Overview of Intercepting Private Communications
Price
$60.00
Content Provider:
Royal Canadian Mounted Police
Tagged Categories:
- Criminal Intelligence
- Investigation Skills
- Legislative Awareness
Language
En/Fr
Length
3 Hour(s)
Release Date
June 2012
Revision Date
January 2021
Investigations involving the interception of private communications are costly, complex and involve many potential risks. These investigations are subject to intense scrutiny as the Courts attempt to balance law and order with the individual’s right to privacy. Ensuring that these investigations succeed is the responsibility of every member of the investigative team. As such, every member of the team must understand and respect the legislation and the specific limitations associated with this intrusive investigative tool.
The Overview of Intercepting Private Communications online course outlines the authorizations and provisions that exist to permit the interception of private communications and identifies some basic considerations associated with affidavits and authorizations. It also examines the relationship between the affiant and every participant in an investigation involving the interception of private communications.
Learning Objectives
When you have completed this course you will be able to:
- Recognize the importance of striking a balance between safeguarding individual privacy rights and enhancing law enforcement techniques
- Define several key terms relating to the interception of private communications
- Identify the authorizations and provisions that permit the interception of private communications
- Describe the key features of each provision
- Recognize the relationship between the affiant and every participant in an investigation involving the interception of private communications
- Recognize the importance of full, fair and frank disclosure and its importance in relation to investigative necessity
- Identify the Terms and Conditions of an Authorization
- Describe the structure of an authorization and how it is implemented
- Identify the terms and conditions which would allow you to intercept private communications
- Recognize the requirements for successfully implementing an authorization to intercept private communications