For over nine years, Blacklock’s has pursued a remarkably determined litigation strategy that has involved nearly two dozen Federal Court lawsuits, including 13 against the Federal Government and its agencies. Its efforts against the Federal Government have been notably unsuccessful and none of its efforts against other parties have resulted in any successful legal precedents from Blacklock’s standpoint. On June 7-9, 2023, the Federal Court heard a summary judgment motion brought by the Government with a public interest intervention by CIPPIC that could bring this litany of litigation to the end. The motion was heard by Justice Yvan Roy, a very thorough and experienced judge. and his decision is pending.
written about Blacklock’s litigation many times before. See here. I
don’t normally comment on cases where judgment is pending – but this is an exception
that calls out for comment because of its public interest importance and its
unique long history.
Attorney General of Canada (“AGC”) was represented by its counsel, Alexander
Gay. Blacklock’s was represented by Scott Miller of MBM. The intervener on behalf of the public
interest was CIPPIC, represented by James Plotkin of Gowlings. These are all very
are some brief point form observations based on the written material in the
case. I did not actually attend the hearing, which was held “live” and was not
virtual or hybrid, so it was not available via Zoom:
- A very important case – as shown by the unusually great role of intervener CIPPIC in terms of length of memo (20 pages) and time – and hour and then extended. Indeed, having resisted CIPPIC’s involvement, Blacklock’s ultimately engaged – with an 18-page response of CIPPIC’s important public interest submissions
- No hacking or decrypting involved here
- No evidence of any attempt to “descramble a scrambled work or decrypt an encrypted work or to otherwise avoid, bypass, remove, deactivate or impair the technological protection measure” (highlight added)
- The law does NOT clearly cover simple sharing of a simple password in the definition of “circumvent” found in s. 41
- No mention in legislation of the word or concept of “to share”
- Just sharing of simple lawfully acquired password by a government worker so she could do her research job and collaborate with colleagues
- No evidence of actual copyright infringement or other listed examples of circumvention
- No expert evidence that the TPM was “effective”
- Like sharing a hotel pass key with family members - or alarm system password with renovation contractors or cleaning staff, who then shares it with their employees or subcontractors?
- Even if there somehow was “circumvention” in this case, is it trumped by any absence of evidence of infringing reproduction or, very importantly, trumped by “fair dealing”?
- No piracy – this is not about getting free movies or music – it’s about government engaging in perfectly legal fair dealing…
any case, there is an important previous ruling in 2016 that Government’s use
of Blacklock material was clearly “fair dealing. There was a strong finding
of fair dealing on the part of Government that public servants were just doing
their research as allowed by the Copyright Act….
Ontario Ltd. v. Canada (Attorney General), 2016 FC 1255 (CanLII),  2 FCR
 I am satisfied that the
Department’s acknowledged use of the two Blacklock’s articles constituted fair
dealing. There is no question that the circulation of this news copy within the
Department was done for a proper research purpose. There is also no question
that the admitted scope of use was, in the circumstances, fair.
Blacklock’s could have, should have,
but didn’t plead circumvention at the time and are now trying with a new
counsel to do so in numerous lawsuits against 13 other Federal Government departments
and agencies and presumably many others.
BTW, here is the applicable definition
There is great interest in this case
and the outcome is eagerly awaited.