This Guide Will Inform You About Your Privacy Rights .

2y ago
19 Views
2 Downloads
4.30 MB
12 Pages
Last View : 1m ago
Last Download : 3m ago
Upload by : Elisha Lemon
Transcription

This guide will inform you about your privacy rights related toyour devices – such as laptops, cellphones, and tablets – at theborder. It’s aimed at people crossing the border into Canada ordeparting for the U.S. through preclearance areas in Canada.Usually, the police cannot searchrandomly without suspicion, butthis isn’t the case at the border.The Charter of Rights andFreedoms applies at the border,but the courts have found that thegovernment’s interest in keepingdangerous goods and undesirablepeople out of the country givesthe CBSA more power to searchpeople and their possessions thanpolice have in other settings.The Customs Act gives theCanadian Border Services Agency(CBSA) broad powers to searchpeople and goods coming into thecountry, including the things thatpeople bring with them. Thisincludes the content – the files,photos and videos – on yourdigital devices. The files on yourdevices are “goods” under theCustoms Act, and border officerscan search goods coming intoCanada without a warrant – evenif they have no reason to suspectthat the goods are or containcontraband.Non-citizens seeking to enterCanada, including asylum seekers,may be subject to searches aswell. Under the Immigration andRefugee Protection Act, a CBSAofficer may search the luggageand personal effects of a personseeking to come to Canada at aport of entry, including electronicdevices and media. However, theofficer must have: reasonable grounds to believethat the person has notrevealed their identity or hashiddenontheirpersondocuments that are relevant totheir admissibility, or reasonable grounds to believethat the person is involved withpeoplesmuggling,humantrafficking, or document fraud.Searches of devices must belimited to identifying the person,finding documents relevant toadmissibility, or evidence of theoffences outlined above.2

Initial SearchesFront-line officers conduct initialsearches of the contents of yourdevice by browsing images, videosand files. This is meant to be acursory look at the contents todetermine that they do notcontain contraband – such as childpornography or hate literature – orevidence of a crime. Initialsearches can be random ortargeted.Anyone can be subject to arandom search. There is concernthat travellers are targeted forsearches based on their race orreligion, and that such profilingcan masquerade as a “random”search. Although any suchprofiling would be a breach of thelaw, it is extremely hard to provediscrimination. If you believe youhave been discriminated against,more information on filing acomplaint can be found below.Most of the people searched bythe CBSA are not chosen atrandom, but rather throughtargeting. People are targetedbased on information in travellers’databases – particularly for air, railor cruise ship arrivals – as well as“indicators” that the CBSA thinksincrease the likelihood that aperson’s electronic devices willcontain some form of contraband.Front-line officers conductinitial searches of thecontents of your device bybrowsing images, videosand files.3

There is no publically available list of the indicators that the CBSAuses, but anecdotally, you are more likely to be chosen for searches if you: Are importing something the CBSA deems to be suspicious, or areassociated with known importers or exporters of materials the CBSAobjects to. This could include anime and manga, which the CBSA ishighly suspicious of Have travelled to “high risk” destinations (while no list is available,this likely includes destinations in Southeast Asia, as well as Germany,Cuba and Spain) Are a single man traveling alone Exhibit nervousness or agitation Have multiple electronic devices (including hard drives) Demonstrate an interest in pornography, as indicated by filenames orfolders on your device Purchase a ticket to travel at the last minute Have coding on your suitcase that doesn’t match where you arecoming from Have unusual travel routesDuring an initial search, officersshould not carefully read everydocument or examine every photoon your device. They should onlylook at the contents for longenough to determine that they donot involve contraband (such aschild pornography), or to confirmor settle suspicions about aviolation of customs or immigrationlaw. Information found during aninitial search may be used to justifya more detailed examination.Officers can only look at contentthat is already on your device. Theyshould put the device in airplanemode and only look at localcontent (this includes emails andtext messages that are marked“read”). If the CBSA wants tosearch information only accessiblewith internet access (such as data inthe cloud), they need a warrantfrom a judge.4

Detailed SearchesIf an officer finds somethingtheyfeelwarrantscloserinspection, a more thoroughsearch can be conducted. Thesesearches are carried out byspecialists with expertise usingforensic tools.For a detailed search, yourdevice will be taken out of yourpossession. The Customs Act givesthe CBSA the power to detaingoods if an officer is not satisfiedthat the goods have been properlyscreened for admission intoCanada. Officers can also copythe entire contents of your device.5This allows the CBSA to later runpassword-cracking software toaccess anything you did notprovide a password for.According to the CBSA, copies ofthe data are not retained after theinvestigation is complete. However,we know that the CBSA can anddoes share personal informationthat it collects from examinationswith other government agenciessuch as the RCMP and withsecurity agencies such as CSIS(who may in turn share it withforeigngovernmentsforintelligence purposes).PHOTO CREDIT: TYLER LASTOVICH

PHOTO CREDIT: NEON BRANDPasswordsOfficers may ask you for yourpassword or fingerprint to accessyour device. There is uncertaintyas to whether you are legallyobligated to provide it, though theCBSA has been able to arrestpeople or threaten arrest forfailing to provide a password. TheCBSA maintains that they have theright to arrest people for failing toprovide a password, and that theymay do so where an officer hasgood reason to believe there couldbe prohibited material on a device.If you are asked and you choosenot to disclose your password orprovide your fingerprint, you riskincreasing the CBSA’s suspicionabout the contents of your device,denial of entry if you are not aCanadian citizen or permanentresident, detention or seizure ofthe device for more detailedinspection by forensic specialists(which could take months), orarrest. Hindering or obstructing aCBSA officer is an offence that cancarry fines of up to 50,000 and/or a term of imprisonment for fiveyears.6

U.S. Preclearance Areasin CanadaU.S. Customs and Border Patrolofficersareauthorizedtoadminister U.S. law in parts ofCanadian airports, train terminalsandferryterminalswheretravellers departing for the U.S.can clear U.S. customs prior toleaving Canada. In these areas,the administration of U.S. laws issubject to Canadian human rightslaws, including the Charter ofRights and Freedoms. This meansthat Canadian search and seizurestandards apply rather than U.S.ones. However, it is unclear if U.S.border officers have knowledgeand training of the appropriatelegal standards.For searching electronic devices,U.S. laws are similar to Canadianlaws: officers do not need awarrant or even reasonablesuspicion to look at your phone.This should be local content only,and nothing that requires anetwork connection to see.U.S. border officers performbasic and advanced searches.Basic searches can be performedwith or without suspicion andinvolve any search of an electronicdevice that falls short of anadvanced search.7PHOTO CREDIT: ALEJANDRO MOLINA FERNANDEZIn an advanced search, thedevice will be connected toexternal equipment in order togain access to the contents butalso potentially copy them.Advanced searches require areasonable suspicion of theviolation of U.S. laws, or a nationalsecurity concern.U.S. border officers may ask youfor your password. If you do notprovide it, the officer may refuseto preclear you for departure tothe U.S. The officer may alsodetain the device so they canperform a more advanced search.They should not keep your devicefor longer than five days, butreports show that sometimesdevices are kept for many months.

TipsIn considering which actions you take to protect your privacy, beaware that your interaction with a border officer may escalate ifthey detect that you have deliberately tried to thwart a search,especially in a manner that destroys data that you otherwisewould have been able to access, or if you have concealed the factthat the data is present at all. Leave your devices at home if you don’t need them on your trip. Make a backup of your data before you cross the border and leave ithome. This will be important if your device is detained or seized, butit also gives you the option of deleting unnecessary data from yourdevice before you cross. You may also wish to clear the entirecontents of your device before you cross the border and restore itfrom a backup afterwards. Securely delete data you do not need to travel with. This means notsimply putting it in the recycling bin, but using built-in tools inWindows (a tool called cipher), Mac (‘secure empty trash’ or srm), orLinux (shred or srm) to permanently delete data. Be aware that borderagencies have access to sophisticated forensic tools and may seeinformation about deleted data that the average person can’t. Justbecause you press “delete” does not guarantee that the informationcannot be found by a border official. Require a password to log on or access your device. An officer who isonly slightly curious and turns on your electronic device intending tobrowse the contents may lose interest when they realize they willhave to ask you for your password. Create a strong password, for example by using several randomwords (a ‘passphrase’) if possible and avoiding passwords that areeasy to guess.8

Turn off your computer before crossing the border, because securityexperts have ways of accessing your computer’s memory if it is on.This also ensures your device is locked if it is turned on for a search.Note that airport security (not CBSA) may require you to turn on yourdevice, but they are only looking at the physical integrity of thedevice and will examine content. Use two-factor authentication, in the event that the border agencyseizes one device but not the other. Use Full-Disk Encryption and require a strong passphrase to access it.Many new devices have this option built-in. This can keep your datasafe from even the most experienced analysts. However, it is not clearwhat will happen if your electronic device is detained and the borderagency is not able to access your data. Your device may be seized andnot returned. If you do not opt to use Full-Disk Encryption, you can encryptspecific critical documents or files using built-in software as well. Separate privileged and confidential documents into their own folderto make it clear they are privileged. This includes lawyers’ files, andcan sometimes include files of doctors, psychologists andpsychiatrists, and journalists. Border officers are supposed to takeprecautions not to look at privileged materials when warned thatthose materials exist, except to verify that it is what it claims to be. Intheory, they should not look at privileged files at all, but border9PHOTO CREDIT: RAW PIXEL

PHOTO CREDIT: OWEN SPENCER

Filing a Complaintofficers may not respect thelaw in this area.If you think your search wasimproper, but your complaint isnot about discrimination or aninvasion of privacy, you cancomplain to the CBSA itself. Ifyour device has been seized, oryou have been issued a penalty orfine, you can request a review ofthe decision.You can also send writtenfeedbacktotheRecourseDirectorate of the CBSA, whichcan review officer conduct. Makesure to include all relevantinformation so a recourse officerunderstands your complaint andcan get back to you.If you believe you havediscriminated against by a CBSAofficer, you may be able to file acomplaint with the CanadianHumanRightsCommission.Grounds of discrimination includerace, national or ethnic origin,colour, religion, age, sex, sexualorientation, gender identity orexpression, marital status, familystatus,disability,geneticcharacteristics, or a conviction forwhich a pardon has been grantedor a record suspended.If you feel the CBSA has invadedyour privacy, you may be able tofile a complaint with the Office ofthe Privacy Commissioner ofCanada, who oversees thegovernment’s compliance with thePrivacy Act.You may also wish to report anyrelevant incidents to interestedcivil rights groups in Canadaincluding the International CivilLiberties Monitoring Group and/orthe National Council of CanadianMuslims.If you think that your privacyhas been breached or if you havebeen discriminated against by U.S.officers in preclearance areas, werecommend writing to theMinister of Public Safety and theMinister of Foreign Affairs. Youcan also contact the Office forCivil Rights and Civil Liberties atthe Department of HomelandSecurity, the Chief Privacy Officerof the Department of HomelandSecurity, and the Department ofHomelandSecurityTravelerRedress Inquiry Program. You mayalso wish to report any relevantincidents to interested civil rightsgroups including the ElectronicFrontier Foundation, the Councilon American-Islamic Relations,

www.bccla.org@bcclawww.cippic.ca@BCCivLib@cippic BC Civil Liberties Association & Canadian Internet Policy and Public Interest Clinic, 2018

This guide will inform you about your privacy rights related to your devices – such as laptops, cellphones, and tablets – at the . databases – particularly for air, rail or cruise ship arrivals – as well as . This could include anime and manga, which the CBSA is highly suspicious of

Related Documents:

In the 26 years since 有iley publìshed Organic 1于ze Disconnection Approach 色y Stuart Warren,由自approach to the learning of synthesis has become while the book Ìtself is now dated in content and appearance' In 唱Tiley published Organic and Control by Paul Wyatt and Stuart 轧Tarren. Thís muc如柱。okís as a

www.nice.com The NICE Inform Reconstruction application is the investigation tool in NICE Inform. The Reconstruction application enables you to search for recordings stored on various data sources, and replay them as required. When a search is completed, the results are displayed in a table

Resending Oracle InForm User Management Tool login details 4-14 Global users 4-14 Viewing the list of Global users 4-15 Creating Global users 4-15 Assigning a product to a Global user 4-16. iv. STEP 5: Lock the study in Oracle InForm User Management Tool for development3-7.

www.handgunlaw.us 1 Louisiana Shall Issue Must Inform Officer Immediately: YES (See Must Inform Section) Note: Alaska, Arizona, Arkansas, Idaho, Kansas, Kentucky, Maine, Montana, Mississippi, Missouri, New Hampshire, Oklahoma, South Dakota, Vermont and West Virginia have “Permitless Carry.” Anyone who can legally possess a firearm may carry concealed in these

entertain. 5. Cut out the Persuade, Inform, Entertain, and Clues fl aps. Apply glue to the back of each top section and attach them below the PIE piece so the top section of each Clues fl ap is covered by the Persuade, Inform, or Entertain fl ap. 6. Under each Persuade, Inform, or Entertain fl ap, record what the author is trying to do. For

Act of 2004, Local Authorities have the duty to warn and inform the public about emergencies. The goal of this project was to develop a toolkit of methods for the Contingency Planning Unit (CPU) of the London borough of Hounslow to warn and inform its local population before, during, and a

Nov 19, 2018 · 2 0 8818541001 (01) 2018-11 EN-USA Accu-Chek Inform II Supplement to the Operator’s Manual Version 6 Revision History Purpose of document This document provides a description of changes to the Operator's Manual V6 for SW 04.03. This supplement is valid for and intended to be used in conjunction with the Accu-Chek Inform II Operator’s

composite indicator that identifies countries at risk of humanitarian crisis and disaster that would overwhelm national response capacity. The INFORM index supports a proactive crisis and disaster management framework. The INFORM initiative began in 2012 as a convergence of interests of UN agencies, donors, NGOs and research