1990-2004 Bar Questions and Answers in Sales
1990-2004 Bar Questions and Answers in SalesMelvinPernez2
 

Recently uploaded (15)

Town of Haverhill's Summary Judgment Motion for Declaratory Judgment Case
Town of Haverhill's Summary Judgment Motion for Declaratory Judgment CaseTown of Haverhill's Summary Judgment Motion for Declaratory Judgment Case
Town of Haverhill's Summary Judgment Motion for Declaratory Judgment Case
 
Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...
Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...
Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...
 
RA. 7432 and RA 9994 Senior Citizen .pptx
RA. 7432 and RA 9994 Senior Citizen .pptxRA. 7432 and RA 9994 Senior Citizen .pptx
RA. 7432 and RA 9994 Senior Citizen .pptx
 
Town of Haverhill's Statement of Facts for Summary Judgment on Counterclaims ...
Town of Haverhill's Statement of Facts for Summary Judgment on Counterclaims ...Town of Haverhill's Statement of Facts for Summary Judgment on Counterclaims ...
Town of Haverhill's Statement of Facts for Summary Judgment on Counterclaims ...
 
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los Angeles
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los AngelesAre There Any Alternatives To Jail Time For Sex Crime Convictions in Los Angeles
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los Angeles
 
Choosing the Right Business Structure for Your Small Business in Texas
Choosing the Right Business Structure for Your Small Business in TexasChoosing the Right Business Structure for Your Small Business in Texas
Choosing the Right Business Structure for Your Small Business in Texas
 
Power Point Obligations and contracts Article 1313-1327
Power Point Obligations and contracts Article 1313-1327Power Point Obligations and contracts Article 1313-1327
Power Point Obligations and contracts Article 1313-1327
 
Ashutosh Yadav v. State of UP 22nd March, 2024 All HC.pdf
Ashutosh Yadav v. State of UP 22nd March, 2024 All HC.pdfAshutosh Yadav v. State of UP 22nd March, 2024 All HC.pdf
Ashutosh Yadav v. State of UP 22nd March, 2024 All HC.pdf
 
OMassmann - Investment into the grid and transmission system in Vietnam (2024...
OMassmann - Investment into the grid and transmission system in Vietnam (2024...OMassmann - Investment into the grid and transmission system in Vietnam (2024...
OMassmann - Investment into the grid and transmission system in Vietnam (2024...
 
Illinois Department Of Corrections reentry guide
Illinois Department Of Corrections reentry guideIllinois Department Of Corrections reentry guide
Illinois Department Of Corrections reentry guide
 
Town of Haverhill's Motion for Summary Judgment on DTC Counterclaims
Town of Haverhill's Motion for Summary Judgment on DTC CounterclaimsTown of Haverhill's Motion for Summary Judgment on DTC Counterclaims
Town of Haverhill's Motion for Summary Judgment on DTC Counterclaims
 
Right to life and personal liberty under article 21
Right to life and personal liberty under article 21Right to life and personal liberty under article 21
Right to life and personal liberty under article 21
 
Hungarian legislation made by Robert Miklos
Hungarian legislation made by Robert MiklosHungarian legislation made by Robert Miklos
Hungarian legislation made by Robert Miklos
 
ENG7-Q4-MOD3. determine the worth of ideas mentioned in the text listened to
ENG7-Q4-MOD3. determine the worth of ideas mentioned in the text listened toENG7-Q4-MOD3. determine the worth of ideas mentioned in the text listened to
ENG7-Q4-MOD3. determine the worth of ideas mentioned in the text listened to
 
1990-2004 Bar Questions and Answers in Sales
1990-2004 Bar Questions and Answers in Sales1990-2004 Bar Questions and Answers in Sales
1990-2004 Bar Questions and Answers in Sales
 

Social media – issues and trends caus 2014

  • 1. Social Media – Issues and Trends CAUS 2014 Academic Program September 19, 2014 Dan Michaluk
  • 2. Outline • Student expression, policy and law • Gathering social media evidence • And I'll leave you with • Other issues and trends • Case law citations CAUS 2014
  • 3. Student expression, policy and law • In a survey of the non-academic codes of 10 universities, only two included language that referred expressly to the internet or electronic communications • The problem is governed pursuant to general rules about student conduct that are rooted in a university's legitimate interests CAUS 2014
  • 4. Student expression, policy and law • Are all interests the same? CAUS 2014
  • 5. Student expression, policy and law • Are all interests the same? A. Interest in complying with legal duties such as those imposed anti-discrimination CAUS 2014 legislation, health and safety legislation and the common law of negligence B. Interest in otherwise enabling members of the college community to use and enjoy the learning and working environment or facilities C. Interest in raising funds, recruiting and retaining employees, students and co-operative education employers and the general interest in establishing and maintaining a strong reputation
  • 6. Student expression, policy and law • Are all interest the same? CAUS 2014 -Connection to university interest will flow from an impact on a student's studies or safe enjoyment of facilities -B and W case from York University illustrates -It's difficult not to take responsibility
  • 7. Student expression, policy and law • Are all interest the same? CAUS 2014 -This may be evidence of alcohol-related misconduct or actionable incivility -But what context would make it appropriate to take action in response to the publication of this image itself? -What if this was a student athlete?
  • 8. Student expression, policy and law • Survey shows most reserve rights but exercise them carefully • 6/10 codes reserved jurisdiction extending to the institution's interest in its reputation • 2/10 codes referred expressly to reputation • 9/10 had student athlete codes AND • 5/10 had a "personal affairs" limitation CAUS 2014
  • 9. Student expression, policy and law • How is the jurisdiction reserved? • "Proper functioning of activities of the university" • "Real and substantial connection to legitimate interests" • "[Non-jeopardization of] the university's mission" • "Interests are affected" CAUS 2014
  • 10. Student expression, policy and law • What have the courts said? • Your interest in protecting reputation ranks low in the eyes of a judge (or, at least, ranks low against the value in expression) • It is not reasonable to find expression that is justifiable in the context as misconduct • Decision-making bodies need to consider words spoken and justification and record reasons CAUS 2014
  • 11. Student expression, policy and law • Zhang v University of Western Ontario CAUS 2014
  • 12. Student expression, policy and law • Pridgen v University of Calgary • Application judge and CA find that "injury" encompasses more than physical harm – i.e. there is jurisdiction over harm to a natural person's reputation • But this can be seen showing how judges struggle with reputation • They want to see (on the record) that the decision maker considered (1) the meaning of each word and (2) its legitimacy in light of expression rights CAUS 2014
  • 13. Student expression, policy and law • Telfer v University of Western Ontario CAUS 2014
  • 14. Gathering social media evidence • Who? • One person • One person likely to be a good witness • When? • Immediately (it disappears) • Pre-confrontation (it disappears) • Periodically (duration of publication is relevant) CAUS 2014
  • 15. Gathering social media evidence • How? • A printout of a screen capture is a poor representation of the evidence… • … but is usually okay for expression cases • Printing doesn’t tell you what is linked to what, so take notes • Take notes on steps, functionality of tool • Sign it and date it CAUS 2014
  • 16. Gathering social media evidence • What? CAUS 2014
  • 17. Gathering social media evidence CAUS 2014
  • 18. Gathering social media evidence • What? • How many people read it? • Who read it? • How did readers react? • And don’t forget… • Circumstantial evidence that supports identification • What else? • Preserve complaints (e-mail, voicemail…) CAUS 2014
  • 19. Other social media issues to watch • Governance of university social media use and • Proliferation of university accounts • CASL risks associated with "direct messages" • Legal and ethical constraints on collecting evidence from social media • Internet monitoring and the standard of care • Duties to maligned (but otherwise safe) employees CAUS 2014
  • 20. Case law citations • B and W (1985), 52 OR (2d) 738 (HC) • Canada (Attorney General) v Tipple, 2011 FC 762 • Doré v Barreau du Québec, 2012 SCC 12 • Lee v Ontario (Ministry of Community Safety and Correctional Services), [2013] OPSGB No 1 (GSB) • Lewis v Rancourt, 2013 ONSC 1564 (CanLII), aff'd 2013 ONCA 701, leave to appeal to SCC denied (35676) • Pacheco v Dalhousie University, 2005 NSSC 222 CAUS 2014 • Pridgen v University of Calgary, 2010 ABQB 644 • Pridgen v University of Calgary, 2012 ABCA 139 • Canada (Attorney General) v. Tipple, 2011 FC 762 • Tipple v Canada (Attorney General), 2012 FCA 158 • Telfer v The University of Western Ontario, 2012 ONSC 1287 • Zhang v The University of Western Ontario, 2010 ONSC 6489
  • 21. Social Media – Issues and Trends CAUS 2014 Academic Program September 19, 2014 Dan Michaluk