The breakdown of any intimate relationship is an emotionally charged and life-altering event. Amidst the division of assets, custody arrangements, and rebuilding your life, there’s another, less visible threat: digital vulnerability. Former partners have seen us at our most intimate and vulnerable moments.  They potentially have access to a treasure trove of personal data — passwords, financial accounts, location history, emails, cloud drives, and even smart home systems.

Here are a few case studies to illustrate the point:

Case 1: “The Watchful Exit” – Spyware Installed by a Departing Spouse

Facts:
Before moving out of the marital home, Lisa installed spyware on her husband Mark’s personal laptop and mobile phone. The spyware secretly captured Mark’s emails, texts, and banking logins, and sent copies to Lisa’s cloud account. Lisa used this data to gather evidence of Mark’s alleged infidelity and undisclosed cryptocurrency assets.

Legal Issues:

  • Criminal Code (Canada) s. 184 & 342.1: Unauthorized interception of private communications and use of computer systems fraudulently.
  • Family Law Implications: Admissibility of evidence obtained through illegal surveillance.

Cybersecurity Commentary:
Spyware use between spouses is becoming increasingly common but illegal. Digital forensics revealed the breach, and Lisa was charged with unauthorized use of a computer system and faced liability for invasion of privacy.

Case 2: “Password Past” – Using Shared Logins After Separation

Facts:
After their separation, Jason continued to access his ex-wife Andrea’s email and bank records using saved shared passwords from when they were together. He claimed this was for “financial transparency” related to child support and division of assets.

Legal Issues:

  • PIPEDA (Personal Information Protection and Electronic Documents Act): Unauthorized access to personal data.
  • Criminal Code s. 342.1: Fraudulently obtaining computer service.
  • Ontario Family Law Rules: Potential breach of undertakings or court-ordered disclosure obligations.

Cybersecurity Commentary:
Shared passwords should be considered revoked upon separation. Even if once consensual, continued use post-separation can constitute a criminal breach and also harm trust in family law proceedings.

Case 3: “Locked Out of the Business” – Changing Passwords on Shared Assets

Facts:
Two spouses co-owned a digital marketing firm. After their relationship ended, Sara locked out her ex-partner Jamal by changing admin credentials to the company’s web hosting and client platforms. Jamal lost access to client data and billing systems.

Legal Issues:

  • Corporate Law & Contractual Obligations: Breach of partnership/co-ownership agreements.
  • Criminal Code s. 342.1: Unauthorized denial of access to a computer service.
  • Civil Torts: Conversion, interference with economic relations.

Cybersecurity Commentary:
Ownership of digital assets must be clearly addressed in partnership or cohabitation agreements. Courts may issue injunctions to restore access, but digital forensics may be needed to track down activities and intent.

Case 4: “Exposed” – Dissemination of Intimate Images Without Consent

Facts:
After a bitter separation, Kevin posted intimate photos of his ex-partner Priya on Reddit and sent them to her employer anonymously. These images had been taken during their relationship with mutual consent but were shared without her permission.

Legal Issues:

  • Criminal Code s. 162.1: Non-consensual distribution of intimate images.
  • Tort of Public Disclosure of Private Facts: Emerging tort in Canadian law (Jane Doe 464533 v. ND).
  • Employment Law Implications: Employer’s obligations to protect against harassment and privacy violations.

Cybersecurity Commentary:
This is a classic “revenge porn” case. Priya obtained a restraining order and a takedown order from the court. Kevin was criminally charged, and Priya pursued a civil action for damages related to emotional distress and reputational harm.

Conclusion: Digital Independence Is a Legal Priority After Divorce

Divorce and separation should represent a clean break — emotionally, financially, and legally. But without clear digital boundaries, your ex-partner may retain access to your most sensitive data. From smartphones to smart homes, co-parenting apps to cloud drives, the scope of risk is vast.

Fortunately, a combination of legal strategies, technical measures, and proactive planning can protect you. By involving your lawyer early, revising your separation agreement to cover digital assets, and being vigilant about cybersecurity practices, you can reclaim digital autonomy.