Judicial Interpretation Of Charter Section 8
Section 8 of the Charter
Section 8 states:
“Everyone has the right to be secure against unreasonable search or seizure.”
Canadian courts interpret s. 8 as protecting a reasonable expectation of privacy (REP). The test is largely normative: What privacy should society reasonably expect to be protected from the state?
Section 8 works by:
Protecting against state intrusion, not private actors.
Ensuring warrants are the norm, not the exception.
Requiring all searches to be authorized by law, the law itself must be reasonable, and the search must be carried out reasonably.
Below are the major cases shaping this doctrine.
1. Hunter v. Southam Inc. (1984)
Foundational case – Created the modern s. 8 framework
Key Facts
The Combines Investigation Act allowed government officials to search newspaper offices without a prior warrant issued by a judge. Southam challenged the constitutionality.
Key Principles Established
Section 8 protects reasonable expectations of privacy, not property interests.
Searches are presumptively unreasonable without prior judicial authorization.
Warrants must be issued based on reasonable and probable grounds.
The reviewing decision-maker must be neutral and impartial (i.e., not the same person conducting the investigation).
Importance
Hunter v. Southam sets the constitutional baseline: warrant first, unless justified otherwise.
2. R. v. Collins (1987)
Introduced the Collins Test for “reasonableness” of a search under s. 8.
Facts
Police suspected a woman of swallowing drugs before entering a bar. They used a “chokehold” to search though they had no warrant.
Key Contributions
The Court asked:
Was the search authorized by law?
Is the law itself reasonable?
Was the search carried out reasonably?
This three-part test remains central today.
Importance
Collins clarifies that even if a search is lawful on paper, how police perform it also determines constitutionality.
3. R. v. Edwards (1996)
Clarified what “reasonable expectation of privacy” means.
Facts
The accused tried to challenge a search of his girlfriend’s apartment. He didn’t own, rent, or have control over the premises.
Key Principles
REP is determined by a totality-of-circumstances test.
Relevant factors include:
Ownership or control of property
Presence at time of search
Ability to regulate access
Subjective expectation of privacy
Importance
The court ruled he had no reasonable expectation of privacy in his girlfriend’s home, therefore no standing to challenge the search.
The case shows s. 8 protection depends on personal privacy rights, not just location.
4. R. v. Stillman (1997)
A major bodily privacy case – bodily samples require high protection.
Facts
Police took hair, dental impressions, and buccal swabs from the accused without consent or warrant.
Key Principles
Bodily samples involve the highest level of privacy.
Taking samples without consent is considered a serious violation.
Distinguishes between:
Conscriptive evidence (evidence taken from the accused’s body or compelled by the accused) – often excluded.
Non-conscriptive evidence (independent of the accused).
Importance
Stillman established that s. 8 protects the human body as a core privacy zone.
5. R. v. Tessling (2004)
Thermal imaging and informational privacy
Facts
Police used a helicopter-mounted thermal imaging device to detect heat patterns suggestive of a marijuana grow-op. No warrant was used.
Key Principles
The Court found no reasonable expectation of privacy in generalized heat patterns because:
They reveal no intimate details of lifestyle or personal activities.
The technology provided limited, non-intrusive information.
Importance
Tessling emphasizes that the Court focuses on the nature of information obtained, not the technology itself.
It draws a line between personal, intimate information and general data.
6. R. v. Patrick (2009)
Garbage searches and abandonment
Facts
Police seized trash bags placed at the edge of Patrick’s property for collection, without a warrant, to gather evidence of drug production.
Key Principles
The accused abandoned the property (by putting it out for collection).
Once abandoned, no reasonable expectation of privacy remains.
However, s. 8 still protects:
The area around the home (curtilage)
Actions revealing attempts to search inside the home
Importance
Shows how the act of abandonment influences REP.
7. R. v. Cole (2012)
Digital privacy on workplace computers
Facts
A teacher’s work-issued laptop contained illegal images. School authorities searched it and handed evidence to police.
Key Principles
Individuals maintain a reasonable expectation of privacy in personal information stored on workplace computers—even if employer rule allows monitoring.
Police require a warrant to search seized electronic devices, even if obtained lawfully by a third party (like a school or employer).
Importance
Cole advanced informational and digital privacy, crucial in the technology era.
8. R. v. Spencer (2014)
Online privacy and anonymity
Facts
Police requested subscriber information from an ISP without a warrant to link an IP address to an individual.
Key Principles
Internet anonymity is a protected privacy interest.
Subscriber information is not purely transactional data; it links identity to online activity.
Police must get a warrant unless an exception applies.
Importance
Spencer is a cornerstone for online privacy, limiting how police can obtain digital identity information.
9. R. v. Fearon (2014)
Cell phone searches incident to arrest
Facts
Police searched an unlocked cellphone belonging to a suspect incident to arrest, without a warrant.
Key Principles
Cell phone searches incident to arrest are permitted, but strict limits apply:
Must be tied to a valid arrest purpose (protect officer safety, preserve evidence).
Must be promptly documented.
Must not be a broad exploratory search.
A warrant is strongly preferred, but not absolutely required.
Importance
Fearon balances traditional police powers with modern digital privacy concerns.
Synthesis: What These Cases Show About Section 8
Across decades, the SCC has emphasized:
1. Privacy is contextual
Different contexts offer different expectations:
Highest: home, body, private communications
Moderate: computers, phones, cars
Lower: public spaces, abandoned property
2. Warrants are the constitutional norm
Unless an exception applies (incident to arrest, exigent circumstances), police must seek judicial authorization.
3. The type of information matters
The Court protects information that is:
Intimate
Reveals choices, lifestyle, identity
Connected to human dignity
4. Section 8 is technologically adaptive
Cases like Tessling, Cole, and Spencer show s. 8 evolves with new technology.

comments