{"id":51086,"date":"2023-03-20T18:20:21","date_gmt":"2023-03-20T18:20:21","guid":{"rendered":"https:\/\/www.oykhmancriminaldefence.com\/faq\/?p=51086"},"modified":"2025-09-30T09:11:53","modified_gmt":"2025-09-30T09:11:53","slug":"unauthorized-use-computer-charges-canada","status":"publish","type":"post","link":"https:\/\/www.strategiccriminaldefence.com\/faq\/unauthorized-use-computer-charges-canada\/","title":{"rendered":"Unauthorized Use of Computer (s. 342.1) Laws in Canada"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"background-color: rgba(255,255,255,0);background-position: center center;background-repeat: no-repeat;border-width: 0px 0px 0px 0px;border-color:#e2e2e2;border-style:solid;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start\" style=\"max-width:calc( 1440px + 50px );margin-left: calc(-50px \/ 2 );margin-right: calc(-50px \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div class=\"fusion-text fusion-text-1\"><h2>What is an unauthorized use of a computer charge?<\/h2>\n<p>The unauthorized use of a computer is covered under <a href=\"https:\/\/canlii.ca\/t\/7vf2#sec342.1\">s. 342.1<\/a> of the <em>Criminal Code<\/em>. Unauthorized use of a computer is found in Part IX of the <em>Criminal Code<\/em> which covers \u201cOffences Against Rights of Property.\u201d<\/p>\n<p>An unauthorized use of a computer charge occurs when a person fraudulently obtains any computer service, intercepts a computer system, used a computer system with the intent to commit an offence, or permits another person to have access to a computer password that would enable that person to commit an offence.<\/p>\n<p>An unauthorized use of a computer charge is a <a href=\"http:\/\/criminalnotebook.ca\/index.php\/List_of_Hybrid_Offences\">hybrid<\/a> offence with a <a href=\"http:\/\/criminalnotebook.ca\/index.php\/Crown_Election\">Crown election<\/a>. This means that depending on the circumstances of your case the Crown can elect to proceed by indictment or summarily. If an accused is prosecuted by indictment, there is a <a href=\"http:\/\/criminalnotebook.ca\/index.php\/Defence_Election\">Defence election<\/a> of court under <a href=\"https:\/\/canlii.ca\/t\/7vf2#sec536\">s. 536(2)<\/a> of the <em>Criminal Code<\/em>.<\/p>\n<h3>Examples<\/h3>\n<p><strong>Some examples of an unauthorized use of a computer charge may include the following:<\/strong><\/p>\n<ul>\n<li>Accessing policing systems without authorization;<\/li>\n<li>Accessing governmental computer systems without authorization;<\/li>\n<li><a href=\"https:\/\/www.strategiccriminaldefence.com\/faq\/theft-charges-canada\/\">Stealing a computer<\/a>\u00a0or computer system to obstruct, interrupt, or interfere with the owner\u2019s lawful use or enjoyment of that computer or computer system; and<\/li>\n<li>Giving someone a password to a computer so they could commit an offence (for example,\u00a0<a href=\"https:\/\/www.strategiccriminaldefence.com\/faq\/theft-forgery-credit-card-charges-canada\/\">theft or forgery of a credit card<\/a>).<\/li>\n<\/ul>\n<h3>Defences<\/h3>\n<p>The defences available against an unauthorized use of a computer charge are entirely dependent on the facts of your case.<\/p>\n<p><strong>However, some defences to an unauthorized use of a computer charge may include:<\/strong><\/p>\n<ul>\n<li>The accused was wrongly identified as the person who committed the unauthorized use of a computer charge;<\/li>\n<li>The computer service the accused obtained was not prohibited to the accused;<\/li>\n<li>The accused did not engage in the act \u201cfraudulently or without colour of right\u201d; and<\/li>\n<li>The accused did not knowingly provide the password for the unauthorized use of a computer system to another person.<\/li>\n<\/ul>\n<h3>Punishment<strong>\u00a0<\/strong><\/h3>\n<p><strong>An unauthorized use of a computer charge is a hybrid offence, which entails a maximum punishment as follows:<\/strong><\/p>\n<ul>\n<li>Imprisonment for a term of not more than 10 years<\/li>\n<\/ul>\n<p>Punishments for the unauthorized use of a computer depend on the circumstances of your case. Additionally, punishments also depend on if the Crown elects to pursue the charge as an indictable offence or summarily. There are no mandatory minimum penalties for this offence. The maximum is no more than 10 years of incarceration if prosecuted by indictment. If prosecuted summarily, the maximum punishment is no more than 6 months of incarceration and\/or a $5,000 fine.<\/p>\n<\/div><div class=\"fusion-text fusion-text-2\"><h2>Overview of the Offence<strong>\u00a0<\/strong><\/h2>\n<p><strong>According to <\/strong><a href=\"https:\/\/canlii.ca\/t\/7vf2#sec342.1\"><strong>s. 342.1 of the <em>Criminal Code<\/em><\/strong><\/a><strong>:<\/strong><\/p>\n<\/div><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start\" style=\"width:calc( 100% + 50px ) !important;max-width:calc( 100% + 50px ) !important;margin-left: calc(-50px \/ 2 );margin-right: calc(-50px \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-0 fusion_builder_column_inner_1_1 1_1 fusion-flex-column cases grey-box\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;background-color:#f9f9f9;padding: 40px 50px 40px 50px;\"><div class=\"fusion-text fusion-text-3\" style=\"font-size:18px;line-height:1.6;letter-spacing:-0.3px;\"><p><strong>Unauthorized use of a computer<br \/>\n<\/strong><\/p>\n<p><strong>342.1 <\/strong>Everyone is guilty of an indictable offence and liable to imprisonment for a term of not more than 10 years, or is guilty of an offence punishable on summary conviction who, fraudulently and without colour of right,<\/p>\n<ul>\n<li>Obtains, directly or indirectly, any computer service;<\/li>\n<li>By means of an electro-magnetic, acoustic, mechanical or other device, intercepts or causes to be intercepted, directly or indirectly, any function of a computer system;<\/li>\n<li>Uses or causes to be used, directly or indirectly, a computer system with intent to commit an offence under paragraph (a) or (b) or under section 430 in relation to computer data or a computer system; or<\/li>\n<li>Uses, possesses, traffics in or permits another person to have access to a computer password that would enable a person to commit an offence under paragraph (a), (b) or (c).<\/li>\n<\/ul>\n<p><strong>Definitions<\/strong><\/p>\n<p><strong>(2) <\/strong>In this section,<\/p>\n<p><strong>Computer data <\/strong>means representations, including signs, signals or symbols, that are in a form suitable for processing in a computer system;<\/p>\n<p><strong>Computer password <\/strong>means any computer data by which a computer service or computer system is capable of being obtained or used;<\/p>\n<p><strong>Computer program <\/strong>means computer data representing instructions or statements that, when executed in a computer system, causes the computer system to perform a function;<\/p>\n<p><strong>Computer service <\/strong>includes data processing and the storage or retrieval of computer data;<\/p>\n<p><strong>Computer system <\/strong>means a device that, or a group of interconnected or related devices one or more of which,<\/p>\n<ul>\n<li>Contains computer programs or other computer data, and<\/li>\n<li>By means of computer programs,<\/li>\n<li>Performs logic and control, and<\/li>\n<li>May perform any other function;<\/li>\n<\/ul>\n<p><strong>Electro-magnetic, acoustic, mechanical or other device <\/strong>means any device or apparatus that is used or is capable of being used to intercept any function of a computer system, but does not include a hearing aid used to correct subnormal hearing of the user to not better than normal hearing;<\/p>\n<p><strong>Function <\/strong>includes logic, control, arithmetic, deletion, storage and retrieval and communication or telecommunication to, from or within a computer system;<\/p>\n<p><strong>Intercept <\/strong>includes listen to or record a function of a computer system, or acquire the substance, meaning or purport thereof;<\/p>\n<p><strong>Traffic <\/strong>means, in respect of a computer password, to sell, export from or import into Canada, distribute or deal with in any other way.<\/p>\n<p><strong>Colour of Right<\/strong><\/p>\n<p>Colour of right is a defence to some property-related offences. It means that the accused has an honest belief that they had a right to possess the property but had no basis in fact or law for that belief.<\/p>\n<\/div><\/div><style type=\"text\/css\">.fusion-body .fusion-builder-nested-column-0{width:100% !important;margin-top : 0px;margin-bottom : 40px;}.fusion-builder-nested-column-0 > .fusion-column-wrapper {padding-top : 40px !important;padding-right : 50px !important;margin-right : 25px;padding-bottom : 40px !important;padding-left : 50px !important;margin-left : 25px;}@media only screen and (max-width:1024px) {.fusion-body .fusion-builder-nested-column-0{width:100% !important;order : 0;}.fusion-builder-nested-column-0 > .fusion-column-wrapper {margin-right : 25px;margin-left : 25px;}}@media only screen and (max-width:640px) {.fusion-body .fusion-builder-nested-column-0{width:100% !important;order : 0;}.fusion-builder-nested-column-0 > .fusion-column-wrapper {margin-right : 25px;margin-left : 25px;}}<\/style><\/div><\/div><div class=\"fusion-text fusion-text-4\"><h3>The Guilty Act (Actus Reus)<\/h3>\n<p><strong>The actus reus for an unauthorized use of computer charge under s. 342.1 is established by proof, beyond a reasonable doubt, of the following:<\/strong><\/p>\n<p><strong>Fraudulently obtaining computer services s. 342.1(1)(a)<\/strong><\/p>\n<ul>\n<li>The accused at a specified date and time, in the correct jurisdiction, obtained directly or indirectly a computer service;<\/li>\n<li>The computer service was prohibited to be accessed by the accused; and<\/li>\n<li>The accused did the prohibited act fraudulently and without colour of right.<\/li>\n<\/ul>\n<p><strong>Unauthorized interception of a computer system s. 342.1(1)(b)<\/strong><\/p>\n<ul>\n<li>The accused at a specified date and time, in the correct jurisdiction, intercepts or causes to be intercepted, directly or indirectly, any function of a computer system;<\/li>\n<li>The interception was by means of an electro-magnetic, acoustic, mechanical, or other device; and<\/li>\n<li>The accused did the prohibited act fraudulently and without colour of right.<\/li>\n<\/ul>\n<p><strong>Obtaining a computer system with the intent for unauthorized use s. 342.1(1)(c)<\/strong><\/p>\n<ul>\n<li>The accused at a specified date and time, in the correct jurisdiction, obtained, directly or indirectly, any computer system; and<\/li>\n<li>The accused did the prohibited act fraudulently and without colour of right.<\/li>\n<\/ul>\n<p><strong>Sharing passwords for unauthorized use of a computer system s. 342.1(1)(d)<\/strong><\/p>\n<ul>\n<li>The accused at a specified date and time, in the correct jurisdiction, uses, possesses, traffics or permits another person to have access to a computer password; and<\/li>\n<li>The accused did the prohibited act fraudulently and without colour of right.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.canlii.org\/en\/on\/onca\/doc\/2011\/2011onca610\/2011onca610.html?autocompleteStr=R%20v%20woodward&amp;autocompletePos=1\"><em>R v Woodward<\/em><\/a> held that texting with a cell phone classifies as communicating \u201cby means of a computer system\u201d within the meaning of s. 342.1(2)<\/p>\n<h3><strong>The Guilty Mind (Mens Rea)<\/strong><\/h3>\n<p><strong>The mens rea for an unauthorized use of a computer charge under s. 342.1 include proving, beyond a reasonable doubt, that: <\/strong><\/p>\n<p><strong>Fraudulently obtaining computer services s. 342.1(1)(a)<\/strong><\/p>\n<ul>\n<li>The accused knowingly obtained the computer service fraudulently; and<\/li>\n<li>A reasonable person in the same circumstances as the accused would have agreed that this was a dishonest act.<\/li>\n<\/ul>\n<p><strong>Unauthorized interception of a computer system s. 342.1(1)(b)<\/strong><\/p>\n<ul>\n<li>The accused knowingly intercepted or caused to be intercepted any function of a computer system.<\/li>\n<\/ul>\n<p><strong>Obtaining a computer system with the intent for unauthorized use s. 342.1(1)(c)<\/strong><\/p>\n<ul>\n<li>The accused intended to commit the offence created by s. 342(1)(a) or s. 342(1)(b) or s. 430.<\/li>\n<\/ul>\n<p><strong>Sharing passwords for unauthorized use of a computer system s. 342.1(1)(d)<\/strong><\/p>\n<ul>\n<li>The accused knowingly permits another person to have access to a computer password; and<\/li>\n<li>The password \u201cwould enable a person to commit an offence under paragraph (a), (b) or (c)\u201d.<\/li>\n<\/ul>\n<\/div><div class=\"fusion-text fusion-text-5\"><h2>Defences<\/h2>\n<h3>How to Beat an Unauthorized use of a Computer Charge<\/h3>\n<p>Every case is different. The availability and strength of any defence depend entirely on the specific facts of your case. The strength of any available defence rests on the evidence against you and the precise details of the allegations. However, the following are some common defences that may be used when fighting an unauthorized use of a computer charge:<\/p>\n<h3>Factual innocence<\/h3>\n<p>A strong defence against an unauthorized use of a computer charge is to maintain that you are factually innocent. If you can show that the facts and the evidence do not support that you accessed a computer system or allowed someone to access a computer system without authorization, then you may be factually innocent.<\/p>\n<h3>Mistake in Identity<\/h3>\n<p>Depending on the circumstances of your case, a possible defence to an unauthorized use of a computer charge may be to raise an identity defence. In this case, for this defence to be raised successfully, you will have to prove that you were not the person who accessed a computer system without being authorized.<\/p>\n<h3>Colour of Right<\/h3>\n<p>If the accused had an honest but mistaken belief that they had a right to access the computer system that they were not authorized to access, then this may be a justified excuse for the offence. For this to be a defence you must show that you did not act dishonestly and in good faith.<\/p>\n<h3><strong>Any applicable <em>Charter <\/em>defences<\/strong><\/h3>\n<p>The <em>Charter <\/em>sets out your rights and freedoms before and after your arrest. If the police fail to abide by these rights deliberately or inadvertently, it could aid in your defence. If any of your <em>Charter <\/em>rights have been violated before or after your arrest, you may be able to have some or all of the evidence that the Crown is relying on to secure a conviction excluded under s. 24(2) of the <em>Charter<\/em>.<\/p>\n<\/div><div class=\"fusion-text fusion-text-6\"><h2>Punishments<\/h2>\n<p>The <em>Criminal Code <\/em>provides for <strong>a possible maximum term of 10 years imprisonment for those convicted of an unauthorized use of a computer charge. <\/strong><\/p>\n<p>Persons found guilty of the unauthorized use of a computer may be eligible for sentencing entailing a discharge, suspended sentence, stand-alone fine, custody, custody with a fine or probation, or a conditional sentence.<\/p>\n<\/div><div class=\"fusion-text fusion-text-7\"><h2>Frequently Asked Questions<\/h2>\n<\/div><style type=\"text\/css\">#accordion-51086-1 .fusion-panel:hover, #accordion-51086-1 .fusion-panel.hover{ background-color: #f5f5f5 } #accordion-51086-1 .fusion-panel { border-color:#f5f5f5; border-width:0px; background-color:#f5f5f5; }.fusion-accordian  #accordion-51086-1 .panel-title a .fa-fusion-box{ color: #c22127;}.fusion-accordian  #accordion-51086-1 .panel-title a .fa-fusion-box:before{ font-size: 16px; width: 16px;}.fusion-accordian  #accordion-51086-1.fusion-toggle-icon-right .fusion-toggle-heading{ margin-right: 34px;}.fusion-accordian  #accordion-51086-1 .panel-title a{font-size:24px;color:#c22127;font-family:\"Lexend\";font-weight:700;}.fusion-accordian  #accordion-51086-1 .toggle-content{font-size:17px;color:#000000;font-family:\"Lexend\";font-weight:300;}.fusion-accordian  #accordion-51086-1 .panel-title a:not(.active):hover, #accordion-51086-1 .fusion-toggle-boxed-mode:hover .panel-title a { color: #c22127;}.fusion-accordian  #accordion-51086-1 .fusion-toggle-boxed-mode:hover .panel-title a .fa-fusion-box{ color: #c22127;}.fusion-accordian  #accordion-51086-1.fusion-toggle-icon-unboxed .fusion-panel .panel-title a:not(.active):hover .fa-fusion-box{ color: #c22127 !important;}<\/style><div class=\"accordian fusion-accordian\"><div class=\"panel-group fusion-toggle-icon-right fusion-toggle-icon-unboxed\" id=\"accordion-51086-1\"><style type=\"text\/css\">.fusion-accordian  #accordion-51086-1 .panel-8aa4f8f6eb576fd7d .panel-title a{}.fusion-accordian  #accordion-51086-1 .panel-8aa4f8f6eb576fd7d .toggle-content{}<\/style><div class=\"fusion-panel panel-default panel-8aa4f8f6eb576fd7d fusion-toggle-no-divider fusion-toggle-boxed-mode\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\"><a aria-expanded=\"false\" aria-controls=\"8aa4f8f6eb576fd7d\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-51086-1\" data-target=\"#8aa4f8f6eb576fd7d\" href=\"#8aa4f8f6eb576fd7d\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Can you go to jail for the unauthorized use of a computer?<\/span><\/a><\/h4><\/div><div id=\"8aa4f8f6eb576fd7d\" class=\"panel-collapse collapse \"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Yes, you can go to jail for the unauthorized use of a computer. If the Crown proceeds by indictment, the maximum jail time one can receive for the unauthorized use of a computer is 10 years. If the Crown proceeds summarily, the maximum jail time one can receive is 6 months.<\/p>\n<\/div><\/div><\/div><style type=\"text\/css\">.fusion-accordian  #accordion-51086-1 .panel-acbc300a32a7ec966 .panel-title a{}.fusion-accordian  #accordion-51086-1 .panel-acbc300a32a7ec966 .toggle-content{}<\/style><div class=\"fusion-panel panel-default panel-acbc300a32a7ec966 fusion-toggle-no-divider fusion-toggle-boxed-mode\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\"><a aria-expanded=\"false\" aria-controls=\"acbc300a32a7ec966\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-51086-1\" data-target=\"#acbc300a32a7ec966\" href=\"#acbc300a32a7ec966\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Is the unauthorized use of a computer a serious offence?<\/span><\/a><\/h4><\/div><div id=\"acbc300a32a7ec966\" class=\"panel-collapse collapse \"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>The unauthorized use of a computer is a serious offence that can result in a convicted person spending up to 10 years in jail. This is a hybrid offence which allows the Crown to choose to proceed by indictment or summarily. Indictable offences are the most serious offences in the <em>Criminal Code<\/em>.<\/p>\n<p>Even if the Crown chooses to proceed summarily, a conviction for the unauthorized use of a computer can have serious repercussions on your life affecting things like future employment and immigration.<\/p>\n<\/div><\/div><\/div><style type=\"text\/css\">.fusion-accordian  #accordion-51086-1 .panel-06e45266d522374de .panel-title a{}.fusion-accordian  #accordion-51086-1 .panel-06e45266d522374de .toggle-content{}<\/style><div class=\"fusion-panel panel-default panel-06e45266d522374de fusion-toggle-no-divider fusion-toggle-boxed-mode\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\"><a aria-expanded=\"false\" aria-controls=\"06e45266d522374de\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-51086-1\" data-target=\"#06e45266d522374de\" href=\"#06e45266d522374de\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Is the unauthorized use of a computer a summary or indictable offence?<\/span><\/a><\/h4><\/div><div id=\"06e45266d522374de\" class=\"panel-collapse collapse \"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>The unauthorized use of a computer is known as a hybrid offence. This means that the Crown can elect to proceed either by indictment or summarily. If the Crown proceeds by indictment, a person convicted for the unauthorized use of a computer will face a maximum penalty of 10 years imprisonment. If the Crown proceeds summarily, the maximum jail time a person can receive for a conviction of the unauthorized use of a computer is 6 months.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-text fusion-text-8\"><h2>Published Decisions<\/h2>\n<\/div><style type=\"text\/css\">#accordion-51086-2 .fusion-panel:hover, #accordion-51086-2 .fusion-panel.hover{ background-color: #f5f5f5 } #accordion-51086-2 .fusion-panel { border-color:#f5f5f5; border-width:0px; background-color:#f5f5f5; }.fusion-accordian  #accordion-51086-2 .panel-title a .fa-fusion-box{ color: #c22127;}.fusion-accordian  #accordion-51086-2 .panel-title a .fa-fusion-box:before{ font-size: 16px; width: 16px;}.fusion-accordian  #accordion-51086-2.fusion-toggle-icon-right .fusion-toggle-heading{ margin-right: 34px;}.fusion-accordian  #accordion-51086-2 .panel-title a{font-size:24px;color:#c22127;font-family:\"Lexend\";font-weight:700;}.fusion-accordian  #accordion-51086-2 .toggle-content{font-size:17px;color:#000000;font-family:\"Lexend\";font-weight:300;}.fusion-accordian  #accordion-51086-2 .panel-title a:not(.active):hover, #accordion-51086-2 .fusion-toggle-boxed-mode:hover .panel-title a { color: #c22127;}.fusion-accordian  #accordion-51086-2 .fusion-toggle-boxed-mode:hover .panel-title a .fa-fusion-box{ color: #c22127;}.fusion-accordian  #accordion-51086-2.fusion-toggle-icon-unboxed .fusion-panel .panel-title a:not(.active):hover .fa-fusion-box{ color: #c22127 !important;}<\/style><div class=\"accordian fusion-accordian\"><div class=\"panel-group fusion-toggle-icon-right fusion-toggle-icon-unboxed\" id=\"accordion-51086-2\"><style type=\"text\/css\">.fusion-accordian  #accordion-51086-2 .panel-afb54baf7eccec000 .panel-title a{}.fusion-accordian  #accordion-51086-2 .panel-afb54baf7eccec000 .toggle-content{}<\/style><div class=\"fusion-panel panel-default panel-afb54baf7eccec000 fusion-toggle-no-divider fusion-toggle-boxed-mode\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\"><a aria-expanded=\"false\" aria-controls=\"afb54baf7eccec000\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-51086-2\" data-target=\"#afb54baf7eccec000\" href=\"#afb54baf7eccec000\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">R v Cole, 2012 SCC 53 (CanLii)<\/span><\/a><\/h4><\/div><div id=\"afb54baf7eccec000\" class=\"panel-collapse collapse \"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>The accused was a high-school teacher charged with possession of child pornography and the unauthorized use of a computer. When performing maintenance activities, a technician found on the accused\u2019s laptop a hidden folder containing nude and partially nude photographs of a female student. The trial judge excluded all of the computer material due to <em>Charter <\/em>violations. The Court of Appeal held that the trial judge wrongly excluded this evidence and ordered a new trial. The Court of Appeal decision was appealed.<\/p>\n<p>At the Supreme Court of Canada, the exclusionary order of the Court of Appeal was set aside and the order of a new trial was affirmed.<\/p>\n<p>You can read the full decision <a href=\"https:\/\/www.canlii.org\/en\/ca\/scc\/doc\/2012\/2012scc53\/2012scc53.html?searchUrlHash=AAAAAQAgInVuYXV0aG9yaXplZCB1c2Ugb2YgYSBjb21wdXRlciIAAAAAAQ&amp;resultIndex=6\">here<\/a>.<\/p>\n<\/div><\/div><\/div><style type=\"text\/css\">.fusion-accordian  #accordion-51086-2 .panel-5676e36db8f6d35b5 .panel-title a{}.fusion-accordian  #accordion-51086-2 .panel-5676e36db8f6d35b5 .toggle-content{}<\/style><div class=\"fusion-panel panel-default panel-5676e36db8f6d35b5 fusion-toggle-no-divider fusion-toggle-boxed-mode\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\"><a aria-expanded=\"false\" aria-controls=\"5676e36db8f6d35b5\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-51086-2\" data-target=\"#5676e36db8f6d35b5\" href=\"#5676e36db8f6d35b5\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Manning v Canada (Citizenship and Immigration), 2022 CanLII 39877 (CA IRB)<\/span><\/a><\/h4><\/div><div id=\"5676e36db8f6d35b5\" class=\"panel-collapse collapse \"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>The Minister argued that Ms. Manning should not be admitted to Canada due to a charge that occurred outside of Canada. Ms. Manning was charged with what was equivalent to the unauthorized use of a computer charge. It was held that Ms. Manning would not be admitted to Canada as she was unauthorized and objectively dishonest in her charge.<\/p>\n<p>You can read the full decision <a href=\"https:\/\/www.canlii.org\/en\/ca\/irb\/doc\/2022\/2022canlii39877\/2022canlii39877.html?searchUrlHash=AAAAAQAgInVuYXV0aG9yaXplZCB1c2Ugb2YgYSBjb21wdXRlciIAAAAAAQ&amp;resultIndex=1\">here<\/a>.<\/p>\n<\/div><\/div><\/div><style type=\"text\/css\">.fusion-accordian  #accordion-51086-2 .panel-55bc6ac90c4d2def1 .panel-title a{}.fusion-accordian  #accordion-51086-2 .panel-55bc6ac90c4d2def1 .toggle-content{}<\/style><div class=\"fusion-panel panel-default panel-55bc6ac90c4d2def1 fusion-toggle-no-divider fusion-toggle-boxed-mode\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\"><a aria-expanded=\"false\" aria-controls=\"55bc6ac90c4d2def1\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-51086-2\" data-target=\"#55bc6ac90c4d2def1\" href=\"#55bc6ac90c4d2def1\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">R v TELUS Communications Co., 2013 SCC 16 (CanLII)<\/span><\/a><\/h4><\/div><div id=\"55bc6ac90c4d2def1\" class=\"panel-collapse collapse \"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>TELUS Communications Company routinely made electronic copies of all text messages sent or received by subscribers and stores them on a computer database for a brief period of time. The police in this case obtained a warrant to obtain copies of any stored text messages sent or received by two subscribers. It was argued that this was an invasion of privacy and therefore, an unauthorized use of a computer.<\/p>\n<p>You can read the full decision <a href=\"https:\/\/www.canlii.org\/en\/ca\/scc\/doc\/2013\/2013scc16\/2013scc16.html?searchUrlHash=AAAAAQAHIjM0Mi4xIgAAAAAB&amp;resultIndex=11\">here<\/a>.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><style type=\"text\/css\">.fusion-body .fusion-builder-column-0{width:100% !important;margin-top : 0px;margin-bottom : 30px;}.fusion-builder-column-0 > .fusion-column-wrapper {padding-top : 0px !important;padding-right : 0px !important;margin-right : 25px;padding-bottom : 0px !important;padding-left : 0px !important;margin-left : 25px;}@media only screen and (max-width:1024px) {.fusion-body .fusion-builder-column-0{width:100% !important;order : 0;}.fusion-builder-column-0 > .fusion-column-wrapper {margin-right : 25px;margin-left : 25px;}}@media only screen and (max-width:640px) {.fusion-body .fusion-builder-column-0{width:100% !important;order : 0;}.fusion-builder-column-0 > .fusion-column-wrapper {margin-right : 25px;margin-left : 25px;}}<\/style><\/div><\/div><style type=\"text\/css\">.fusion-body .fusion-flex-container.fusion-builder-row-1{ padding-top : 0px;margin-top : 0px;padding-right : 0px;padding-bottom : 0px;margin-bottom : 0px;padding-left : 0px;}<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Unauthorized Use of Computer (s. 342.1) under Canadian law covers accessing, using, or altering computer data without permission. These offences carry serious consequences, including fines or imprisonment. Learn your rights, possible defences, and the importance of legal representation.<\/p>\n","protected":false},"author":9,"featured_media":52473,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[129,148],"tags":[],"class_list":["post-51086","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-featured","category-fraud"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Unauthorized Use of Computer (s. 342.1) Laws in Canada | Strategic Criminal Defence FAQ<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.strategiccriminaldefence.com\/faq\/unauthorized-use-computer-charges-canada\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Unauthorized Use of Computer (s. 342.1) Laws in Canada | Strategic Criminal Defence FAQ\" \/>\n<meta property=\"og:description\" content=\"Unauthorized Use of Computer (s. 342.1) under Canadian law covers accessing, using, or altering computer data without permission. These offences carry serious consequences, including fines or imprisonment. Learn your rights, possible defences, and the importance of legal representation.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.strategiccriminaldefence.com\/faq\/unauthorized-use-computer-charges-canada\/\" \/>\n<meta property=\"og:site_name\" content=\"Strategic Criminal Defence FAQ\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-20T18:20:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-30T09:11:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.strategiccriminaldefence.com\/faq\/wp-content\/uploads\/sites\/2\/2023\/03\/Unauthorized-Use-of-Computer-s.-342.1-Laws-in-Canada72.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Michael Oykhman\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michael Oykhman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"13 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.strategiccriminaldefence.com\\\/faq\\\/unauthorized-use-computer-charges-canada\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.strategiccriminaldefence.com\\\/faq\\\/unauthorized-use-computer-charges-canada\\\/\"},\"author\":{\"name\":\"Michael Oykhman\",\"@id\":\"https:\\\/\\\/www.strategiccriminaldefence.com\\\/faq\\\/#\\\/schema\\\/person\\\/b15d2e90cba3aeda9530b03de94004e7\"},\"headline\":\"Unauthorized Use of Computer (s. 342.1) Laws in Canada\",\"datePublished\":\"2023-03-20T18:20:21+00:00\",\"dateModified\":\"2025-09-30T09:11:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.strategiccriminaldefence.com\\\/faq\\\/unauthorized-use-computer-charges-canada\\\/\"},\"wordCount\":4075,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.strategiccriminaldefence.com\\\/faq\\\/unauthorized-use-computer-charges-canada\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.strategiccriminaldefence.com\\\/faq\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/03\\\/Unauthorized-Use-of-Computer-s.-342.1-Laws-in-Canada72.jpg\",\"articleSection\":[\"Featured\",\"Fraud\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.strategiccriminaldefence.com\\\/faq\\\/unauthorized-use-computer-charges-canada\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.strategiccriminaldefence.com\\\/faq\\\/unauthorized-use-computer-charges-canada\\\/\",\"url\":\"https:\\\/\\\/www.strategiccriminaldefence.com\\\/faq\\\/unauthorized-use-computer-charges-canada\\\/\",\"name\":\"Unauthorized Use of Computer (s. 342.1) Laws in Canada | Strategic Criminal Defence FAQ\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.strategiccriminaldefence.com\\\/faq\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.strategiccriminaldefence.com\\\/faq\\\/unauthorized-use-computer-charges-canada\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.strategiccriminaldefence.com\\\/faq\\\/unauthorized-use-computer-charges-canada\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.strategiccriminaldefence.com\\\/faq\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/03\\\/Unauthorized-Use-of-Computer-s.-342.1-Laws-in-Canada72.jpg\",\"datePublished\":\"2023-03-20T18:20:21+00:00\",\"dateModified\":\"2025-09-30T09:11:53+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.strategiccriminaldefence.com\\\/faq\\\/#\\\/schema\\\/person\\\/b15d2e90cba3aeda9530b03de94004e7\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.strategiccriminaldefence.com\\\/faq\\\/unauthorized-use-computer-charges-canada\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.strategiccriminaldefence.com\\\/faq\\\/unauthorized-use-computer-charges-canada\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.strategiccriminaldefence.com\\\/faq\\\/unauthorized-use-computer-charges-canada\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.strategiccriminaldefence.com\\\/faq\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/03\\\/Unauthorized-Use-of-Computer-s.-342.1-Laws-in-Canada72.jpg\",\"contentUrl\":\"https:\\\/\\\/www.strategiccriminaldefence.com\\\/faq\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/03\\\/Unauthorized-Use-of-Computer-s.-342.1-Laws-in-Canada72.jpg\",\"width\":1200,\"height\":800,\"caption\":\"A man is using a computer.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.strategiccriminaldefence.com\\\/faq\\\/unauthorized-use-computer-charges-canada\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.strategiccriminaldefence.com\\\/faq\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Unauthorized Use of Computer (s. 342.1) Laws in Canada\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.strategiccriminaldefence.com\\\/faq\\\/#website\",\"url\":\"https:\\\/\\\/www.strategiccriminaldefence.com\\\/faq\\\/\",\"name\":\"Strategic Criminal Defence FAQ\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.strategiccriminaldefence.com\\\/faq\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.strategiccriminaldefence.com\\\/faq\\\/#\\\/schema\\\/person\\\/b15d2e90cba3aeda9530b03de94004e7\",\"name\":\"Michael Oykhman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.strategiccriminaldefence.com\\\/faq\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/09\\\/avatar_user_9_1694196842.jpg\",\"url\":\"https:\\\/\\\/www.strategiccriminaldefence.com\\\/faq\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/09\\\/avatar_user_9_1694196842.jpg\",\"contentUrl\":\"https:\\\/\\\/www.strategiccriminaldefence.com\\\/faq\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/09\\\/avatar_user_9_1694196842.jpg\",\"caption\":\"Michael Oykhman\"},\"description\":\"Michael Oykhman Senior Criminal Lawyer Michael Oykhman is a senior lawyer and founder of Strategic Criminal Defence, a full-service criminal law firm with central law offices in Calgary, Edmonton, Lethbridge, Toronto, and Victoria. My professional experience consists of countless court appearances and thousands of successful defences and satisfied clients. In my legal career, I have appeared at all levels of court in Alberta, including at the Supreme Court of Canada. I received my Bachelor of Arts in Psychology from the University of Calgary (2003) and my Bachelor of Laws (LLB) from the University of Calgary (2006).\",\"url\":\"https:\\\/\\\/www.strategiccriminaldefence.com\\\/faq\\\/author\\\/michaeloykhman\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Unauthorized Use of Computer (s. 342.1) Laws in Canada | Strategic Criminal Defence FAQ","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.strategiccriminaldefence.com\/faq\/unauthorized-use-computer-charges-canada\/","og_locale":"en_US","og_type":"article","og_title":"Unauthorized Use of Computer (s. 342.1) Laws in Canada | Strategic Criminal Defence FAQ","og_description":"Unauthorized Use of Computer (s. 342.1) under Canadian law covers accessing, using, or altering computer data without permission. These offences carry serious consequences, including fines or imprisonment. Learn your rights, possible defences, and the importance of legal representation.","og_url":"https:\/\/www.strategiccriminaldefence.com\/faq\/unauthorized-use-computer-charges-canada\/","og_site_name":"Strategic Criminal Defence FAQ","article_published_time":"2023-03-20T18:20:21+00:00","article_modified_time":"2025-09-30T09:11:53+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/www.strategiccriminaldefence.com\/faq\/wp-content\/uploads\/sites\/2\/2023\/03\/Unauthorized-Use-of-Computer-s.-342.1-Laws-in-Canada72.jpg","type":"image\/jpeg"}],"author":"Michael Oykhman","twitter_misc":{"Written by":"Michael Oykhman","Est. reading time":"13 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.strategiccriminaldefence.com\/faq\/unauthorized-use-computer-charges-canada\/#article","isPartOf":{"@id":"https:\/\/www.strategiccriminaldefence.com\/faq\/unauthorized-use-computer-charges-canada\/"},"author":{"name":"Michael Oykhman","@id":"https:\/\/www.strategiccriminaldefence.com\/faq\/#\/schema\/person\/b15d2e90cba3aeda9530b03de94004e7"},"headline":"Unauthorized Use of Computer (s. 342.1) Laws in Canada","datePublished":"2023-03-20T18:20:21+00:00","dateModified":"2025-09-30T09:11:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.strategiccriminaldefence.com\/faq\/unauthorized-use-computer-charges-canada\/"},"wordCount":4075,"commentCount":0,"image":{"@id":"https:\/\/www.strategiccriminaldefence.com\/faq\/unauthorized-use-computer-charges-canada\/#primaryimage"},"thumbnailUrl":"https:\/\/www.strategiccriminaldefence.com\/faq\/wp-content\/uploads\/sites\/2\/2023\/03\/Unauthorized-Use-of-Computer-s.-342.1-Laws-in-Canada72.jpg","articleSection":["Featured","Fraud"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.strategiccriminaldefence.com\/faq\/unauthorized-use-computer-charges-canada\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.strategiccriminaldefence.com\/faq\/unauthorized-use-computer-charges-canada\/","url":"https:\/\/www.strategiccriminaldefence.com\/faq\/unauthorized-use-computer-charges-canada\/","name":"Unauthorized Use of Computer (s. 342.1) Laws in Canada | Strategic Criminal Defence FAQ","isPartOf":{"@id":"https:\/\/www.strategiccriminaldefence.com\/faq\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.strategiccriminaldefence.com\/faq\/unauthorized-use-computer-charges-canada\/#primaryimage"},"image":{"@id":"https:\/\/www.strategiccriminaldefence.com\/faq\/unauthorized-use-computer-charges-canada\/#primaryimage"},"thumbnailUrl":"https:\/\/www.strategiccriminaldefence.com\/faq\/wp-content\/uploads\/sites\/2\/2023\/03\/Unauthorized-Use-of-Computer-s.-342.1-Laws-in-Canada72.jpg","datePublished":"2023-03-20T18:20:21+00:00","dateModified":"2025-09-30T09:11:53+00:00","author":{"@id":"https:\/\/www.strategiccriminaldefence.com\/faq\/#\/schema\/person\/b15d2e90cba3aeda9530b03de94004e7"},"breadcrumb":{"@id":"https:\/\/www.strategiccriminaldefence.com\/faq\/unauthorized-use-computer-charges-canada\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.strategiccriminaldefence.com\/faq\/unauthorized-use-computer-charges-canada\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.strategiccriminaldefence.com\/faq\/unauthorized-use-computer-charges-canada\/#primaryimage","url":"https:\/\/www.strategiccriminaldefence.com\/faq\/wp-content\/uploads\/sites\/2\/2023\/03\/Unauthorized-Use-of-Computer-s.-342.1-Laws-in-Canada72.jpg","contentUrl":"https:\/\/www.strategiccriminaldefence.com\/faq\/wp-content\/uploads\/sites\/2\/2023\/03\/Unauthorized-Use-of-Computer-s.-342.1-Laws-in-Canada72.jpg","width":1200,"height":800,"caption":"A man is using a computer."},{"@type":"BreadcrumbList","@id":"https:\/\/www.strategiccriminaldefence.com\/faq\/unauthorized-use-computer-charges-canada\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.strategiccriminaldefence.com\/faq\/"},{"@type":"ListItem","position":2,"name":"Unauthorized Use of Computer (s. 342.1) Laws in Canada"}]},{"@type":"WebSite","@id":"https:\/\/www.strategiccriminaldefence.com\/faq\/#website","url":"https:\/\/www.strategiccriminaldefence.com\/faq\/","name":"Strategic Criminal Defence FAQ","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.strategiccriminaldefence.com\/faq\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.strategiccriminaldefence.com\/faq\/#\/schema\/person\/b15d2e90cba3aeda9530b03de94004e7","name":"Michael Oykhman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.strategiccriminaldefence.com\/faq\/wp-content\/uploads\/sites\/2\/2023\/09\/avatar_user_9_1694196842.jpg","url":"https:\/\/www.strategiccriminaldefence.com\/faq\/wp-content\/uploads\/sites\/2\/2023\/09\/avatar_user_9_1694196842.jpg","contentUrl":"https:\/\/www.strategiccriminaldefence.com\/faq\/wp-content\/uploads\/sites\/2\/2023\/09\/avatar_user_9_1694196842.jpg","caption":"Michael Oykhman"},"description":"Michael Oykhman Senior Criminal Lawyer Michael Oykhman is a senior lawyer and founder of Strategic Criminal Defence, a full-service criminal law firm with central law offices in Calgary, Edmonton, Lethbridge, Toronto, and Victoria. My professional experience consists of countless court appearances and thousands of successful defences and satisfied clients. In my legal career, I have appeared at all levels of court in Alberta, including at the Supreme Court of Canada. I received my Bachelor of Arts in Psychology from the University of Calgary (2003) and my Bachelor of Laws (LLB) from the University of Calgary (2006).","url":"https:\/\/www.strategiccriminaldefence.com\/faq\/author\/michaeloykhman\/"}]}},"acf":[],"_links":{"self":[{"href":"https:\/\/www.strategiccriminaldefence.com\/faq\/wp-json\/wp\/v2\/posts\/51086","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.strategiccriminaldefence.com\/faq\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.strategiccriminaldefence.com\/faq\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.strategiccriminaldefence.com\/faq\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.strategiccriminaldefence.com\/faq\/wp-json\/wp\/v2\/comments?post=51086"}],"version-history":[{"count":0,"href":"https:\/\/www.strategiccriminaldefence.com\/faq\/wp-json\/wp\/v2\/posts\/51086\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.strategiccriminaldefence.com\/faq\/wp-json\/wp\/v2\/media\/52473"}],"wp:attachment":[{"href":"https:\/\/www.strategiccriminaldefence.com\/faq\/wp-json\/wp\/v2\/media?parent=51086"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.strategiccriminaldefence.com\/faq\/wp-json\/wp\/v2\/categories?post=51086"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.strategiccriminaldefence.com\/faq\/wp-json\/wp\/v2\/tags?post=51086"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}