volume 1 chapter 1 copyright and...

35
TABLE OF CONTENTS VOLUME 1 CHAPTER 1 COPYRIGHT AND E-COMMERCE 1.1 Introduction ........................................................................... 1-1 1.2 Requirements for Copyright Protection..................................... 1-4 (a) Characteristics of the Author or Place of Publication ........ 1-4 (b) Character of the Work ................................................... 1-5 (c) An Original Work ......................................................... 1-5 (d) Requirement of Fixation ................................................ 1-5 (e) Ownership .................................................................... 1-5 (f) Term ........................................................................... 1-6 (g) Notice .......................................................................... 1-7 (h) Registration .................................................................. 1-8 1.3 Specific Rights Under Copyright Law...................................... 1-8 (a) Reproduction Right ....................................................... 1-9 (b) Public Performance Right .............................................. 1-12 (c) Publication Right .......................................................... 1-13 (d) Translation Right .......................................................... 1-13 (e) Adaptation Right........................................................... 1-13 (f) Mechanical Reproduction Right ...................................... 1-14 (g) Cinematographic Presentation Right ................................ 1-14 (h) Communication Right.................................................... 1-15 (i) Exhibition Right ........................................................... 1-19 (j) Rental Right ................................................................. 1-19 (k) Commercial Action/Importation ...................................... 1-19 1.4 Liability for Infringing Acts .................................................... 1-20 (a) Direct Infringement ....................................................... 1-20 (b) Indirect Infringement ..................................................... 1-23 (c) Contributory Infringement .............................................. 1-25 (d) Circumvention .............................................................. 1-27 (e) Test for Analysis of Infringement ................................... 1-31 (f) Remedies and Offences ................................................. 1-33 1.5 Defences ............................................................................... 1-35 (a) Express or Implied Permission Granted by Copyright Holder ................................................................... 1-35 (b) Works for which Term has Expired ................................ 1-36 (c) Works Created and First Published in Countries Not Members of Copyright Treaties with Canada ............. 1-36 (d) The Copying of a Non-substantial Part of a Work............ 1-36 CON-1 (Electronic Commerce) (2015 - Rel. 4)

Upload: dinhcong

Post on 25-May-2018

215 views

Category:

Documents


0 download

TRANSCRIPT

TABLE OF CONTENTS

VOLUME 1

CHAPTER 1 COPYRIGHT AND E-COMMERCE

1.1 Introduction........................................................................... 1-11.2 Requirements for Copyright Protection..................................... 1-4

(a) Characteristics of the Author or Place of Publication ........ 1-4(b) Character of the Work ................................................... 1-5(c) An Original Work......................................................... 1-5(d) Requirement of Fixation ................................................ 1-5(e) Ownership.................................................................... 1-5(f) Term ........................................................................... 1-6(g) Notice.......................................................................... 1-7(h) Registration .................................................................. 1-8

1.3 Specific Rights Under Copyright Law...................................... 1-8(a) Reproduction Right ....................................................... 1-9(b) Public Performance Right .............................................. 1-12(c) Publication Right .......................................................... 1-13(d) Translation Right .......................................................... 1-13(e) Adaptation Right........................................................... 1-13(f) Mechanical Reproduction Right...................................... 1-14(g) Cinematographic Presentation Right................................ 1-14(h) Communication Right.................................................... 1-15(i) Exhibition Right ........................................................... 1-19(j) Rental Right ................................................................. 1-19(k) Commercial Action/Importation...................................... 1-19

1.4 Liability for Infringing Acts .................................................... 1-20(a) Direct Infringement ....................................................... 1-20(b) Indirect Infringement ..................................................... 1-23(c) Contributory Infringement.............................................. 1-25(d) Circumvention .............................................................. 1-27(e) Test for Analysis of Infringement ................................... 1-31(f) Remedies and Offences ................................................. 1-33

1.5 Defences ............................................................................... 1-35(a) Express or Implied Permission Granted by Copyright

Holder ................................................................... 1-35(b) Works for which Term has Expired ................................ 1-36(c) Works Created and First Published in Countries Not

Members of Copyright Treaties with Canada ............. 1-36(d) The Copying of a Non-substantial Part of a Work............ 1-36

CON-1 (Electronic Commerce) (2015 - Rel. 4)

(e) Use of Ideas, Functions, etc ........................................... 1-37(f) Infringement for which Limitation Period has Expired...... 1-38(g) Non-protectable Elements .............................................. 1-38

1.6 Specific Exemptions and Limitations ....................................... 1-39(a) Fair Dealing & Fair Use ................................................ 1-39(b) Private Copying of Sound Recordings............................. 1-45(c) Exemptions for Online Service Providers ........................ 1-46

1. Canadian Copyright Act ....................................... 1-472. Digital Millennium Copyright Act, 1998 ................ 1-49

(i) Limitation for Transitory Communications ..... 1-50(ii) Limitation for System Caching...................... 1-51(iii) Limitation for Information Residing on

Systems or Networks at the Direction ofUsers .......................................................... 1-51

(iv) Notice and Take Down................................. 1-53(d) Educational Exemptions ................................................ 1-54(e) Public Policy Exemptions .............................................. 1-56(f) Additional Exemptions under

Copyright Modernization Act ................................... 1-60(g) Other Exemptions ......................................................... 1-61

1.7 Protection of Data and Databases ............................................ 1-62(a) Protection of Data Elements........................................... 1-62(b) The Database Itself ....................................................... 1-63

1.8 Moral Rights ......................................................................... 1-66(a) Right to Claim Authorship............................................. 1-67(b) Integrity Right .............................................................. 1-67(c) Association Right.......................................................... 1-68

1.9 Performers’ Rights ................................................................. 1-68(a) Fixation Right .............................................................. 1-69(b) Reproduction Right ....................................................... 1-69(c) Communication Right.................................................... 1-70(d) Performance Right ........................................................ 1-70(e) Rental Right ................................................................. 1-70(f) Authorization................................................................ 1-70(g) Defences or Limitations................................................. 1-71

1.10 Legislative Reform................................................................. 1-71Quantum Table: Copyright Infringement .................................. 1-75

CHAPTER 2 TRADE-MARKS AND THE INTERNET

2.1 Introduction........................................................................... 2-12.2 Trade-mark Rights and Remedies ............................................ 2-2

(a) Trade-marks ................................................................. 2-2(b) Rights and Remedies..................................................... 2-5

1 Imitation ............................................................. 2-5

ELECTRONIC COMMERCE AND THE INTERNET

CON-2

2 Confusion ........................................................... 2-63 Depreciation of Goodwill...................................... 2-84 Common Law and Statutory Passing-off ................ 2-8

(c) Protection of Famous Marks .......................................... 2-10(d) The Limits of Trade-mark Rights ................................... 2-12

2.3 The Internet—An Overview.................................................... 2-132.4 Internet Challenges to Trade-mark and Trade-name Rights......... 2-17

(a) Domain Name Disputes ................................................. 2-171 Trade-mark Status ................................................ 2-182 Use .................................................................... 2-20

(i) Registration ................................................. 2-22(ii) Cybersquatting............................................. 2-23(iii) E-mail Addresses ......................................... 2-24

3 Confusion and Misrepresentation ........................... 2-24(i) Traditional Confusion Analysis ..................... 2-24(ii) Initial Interest Confusion .............................. 2-27(iii) Passing-off .................................................. 2-33(iv) Misleading Advertising and Consumer

Protection Laws ........................................... 2-37(b) Misleading Meta Tags and Hidden Text.......................... 2-38(c) Unauthorized Links ....................................................... 2-41

1 Simple Links ....................................................... 2-412 Deep Links ......................................................... 2-42

(d) Framing ....................................................................... 2-43(e) Typo-squatting.............................................................. 2-44(f) Keyword Advertising .................................................... 2-45(g) Criticism and Parody Web Sites ..................................... 2-46(h) Trade-mark Use in Web Site Content.............................. 2-50(i) Jurisdiction Issues ......................................................... 2-51(j) Other Issues ................................................................. 2-54

1 Garnishing Domain Names as Property .................. 2-542 In Rem Actions ................................................... 2-543 Domain Name Registrar Liability .......................... 2-55

2.5 Legislation and Private Ordering ............................................. 2-56(a) The U.S. Anticybersquatting Consumer Protection

Act ........................................................................ 2-561 Purpose and Scope of the Act ............................... 2-562 The “Safe Harbour” ............................................. 2-603 In Rem Actions ................................................... 2-614 Remedies ............................................................ 2-625 Commentary........................................................ 2-63

(b) The ICANN Uniform Domain Name DisputeResolution Policy.................................................... 2-63

1 General ............................................................... 2-632 Application of the Policy ...................................... 2-64

TABLE OF CONTENTS — VOLUME 1

CON-3 (Electronic Commerce) (2015 - Rel. 4)

3 Scope of the Policy .............................................. 2-654 The Process......................................................... 2-67

(i) Providers..................................................... 2-67(ii) Submissions and Evidence ............................ 2-67(iii) Panels ......................................................... 2-69(iv) Remedies .................................................... 2-69(v) Applicable Law ........................................... 2-70(vi) Delay.......................................................... 2-70

5 The Elements Required by the Policy .................... 2-71(i) Conflicting Mark and Domain Name ............. 2-71

(1) Trade-mark Rights ........................... 2-71(2) Personal Names ............................... 2-73(3) Geographic Place-names ................... 2-74(4) Trade Names ................................... 2-74

(ii) Identical or Confusingly Similar .................... 2-75(1) The Appropriate Test ....................... 2-75(2) Prefixes, Suffixes, Other Domain

Name Elements, and Misspellings .. 2-76(3) Critical Domain Names .................... 2-78

(iii) Rights and Legitimate Interests...................... 2-79(1) General ........................................... 2-79(2) Criticism and Commentary Uses ....... 2-82(3) Speculation in Generic Domain

Names ......................................... 2-85(iv) Bad Faith Registration and Use ..................... 2-86

6 Miscellaneous Issues ............................................ 2-92(i) Burden of Proof........................................... 2-92(ii) Default Proceedings ..................................... 2-93(iii) Without Prejudice Negotiations ..................... 2-94(iv) Reverse Domain Name Hijacking .................. 2-94(v) “Cyberflying” .............................................. 2-95(vi) Res Judicata in Policy Proceedings ................ 2-96(vii) Tort Liability for Policy Proceedings ............. 2-97(viii) Judicial Proceedings ..................................... 2-97(ix) The Risk of Systemic Bias............................ 2-101

7 Commentary........................................................ 2-1032.6 Risk Management .................................................................. 2-1042.7 Conclusion ............................................................................ 2-106Appendix 2.1: Quantum Table — Trade-mark Infringement and

Passing Off ........................................................................ 2-107Appendix 2: Trade-marks Act ............................................................. 2A-1

CHAPTER 3 TRADE SECRETS

3.1 The Law of Confidential Information....................................... 3-2

ELECTRONIC COMMERCE AND THE INTERNET

CON-4

3.2 Introduction........................................................................... 3-23.3 Constitutional Basis of the Law of Confidential Information

and Trade Secret Law ......................................................... 3-3(a) United States ................................................................ 3-3(b) Canada......................................................................... 3-5

3.4 Elements of the Breach of Confidence Action........................... 3-6(a) A Relationship of Confidence ........................................ 3-6(b) Confidential Information................................................ 3-10(c) Unauthorized Use or Disclosure to the Detriment of

the Discloser .......................................................... 3-133.5 Limitations on the Breach of Confidence Action....................... 3-143.6 Secrets and the Internet .......................................................... 3-16

(a) World Wide Web (WWW) ............................................ 3-16(b) Usenet ......................................................................... 3-16(c) Listserv........................................................................ 3-17(d) File Transfer Protocol (FTP) .......................................... 3-18(e) Gopher......................................................................... 3-18(f) Telnet .......................................................................... 3-19(g) Electronic Mail ............................................................. 3-19(h) Internet Relay Chat (IRC).............................................. 3-26

3.7 Specific Issues in Basic Non-Disclosure Agreements ................. 3-26(a) Form of Agreement....................................................... 3-27(b) Parties.......................................................................... 3-27(c) Scope of Information..................................................... 3-28(d) Purpose of the Disclosure .............................................. 3-28(e) Definition of Information............................................... 3-29(f) Requirements for Formality............................................ 3-29(g) Non-Disclosure Obligation and Restrictions on Use.......... 3-30(h) Scope of the Duty......................................................... 3-31(i) Permitted Disclosure to Others ....................................... 3-32(j) Duration of the Obligations............................................ 3-33(k) Common Limitations or Exclusions from the Obligations . 3-33(l) Return of the Information .............................................. 3-34(m) No Implied Licence....................................................... 3-35(n) Execution Provisions ..................................................... 3-35(o) Special Terms............................................................... 3-35(p) Governing Law............................................................. 3-35(q) Improvements and Suggestions....................................... 3-36(r) Injunctive Relief ........................................................... 3-37(s) Indemnity..................................................................... 3-38(t) Standstill Arrangement .................................................. 3-38(u) Damage Limitations ...................................................... 3-38(v) Confidentiality Is Not Private ......................................... 3-38

3.8 Economic and Industrial Espionage Legislation......................... 3-39

TABLE OF CONTENTS — VOLUME 1

CON-5 (Electronic Commerce) (2015–Rel. 8)

(a) Canadian Legal Developments in Industrial orEconomic Espionage ............................................... 3-39

(b) U.S. Legislative Provisions Concerning EconomicEspionage .............................................................. 3-44

CHAPTER 4 PATENTS FOR COMPUTER-IMPLEMENTEDINVENTIONS AND BUSINESS METHODS

4.1 Patent Law Primer ................................................................. 4-11 Introduction.................................................................. 4-12 The Patent Specification ................................................ 4-2

1 The Claims.......................................................... 4-22 The Description (or Disclosure)............................. 4-23 Statutory Subjet Matter......................................... 4-2

3 Other Pre-requisites to Patentability ................................ 4-41 Novelty (New)..................................................... 4-42 Utility (Useful) .................................................... 4-53 Non-obviousness (Inventive) ................................. 4-5

4 The Application Process ................................................ 4-61 An Inventor......................................................... 4-6

(i) First-to-file versus First-to-invent................... 4-62 The Application ................................................... 4-6

(i) Prosecution.................................................. 4-7(ii) The “Office Action”..................................... 4-7(iii) Laying Open of the Application .................... 4-7(iv) Money ........................................................ 4-7

5 Claim Construction ....................................................... 4-76 The Addressee .............................................................. 4-87 File Wrapper Estoppel ................................................... 4-8

4.2 Infringement .......................................................................... 4-91 Intent to Infringe........................................................... 4-92 Approach to Infringement .............................................. 4-93 Cross-Border Activities and Infringement of US Patents ... 4-94 Infringement of System Claims in the USA..................... 4-95 Infringement of Method Claims in the USA .................... 4-10

1 Joint or Divided Infringement of Method Claims .... 4-104.3 Remedies .............................................................................. 4-114.4 International Agreements Affecting Patents............................... 4-11

1 The Paris Convention –1883 .......................................... 4-112 World Trade Organization ............................................. 4-123 Patent Co-operation Treaty ............................................ 4-12

4.5 Computer-implemented Inventions........................................... 4-121 Statutory Subject Matter ................................................ 4-122 The Basic “Principles”................................................... 4-133 United States ................................................................ 4-13

ELECTRONIC COMMERCE AND THE INTERNET

CON-6

1 U.S. Case Law .................................................... 4-14(i) Gottschalk v. Benson, 409 U.S. 63, 175

U.S.P.Q. 673 (1972)..................................... 4-14(ii) Parker v. Flook, 437 U.S. 584, 198 U.S.P.Q.

193 (1978) .................................................. 4-14(iii) Diamond v. Diehr, 450 U.S. 175, 209 U.S.P.Q.

1 (1981)...................................................... 4-15(iv) The Mathematicla Loop: Freeman-Walter-Abele

U.S.P.Q. 673 (1978)..................................... 4-16(v) In Re: Freeman, F.2d 1237, 197 U.S.P.Q 464

(C.C.P.A 1978)............................................ 4-16(vi) In re Walter, 618 F.2d 758m 205 U.S.P.Q. 397

(C.C.P.A. 1980)........................................... 4-16(vii) In re Abele, 684 F.2d 902, 214 U.S.P.Q 682

(C.C.P.A 1982)............................................ 4-17(viii) Arrhythmia Research Technology v. Corazonix

Corp., 958 F.2d 1053, U.S.P.Q 2d 1033 (Fed.Cir. 1992) ................................................... 4-17

(ix) In re Alappat, 33 F.3d 1526 (Fed. Cir. 1994)-Back to the Primary Authorities .................... 4-18

(x) State Street Bank and Trust Company v.Signature Financial Group, Inc., CAFC,1998 ........................................................... 4-18

(xi) AT&T v. Excel Communications, CAFC,1999 ........................................................... 4-19

(xii) CLS Bank International v. Alice Corporation(in U.S. Supreme Court) ............................... 4-20

2 Data Structures .................................................... 4-21(i) In re Beauregard, Decision of Board of

Appeals and Inerferences, dated September 29,2993, Appeal No. 93-0378............................ 4-21

(ii) In re Warmerdam, 33 F.3d 1354, 31 U.S.P.Q.2d 1754 (Fed. Cir. 1994) .............................. 4-21

3 Programs stored on memory ................................. 4-22(i) In re Lowry, 32 U.S.P.Q. 2d 1031 (Fed. Cir.

1994).......................................................... 4-224 USPTO Guidelines............................................... 4-23

(i) 2014 Interim Guidance on Patent SubjectMatter Eligibility.......................................... 4-23

(ii) July 2015 Update on Subject MatterEligibility .................................................... 4-24

4 Canada......................................................................... 4-251 Canadian Case Law ............................................. 4-252 Schlumberger, and Beyond ................................... 4-273 Canadian Patent Office Practice............................. 4-27

TABLE OF CONTENTS — VOLUME 1

CON-7 (Electronic Commerce) (2015–Rel. 8)

(i) MPOP: Subject Matter ................................. 4-271. Art ................................................. 4-272. Process ........................................... 4-283. Machine.......................................... 4-294. Manufacture .................................... 4-295. Utility ............................................. 4-296. Data structures................................. 4-297. Databases ........................................ 4-30

(ii) Examination Practice Respecting Computer-Implemented Inventions................................ 4-30

5 European Patent Convention .......................................... 4-301 The Governing Articles ........................................ 4-312 EPO Guidelines ................................................... 4-313 Case Law............................................................ 4-33

(i) Computer-generated Software........................ 4-34(ii) Method of Doing Business ........................... 4-35

4.6 Business Methods .................................................................. 4-361 Introduction.................................................................. 4-362 What is a Business Method Patent.................................. 4-373 United States ................................................................ 4-38

1 Case Law............................................................ 4-38(i) State Street Bank and Trust Company

v. Signature Financial Group, Inc .................. 4-38(ii) In Re Bilski ................................................. 4-39(iii) Decisions post-Bilski .................................... 4-40(iv) CLS Bank International v. Alice Corporation

(in CAFC)................................................... 4-43(v) CLS Bank International v. Alice Corporation

(in U.S Supreme Court)................................ 4-44(vi) Decisions post-Alice ..................................... 4-46

4 Canada......................................................................... 4-471 Case Law: Patentable “Art” .................................. 4-47

(i) The Amazon.com “One-click decision” .......... 4-492 CIPO Manual of Patent Office Practice .................. 4-50

(i) Chapter 12: Guidance on non-technologicalfields .......................................................... 4-50

(ii) The CIPO 2013 Guidelines on StatutorySubject Matter ............................................. 4-511. Inventive concept............................. 4-512. Physical existence, or manifests a

discernible effect or change andtechnical result.............................. 4-51

3 Some Practical Consequences on Pursuing BusinessMethod Patents in Canada .............................. 4-52

4.7 Conclusions........................................................................... 4-53

ELECTRONIC COMMERCE AND THE INTERNET

CON-8

CHAPTER 5 INTELLECTUAL PROPERTY, TECHNOLOGY,AND E-COMMERCE DUE DILIGENCE INBUSINESS TRANSACTIONS

5.1 Introduction........................................................................... 5-2(a) Need For Intellectual Property and Information

Technology Due Diligence....................................... 5-3(b) Due Diligence .............................................................. 5-4(c) Identification of Nature of Primary and Related Transactions

5-51 Share Purchase .................................................... 5-62 Asset Purchase..................................................... 5-63 Purchase from Receiver or Trustee ........................ 5-74 Financing ............................................................ 5-8

(d) Due Diligence by Parties other than the Purchaser ........... 5-91 Due Diligence by Seller........................................ 5-92 Due Diligence by Borrower .................................. 5-103 Due Diligence by Issuer ....................................... 5-10

(e) Scope and Cost of Work for Intellectual Property andTechnology Due Diligence....................................... 5-11

1 Time................................................................... 5-112 Cost.................................................................... 5-113 Nature of the Transaction ..................................... 5-124 Ancillary Agreements ........................................... 5-12

(g) Nature of the Business .................................................. 5-141 Value of Intellectual Property and Information

Technology ................................................... 5-14(h) Structure of the Business ............................................... 5-14

1 Related Companies .............................................. 5-152 Small Business .................................................... 5-153 Partnership .......................................................... 5-16

(i) Domestic Issues of Multinational Transaction .................. 5-16(j) Multiple Location Business ............................................ 5-17(k) International Business.................................................... 5-17(l) Plans for the Business ................................................... 5-18(m) The Marketplace ........................................................... 5-19(n) Assistance .................................................................... 5-19(o) Secrecy Agreements ...................................................... 5-19(p) Representations, Warranties, and Opinions ...................... 5-20(q) Transitional Issues......................................................... 5-20(r) Confidentiality and Privilege Issues ................................ 5-21

5.2 Intellectual Property Rights ..................................................... 5-23(a) Overview of Intellectual Property ................................... 5-23(b) Patents ......................................................................... 5-25

1 Information Technology Related Patents ................ 5-26

TABLE OF CONTENTS — VOLUME 1

CON-9 (Electronic Commerce) (2015–Rel. 8)

(i) Software ..................................................... 5-27(ii) Business Methods ........................................ 5-28.1

2 Types of Searches ................................................ 5-28.23 Limitations of Searches ........................................ 5-28.44 Follow-up ........................................................... 5-28.5

(c) Industrial Designs ......................................................... 5-28.61 Types of Searches ................................................ 5-292 Limitations of Searches ........................................ 5-303 Follow-up ........................................................... 5-31

(d) Trade-marks ................................................................. 5-311 Types of Searches ................................................ 5-322 Limitations of Searches ........................................ 5-333 Trade Dress......................................................... 5-354 Domain Names .................................................... 5-355 Follow-up ........................................................... 5-36

(e) Trade Names ................................................................ 5-37(f) Copyright ..................................................................... 5-38

1 Types of Searches ................................................ 5-392 Limitations of Searches ........................................ 5-403 Moral Rights ....................................................... 5-414 Neighbouring Rights ............................................ 5-415 Database Rights ................................................... 5-416 Follow-up ........................................................... 5-42

(g) Integrated Circuit Topography Rights ............................. 5-42(h) Plant Breeders’ Rights ................................................... 5-43(i) Personality Rights ......................................................... 5-43(j) Proprietary Information.................................................. 5-44(k) Foreign Rights .............................................................. 5-45(l) Secured Intellectual Properties........................................ 5-46

1 Searches for Secured Intellectual Property .............. 5-48(m) On-site Technology Investigations .................................. 5-49(n) Products, Advertising, and Packaging ............................. 5-50(o) Intellectual Property Maintenance Costs .......................... 5-51

5.3 Contract Review .................................................................... 5-51(a) Agreement Review........................................................ 5-51(b) Secrecy Agreements ...................................................... 5-53(c) Licence Agreements ...................................................... 5-53(d) Assignments ................................................................. 5-54(e) Franchise Agreements ................................................... 5-54(f) Distribution and Supply Agreements............................... 5-55(g) Co-packing and Toll Manufacturing Agreements.............. 5-55(h) Joint Venture and Strategic Alliance Agreements ............. 5-55(i) Research and Development Agreements .......................... 5-56(j) Government Agreements................................................ 5-56(k) Sponsorship and Co-promotion Agreements .................... 5-56

ELECTRONIC COMMERCE AND THE INTERNET

CON-10

(l) Advertising Agreements................................................. 5-57(m) Employee and Contractor Agreements............................. 5-57(n) Settlement Agreements .................................................. 5-59(o) Information Technology Agreements .............................. 5-59

5.4 Information Technology and E-Commerce Issues...................... 5-59(a) Hardware ..................................................................... 5-59(b) Software ...................................................................... 5-60(c) Data ............................................................................ 5-61(d) Web Sites .................................................................... 5-62(e) Electronic Commerce .................................................... 5-63(f) Outsourcing Agreements................................................ 5-64(g) Computer and Information Technology Industry .............. 5-64

5.5 Liabilities .............................................................................. 5-66(a) Infringement Risks ........................................................ 5-66(b) Litigation ..................................................................... 5-67

5.6 Industry Specific Issues .......................................................... 5-68(a) Franchise Industry......................................................... 5-68(b) Merchandising Industry ................................................. 5-69(c) Pharmaceutical Industry................................................. 5-69(d) Publishing Industry ....................................................... 5-70(e) Entertainment Industry................................................... 5-70(f) Sports Industry ............................................................. 5-71

5.7 Regulatory Issues................................................................... 5-72(a) Technology Transfer Restrictions.................................... 5-72(b) Reporting Requirements ................................................ 5-73(c) Access to Information ................................................... 5-73(d) Privacy and Personal Information Issues ......................... 5-73(e) Competition and Anti-trust Issues ................................... 5-74(f) Franchising................................................................... 5-75(g) Pharmaceuticals ............................................................ 5-75(h) Telecommunications...................................................... 5-76

5.8 The Results of Due Diligence ................................................. 5-77(a) Interpretation ................................................................ 5-77(b) Representations and Warranties ...................................... 5-78

1 Definitions .......................................................... 5-792 Title ................................................................... 5-793 Validity and Enforceability ................................... 5-804 Non-Infringement................................................. 5-80

(c) Opinions ...................................................................... 5-815.9 Conclusion ............................................................................ 5-82

CHAPTER 6 TECHNOLOGY AND CRIMINAL LIABILITY

6.1 Introduction........................................................................... 6-16.2 Criminal Code Offences Specifically Directed at Computers ...... 6-3

TABLE OF CONTENTS — VOLUME 1

CON-11 (Electronic Commerce) (2015–Rel. 8)

(a) Unauthorized Use of a Computer ................................... 6-31 Generally ............................................................ 6-32 “Fraudulently and Without Colour of Right” .......... 6-53 Fraudulently Obtaining Computer Services ............. 6-64 Intercepting Any Function of a Computer

System.......................................................... 6-85 Using Computer System with Intent to Commit ...... 6-9

(b) Compromising Passwords .............................................. 6-91 Trafficking in Passwords ...................................... 6-92 Possession of Device for Unauthorized Use of

Computer ...................................................... 6-10(c) Mischief To Data.......................................................... 6-11

1 The Offence Created by Subsection 430(1.1) .......... 6-112 Punishment for Mischief....................................... 6-123 Ancillary Provisions Related to Mischief................ 6-13

(i) “Wilfully” ................................................... 6-134 Mischief by Persons with an Interest in the Data .... 6-14

(d) Theft of Telecommunications Services ............................ 6-151 Generally ............................................................ 6-152 Device Intended for Use in Telecom Services

Theft ............................................................ 6-186.3 Other Criminal Code Offences Relevant to Technology

Crimes ............................................................................... 6-19(a) Theft ........................................................................... 6-19

1 Generally ............................................................ 6-192 Theft and “Information” ....................................... 6-20

(b) Fraud........................................................................... 6-211 Generally ............................................................ 6-212 Use of Copyrighted or Trade Secret Material.......... 6-23

6.4 Speech-Like Offences: Porn, Hate, Threats, and“Cyber-Luring”................................................................... 6-24

(a) Obscene Material (Pornography)..................................... 6-25(b) Hate Crimes ................................................................. 6-29(c) Threatening Offences .................................................... 6-30(d) Cyber-Luring................................................................ 6-30

6.5 Counselling of Offences ......................................................... 6-316.6 The Responsibility of the Internet Service Provider ................... 6-33

(a) Possession .................................................................... 6-33(b) Aiding and Abetting...................................................... 6-34(c) New Special Web Site Warrants..................................... 6-34

6.7 Geographical Jurisdiction Over the Offence .............................. 6-356.8 Gambling and the Internet ...................................................... 6-37

ELECTRONIC COMMERCE AND THE INTERNET

CON-12

CHAPTER 7 CYBERLIBEL

7.1 Quotations............................................................................. 7-17.2 Introduction........................................................................... 7-27.3 Elements of Libel Law ........................................................... 7-3

(a) Elements of Defamation Actions and Defences ................ 7-31 Introduction......................................................... 7-32 Actions in Defamation.......................................... 7-3

7.4 Distinctive Features of the Internet and Their Application toCyberlibel .......................................................................... 7-5

(a) Global Nature ............................................................... 7-6(b) Interactive Nature.......................................................... 7-8(c) Accessibility ................................................................. 7-10(d) Anonymity ................................................................... 7-10(e) Hyperlinks ................................................................... 7-10

1 Overview ............................................................ 7-102 Types of Hyperlinks............................................. 7-10

(f) Long-Term Impact — Permanent Archives...................... 7-13(g) Multimedia................................................................... 7-14(h) Temporal Indeterminacy ................................................ 7-14(i) The Differential Treatment of Mass Communication

Media .................................................................... 7-167.5 Differences in Cyberlibel Litigation and Offline Libel

Litigation ........................................................................... 7-18(a) Differences ................................................................... 7-18

1 Media ................................................................. 7-182 Identifying the Defendant ..................................... 7-183 Jurisdiction.......................................................... 7-184 Standards ............................................................ 7-195 Dynamism........................................................... 7-206 Action and Reaction............................................. 7-207 Counsel............................................................... 7-208 Assets ................................................................. 7-209 Remedies ............................................................ 7-2010 Conventional Versus Guerrilla/Information

Warfare......................................................... 7-217.6 Liability for Statements Made on the Internet ........................... 7-21

(a) Direct Liability ............................................................. 7-211 Canada................................................................ 7-212 United States ....................................................... 7-21

(i) Listservs ..................................................... 7-22(ii) Usenet ........................................................ 7-22

3 United Kingdom .................................................. 7-224 Australia ............................................................. 7-23

TABLE OF CONTENTS — VOLUME 1

CON-13 (Electronic Commerce) (2015–Rel. 8)

(b) Indirect Liability — The Liability of Internet ServiceProviders and Hosts of Bulletin Boards..................... 7-24

1 Distributor/Publisher Characterization .................... 7-242 United States ....................................................... 7-25

(i) Lunney v. Prodigy Services Co ..................... 7-263 United Kingdom .................................................. 7-28

(i) Publisher/Distributor..................................... 7-28(ii) Offer to Make Amends................................. 7-29(iii) Godfrey v. Demon Internet ........................... 7-30

4 Canada................................................................ 7-307.7 Apologies.............................................................................. 7-317.8 Conflicts of Laws Issues......................................................... 7-32

(a) Forum Shopping ........................................................... 7-33(b) Choice of Law Problems ............................................... 7-33(c) Decisions on Jurisdiction ............................................... 7-34

7.9 Procedural Issues ................................................................... 7-35(a) Service of Documents ................................................... 7-35(b) Demand for Particulars .................................................. 7-36(c) Plaintiff’s Strategies Seeking The Names of Original

Publishers .............................................................. 7-371 Prior to Proceedings — Ontario Cases ................... 7-372 During the Course of Proceedings ......................... 7-38

CHAPTER 8 ADVERTISING IN CYBERSPACE

8.1 Jurisdictional Issues................................................................ 8-1(a) Case Law with Regard to Jurisdiction ............................. 8-2(b) Enforcement ................................................................. 8-4(c) Case Law Concerning the Enforcement of a Foreign

Decision Concerning the Internet in Canada .............. 8-4(d) A New Jurisdiction Called Cyberspace............................ 8-6(e) Self-Regulation ............................................................. 8-7(f) Competition Bureau Guidelines ...................................... 8-7

8.2 Contests on the Net................................................................ 8-9(a) Jurisdiction................................................................... 8-9(b) Disclaimers and Governing Law and Other

Solutions................................................................ 8-10(c) The Criminal Code ....................................................... 8-10(d) Can You Limit Access to One Entry per Internet

Address? ................................................................ 8-11(e) Who Is Eligible to Enter the Contest? ............................. 8-11(f) The Regie in Quebec..................................................... 8-13(g) Skill-testing Question .................................................... 8-13(h) The Competition Act..................................................... 8-14(i) The Federal Privacy Legislation ..................................... 8-15

ELECTRONIC COMMERCE AND THE INTERNET

CON-14

(j) The Quebec Privacy Act................................................ 8-16(k) Technical Problems and Loss of Entry Forms.................. 8-17

8.3 Uniquely Canadian Trade-mark Issues ..................................... 8-17(a) What is a Trade-mark? .................................................. 8-17(b) Unregistered Trade-mark Protection

(Common Law) ...................................................... 8-17(c) Registered Trade-mark Protection

(Trade-marks Act)................................................... 8-18(d) Common Law versus Federal Protection ......................... 8-18(e) Statutory Framework ..................................................... 8-19(f) Domain Names and Trade-marks on the Internet.............. 8-20(g) Trade-mark Infringement on the Internet

— Case Law .......................................................... 8-22(h) Trade-mark Infringement by Framing on

the Internet............................................................. 8-24(i) Recent Decision on Trade-mark Infringement Through

Hyperlinking .......................................................... 8-258.4 Other Forms of Advertising In Cyberspace............................... 8-26

(a) Spamming.................................................................... 8-26(b) Cookies........................................................................ 8-28

8.5 Advertising versus Entertainment — Where to Drawthe Line ............................................................................. 8-28

8.6 Conclusion ............................................................................ 8-30Appendix 8A: Sentencing Table — False and Misleading

Advertising......................................................................... 8A-1

CHAPTER 9 LINKS, FRAMES, AND META TAGS

9.1 Meta Tags ............................................................................. 9-1(a) Introduction.................................................................. 9-1(b) Legal Disputes.............................................................. 9-3

1 Trade-mark Liability ............................................ 9-32 Initial Interest Confusion ...................................... 9-73 Keyword Advertising ........................................... 9-8

9.2 Linking ................................................................................. 9-12(a) Introduction.................................................................. 9-12

1 Linking in General ............................................... 9-122 Appearance and Nature of Links ........................... 9-133 The Use of Links................................................. 9-14

(b) Legal Disputes.............................................................. 9-151 Copyright ............................................................ 9-15

(i) Direct Infringement ...................................... 9-15(ii) Compilations ............................................... 9-19(iii) Authorizing/Contributing to

Infringement ................................................ 9-20

TABLE OF CONTENTS — VOLUME 1

CON-15 (Electronic Commerce) (2016–Rel. 5)

2 Trade-mark and Unfair Competition....................... 9-233 Defences ............................................................. 9-26

(i) Fair Use/Implied Licence: Direct CopyrightInfringement ................................................ 9-26

(ii) Fair Use: Trade-marks .................................. 9-26.2(iii) Free Speech................................................. 9-26.2

4 Contract .............................................................. 9-26.45 Tort .................................................................... 9-286 Avoiding/Mitigating Liability When

Creating Links ............................................... 9-28(i) Obtain Permission........................................ 9-28(ii) Use Disclaimers ........................................... 9-29

7 To Avoid Third Party Links.................................. 9-309.3 Framing ................................................................................ 9-30

(a) Introduction.................................................................. 9-30(b) Legal Disputes.............................................................. 9-32

1 Copyright ............................................................ 9-342 Unfair Competition/Trade-mark ............................. 9-373 Contract .............................................................. 9-394 Tort .................................................................... 9-40

(c) Licensing ..................................................................... 9-40(d) Technical Measures....................................................... 9-41

CHAPTER 10 COMPUTER SECURITY INVESTIGATION ANDRELATED LEGAL CONSIDERATIONS

10.1 Introduction........................................................................... 10-1(a) Security and Law.......................................................... 10-1(b) Legal Obligation to Provide Adequate

Security Measures ................................................... 10-210.2 Introduction to Criminal Law .................................................. 10-3

(a) A Framework for Computer Crime Laws ........................ 10-4(b) Canadian Computer Crime Laws .................................... 10-6

1 Unauthorized Use of a Computer System ............... 10-62 Possession of System Cracking Devices ................. 10-83 Mischief in Relation to Data ................................. 10-94 Luring of Children on the Internet ......................... 10-105 Child Pornography and the Internet ....................... 10-126 General Theft Provision: Theft of Confidential

Information ................................................... 10-157 Theft of a Telecommunication Service ................... 10-198 Fraud — Sale of Copyright Infringing Goods ......... 10-219 Quasi-Criminal Remedies Under the

Copyright Act................................................ 10-23(c) U.S. Federal Computer Crime Laws ............................... 10-25

ELECTRONIC COMMERCE AND THE INTERNET

CON-16

1 Computer Fraud and Abuse Act of 1986................ 10-252 Electronic Communications Privacy Act................. 10-273 Computer Security Act of 1987............................. 10-28

10.3 Authorized Use and a Computer Use and CommunicationsPolicy ................................................................................ 10-29

10.4 Computer Abuse Checklist...................................................... 10-30(a) Review of Documents ................................................... 10-32(b) Review of the Abuser’s Alleged Conduct ........................ 10-34

10.5 Summary .............................................................................. 10-36

CHAPTER 11 CANADIAN EXPORT CONTROLS ANDINFORMATION TECHNOLOGY

11.1 Introduction........................................................................... 11-111.2 Definition and Development of Export Controls........................ 11-211.3 Canada’s System of Export Controls........................................ 11-5

(a) The Export Control List (ECL) ...................................... 11-6(b) The ECL: Cryptography ................................................ 11-9(c) The Area Control List (ACL)......................................... 11-14(d) Export Permits: IEPs and GEPs...................................... 11-15(e) Penalties for Contravention of the EIPA.......................... 11-18(f) Enforcing Canada’s Export Controls Regime ................... 11-18

11.4 The Special Case of the United States...................................... 11-19(a) Goods Exported to the United States .............................. 11-19(b) General Restrictions on U.S. Goods................................ 11-19(c) U.S.-Origin Goods Transiting Canada ............................. 11-21(d) U.S. Measures in Relation to Trade with Cuba ................ 11-21

11.5 Contractual Provisions for IT-Related Agreements .................... 11-23Appendix A: IT-Related Items in Canada’s ECL................................... 11-24Appendix B: Export Controls Websites and Related Links..................... 11-27

CHAPTER 12 DIGITAL CERTIFICATES: SIGNATURES,ENCRYPTION, AND TRUST IN ELECTRONICENVIRONMENTS

12.1 The Statement of Requirements ............................................... 12-212.2 The Technology: Concepts and Frameworks............................. 12-4

(a) Encryption and Digital Signatures................................... 12-4(b) Digital Certificates ........................................................ 12-6(c) Revocation Checking .................................................... 12-7(d) The Principal Actors ..................................................... 12-8

1 Certification Authority (CA) ................................. 12-82 Registration Authority (RA) .................................. 12-83 Directory Service Provider .................................... 12-84 Subscribers.......................................................... 12-8

TABLE OF CONTENTS — VOLUME 1

CON-17 (Electronic Commerce) (2016–Rel. 5)

5 Relying Parties .................................................... 12-9(e) The Documents ............................................................ 12-9

12.3 How the Technology Meets the Statementof Requirements.................................................................. 12-13

12.4 The Treatment of Digital Certificates in Canada........................ 12-15(a) Federal Legislation........................................................ 12-15(b) Secure Electronic Signatures in Part 2............................. 12-16(c) Provinces Other than Quebec ......................................... 12-18(d) Quebec ........................................................................ 12-19

1 Certificates .......................................................... 12-202 Certification Service and Directory Service

Providers....................................................... 12-213 Accreditation ....................................................... 12-234 Certification Devices ............................................ 12-24

(i) Due Diligence ............................................. 12-2412.5 Conclusion ............................................................................ 12-25Annex A: RFC 2527 Internet X-509 Public Key Infrastructure Certificate

Policy and Certification Practices Framework ........................ 12-27Annex B: Proposed Revision of RFC 2527 .......................................... 12-32

CHAPTER 13 EFFECTIVE ONLINE LEGAL AGREEMENTS:ELECTRONIC COMMERCE IN AN AGE OFUNCERTAINTY

13.1 The Traditional Law of Contracts and Electronic Commerce ...... 13-213.2 Click-Through Contracts......................................................... 13-313.3 Creating Effective “Click-Through” Contracts........................... 13-7

(a) Forming the Contract .................................................... 13-71 Automated Acceptance ......................................... 13-7

(b) Formal Requirements .................................................... 13-81 Writing Requirements........................................... 13-82 Signature Requirements ........................................ 13-83 Electronic Signatures ............................................ 13-94 Record Retention Requirements............................. 13-105 Language ............................................................ 13-10

(c) Drafting the Click-Through Agreement ........................... 13-1013.4 Electronic Commerce Legislation ............................................ 13-12

(a) International Laws......................................................... 13-121 UNCITRAL’s Model Law on

Electronic Commerce ..................................... 13-122 UNCITRAL’s Model Law on

Electronic Signatures ...................................... 13-13(b) Canadian Laws ............................................................. 13-13

1 Provincial Laws ................................................... 13-14(c) Federal Laws................................................................ 13-15

ELECTRONIC COMMERCE AND THE INTERNET

CON-18

1 Personal Information Protection and ElectronicDocuments Act, S.C. 2000, c. 5 ...................... 13-15

(d) Private Sector Codes and Guidelines............................... 13-171 Internet Sales Contract Harmonization ................... 13-172 Canadian Marketing Association Code of Ethics

and Standards of Practice................................ 13-1713.5 Controlling Exposure to Laws of Foreign Jurisdictions .............. 13-18

(a) Jurisdiction in Canadian Internet Cases ........................... 13-181 Rudder v. Microsoft ............................................. 13-182 Braintech, Inc. v. Kostiuk ..................................... 13-19

(b) Jurisdiction in U.S. Internet Cases .................................. 13-191 Zippo Manufacturing Company v. Zippo

DotCom Inc .................................................. 13-192 Post-Zippo Cases ................................................. 13-203 Jurisdiction and Online Forum Selection ................ 13-21

(c) Industry Examples ........................................................ 13-23(d) Checklist for Controlling Exposure to Laws of Foreign

Jurisdictions ........................................................... 13-2313.6 Conclusion ............................................................................ 13-24

CHAPTER 14 DOMAIN NAMES AND E-COMMERCE

14.1 Introduction........................................................................... 14-114.2 Domain Name Registration ..................................................... 14-2

(a) “First Come, First Served”............................................. 14-2(b) Registrars & Registries .................................................. 14-3(c) “Unrestricted” Registration versus “Restricted”

Registration ............................................................ 14-4(d) Choosing gTLDs and ccTLDs........................................ 14-5

14.3 Trade-mark Disputes .............................................................. 14-6(a) Canadian Causes of Action under Trade-mark Law.......... 14-7(b) U.S. & U.K. Cases on Cyberpirates ................................ 14-9

14.4 Uniform Domain-Name Dispute-Resolution Policy (UDRP) ....... 14-1214.5 U.S. Anticybersquatting Legislation ......................................... 14-1814.6 Jurisdiction and Domain Name Disputes .................................. 14-1914.7 CIRA’s Dispute Resolution Policy for the .ca Domain............... 14-22

VOLUME 2

CHAPTER 15 ELECTRONIC MONEY

15.1 Legal Questions about E-Money.............................................. 15-115.2 SVPs and Other Payment Instruments ...................................... 15-215.3 Definitional Issues of Money and E-Money.............................. 15-13

(a) Defining Money ........................................................... 15-14

TABLE OF CONTENTS — VOLUME 1

CON-19 (Electronic Commerce) (2016–Rel. 5)

(b) Defining E-Money ........................................................ 15-1615.4 Modern E-Money................................................................... 15-21

(a) SVPs ........................................................................... 15-22(b) Technical Features of Modern SVPs ............................... 15-24

1 Examples of Early SVPs....................................... 15-232 SVP Storage Media and Technical Functions.......... 15-273 Players and Payment Infrastructure ........................ 15-30

(c) Legal Analysis of SVPs................................................. 15-331 True E-Money ..................................................... 15-332 Other SVPs ......................................................... 15-353 Issuance of SVPs ................................................. 15-364 Validity of SVP Payments .................................... 15-415 Storing Issued Value ............................................ 15-416 PayPal and Zoompass User Agreements................. 15-43

(d) Criteria for evaluating SVPs........................................... 15-4515.5 Regulation of E-Money .......................................................... 15-48

(a) Global and Canadian Financial Industry Concernsabout E-Money....................................................... 15-48

(b) Bank De-intermediation ................................................. 15-48(c) Monetary System Concerns: E-money As a New Form

of Money ............................................................... 15-4915.6 Concluding Thoughts ............................................................. 15-56

CHAPTER 16 E-TAXATION: INTERNATIONAL TAXATION OFE- COMMERCE

16.1 Overview of Internet Taxation................................................. 16-1(a) Types of Electronic Commerce ...................................... 16-2(b) Types of Taxes ............................................................. 16-2(c) Identification of Taxpayers and Jurisdiction to Tax

E-Commerce Transactions ....................................... 16-3(d) Characterization of Licence Fees: Business Income or

Royalties? .............................................................. 16-4(e) Elimination of Intermediaries and the Threat to Tax

Collection .............................................................. 16-5(f) Lack of Harmonization in E-Commerce Taxation............. 16-5

16.2 Rules for Taxation of Income from E-Commerce and TechnologyBusinesses.......................................................................... 16-6

(a) Interaction between Tax Treaties and DomesticTax Rules .............................................................. 16-6

(b) Taxation of International Business Profits........................ 16-8(c) Withholding Tax Obligations for Dividends, Interest

and Royalties.......................................................... 16-1016.3 Canada’s Income Tax Treatment of E-Commerce Vendors......... 16-14

(a) Overview of Canada’s Income Tax System ..................... 16-14

ELECTRONIC COMMERCE AND THE INTERNET

CON-20

(b) Taxation of Non-Residents Conducting Business inCanada................................................................... 16-16

(c) Provincial Income Tax Considerations ............................ 16-21(d) Special Canadian Income Tax Programs.......................... 16-21

1 Qualified Small Business Corporation Exemption ... 16-212 Investment Tax Credits......................................... 16-223 Amortization of Intangibles................................... 16-234 Tax-free Rollovers for Qualified Technology

Businesses..................................................... 16-2316.4 United States Income Tax Treatment of

E-Commerce Vendors ......................................................... 16-24(a) Overview of U.S. Income Tax System ............................ 16-24(b) Taxation of Non-Residents Conducting a Trade or

Business in the United States ................................... 16-27(c) Issues and Considerations in U.S. Income Taxation.......... 16-29

1 Characterization of Income ................................... 16-292 Restrictions on Taxing Powers of U.S. States ......... 16-293 International Tax Planning for U.S.-based

E-Commerce Ventures.................................... 16-314 Transfer of Pricing Rules for Intangibles ................ 16-31

16.5 Sales, GST, HST and Other Transaction Taxes ......................... 16-33(a) Canada......................................................................... 16-34

1 Federal GST and the HST .................................... 16-342 Provincial Sales Taxes.......................................... 16-35

(b) United States ................................................................ 16-361 U.S. State Sales and Use Taxes............................. 16-36

(c) Europe and Value-Added Taxes forE-Commerce Vendors ............................................. 16-39

1 Distance Selling Cap ............................................ 16-392 Export Sales ........................................................ 16-393 Import Concerns .................................................. 16-404 Services .............................................................. 16-405 Rates of VAT...................................................... 16-41

16.6 Trends in the Taxation of E-Commerce.................................... 16-42(a) Computer Servers, Web Sites and the Expansion of

the Permanent Establishment Concept ....................... 16-42(b) Tax havens, Residence, and the Manipulation of Tax

Rules ..................................................................... 16-44(c) Establishing Transfer Prices for Intangible Goods and

Services ................................................................. 16-45

[Chapters 17 and 18 to be issued in a further release]

TABLE OF CONTENTS — VOLUME 1

CON-21 (Electronic Commerce) (2016–Rel. 5)

CHAPTER 19 PRIVACY IN ELECTRONIC COMMERCE:CANADA’S PRIVATE SECTOR PRIVACY REGIME

19.1 Introduction........................................................................... 19-119.2 Recent Media Attention .......................................................... 19-219.3 Recent Scrutiny of Google...................................................... 19-3

(a) Australia ...................................................................... 19-3(b) France.......................................................................... 19-3(c) Switzerland .................................................................. 19-4(d) Czech Republic ............................................................ 19-4(e) Germany ...................................................................... 19-4(f) Canada......................................................................... 19-4

19.4 Recent Scrutiny of Facebook .................................................. 19-6(a) Canada......................................................................... 19-6(b) USA ............................................................................ 19-6(c) European Union............................................................ 19-8

19.5 The Changing Face of Privacy ................................................ 19-9(a) United States ................................................................ 19-10(b) Canada......................................................................... 19-12

1 Federal................................................................ 19-122 Alberta................................................................ 19-16

19.6 Canada’s Privacy Sector Privacy Regime ................................. 19-18(a) Federal Laws................................................................ 19-20(b) Provincial and Territorial Laws ...................................... 19-22(c) Key Canadian Privacy Principles .................................... 19-24(d) A Few Words About Consent ........................................ 19-27(e) What Are The Main Exemptions?................................... 19-30(f) A Compliance Checklist ................................................ 19-31

19.7 Creating Practical Privacy Policies........................................... 19-31(a) Exchange of Personal Information with

Service Providers .................................................... 19-32(b) Exchanges of Personal Information in Business

Transactions ........................................................... 19-33(c) The Alberta and British Columbia Transaction

Exemptions ............................................................ 19-3619.8 Checklists ............................................................................. 19-39Appendix — A Summary of July 16, 2009 Report of Findings:

Facebook ........................................................................... 19-43

CHAPTER 20 SELF-REGULATION: NETIQUETTE

20.1 Introduction........................................................................... 20-120.2 Definition of Netiquette .......................................................... 20-320.3 Definition of Self-Regulation .................................................. 20-320.4 Tools of Self-Regulation......................................................... 20-4

ELECTRONIC COMMERCE AND THE INTERNET

CON-22

20.5 Types of Self-Regulation ........................................................ 20-5(a) User Self-Control/Self-Regulation ................................... 20-5(b) Inherent Ability of Every User of the Net to Decide

Where to Go, What to Read, and with Whomto Interact............................................................... 20-8

1 Filters ................................................................. 20-8(c) Organizations on the Internet that Provide Information

and Play a Watchdog Role....................................... 20-111 Junkbusters ......................................................... 20-112 Panix .................................................................. 20-113 Internet Content Rating for Europe

(INCORE)..................................................... 20-114 Internet Content Rating Association (ICRA) ........... 20-125 GetNetWise......................................................... 20-12

(d) Voluntary Rating Systems.............................................. 20-13(e) Self-Regulation through a Web of Contracts .................... 20-15

1 Internet Service Provider Rules ............................. 20-1520.6 Conclusion ............................................................................ 20-19Appendix 1: Terminology Applicable to Netiquette ............................... 20-21

[Chapter 21 to be issued in a further release]

CHAPTER 22 JURISDICTION AND PROCEDURE ISSUES

22.1 Introduction........................................................................... 22-1(a) Traditional Approach to Jurisdiction and

Conflict of Laws..................................................... 22-2(b) Jurisdiction and Conflict of Laws Issues in Electronic

Commerce.............................................................. 22-322.2 Personal Jurisdiction in Canada ............................................... 22-5

(a) Underlying Law............................................................ 22-51 Common Law Province Procedural

Requirements................................................. 22-52 Quebec Civil Code............................................... 22-63 Constitutional Limitations ..................................... 22-84 Forum Non Conveniens........................................ 22-10

(b) Contractually Determining Venue andChoice of Law........................................................ 22-10

1 Common Law Provinces....................................... 22-112 Quebec ............................................................... 22-143 Internet and Electronic Commerce Statutes ............. 22-14

(c) Personal Jurisdiction on the Internet in Canada ................ 22-161 Common Law Courts ........................................... 22-162 Quebec Courts ..................................................... 22-203 Application of Federal Statutes.............................. 22-22

(d) Enforcement of Foreign Judgments................................. 22-24

TABLE OF CONTENTS — VOLUME 1

CON-23 (Electronic Commerce) (2016–Rel. 5)

1 Importance of Enforcement Jurisdiction inInternet Cases ................................................ 22-24

2 Common Law Provinces....................................... 22-243 Quebec Rules ...................................................... 22-26

22.3 Personal Jurisdiction in the United States ................................. 22-27(a) Relevance of U.S. Case Law.......................................... 22-27(b) Underlying U.S. Law Regarding

Personal Jurisdiction................................................ 22-27(c) Personal Jurisdiction in U.S. Internet Cases ..................... 22-29

1 “Doing Business” Over the Internet ....................... 22-292 “Passive” Web sites ............................................. 22-313 The Zippo Spectrum............................................. 22-324 Targetting/Contacts with the Forum ....................... 22-375 Intentional Torts .................................................. 22-40

22.4 Prescriptive (Regulatory) Jurisdiction ....................................... 22-44(a) The Issue: Where Can You Be Regulated? ...................... 22-44(b) Prescriptive Jurisdiction: Underlying Canadian Law ......... 22-45

1 Potentially Applicable Canadian Statutes ................ 22-452 Scope of Canadian Statutes ................................... 22-463 Constitutional Limits on the Reach of Statutory

Provisions ..................................................... 22-474 Extraterritorial Application.................................... 22-48

(c) Contracting Out of Statutory Provisions ThroughChoice of Law........................................................ 22-50

1 Contracting Out Under Common Law.................... 22-51(i) Enforceability of Choice of Law Clauses........ 22-51(ii) Effect of Choice of Law Clauses ................... 22-52(iii) Statutes Applicable Regardless of the Proper

Law of the Contract ..................................... 22-532 Contracting Out Under Quebec Law ...................... 22-55

(i) General Rules .............................................. 22-55(ii) Consumer Contracts ..................................... 22-56

3 Prescriptive Jurisdiction Under U.S. Law ............... 22-57(d) Canadian Approaches to Regulatory Jurisdiction on the

Internet .................................................................. 22-581 Service Available to Residents .............................. 22-582 Physical Office Located in Jurisdiction .................. 22-603 Where the Control of the Internet

Content Resides ............................................. 22-624 Real and Substantial Connection ........................... 22-635 Jurisdiction for Online Criminal Activities.............. 22-656 Relevance of Targeting to Regulatory or Criminal

Law Jurisdiction ............................................ 22-68(e) Screening Web Site Visitors........................................... 22-69

22.5 International Initiatives ........................................................... 22-71

ELECTRONIC COMMERCE AND THE INTERNET

CON-24

(a) International Positivist Law............................................ 22-71(b) Brussels Regulation on Jurisdiction................................. 22-71(c) Hague Convention on International Jurisdiction ............... 22-73

1 Personal Jurisdiction............................................. 22-742 Choice of Forum and Consumer Contracts ............. 22-743 Enforcement of Foreign Judgments........................ 22-75

CHAPTER 23 REGULATION OF TELECOMMUNICATIONS ANDBROADCASTING ON THE INTERNET

23.1 Introduction........................................................................... 23-123.2 Broadcasting.......................................................................... 23-2

(a) Background.................................................................. 23-2(b) The Statutory Framework .............................................. 23-4(c) CRTC Decisions Addressing Broadcasting in

New Media ............................................................ 23-71 Introduction......................................................... 23-72 Legal Analysis..................................................... 23-73 Regulation vs. Exemption ..................................... 23-124 Exemptions Orders............................................... 23-15

23.3 Telecommunications............................................................... 23-16(a) Background.................................................................. 23-16(b) The Statutory Framework .............................................. 23-18(c) Ownership and Control.................................................. 23-20(d) Regulation of Canadian Carriers’ Rates

and Services ........................................................... 23-20(e) Rate Regulation of Retail Internet Access Service ............ 23-21(f) Access to Facilities ....................................................... 23-21(g) Net Neutrality............................................................... 23-25(h) Universal Access Subsidies ............................................ 23-28

23.4 Radiocommunication .............................................................. 23-32(a) Application................................................................... 23-32(b) Requirement to Hold a Licence ...................................... 23-33(c) Eligibility ..................................................................... 23-34

[Chapter 24 to be issued in a further release]

CHAPTER 25 BARGAINS BY MISTAKE: ONLINE PRICINGERRORS

25.1 Introduction........................................................................... 25-1(a) The Rise of E-commerce ............................................... 25-2(b) The Importance of Online Price Mistakes........................ 25-2

25.2 Contract Law and Online Price Mistakes.................................. 25-5(a) Offer to Contract and Invitation to Treat ......................... 25-5(b) Auto-Replies and Acceptance......................................... 25-8

TABLE OF CONTENTS — VOLUME 1

CON-25 (Electronic Commerce) (2016–Rel. 5)

(c) Unilateral Mistake......................................................... 25-10(d) Enforceability of Click Wrap and Browse Wrap Terms

of Use and Sale ...................................................... 25-1325.3 Case Studies of Prominent Online Price

Mistake Situations............................................................... 25-18(a) Common Law Jurisdictions............................................ 25-19

1 Singapore ............................................................ 25-192 United States ....................................................... 25-223 United Kingdom .................................................. 25-254 Canada................................................................ 25-31

(b) Civil Law Jurisdictions .................................................. 25-331 Germany ............................................................. 25-332 France................................................................. 25-36

25.4 Legal Commentary on Issues Surrounding Online PriceMistakes ............................................................................ 25-37

(a) Categories of Online Price Mistake................................. 25-381 Blatantly Obvious Price Mistakes .......................... 25-382 Low Price, But With an Explanation...................... 25-393 Non-Apparent Mistakes ........................................ 25-394 False Mistakes ..................................................... 25-40

(b) Typical Responses by E-tailers toMistake Situations................................................... 25-41

1 Honouring of Erroneous Prices.............................. 25-412 Characterize Web Page as Invitation to Treat.......... 25-423 Reliance on Doctrine of Unilateral Mistake ............ 25-434 Control of Contracting Process Through Online

Terms ........................................................... 25-44(c) Key Factors in Online Price Mistake Situations ............... 25-45(d) Towards a Consistent Treatment of Online

Price Mistakes ........................................................ 25-4725.5 Prevention and Mitigation of Online Pricing Mistakes ............... 25-49

(a) Design of Legally Sufficient Terms and Conditions.......... 25-50(b) Structure as Click-Wrap Agreements............................... 25-52(c) Ensure Human Review of Orders ................................... 25-53(d) Software Price Error Early Warning Systems................... 25-54(e) Case Study: Amazon ..................................................... 25-55

25.5 Conclusion ............................................................................ 25-57

CHAPTER 26 CLOUD COMPUTING — A CONTRACTUALANALYSIS

26.1 Introduction........................................................................... 26-126.2 Cloud Computing Defined ...................................................... 26-1

(a) On-Demand Self-Service ............................................... 26-2(b) Broad Network Access .................................................. 26-2

ELECTRONIC COMMERCE AND THE INTERNET

CON-26

(c) Resource Pooling .......................................................... 26-2(d) Rapid Elasticity ............................................................ 26-3(e) Measured Service.......................................................... 26-3

26.3 Cloud Computing Arrangement Models .................................. 26-3(a) Software as a Service (SaaS).......................................... 26-3(b) Platform as a Service (PaaS) .......................................... 26-4(c) Infrastructure as a Service.............................................. 25-4

26.4 Parties to a Cloud .................................................................. 26-426.5 Importance of Cloud Computing Today ................................... 26-526.6 Risks Associated with Cloud Computing.................................. 26-5

(a) Outages........................................................................ 26-6(b) Jursidiction................................................................... 26-6(d) Security and Privacy ..................................................... 26-7(d) Licensing and Contractual Issues .................................... 26-7(e) Data Protection Issues ................................................... 26-8(f) Scalability of Serivce .................................................... 26-8(g) Storing Data ................................................................. 26-9(h) Abuse of Service .......................................................... 26-9(i) Insecure Interfaces ........................................................ 26-9(J) Detection of Malicious Insiders ...................................... 26-10(k) Shared Technology Issues.............................................. 26-10(l) Data Loss and Leakage ................................................. 26-10(m) Hacking ....................................................................... 26-11

26.7 Contractual Issues in Cloud Computing ................................... 26-11(a) Standard Terms of Suppliers .......................................... 26-11(b) Shared Resources.......................................................... 26-12(c) Pricing and Fee Structure............................................... 26-12(d) Changing Providers ....................................................... 26-13(e) Level of Accessibility.................................................... 26-14(f) Service Level Agreements ............................................. 26-15(g) Disaster Recovery and Business Continuity ..................... 26-15(h) Audit Rights................................................................. 26-16(i) Ownership and Control of Data...................................... 26-16(j) Reputational Risk.......................................................... 26-17(k) Data Breach Notification ............................................... 26-17(l) Privacy and Data Security.............................................. 26-18

26.8 IP Issues in Cloud Computing Arrangements............................ 26-18(a) Software Licensing........................................................ 26-19(b) Control Licensing ......................................................... 26-19(c) Indemnities................................................................... 26-20(d) Protection of IP ............................................................ 26-20

26.9 Challenges ............................................................................ 26-20(a) Privacy and Data Security Concerns ............................... 26-20(b) Data Security................................................................ 26-32(c) IP Related Cases........................................................... 26-33

TABLE OF CONTENTS — VOLUME 1

CON-27 (Electronic Commerce) (2016–Rel. 5)

26.10 Conclusion ............................................................................ 26-40

CHAPTER 27 CANADA’S NEW ANTI-SPAM LEGISLATION

27.1 Introduction........................................................................... 27-1(a) Legislative History ........................................................ 27-1(b) Problems Dealt with by the Legislation........................... 27-2(c) Status of the Legislation ................................................ 27-3

27.2 Scope of CASL ..................................................................... 27-627.3 Prohibitions ........................................................................... 27-8

(a) Commercial Electronic Messages.................................... 27-8(b) Exemptions .................................................................. 27-10(c) Implied Consent............................................................ 27-14(d) Express Consent ........................................................... 27-16(e) Alteration of Transmission Data ..................................... 27-17(f) Installation of Computer Program ................................... 27-18

27.4 Liability ................................................................................ 27-20(a) Enforcement Agencies ................................................... 27-20(b) Investigation and Enforcement ....................................... 27-21(c) Injunction..................................................................... 27-26(d) Private Right of Action ................................................. 27-26(e) Offences ...................................................................... 27-26(f) Liability of Directors, Officers, and Agents ..................... 27-27(g) Defences ...................................................................... 27-28

27.5 Compliance ........................................................................... 27-28(a) Transition Period .......................................................... 27-28(b) Compliance .................................................................. 27-28

APPENDIX A AGREEMENTS AND POLICIES

Appendix A.1: Web Site Terms of Service Agreements ......................... A.1-1[Appendix A.2 - A.3 to be issued in a further release]Appendix A.4: Linking Agreements..................................................... A.4-1[Appendix A.5 - A.6 to be issued in a further release]Appendix A.7: Privacy Policies ........................................................... A.7-1Appendix A.8: Content Distribution and License Agreement.................. A.8-1Appendix A.9: Advertising Distribution Agreement............................... A.9-1A.10 Domain Name and Content License Agreement ........................ A.10-1A.11 Wireless Content License Agreement ....................................... A.11-1A.12 Linking Agreement ................................................................ A.12-1Appendix A.13: Application Service Provider License and Services

Agreement.......................................................................... A.13-1Appendix A.14: Website Hosting and License Agreement ..................... A.14-1Appendix A.15: Master Outsourcing Services Agreement ...................... A.15-1

ELECTRONIC COMMERCE AND THE INTERNET

CON-28

APPENDIX B MISCELLANEOUS

Appendix B.1: Act A775 Copyright (Amendment) Act 1990 ................. B.1-1Appendix B.1: Digital Millennium Copyright Act ................................. B.1-13Appendix B.1: U.S. Communications Decency Act ............................... B.1-73Appendix B.2: U.S.A Freedom Act of 2015 ......................................... B.2-1

VOLUME 3

APPENDIX B MISCELLANEOUS

Appendix B.4: Manual of Patent Office Practice - Chapter 16:Computer-Implemented Inventions........................................ B.4-11

Appendix B.5: Copyright Act R.S.C. 1985, c. C-42 .............................. B.5-1Appendix B.6: MicroSD Cards Exclusion Regulations (Copyright Act)... B.6-1

APPENDIX C PRIVATE SECTOR PRIVACY LEGISLATION

Appendix C.1: Personal Information Protection 1and Electronic DocumentsAct .................................................................................... C.1-1

Appendix C.2: Personal Information Protection Act, S.A. 2003 .............. C.2-1Appendix C.3: Personal Information Protection Act, S.B.C. 2003........... C.3-1Appendix C.3A: E-Health (Personal Health Information Access and

Protection of Privacy) Act ................................................... C.3A-1Appendix C.3B: The Personal Information Protection and Identity Theft

Proection Act ..................................................................... C.3B-1Appendix C.4: Personal Health Information Protection Act, 2004 ........... C.4-1Appendix C.5: Ca. Reg. 2004-308 — Electronic Alternatives

Regulations for the Purposes of the Federal Real Propertyand Federal Immovables Act................................................ C.5-1

Appendix C.6: Can Reg. 2005-30 — Secure Electronic SignatureRegulations ........................................................................ C.6-1

Appendix C.7: Can RE. 2008-115 — Electronic AlternativesRegulations for the Purposes of Subsection 254(1) of theCanada Labour Code........................................................... C.7-1

Appendix C.8: An Act Respecting Protection of Personal Informationin the Private Sector............................................................ C.8-1

Appendix C.9: Seizing Opportunity: Good Privacy Practices forDeveloping Mobile Apps..................................................... C.9-1

Appendix C.10: Guidelnes: Policy Position on Online BehaviouralAdvertising......................................................................... C.10-1

Appendix C.11: Practice Resource....................................................... C.11-1Appendix C.12: Privacy and Social Media in the Age of Big Data ......... C.12-1Appendix C.13: Children’s Online Privacy Protection Act of 1998 ......... C.13-1Appendix C.14: Children’s Online Privacy Protection Rules

(Effective July 1, 2013) ....................................................... C.14-1

TABLE OF CONTENTS — VOLUME 1

CON-29 (Electronic Commerce) (2016–Rel. 5)

Appendix C.15: A Primer on Metadata: Separating Factfrom Fiction, Information and Privacy Commissioner, Ontario,July 2013 ........................................................................... C.15-1

Appendix C.16: Guidelines for Online Consent (Federal)....................... C.16-1Appendix C.17: Transparency, Privacy and the Internet: Municipal

Balancing Acts from Fiction, Information and PrivacyCommissioner of Ontario..................................................... C.17-1

Appendix C.18: The Internet of Things: An introduction to privacyissues with a focus on the retail and home environments ........ C.18-1

APPENDIX D E-DOCUMENT LEGISLATION

Appendix D.1: Canada Cooperatives Act, S.C. 1998 [Selectedsections, Part 21.1, ss.361.1 — 361.7] .................................. D.1-1

Appendix D.2: Canada Business Corporations Act, R.S.C. 1985[Selected sections, Part XX.1, ss. 252.1 — 252.7].................. D.2-1

Appendix D.3: Criminal Code, R.S.C. 1985 [Selected sections PartXXVII, ss. 841 — 847]....................................................... D.3-1

Appendix D.4: Canada Evidence Act, R.S.C. 1985 [Selected section,s. 31.1] .............................................................................. D.4-1

Appendix D.5: Business Corporations Act, S.B.C. 2002 [Selectedsections, ss. 12, 412(1)9-(3), 418(1)-(4)] ............................... D.5-1

Appendix D.6: Business Practices and Consumer Protections Act,S.B.C. 2004 [Selected sections, ss. 47(1) and 54]................... D.6-1

Appendix D.7: Evidence Act, R.S.B.C. 1996 [Selected section, s. 41.1] .. D.7-1

APPENDIX E BUSINESS PRACTICES LEGISLATION: COOLDOWN PERIODS

Appendix E.1: Fair Trading Act, R.S.A. 2000 [Selected section, s. 27] ... E.1-1Appendix E.2: Alta. Reg. 81/2001 — Internet Sales Contract Regulation E.2-1Appendix E.3: Business Practices and Consumer Protection Act,

S.B.C. 2004 [Selected sections, ss. 21 and 25]....................... E.3-1Appendix E.4: Consumer Protection Act, S.O. 2002 [Selected

sections, ss. 35, 43 and 51].................................................. E.4-1

APPENDIX F E-RECORDS AND E-TRANSACTIONSLEGISLATION

Appendix F.1: Electronic Transactions Act, S.A. 2001, c. E-5.5 ............. F.1-1Appendix F.2: Alta. Reg. 34/2003 — Electronic Transactions

Act General Regulation ....................................................... F.2-1Appendix F.3: Fair Trading Act, R.S.A. 2000....................................... F.3-1Appendix F.4: Electronic Transactions Act S.B.C. 2001 ........................ F.4-1Appendix F.5: The Consumer Protection Act, R.S.M. 1987 [Selected

sections, Part XXVII, ss. 127-135] ....................................... F.5-1

ELECTRONIC COMMERCE AND THE INTERNET

CON-30

Appendix F.6: The Electronic Transactions Act, S.M. 2000 ................... F.6-1Appendix F.7: Man. Reg. 176/2002 — Common Business Identifiers

Regulation.......................................................................... F.7-1Appendix F.8: Electronic Transactions Act, S.N.B. 2001 ....................... F.8-1Appendix F.9: Consumer Protection and Business Practices Act,

S.N. 2009 [Selected section, s. 30] ....................................... F.9-1Appendix F.10: Electronic Commerce Act, S.N. 2001 ........................... F.10-1Appendix F.11: The Consumer Protection Act, R.S.N.S. 1989 [Selected

section, s. 21AB] ................................................................ F.11-1Appendix F.12: N.S. Reg. 91/2002 — Internet Sales Contract

Regulations ........................................................................ F.12-1Appendix F.13: The Consumer Protection and Business Practices Act,

S.S. 2014 ........................................................................... F.13-1Appendix F.13A: The Consumer Protection and Business Practices

Regulations ........................................................................ F.13A-1Appendix F.14: Electronic Commerce Act, S.N.S. 2000 ........................ F.14-1Appendix F.15: Electronic Commerce Act, S. Nu. 1004 ........................ F.15-1Appendix F.16: Electronic Commerce Act, S.O. 2000 ........................... F.16-1Appendix F.17: Electronic Commerce Act, S.P.E.I. 2001....................... F.17-1Appendix F.18: An Act to Establish a Legal Framework for Information

Technology, R.S.Q., c. C-1.1 ............................................... F.18-1Appendix F.19: The Electronic Information and Documents Act,

S.S. 2000 ........................................................................... F.19.1Appendix F.20: R.R.S., c. E.7.22, Reg. 1 — The Electronic

Information and Documents Regulations ............................... F.20-1Appendix F.21: Electronic Commerce Act, R.S.Y. 2002........................ F.21-1Appendix F.22: Table of Concordance - Electronic Commerce Statutes... F.22-1

VOLUME 4

APPENDIX G ELECTRONIC COMMUNICATION

Appendix G.1: An Act to promote the efficiency and adaptability ofthe Canadian economy by regulating certain activitiesthat discourage reliance on electronic means of carrying outcommercial activities, and to amend the CanadianRadio-television and Telecommunications Commission Act,the Competition Act, the Personal Information Protectionand Electronic Documents Act and the TelecommunicationsAct, 2010, s. 23 .................................................................. G.1-1

Appendix G.2: Electronic Commerce Protection Regulations (CRTC) ..... G.2-1Appendix G.3: Electronic Commerce Protection Regulations.................. G.3-1Appendix G.4: Guidelines on the Interpretation of the Electronic

Commerce Protection Regulations (CRTC)............................ G.4-1Appendix G.6: CAN-SPAM Act of 2003 (PublicLaw 108-187)............. G.6-1

TABLE OF CONTENTS — VOLUME 1

CON-31 (Electronic Commerce) (2016–Rel. 5)

Appendix G.7: Compliance and Enforcement Information Bulletin CRTC2012-549............................................................................ G.7-1

Appendix G.8: Compliance and Enforcement Information Bulletin CRTC2012-548............................................................................ G.8-1

Appendix G.9: Electronic Commerce Protection Regulations.................. G.9-1Appendix G.10: Rules and Regulations Implementing the Controlling

the Assault of Non-Solicited Pornography and Marketing Actof 2003.............................................................................. G.10-1

Appendix G.11: Order Establishing Rules and Implementing theCAN-SPAM Act of 2003 .................................................... G.11-1

Appendix G.12: .com Disclosures - How to make effective disclosuresin Digital Advertising, March 2013 ...................................... G.12-1

Appendix G.13: Regulatory Impact Analysis Statement forElectronic Commerce Protection Regulations ......................... G.13-1

Appendix G.14: Canada’s Anti-Spam Legislation – Frequently AskedQuestions ........................................................................... G.14-1

Appendix G.15: Memorandum of Understanding For Cooperation,Coordination and Information Sharing .................................. G.15-1

Appendix G.16: Canada’s Law on Spam and Other ElectronicThreats............................................................................... G.16-1

Appendix G.17: Canada’s Anti-Spam Legislation Requirements forInstalling Computer Programs .............................................. G.17-1

Appendix G.18: Office of the Privacy Commissioner of CanadaAnti-spam law’s changes to Canadian federal privacy law:a guide for businesses doing e-marketing .............................. G.18-1

Appendix G.19: Sentencing Table – Canada’s Anti-Spam Law .............. G.19-1

APPENDIX H CANADIAN INTERNET REGISTRY AUTHORITY(CIRA)

Appendix H.1: Registrant Agreement................................................... H.1-1Appendix H.2: General Registration Rules ........................................... H.2-1Appendix H.3: Cira Policies, Rules, And Procedures,

Canadian Presence Requirements for Registrants.................... H.3-1Appendix H.4: CIRA Domain Name Dispute Resolution Policy ............. H.4-1Appendix H.5: Registration Information Access Rules and

Procedures.......................................................................... H.5-1Appendix H.6: Request for Disclosure of Registrant Information - Rules

and Procedures Version 1.6 (July 4, 2013) ............................ H.6-1Appendix H.7: Request for Disclosure of Registrant Information

for Law Enforcement .......................................................... H.7-1Appendix H.8: CIRA Domain Name Dispute Resolution Rules .............. H.8-1Appendix H.9: CIRA Domain Name Dispute Resolution

Policy ................................................................................ H.9-1

ELECTRONIC COMMERCE AND THE INTERNET

CON-32

Appendix H.10: CIRA – Registrar Agreement, Version 1.13(June 12, 2013)................................................................... H.10-1

APPENDIX I INTERNET CORPORATION FOR ASSIGNEDNAMES AND NUMBERS (ICANN)

Appendix I.1: Uniform Domain Name Resolution Policy....................... I.1-1Appendix I.2: ICANN Policy-Rules for Uniform Domain Name

Dispute Resolution Policy.................................................... I.2-1Appendix I.3: Rules for Uniform Domain Name Dispute Resolution

Policy ................................................................................ I.3-1Appendix I.4: ICANN -Approved Providers for Uniform Domain .......... I.4-1Appendix I.5: ICANN -Rules for Uniform Domain Name Dispute

Resolution Policy................................................................ I.5-1Appendix I.6: WIPO Supplemental Rules for Uniform Domain

Name Dispute Resolution Policy .......................................... I.6-1Appendix I.7: Internet Corporation for Assigned Names and Numbers

(ICANN) – The Asian Domain Name Dispute ResolutionCentre – Supplementary Rules ............................................. I.7-1

Appendix I.8: Internet Corporation for Assigned Names and Numbers(ICANN) – Czech Arbitration Court – Supplementary Rules... I.8-1

Appendix I.9: Internet Corporation for Assigned Names and Numbers(ICANN) – Arab Center for Dispute Resolution –Supplementary Rules........................................................... I.9-1

APPENDIX J COMPUTER CRIME

Appendix J.1: Criminal Code .............................................................. J.1-1Appendix J.2: Best Practices for Victim Response and Reporting of

Cyber Incidents................................................................... J.2-1

APPENDIX K COPYRIGHT AND E-COMMERCE

Appendix K.1: WIPO World Copyright Treaty ..................................... K.1-1Appendix K.2: WIPO World Performances and Phonograms

Treaty ................................................................................ K.2-1

APPENDIX L COMPUTER IMPLEMENTED INVENTIONSAND BUSINESS METHODS

Appendix L.1: lski et al v. Kappos (Supreme Court of the United StatesSyllabus) ............................................................................ L.1-1

Appendix L.2: (pages for this appendix will be issued in a later release)Appendix L.3: New Interim Patent Subject Matter Eligiblity

Examination Instructions...................................................... L.3-1

CON-33 (Electronic Commerce) (2016–Rel. 5)

TABLE OF CONTENTS — VOLUME 1

Appendix L.4: A USPTO White Paper, Automated Financial orManagement Data Processing Methods(Business Methods) ............................................................. L.4-1

Appendix L.5: USPTO Manual of Patent Examining Procedure(MPEP).............................................................................. L.5-1

Appendix L.6: Interim Guidance for Determining Subject MatterEligibility for Process Claims in View of Bilski v. Kappas...... L.5-1

Appendix L.7: Memorandum to the Patent Examining Corps on theSupreme Court decision in Bilski.......................................... L.7-1

Appendix L.8: Leahy-Smith America Invents Act ................................. L.8-1Appendix L.9: CIPO Notice - August 1, 2011 - Practice Subsequent

to the Amazon.com Decision ................................................ L.9-1Appendix L.10: Examination Practice Respecting Purposive

Construction ....................................................................... L.10-1Appendix L.11: Examination Practice Respecting

Computer-Implemented Inventions........................................ L.11-1Appendix L.12: Preliminary Examination Instructions for Determining

Subject Matter Eligibility ..................................................... L.12-1Appendix L.13: July 2015 Update: Subject Matter Eligibility................. L.13-1

VOLUME 5

APPENDIX M REGULATIONS OF TELECOMMUNICATIONSAND BROADCASTING ON THE INTERNET

Appendix M.1: Canadian Radio-Television and TelecommunicationsCommission Rules of Practice and Procedure ........................ M.1-1

Appendix M.2: Summary of Procedure - Conduct of Proceedings beforeCanadian Radio-Television and TelecommunicationsCommission ....................................................................... M.2-1

Appendix M.3: Compliance and Enforcement and Telecom InformationBulletin CRTC 2015-111 - March 27, 2015 - Guidelinesregarding the general administrative monetary penalties regimeunder the Telecommunications Act ....................................... M.3-1

Appendix M.4: Sentencing Table - Violation of UnsolicitedTelecommunications Rules................................................... M.4-1

APPENDIX N INTERNATIONAL MATERIALS

Appendix N.1: Promoting Confidence in Electronic Commerce .............. N.1-1Appendix N.2: Proposal of U.S.A. Online Dispute Resolution................ N.2-1Appendix N.3: WG.III Online Dispute Resolution................................. N.3-1Appendix N.4: Technical Summary of Canada-European Union

Comprehensive Economic and Trade Agreement.................... N.4-1

ELECTRONIC COMMERCE AND THE INTERNET

CON-34

Appendix N.5: European Commission - The EU’s Free Trade Agreementwith Canada and its Intellectual Property Rights Provisions,October 18, 2013-12-12....................................................... N.5-1

Appendix N.6: Official Text - Text of the Trans-Pacific Partnership –(November 5, 2015) Chapter 14 - Electronic Commerce......... N.6-1

Appendix N.7: Official Text - Text of the Trans-Pacific Partnership –(November 5, 2015) Chapter 18 - Intellectual Property........... N.7-1

APPENDIX O Electronic Delivery of Documents

Appendix O.1: National Policy 11-201 Electronic Delivery Of Documents......................................................................................... O.1-1

Appendix O.2: Toronto Region Commercial List e-Delivery Pilot ProjectGuidelines For Preparing And Delivering ElectronicDocuments Requested By Judges ......................................... O.3-1

APPENDIX P: TAXATION AND ELECTRONIC COMMERCE

Appendix P.1: National Policy 11-201 Electronic Delivery OfDocuments ......................................................................... P.1-1

APPENDIX Q: ENFORCEMENT OF IP RIGHTS IN THE DIGITALENVIRONMENT

Appendix Q.1: ACTA Trade Agreement .............................................. Q.1-1Appendix Q.2: Enforcement Guidelines — Intellectual Property............. Q.2-1Appendix Q.3: Intellectual Property — Enforcement Guidelines ............. Q.3-1

APPENDIX R: ELECTRONIC MONEY

Appendix R.1: Paper, Plastic or Mobile? An FTC Workshop onMobile Payments, March 2013............................................. R.1-1

APPENDIX S: CANADA BORDER SERVICES AGENCY(“CBSA”) ENFORCEMENT

Appendix S.1: Introduction — Combating Counterfeit Products Act ...... S.1-1Appendix S.2: CBSA — Combating Counterfeit Products (Intellectual

Property Rights).................................................................. S.2-1Appendix S.3: CBSA — Combating Counterfeit Products — Request for

Assistance .......................................................................... S.3-1Appendix S.4: CBSA — Request for Assistance................................... S.4-1

WORDS & PHRASES ............................................................. WP-1

BIBLIOGRAPHY ................................................................... BIB-1

TABLE OF CONTENTS — VOLUME 1

CON-35 (Electronic Commerce) (2016–Rel. 5)