The Magic Of Metamorphosis

During last fall’s Orientation Week, I was delighted to welcome the Class of 2014 to the Faculty of Law with a lecture about the way that law school changes people: The Magic of Metamorphosis.

Looks like I am going to do a similar lecture for the Class of 2015.

For those who are interested, here is last year’s lecture.

Digital Locks And The Automation Of Virtue

"Digital Locks and the Automation of Virtue" in Michael Geist ed, From "Radical Extremism" to "Balanced Copyright": Canadian Copyright and the Digital Agenda (Toronto: Irwin Law, 2010).

This chapter examines the social and moral cost of digital locks. I trace the concept and construct of a lock all the way back to the mythical Gordian knot, revealing two essential features of locks. First, I argue that locks are important not only for what they restrict, but for what they permit. I develop this idea in the context of digital locks using the concept of automated permissions. Second, I argue that the restrictions imposed by locks come with a social and moral cost; namely, that the adoption of a universal digital lock strategy could undermine the cultivation of moral virtue.

Read more

My Appearance Before The ETHI

On June 12th, I was called to appear before the Standing Committee on Ethics, Accountability & Privacy in a hearing on privacy and social media. I told the Committee that ‘big data’ is the ‘new sugar’ and that we stand at the precipice of what one might call the ‘late onset diabetes’ of the information age.

I made a number of recommendations and will submit a detailed brief to the Committee later this summer.

Read more

Privacy, Identity And Anonymity

'Privacy, Identity and Anonymity' in International Handbook of Surveillance Studies, eds. Kristie Ball, Kevin Haggerty and David Lyon (London: Routledge) forthcoming 2011 [co-authored in equal proportion with Jennifer Barrigar].

'This chapter was written in collaboration with one of my favourite readers and writers, Jennifer Barrigar.  Together, we consider the complex interrelationship between privacy, identity and anonymity in an increasingly networked society through an exploration of the evolution of network technologies and its consequent shifts in social and technological architectures.   The rise of ubiquitous computing from CCTV cameras and handheld devices to digital rights management systems (DRM) and radio frequency identification (RFID) tags has precipitated a shift in the network architecture from one in which anonymity was the default to one in which nearly every online transaction is subject to monitoring and the possibility of identity authentication. We argue that this invariably affects the relationship between privacy, identity and anonymity

Read more