Judicial Interpretation Of Charter Section 8

Section 8 of the Charter 

Section 8 states:

“Everyone has the right to be secure against unreasonable search or seizure.”

Canadian courts interpret s. 8 as protecting a reasonable expectation of privacy (REP). The test is largely normative: What privacy should society reasonably expect to be protected from the state?

Section 8 works by:

Protecting against state intrusion, not private actors.

Ensuring warrants are the norm, not the exception.

Requiring all searches to be authorized by law, the law itself must be reasonable, and the search must be carried out reasonably.

Below are the major cases shaping this doctrine.

1. Hunter v. Southam Inc. (1984)

Foundational case – Created the modern s. 8 framework

Key Facts

The Combines Investigation Act allowed government officials to search newspaper offices without a prior warrant issued by a judge. Southam challenged the constitutionality.

Key Principles Established

Section 8 protects reasonable expectations of privacy, not property interests.

Searches are presumptively unreasonable without prior judicial authorization.

Warrants must be issued based on reasonable and probable grounds.

The reviewing decision-maker must be neutral and impartial (i.e., not the same person conducting the investigation).

Importance

Hunter v. Southam sets the constitutional baseline: warrant first, unless justified otherwise.

2. R. v. Collins (1987)

Introduced the Collins Test for “reasonableness” of a search under s. 8.

Facts

Police suspected a woman of swallowing drugs before entering a bar. They used a “chokehold” to search though they had no warrant.

Key Contributions

The Court asked:

Was the search authorized by law?

Is the law itself reasonable?

Was the search carried out reasonably?

This three-part test remains central today.

Importance

Collins clarifies that even if a search is lawful on paper, how police perform it also determines constitutionality.

3. R. v. Edwards (1996)

Clarified what “reasonable expectation of privacy” means.

Facts

The accused tried to challenge a search of his girlfriend’s apartment. He didn’t own, rent, or have control over the premises.

Key Principles

REP is determined by a totality-of-circumstances test.

Relevant factors include:

Ownership or control of property

Presence at time of search

Ability to regulate access

Subjective expectation of privacy

Importance

The court ruled he had no reasonable expectation of privacy in his girlfriend’s home, therefore no standing to challenge the search.
The case shows s. 8 protection depends on personal privacy rights, not just location.

4. R. v. Stillman (1997)

A major bodily privacy case – bodily samples require high protection.

Facts

Police took hair, dental impressions, and buccal swabs from the accused without consent or warrant.

Key Principles

Bodily samples involve the highest level of privacy.

Taking samples without consent is considered a serious violation.

Distinguishes between:

Conscriptive evidence (evidence taken from the accused’s body or compelled by the accused) – often excluded.

Non-conscriptive evidence (independent of the accused).

Importance

Stillman established that s. 8 protects the human body as a core privacy zone.

5. R. v. Tessling (2004)

Thermal imaging and informational privacy

Facts

Police used a helicopter-mounted thermal imaging device to detect heat patterns suggestive of a marijuana grow-op. No warrant was used.

Key Principles

The Court found no reasonable expectation of privacy in generalized heat patterns because:

They reveal no intimate details of lifestyle or personal activities.

The technology provided limited, non-intrusive information.

Importance

Tessling emphasizes that the Court focuses on the nature of information obtained, not the technology itself.
It draws a line between personal, intimate information and general data.

6. R. v. Patrick (2009)

Garbage searches and abandonment

Facts

Police seized trash bags placed at the edge of Patrick’s property for collection, without a warrant, to gather evidence of drug production.

Key Principles

The accused abandoned the property (by putting it out for collection).

Once abandoned, no reasonable expectation of privacy remains.

However, s. 8 still protects:

The area around the home (curtilage)

Actions revealing attempts to search inside the home

Importance

Shows how the act of abandonment influences REP.

7. R. v. Cole (2012)

Digital privacy on workplace computers

Facts

A teacher’s work-issued laptop contained illegal images. School authorities searched it and handed evidence to police.

Key Principles

Individuals maintain a reasonable expectation of privacy in personal information stored on workplace computers—even if employer rule allows monitoring.

Police require a warrant to search seized electronic devices, even if obtained lawfully by a third party (like a school or employer).

Importance

Cole advanced informational and digital privacy, crucial in the technology era.

8. R. v. Spencer (2014)

Online privacy and anonymity

Facts

Police requested subscriber information from an ISP without a warrant to link an IP address to an individual.

Key Principles

Internet anonymity is a protected privacy interest.

Subscriber information is not purely transactional data; it links identity to online activity.

Police must get a warrant unless an exception applies.

Importance

Spencer is a cornerstone for online privacy, limiting how police can obtain digital identity information.

9. R. v. Fearon (2014)

Cell phone searches incident to arrest

Facts

Police searched an unlocked cellphone belonging to a suspect incident to arrest, without a warrant.

Key Principles

Cell phone searches incident to arrest are permitted, but strict limits apply:

Must be tied to a valid arrest purpose (protect officer safety, preserve evidence).

Must be promptly documented.

Must not be a broad exploratory search.

A warrant is strongly preferred, but not absolutely required.

Importance

Fearon balances traditional police powers with modern digital privacy concerns.

Synthesis: What These Cases Show About Section 8

Across decades, the SCC has emphasized:

1. Privacy is contextual

Different contexts offer different expectations:

Highest: home, body, private communications

Moderate: computers, phones, cars

Lower: public spaces, abandoned property

2. Warrants are the constitutional norm

Unless an exception applies (incident to arrest, exigent circumstances), police must seek judicial authorization.

3. The type of information matters

The Court protects information that is:

Intimate

Reveals choices, lifestyle, identity

Connected to human dignity

4. Section 8 is technologically adaptive

Cases like Tessling, Cole, and Spencer show s. 8 evolves with new technology.

LEAVE A COMMENT