I have a point of order.
We aren't discussing committee business. We're here to study Bill .
We have a motion regarding the consideration of Bill C‑12. We debated, amended and passed this motion last Tuesday. As a result, I don't think that it's proper procedure for us to—this morning, in front of our witnesses and in public—reconsider a decision made on Tuesday.
Mr. Chair, remember that we spent half an hour on Tuesday planning the work on the consideration of Bill C‑12, and we came to an agreement. I find it unacceptable to continue the discussion this morning.
I'm raising a point of order because this is off topic. We're studying Bill C‑8, which has nothing to do with Bill .
:
Mr. Chair, I find it difficult to accept your explanation. After debating the motion for half an hour, we came to an agreement. You now want us to quickly agree on something that was debated for 30 minutes.
Mr. Chair, I gather that there have been discussions, that the Conservatives probably agree with your proposal and that you feel comfortable not complying with the Standing Orders. Personally, if I may say so, I think that this is a poor way to run the committee.
I'm not holding this against you personally. You're stuck in a bit of a bind. You decided to leave it off the committee's agenda so that we would have time to come to an agreement. However, this morning, because a negotiation took place between the Liberals and the Conservatives, you can't suddenly ask me to meekly accept this change in three or four minutes without speaking up.
This is out of order and off topic. I challenge your ruling.
:
I'm simply telling you that I find this unacceptable.
I think that we reached a good consensus at the last meeting. The Conservatives are prepared to support the amendment. I take that for granted. The Liberals feel comfortable revisiting an issue resolved at the last meeting. This is basically a test of confidence.
The Bloc Québécois has no intention of blocking Bill . We told you this, and we even facilitated the debate. We don't intend to filibuster or to move a bundle of amendments. Everyone agrees on this. I have the impression that the same applies to the Conservatives.
I'm arguing on principle. If you proceed as you intend to do today, it will set a precedent.
You're in charge of maintaining order and following procedure. I expect you to refrain from participating in informal partisan discussions. You must remain neutral.
We'll take a short break to make sure that the interpreters have a copy of the motion.
We're moving along, but not as fast as some people thought we would.
I would like to inform the various team members that the parties haven't reached a clear agreement on the motion regarding Bill . This means that we must postpone the discussion until a bit later, since we have important witnesses to hear from.
That's what will happen.
[English]
This brings me to perhaps something a bit more timely, which is the fact that we're now going to greet four important witnesses.
[Translation]
I'll start by welcoming all our witnesses.
From Canadian Cyber Threat Exchange, we're joined by Jennifer Quaid, executive director.
From ISC2, Inc., we're joined by Philip Stupak, senior director of advocacy.
From the Office of the Intelligence Commissioner, we're joined by the Honourable Simon Noël, Intelligence Commissioner, and Justin Dubois, executive director and general counsel.
Lastly, from the Office of the Privacy Commissioner of Canada, we're joined by Philippe Dufresne, Privacy Commissioner of Canada, and Marc Chénier, deputy commissioner and senior general counsel.
You have five minutes for your remarks.
Ms. Quaid, the floor is yours.
:
With more than 200 members representing 15 sectors and more than 1.5 million employees, many of our members represent the critical infrastructure sectors impacted by this legislation, while others make up their supply chain—large and small businesses alike. Members join the CCTX because they want to actively share cyber-threat information to help build awareness and resilience in others, to get ahead of the threat and to prevent breaches and the corresponding need to report, which this bill governs. However, they are limited in what they can share.
As Canada advances its national cybersecurity posture, one policy concept merits greater attention: safe harbour legislation. While overlooked in the current proposed legislation, it plays a critical role in fostering transparency, co-operation and resilience across our digital ecosystem. When we talk about cybersecurity, we often focus on technology—firewalls, encryption and artificial intelligence—yet one of the most powerful tools we have to strengthen our defences isn't technological at all. It's collaboration. It's the sharing of cyber-threat information to enable others to better protect themselves and to prevent a breach from happening.
This requires protection by legislation. Safe harbour protection is about creating a climate of trust. We need to ensure that organizations that are trying to do the right thing by sharing useful information about cyber-attackers and their techniques are not punished. Safe harbour protection helps others to not be the victim of a breach.
Mandatory reporting is done after the fact. We are interested in prevention. Without safe harbour protections, too many organizations hesitate to talk about breaches or vulnerabilities that fall below the threshold of reporting to regulators. They fear lawsuits, reputational damage or regulatory penalties. As a result, critical information stays hidden. The same attacks can then impact others across sectors and borders. Attackers will keep using the same techniques over and over again. We have seen this numerous times in the last year. Safe harbour changes that. It empowers companies to share threat intelligence with government and with each other, knowing they're protected when acting responsibly and without fear of legal consequence.
It's not about excusing negligence or shielding bad actors. It's about enabling responsible behaviour, which creates the legal certainty needed for transparency and co-operation to flourish. Ultimately, safe harbour protection strengthens our collective resilience. It allows us to learn from each other and collaborate across sectors to build the trust needed to defend Canadians and Canadian organizations. If we embed safe harbour legislation in our cybersecurity policies and legislative frameworks, we can build a culture where reporting, learning and collaboration are seen not as risks but as responsibilities. That is how we move from reactive cybersecurity to a truly resilient digital Canada.
In cybersecurity, silence is the real threat. Safe harbour ensures that speaking up is safe and that doing the right thing protects us all.
Thank you.
:
Good morning, Mr. Chair and honourable members of the committee. My name is Philip Stupak. I serve as the senior director of advocacy at ISC2, the professional member association for cybersecurity professionals. Prior to joining ISC2, I had the privilege of serving in the Biden-Harris administration as the assistant national cyber director at the White House.
ISC2 is the world's largest association dedicated to cybersecurity professionals, representing more than 265,000 members and associates globally. Our second-largest membership base is right here in Canada, with over 14,000 members. We offer nine professional certifications, the most recognized of which is the certified information systems security professional, or CISSP, widely regarded by employers as the gold standard for cybersecurity expertise.
I appear today on behalf of our global membership to express the cybersecurity profession's strong support for Bill , an act respecting cybersecurity. We live in a period of extraordinary uncertainty. For much of our shared history, Canada and the United States benefited from geography as a natural deterrent. The vastness of the Atlantic and Pacific oceans provided a measure of protection our adversaries could not easily overcome. That era is over.
The 2010 Stuxnet cyber-attack against Iranian centrifuges demonstrated, for the first time, that the boundary between the digital and physical worlds can be breached with tangible, real-world consequences. Today, 15 nations possess blue-water navies capable of projecting power across oceans. Eight possess nuclear weapons, and 170 nations have cyber-capabilities. We have already seen the effects of cyber-attacks here in Canada. Patients in hospitals across southwestern Ontario were forced to reschedule surgeries and appointments, costing millions of dollars and delaying care. While 516,000 patients had their private health information compromised, we know that cyber-attacks can cause even greater damage at a broader scale.
It may take a navy a week to cross the Pacific or minutes for a missile to reach its target, but a cyber-attack could return hospital systems to the age of torchlight and hacksaws, and communication to horseback dispatches, without warning and without attribution. This is not speculation. This is preparation.
Our adversaries are actively working to undermine critical infrastructure. Even a minor activation of pre-positioned digital weapons or malware across essential sectors could result in service disruptions, communication collapse, power outages, water shortages and transportation paralysis at a time and place of an adversarial actor's choosing. In the worst case, it could return modern societies to conditions resembling the pre-industrial era.
However, I want to be clear: Our adversaries are not invincible. With foresight, coordination and policy action, we can and must defend ourselves. Bill is an essential step toward ensuring that those defences are in place before they are needed. The amendments to the Telecommunications Act are particularly significant. By prohibiting high-risk suppliers, removing compromised equipment and requiring pre-approval for certain technologies, the bill strengthens the sector that underpins every other sector. Vulnerabilities in telecommunications are vulnerabilities everywhere.
The creation of the critical cyber systems protection act is likewise prudent. It establishes minimum cybersecurity baselines across Canada's most essential sectors. I would respectfully encourage the committee to consider adding federally regulated water systems to that list, given their foundational importance to national health and safety. I likewise encourage the federal government to work with provincial, territorial and municipal partners to ensure that critical infrastructure under their jurisdictions achieves the same level of cyber-protection envisioned by Bill . A qualified workforce is essential to executing the functions of this act. Every day, ISC2 is training and certifying the government and critical infrastructure professionals who will be needed to implement Bill C‑8.
We cannot afford to assume that threats to the Canadian way of life are distant or hypothetical. They are real, they are present and they demand decisive action. The responsibility for defending against these threats rests in part with this committee. Bill represents a thoughtful, measured and necessary step toward that defence.
Thank you.
I also want to thank the members for inviting me.
I'm joined today by Justin Dubois, executive director and general counsel at the Office of the Intelligence Commissioner.
[English]
To place my comments on this bill into context, it's useful to briefly explain what my role as the intelligence commissioner is all about.
[Translation]
My role is to approve or not approve certain national security and intelligence activities proposed by the Communications Security Establishment, or CSE, and Canadian Security Intelligence Service. These activities are authorized respectively by the and the .
[English]
My independent approval is necessary because the activities the ministers authorize may be contrary to the law or breach the reasonable expectation of privacy of Canadians. Only with my approval can activities proceed.
[Translation]
The commissioner position that I hold was created in 2019. The mandate given to the commissioner by Parliament at that time is of particular relevance to the study of this bill. It includes enabling CSE to effectively respond to cyber incidents that affect federal systems and systems designated as important to the Government of Canada. One of my specific duties is to review ministerial authorizations that allow CSE to conduct cybersecurity activities on those systems.
[English]
My approval is also necessary because the cybersecurity activities conducted by the CSE lead to the collection of vast amounts of information, including information for which Canadians have a reasonable expectation of privacy. To be effective in conducting cybersecurity, the CSE needs to collect this information.
I only approve ministerial authorization when I'm satisfied that the minister has struck a reasonable balance between the security of Canada and the privacy of Canadians. This includes ensuring that appropriate measures are in place to protect the privacy interests of Canadians.
[Translation]
I noted that through my work as Information Commissioner, I see the tremendous value of a national approach to cybersecurity. Canada must have the necessary tools to protect our critical electronic systems. However, these tools must be accompanied by the appropriate safeguards and independent oversight.
[English]
In my view, there are elements of this bill where independent oversight would improve the protection of these privacy interests. I will raise one that relates closely to my role as IC. This bill aims to protect our critical cyber-systems. The CSE is our national expert on cybersecurity and will, through this bill, receive information on cyber-incidents.
In my experience as IC—with over three years and 45 decisions rendered—for the CSE to analyze and understand a cyber-incident, it must have access to information about the incident. There may be situations where this information is only technical in nature and sharing it with the CSE raises no privacy concerns, as you were told when you met with other witnesses. However, to fully understand the cyber-incident, other situations may require the CSE to have access to information, including technical information, for which Canadians have a reasonable expectation of privacy. I've seen it.
Technology and cyber-threats evolve faster than legislation. The bill should provide the flexibility to adapt accordingly and allow for the sharing of this information with appropriate oversight.
[Translation]
In the current system, prior to collecting this information, CSE is required to obtain a ministerial authorization and approval from the Information Commissioner. Parliament chose to implement this process in 2019, but not in 2025.
[English]
The mechanism proposed consists of adopting a regulation setting out what information about cyber-incidents is to be shared with the CSE and how it is to be shared. As you know, there is no independent oversight of the regulation. One possible simple and effective oversight measure would be to annually require ministerial authorization establishing a framework for how the CSE uses and shares the information, which would then be subject to review and approval by the intelligence commissioner.
[Translation]
Effective cybersecurity is essential for Canadians. CSE must have access to the information it needs to conduct its excellent work—with the necessary oversight to allow for that access.
[English]
I support the bill's intent but believe that targeted, additional safeguards that do not impose a heavy administrative burden on our agencies would increase Canadians' confidence that these measures intended to protect them do not themselves unnecessarily intrude on their privacy.
Thank you for the invitation to appear before you today to offer my views on the implications of Bill , an act respecting cyber security, amending the Telecommunications Act and making consequential amendments to other acts.
I am accompanied by Marc Chénier, deputy commissioner and senior general counsel.
There is no doubt that we continue to face a challenging cyber-threat landscape in which the consequences of cyber-incidents are increasingly disruptive and widespread.
[English]
Breaches of critical infrastructure, such as the one that affected Nova Scotia Power in May of this year, are particularly concerning as they can compromise systems and services that are essential to the health, safety, security and economic prosperity of Canadians. Such incidents may result in unauthorized access to or disclosure of personal information, potentially leading to major privacy implications and a real risk of significant harm to affected individuals.
It is for these reasons that I support the objective of Bill to protect systems and services that are vital to national security or public safety from cybersecurity threats and vulnerabilities.
Like its predecessor Bill , Bill recognizes that steps must be taken to protect critical infrastructure against cyber-threats, which are continuing to evolve in sophistication and complexity. This is necessary from a security standpoint and from a privacy standpoint.
[Translation]
While stronger cybersecurity protections can help to reduce the likelihood and impact of privacy breaches, it is also essential to ensure that new powers that are created to improve cybersecurity contain the necessary limits and that they do not have unintended impacts on privacy.
I am pleased to see that Bill C‑8 incorporates a number of improvements compared to its predecessor, Bill , including additional guardrails on the proposed order-making powers, and new notification and reporting obligations.
[English]
These will help to achieve a better balance between the bill's cybersecurity objectives and privacy rights and interests.
However, some privacy risks remain, including lower thresholds for the exercise of certain powers and authorities with potential privacy implications, the absence of a mechanism to ensure that my office is notified of major cybersecurity breaches that impact the privacy of Canadians, and insufficient minimum privacy requirements for the sharing of information with foreign governments.
To address these risks and achieve the necessary balance between security and privacy, I would recommend, first, that the legislation impose a uniform standard requiring that any collection, use or disclosure of personal information be both necessary in the circumstances to achieve the stated purpose and proportional to the benefits to be gained.
Second, I would recommend that information-sharing agreements entered into under the legislation provide for minimum privacy safeguards in order to strengthen governance and accountability and to ensure a consistent standard of privacy protection when information is exchanged outside of Canada.
Third, I would recommend that the relevant government institutions, including the Communications Security Establishment, CSE, be required to notify my office when they're made aware of cybersecurity incidents involving a material privacy breach so that we can together collaborate and coordinate our efforts in protecting Canadians’ privacy.
[Translation]
While this is not specific to Bill , I would also reiterate my overarching recommendation that government institutions be legally required to conduct privacy impact assessments and to consult my office when developing any new programs or initiatives with privacy implications for Canadians.
Thank you for the opportunity to present my views on this bill. I would now be pleased to answer your questions.
:
Thank you very much to all the witnesses.
Where do I start? I'd like to start with Monsieur Noël and Monsieur Dufresne.
You both spoke a lot about what's not in this bill.
I'm sorry. I'm going to take a step back before I forget. We only have you for a few minutes today, unfortunately. What I would ask, if you are comfortable with it, is that, whatever we don't get to, especially.... You have given us comprehensive areas where the legislation is silent. Really, we're talking about two things here: the problematic aspects of the legislation—what's written and what's wrong with what's written—and what's not present.
Perhaps this already exists, but it would be exceptionally helpful to me if you were to enumerate those things. Otherwise, we're going through transcripts. I'm not sure if your office has the capability. I think it would be very helpful if you were able to say, “In our view, the legislation needs to include this, this and this.” That would help us tremendously at the clause-by-clause and amendment phase.
I'll leave that with you.
I'm going to focus on what's in the bill. I will give you both two minutes. Please point out specific provisions, if you can, because you've spoken in generalities thus far. If there is a specific section, can you point to it and say, “In my view, this section is a problem because...”? Am I clear?
Mr. Dufresne, do you want to have the first couple of minutes? Then we'll move on to Monsieur Noël.
:
Sure. Thank you, Mr. Caputo.
I highlighted three themes for recommendations: necessity and proportionality; information-sharing agreements and the minimum content there; and sharing authorities.
For necessity and proportionality, I'll start with the positive. There have been amendments to the minister's order-making power in the Telecommunications Act section. If we look at proposed subsection 15.1(2), we see this mentioned:
The provisions of the order must, in scope and substance, be reasonable in relation to the gravity of the threat, including that of interference, manipulation, disruption or degradation.
That doesn't use the words “necessity and proportionality”, but it achieves that purpose because you are talking about what you are trying to achieve and whether it would be proportional to that.
By contrast, if we look at the powers given to the Minister of Industry under proposed section 15.4, they would have the ability to require any person to provide to the Minister or any person designated “subject to any conditions that the Minister may specify, any information that the Minister believes on reasonable grounds is relevant”. That's not a necessity and proportionality test. That's a relevance test, so it's different.
Later in the bill, we have exchanges of information with foreign governments based on necessity. In the cybersecurity section of the legislation, we have the ability to issue some directions for cybersecurity. There, we have either necessity alone or an absence of necessity and proportionality.
My overarching point is this: In those sections, there is a precedent for a good necessity and proportionality clause. It's the proposed section that I cited. What's interesting is that, even in the cybersecurity bill, in proposed subsection 147(1), there is an annual report that would have to be prepared. In there, the legislation says, at proposed paragraph 147(2)(f), that the report would have to include “an explanation of the necessity, proportionality, reasonableness and utility of the directions.” I think that's an example of why this proportionality is necessary. There's already a recognition that it should be in the report, but it should also be in the power.
In terms of information-sharing agreements, then, we should specify the types of restrictions for sharing with other countries.
My knowledge is on the CSE. I know the information that is being transferred to the CSE in order for it to be able to do its cyber-activities.
Where's the framework? Look at proposed section 17 in part 2 of the bill. It doesn't stipulate anything. It says there will be regulations eventually.
At the present time, under my legislation with the CSE, when a cyber-activity incident occurs, the minister gets involved and renders a decision. You go into action and then I get the decision. I approve it, amend it and change it, and then the results come out.
The other point I want to tell you is this. I heard the bureaucrats tell you earlier this week that it's technical information. I agree that it's technical information, but I also know that if you want a positive result on an incident of such importance, they need to go into the content. I've seen it in every cyber-operation I've been involved in.
You're asking me if there are other types. I'm not talking about it—I'm limiting myself to this—but it's clear that warrantless search and seizure creates a problem. I'll let others deal with that.
:
When I think about benchmarking, one of the first things Bill would do, which I think is quite wise, is consolidate some powers in the minister. This is important.
Right now, many countries have a distributed system of defining cybersecurity policy and reacting to the cybersecurity incident. By having this invested in the minister, you have one person who is ultimately responsible. When we created the national cyber director role within the United States, it was at the behest of our senate. Senator Angus King from Maine famously said he was doing this because he needed “one throat to choke.”
One of the important elements in Bill is that you are creating this uniformity within one minister. Obviously, there are other ministers and other ministries that will participate in implementing those actions, but having that one person to look over all of it is important.
What is a bit different—at least from the United States' system, which is what I can talk about—is the ability to direct industry to do certain actions. I wish I'd had that ability. That was something I was certainly lacking during my tenure at the White House. I could not direct industry to take specific actions. I think that is beneficial, especially when you're dealing with a cyber-incident where time matters. That's something that is not within our system, but you do have it here, and I think it is beneficial.
:
Thank you very much, Mr. Chair.
Mr. Dufresne, you talked a lot about section 15. You said there's a provision regarding reports, but that it might be better to limit the minister's powers and ensure a correlation between powers. I'd like to talk about section 34 of the proposed critical cyber systems protection act, which has the word “order” in its title. Let's put aside section 15. Section 34 gives the superintendent a lot of power. They may, in writing, order what they want from an operator. You haven't talked about this section, but I worry about it.
Elsewhere in the bill, there's mention of a transparency process, but I'll give you an extreme example of what section 34 could allow. A superintendent could ask a supplier to reduce their encryption. The superintendent would then have access to conversations between clients and suppliers without any accountability or authorization. No one would know.
Am I right in saying that a lot of power is being given without any accountability requirement, and that a citizen has no way of knowing that authorities have access to their conversation?
:
That section refers specifically to the superintendent's powers. Other sections apply to the Bank of Canada and the industry minister. We're talking about a regulatory audit, a records audit. Audit authorities get that type of power through statutory instruments. That's not why I'm here today, and it's not one of my main concerns.
That said, I would point out that my third recommendation would require that these organizations share information and notify my office when cyber-attacks are committed and when they are made aware of incidents that could lead to privacy breaches for Canadians. I don't think the audits you're referring to concern this type of information. However, if they do, we need to be notified.
I'd like to follow up on the previous discussion about whether this includes personal information. In a way, I think the bill recognizes that it's possible, because it refers to personal information. Personal information is part of confidential information.
Regarding whether there are comparable provisions in other countries, in Europe, institutions have to notify data protection authorities. We don't have such provisions, so I think we could do better.
Mr. Dufresne, I would like to come back to what you and Mr. Caputo were talking about earlier.
Your remarks were very relevant, especially since you made a connection with Bill , which the committee will be studying.
You could give us examples of provisions we could improve in the bill to protect privacy. I think democracy is based on privacy protection, and the American model doesn't inspire confidence. We value this protection. Again, I think we have an opportunity to improve on Bill , and modernize this one even more to better protect the personal information of Quebeckers and Canadians.
I often read the reports of the agency that examines whether organizations are respecting the requirements related to the use of personal information, and I've realized that they are often in violation of those requirements. Given that, Bill needs to be nearly perfect.
That's why we'll use your recommendations to bring tangible improvements to the bill through amendments.
:
In terms of the section that you're referring to as it relates to the order-making power under the Telecommunications Act in proposed subsection 15.2(3), there has been an addition to require that it must, “in scope and substance, be reasonable in relation to the gravity of the threat, including that of interference, manipulation, disruption or degradation.”
I think this doesn't use the words “necessity and proportionality”, but there is that sense of balance, so I would find that achieves my goal of making sure that you have security and privacy. It's a balance and we don't want to have a zero-sum game, where you go too far in limiting the agency's power to protect Canadians, or you go too far in harming Canadians' privacy. I am comfortable with that clause.
It's the other clauses, in terms of some of the other powers, where we're talking only about necessity or about relevance, that I would want to see strengthened to bring in this key concept of proportionality.
I will be sharing my time with Ms. Dandurand, if there's any left.
[English]
Thank you for coming today.
My question will be for Mr. Stupak.
Thank you for your testimony and for speaking on the importance of this bill.
I echo your point on the implications of a cyber-attack on our infrastructure from monetary and security perspectives. Under Bill , designated operators will be required to adopt comprehensive cyber programs and report incidents essential for baseline protections.
You have expressed strong support for Bill . Given your experience and extensive knowledge on similar laws in Europe or the Five Eyes, particularly in the U.S., when it comes to federal policy and workplace development, you have experienced what worked and what didn't work.
With two questions, I would like to focus on implementation capacity and professional standards. First, how prepared is Canada's current cybersecurity workforce to meet the compliance and technical demands that Bill introduces?
Second, from your international perspective, how does Bill align with similar frameworks in allied jurisdictions, and where should Canada prioritize harmonization to reduce compliance challenges for global firms?
:
Thank you for both of those questions. They're extremely pertinent.
On the workforce question, Canada has a very robust workforce. You have an impressive workforce that has the tools and capabilities to implement Bill .
I will be honest. We all need more. We need more professionals within this space. We need more people who have certifications that indicate they have the necessary skills in order to do the work that needs to be done. This is important. Too often, we are focused on education and whether someone has the necessary degree, but what we're really looking for are the skills in order to do this work.
There are efforts under way under the NICE framework, for example, to define what those functions are that every role within cybersecurity should have, and then how you meet those functions. This is being developed. I think this is something that is not robust enough across borders, but the point is that you do have the capability to begin implementing. You are going to need to do more education. You are going to need to do more training. You're going to need to do more certification.
On the question of international frameworks, because you do take the sectoral approach and it is directed at a particular sector, I think you are very well aligned with the United States and how we have historically done this—by looking at each sector and what needs to be done within that sector. Not all sectors are equal. Bluntly, the water sector within my country is not at the same level as financial services. You do need to have that approach, because not everyone is ready to do the same thing at the same time.
I would compare this also to the NIS2 standards from within the European Union. That is not how I would recommend to do this. There, they take much more of an auditing perspective, and it's impossible to audit all critical infrastructure as frequently as you need to. Moreover, the compliance regime is simply not mature enough or robust enough yet to comply with NIS2.
I appreciate that this bill takes more of a sectoral approach, which is more like the United States and a little less like the European Union.
:
Thank you very much, Mr. Chair.
Mr. Noël, the RCMP and the Canadian Security Intelligence Service, or CSIS, are putting a lot of pressure on lawmakers to make access to information—intelligence—easier. As we always say, there needs to be a balance between security, protective intervention and privacy protection.
I feel a lot of pressure to follow a path that is quite unsettling for us as elected officials. If our institutions no longer need or want to be accountable or would prefer to show as little transparency as possible, won't that break people's trust in those institutions? They say that too much transparency makes us vulnerable security-wise and opens the door to outside powers that don't necessarily want what's best for us.
Do you think the committee should be able to hear from the National Security and Intelligence Review Agency? They're charged with making sure agencies respect the law. If we give the ministers and superintendents more power without holding them to account, the agency won't be able to do its job. Everything will happen in secret.
What do you think of this pressure we feel to both increase and limit transparency?
:
I sympathize with what you're saying.
It is clear that we are living in a world in which cyber-attacks have become the new tools of war. When we look at malicious actors, whether it's a country or someone demanding a ransom, we see they have a tremendous capacity to pierce through our layers of protection and gain access to what they want.
If you want to adequately protect your constituents, you need to give the government and police the same tools, so they can combat those malicious actors.
That said, your challenge is to find measures that take into account your concerns as an MP: people's privacy, on one hand, and national security, on the other.
:
We are resuming the meeting since we have quorum.
Welcome to our four important witnesses.
With us are Josh Dehaas, counsel for the Canadian Constitution Foundation; Aaron Shull, managing director and general counsel for the Centre for International Governance Innovation; Luc Lefebvre, chairman and co-founder of Crypto Québec, who is joining us by video conference; and Sharon Polsky, president of the Privacy and Access Council of Canada.
Welcome to all four of you. You will each have five minutes for your presentation.
Please go ahead, Mr. Dehaas.
My name is Josh Dehaas. I'm counsel with the Canadian Constitution Foundation. The CCF is a non-partisan charity dedicated to defending Canadians' rights and freedoms through education, communications and litigation. The CCF is most famous for successfully challenging the invocation of the Emergencies Act in February 2022. The Federal Court found that the invocation was ultra vires the statute and violated the rights to freedom of expression as well as security against unreasonable searches and seizures.
The CCF has serious concerns about one particular aspect of Bill . Proposed section 15.2 would allow unconstitutional limits on freedom of expression, peaceful assembly and association. Proposed subsection 15.2(1) would give the Minister of Industry a dangerous new power to order telecommunications service providers to cut individuals off of Internet or phone services based on “any threat” to the telecommunications system, which includes all of Canada's Internet, phone and radio infrastructure. This need not be a systemic or even a serious threat.
Proposed subsections 15.2(5) and (8) would allow the details of the minister's orders to remain secret under the threat of huge fines. While there may be circumstances where the minister requires the power to order malicious servers to be cut out of the system, it's dangerous to civil liberties to allow the minister the power to cut off individual Canadians without proper due process and to keep that secret.
Consider, for example, a protester whom the minister believes may engage in a distributed denial of service, or DDOS, attack, which is a common form of civil disobedience employed by political activists. Using proposed section 15.2, the minister could order that this dissident's Internet and phone services be cut off and require that the decision remain secret. That individual's only recourse would be to hire a lawyer at great expense to contest the minister's order. That order would remain in place unless and until a court hears the case and orders restoration of the services. The person affected may not even be aware that they're entitled to judicial review, because the statute does not require that they be informed of their right to challenge that order in court.
To be clear, DDOS attacks are genuine cybersecurity risks. They are a criminal offence. However, somebody merely suspected of planning to participate in such civil disobedience could be silenced. Without the Internet or phone, they would be effectively cut off from all online expression. They would be prevented from constitutionally protected political activities, including speaking out in opposition to policy or meeting with others online—violating expression, assembly and freedom of association.
While the statute appears to be a good-faith attempt to prevent and stem cyber-attacks, it does not include proper safeguards to prevent abuse. Statutes passed in good faith are often used to violate rights, particularly in periods of political and social unrest. For example, the federal government ordered financial institutions to freeze hundreds of accounts without due process during the invocation of the Emergencies Act. This left some protesters and their domestic partners unable to pay bills in the middle of a very cold winter and violated their rights under section 8 of the charter. The government also used the act to block protesters from simply standing on Parliament Hill with the Canadian flag or a placard opposing vaccine mandates, violating their right to expression.
In other words, we can't just trust governments with this sort of power. There must be better safeguards built into the bill.
The CCF has five proposed amendments that would reduce that civil liberties risk.
First, the CCF proposes that proposed subsection 15.2(1) be modified to clarify that the power to cut off services may only be used in cases of serious systemic risks.
Second, the CCF proposes that the statute make explicit that judicial review is available and that services may be restored immediately by a judge.
Third, the CCF proposes that the statute limit the secrecy of any order by requiring that it be published in the Canada Gazette within 90 days unless the minister obtains an order from the Federal Court prohibiting the disclosure of some or all of its contents.
Fourth, the CCF proposes that such orders may only be kept secret where a Federal Court judge is satisfied that there are reasonable grounds to believe that the disclosure of some or all of the order would be injurious to international relations, national defence or national security or endanger the safety of any person.
Finally, the CCF proposes that where the judge is of the opinion that it is necessary to protect the fairness of proceedings for an individual impacted by such a decision, they may appoint an amicus curiae to assist that individual.
Thank you for your time. I'd be happy to answer any questions.
:
Thank you very much, Chair and members of the committee.
I'm going to do two things today. I will go to specific proposed sections of the legislation that I think warrant a further look and potential amendment. Then I will talk about a practical policy tool to encourage compliance. I'm going to propose a cybersecurity investment tax credit for Canadian businesses. We have a once-in-a-generation nation-building moment here, and I think a tax credit is the way to go.
My colleagues who preceded me did a good job, but I want to go through a couple of things.
Proposed subsection 15.1(3) and proposed subsection 15.2(5) are non-disclosure provisions that allow the Governor in Council or the minister to impose secrecy around orders without any guiding criteria. That's the point I want to come back to. Secrecy must be the exception, not the default. I think you should impose statutory criteria that need to be considered when determining whether or not to render an order secret.
I would propose the following if it were up to me: the degree to which disclosure could reasonably be expected to compromise the effectiveness of the order or jeopardize national security; the availability of less restrictive means, including partial or delayed publication to achieve the same objective; the impact of non-disclosure on the transparency and accountability of government decision-making; the necessity of non-disclosure in light of a threat's urgency, nature and duration; and any representations made by affected telecommunications service providers or regulators surrounding the need for confidentiality.
I'm okay with secrecy and understand the need for it here. I'm just saying that you need some criteria under which to make those determinations. The bill has criteria elsewhere for decision-making, just not around non-disclosure.
Next, I want to talk about proposed subsection 15.1(8) and proposed subsection 15.2(10), and I apologize for being so detailed. I'm a lawyer. It's an occupational hazard.
Here, the Crown would bear no financial responsibility arising out of an order. I think that's sound, but we would end up with a bit of a problem. Pairing the no-compensation rules with the non-disclosure rules would lead us to a situation where publicly traded companies could find themselves in breach of securities law. They could have a material change to their financial books. Suppose a telecommunications provider gets a rip-and-replace order, and it's $25 million. They couldn't disclose that to their shareholders if the order were secret. In that very moment, they would find themselves in breach of their fiduciary duty and the securities regulations. That's something we should consider.
There are ways you can deal with this. I propose that regulations could allow for cost recovery in discrete and exceptional circumstances. You should also create a secure disclosure channel for affected companies so they could make these disclosures to their security regulators and auditors under conditions that would satisfy the safeguards surrounding the classified information.
Somebody was talking about safe harbour earlier. I want to talk about a different safe harbour because, if this proceeds the way it's written, it could function as.... We need a limited form of legal protection for officers and directors of corporations who comply with Bill on a good-faith basis but who are then exposed to liability under their securities law. We need to make sure there's a safe way for them to do that without finding themselves on the horns of a very pronounced legal dilemma, where they cannot simultaneously comply with both obligations.
In proposed subsection 15.21(1) and proposed subsection 15.81(1), there is duplication of reporting. There are two proposed subsections that would require the minister to report to Parliament three months after the annual report. I think it's just a drafting error. You could easily clean that up. It's the same thing.
More pronounced, proposed section 15.4 would compel information. This would let the minister compel information from any person. This isn't important for compliance, but you're going to run into section 7 and section 11(c) challenges under the charter if the material is used for the purpose of prosecution down the road. Add an explicit immunity-use clause modelled after the Competition Act. This would make sure the information is only used for regulatory purposes, not criminal prosecution. That would preserve your confidentiality without weakening enforcement. That is present in the Competition Act.
Regarding proposed section 15.9 and judicial review, there's an issue there too. The judge would have to give back any irrelevant information the minister provided. There is a problem because, when a judge reviews something on a JR, they're looking at whether all the information the minister relied on is relevant. Judges could find themselves in an awkward spot, where they are not allowed to look at all the material they need to for the purpose of determining relevancy. That's something you will want to look at. It's a bit like putting a hockey player on the ice with one skate and no stick. You have to make sure the judge has all the information they need, and I think a simple amendment could solve that.
Moving to proposed section 142 under the CCSPA and proposed subsection 73(3.3) of the Telecommunications Act, I don't know if this was done on purpose, but under the Telecommunications Act the company is only liable if the employee who committed the offence was acting within the scope of their job or authority, while under the CCSPA that qualifier is missing. This means that two companies could face different standards of liability. I think that's worth a second look too.
Thank you very much.
:
Mr. Chair, members of the committee, I am here today as the chairman and co-founder of Crypto Québec, a non-profit organization and social economy enterprise. Our mission is to shed light on information security, intelligence and geopolitical issues, while promoting best practices.
Thank you for having me as a witness as part of your study on Bill .
Part of Crypto Québec's work is to foster a digital environment where protecting fundamental rights is central to securing data and infrastructure, while taking into account Quebec's context, first and foremost, and industry practices around the world. To that end, Quebec has a strong body of privacy legislation—Bill 25, in particular—as well as relevant institutions—including the access to information commission, which actively monitors compliance and respect for individuals' rights. I would also point out that many information security practices, standards and certifications govern Quebec's critical infrastructure activities.
My comments today on Bill C‑8 are informed by that dual requirement of privacy and security. At a time when the enemies of democracy are clearly and publicly demonstrating their desire to make people doubt government institutions, we, too, must be more transparent in our response.
The bill gives the federal government the power to direct telecommunications service providers and vital system operators to do anything, or refrain from doing anything, and that direction may constitute a state secret. This ability raises two major issues. First of all, there are no clear guardrails, no parameters around the necessity, proportionality or duration of the order, or recourse. Those problems have been discussed extensively in the submissions to the committee. Second, because the confidentiality that applies to the orders is not limited in any way, the regime goes beyond the legitimate objective of security; it makes transparency and accountability difficult, if not impossible.
In Quebec, privacy protection is based on clear principles: a privacy impact assessment must be conducted; measures must be documented; disclosure is required when individuals' rights are affected; and lastly, consent must be obtained. The adoption of a less stringent federal regime must not weaken Quebec's system. For that reason, I recommend that any order made under Bill C‑8 be subject to the following requirements: a public summary, annual reporting to a committee or the Quebec National Assembly, and a proportionality test explicitly set out in the legislation.
Quebec has demonstrated its ability and authority to oversee privacy and digital security. Bill 25, along with laws such as Bill 5, which pertains to health information, sets out strict requirements for public and private organizations in relation to privacy impact assessments, consent, incident reporting, data localization and respect for the language and rights of Quebeckers.
Bill could create a parallel system, or override Quebec's regime for Quebec-based entities or foreign industrial entities operating in vital sectors such as energy, telecommunications and transportation. This opens the door to a fragmented system with watered-down responsibilities, not to mention public confusion, which would only help our enemies. It is crucial that the federal framework explicitly recognize two things: one, that organizations operating in Quebec are subject to Bill 25; and two, that Quebec's standards provide at least as much protection as federal requirements. That is not a given at this point.
Unlike the rest of Canada, Quebec has a sophisticated governance regime for securing its information systems. To begin with, Quebec has a cybersecurity and digital technology ministry, which ensures that all the entities under its jurisdiction adhere to high security standards. Second, Quebec has an access to information commission, an independent body responsible for protecting personal information, and unlike its counterparts in the rest of the country, Quebec's commission has punitive powers to deal with violations or non-compliance. Bill C‑8 would infringe on the responsibilities of these two organizations, while failing to provide a similar or higher level of security. Bill C‑8 would in fact be a step backwards for Quebec.
Another major issue is that the bill does not explicitly prohibit the government from compelling providers to undermine encryption or install internal monitoring mechanisms. This directly affects user trust, the security of communications and resistance to digital threats. The approach Quebec has chosen does not achieve security at the expense of privacy; rather, security is achieved through stronger controls, encryption, governance mechanisms and auditing.
I recommend that Bill C‑8 include an explicit ban on the undermining of encryption, that it clearly distinguish between cybersecurity measures and monitoring measures, and that it require Quebec-based entities to report the collection or sharing of sensitive data to the appropriate Quebec authorities.
In conclusion, I urge you to protect critical infrastructure systems, while respecting individuals' rights, preserving Quebec's authority, and adopting a clear, consistent, credible, transparent and proportionate framework. Bill C‑8 is not only an opportunity, but also a challenge. We already have a strong track record in Quebec, so use that expertise to build a reliable Canadian model that people can trust. Quebec can play a central role in that effort.
Thank you for your time. I would be happy to answer your questions.
:
Thank you for inviting me to address the committee today.
I am Sharon Polsky. I'm the president of the Privacy and Access Council of Canada, an independent, non-profit, non-partisan organization that is not funded by government or industry.
Since launching 30-some years ago, the Internet has infiltrated our lives. I spent those years consulting to governments and to small, medium-sized and Fortune 100 businesses, seeing how they apply the law and policy and identifying practical risks invariably caused by human nature and, increasingly, the Internet itself.
MP Caputo asked for some specifics, and I hope to oblige. The preamble says that the bill is to protect telco providers and critical systems and provides the minister with great power to order them to do anything or to refrain from doing anything to protect the Canadian telco system. That's laudable, but it lacks adequate safeguards to prevent abuse or ideological attack. This new law to add the promotion of the security of the Canadian telecommunications system as a policy objective tells companies to plug the holes that were built into their systems, something they should have done long ago to comply with privacy and other laws.
Rephrasing the request isn't going to change much, even with AMPs. I'll speak more on that in a minute.
Under proposed section 7 of part 2, a class of operators can be declared and any person or organization declared a member of that class. The bill applies to enterprises within the legislative authority of Parliament, and proposed subsection 9(1) ensnares the rest, the businesses and people whose products or services are in support of federally regulated enterprises.
On accountability, the Auditor General noted that “Gaps in cyber security defences undermine the ability to protect critical information and manage cyber security risks.” Those gaps will remain even if this bill becomes law.
The standards, laws and frameworks already in place—the privacy, security and risk assessments now done or supposed to be done—cannot prevent outages like we saw last week that took down half the Internet and again yesterday that took down another half of the Internet, each time grinding services around the globe to a halt, thanks to a single technical problem. That's all it took, because accountability requirements are inadequate.
What accountability can there be when even the existence of orders can be ordered to be kept secret and when the Governor in Council can direct that orders not be published? Doing that leaves everybody in the dark and speaks to an undemocratic lack of transparency and a shield against accountability.
Proposed section 15.21 requires the minister to reveal how many times in the previous year secret orders were made and other details, but statistics are cold comfort, especially given the broad information collection and sharing powers in the bill.
Part 2 of Bill allows any service or system to be designated a vital service or system and requires designated operators “mitigate supply-chain and third-party risks”. It doesn't, but it should specify what risks are to be mitigated.
Proposed subsection 20(6) of the CCSPA prohibits a designated operator or class of operators from intercepting communications, but third parties that support critical services aren't included. That could easily be operationalized as encryption-busting back doors. This and other governments have worked mightily over the years to circumvent encryption. Bill needs clear language to ensure that its broad powers cannot be used in any way by anyone to undermine or circumvent encryption, a ban even more urgent considering that Bill 's vague language would grant sweeping ministerial powers to order changes in Canada's telecommunication networks.
The bill says AMPs are only intended to promote compliance and not intended to be punitive. They will benefit the largest providers that can recoup the cost from their broad customer base, further solidify their dominant position and still evade accountability. Meantime, others will be bankrupted.
Implementation must be monitored, measured and mandatory with Sarbanes-Oxley-like penalties imposed, including personal—not corporate—liability to make accountability inescapable so they do the right thing from the beginning.
How will a Canadian regulator be able to monitor compliance, I wonder, when Rogers just announced that it will be running its wireless network from India?
Orders may be made about any threat, including that of interference and manipulation. We know that elections have been swayed by social media content. AI for news often misrepresents the story. Will that be deemed manipulative or a threat and the platform subject to being silenced?
I wonder by what objective standard and by what calculation one measures the gravity of manipulation. The bill must be clear.
Finally, ordering that someone be denied Internet access because the minister considers something they’ve done or said to be a threat or to be manipulative will mean cutting them off from phone service, which is now Internet-based. Everyone in your house will be blocked from talking to friends, from calling adaptive transport, from phoning 911 or from applying to university. This is unjust and disproportionate, and this is what Bill allows.
Bill must be changed, or we will relive what my grandparents fled a hundred years ago, after the Russian revolution: people placed in isolation for their views and this being conflated with the stuff of good government.
:
I think that would be hard to justify.
I think there are occasions when a secret order would be warranted, if we're talking about national security threats from other countries or from foreign actors that want to take over parts of the system. The way it's written would allow the minister to do this and then to keep it secret for long enough, until the crisis that led to it had passed.
Think, for example, of a protester who wants to take over the Prime Minister's website through a DDOS attack. Maybe a group is planning to do this as some sort of protest. The minister could do this as punishment, without due process, and could keep that secret. We might never find out that it had occurred, so—
Thank you to the witnesses for their testimony. I think there's some consensus that this is a good bill, but that there are improvements to be made, especially to clause 15. It may be necessary to tighten up or better regulate the ministerial powers. There are reports and accountability, but they don't match the ministers' powers. That's what I'm noticing and retaining today. Thank you very much.
Mr. Lefebvre, I'd like to ask you a question so that the committee can better understand something. You talked about encryption. We don't have any knowledge of that, but I think it's an important aspect for you, because you point out that it's completely missing from the bill.
Can you explain why you think it's important for the bill to state that it's prohibited to change encryption standards?
:
I think encryption is what prevents companies or the government from having access to our personal conversations. If the standards are lowered, companies and governments could have access without us knowing. That means that encryption is a protection, a measure that has to be retained so that authorities aren't allowed to easily intrude into our exchanges by email or on WhatsApp, Messenger, Facebook and so on. That's what I've understood.
At the previous meeting, there was a lot of talk about overlap with Quebec, and department officials told us that they were aware of those overlaps and duplications, but they said that everything would be settled in the regulatory part with the aim of reducing those overlaps as much as possible.
As a Bloc Québécois member, I know that when Canada wants to do this with the provinces, the result is always that it wants to impose its views and that the provinces have to obey and comply. The proof is that there are currently still a few billion dollars in the federal government's coffers, while the municipalities are in need. However, in the absence of an agreement with Quebec because Ottawa wants to impose its standards, the money isn't currently being disbursed, even though that would enable municipalities in particular to build infrastructure.
Could you tell me your biggest fear about this overlap and duplication? What's the main problem?
:
Of course, in reality, there are fundamental differences between Bill 25 on the protection of Quebec citizens' personal information and Bill . Bill C‑8 doesn't particularly cover the risks of privacy breaches. It probably isn't clear enough, especially when it comes to the proportionality we talked about, for example. On the other hand, Quebec's Bill 25 places a great deal of importance on it.
In fact, Quebec's approach to information security, privacy and infrastructure protection is very much oriented toward privacy. That protection is really central to Quebec's approach, whereas the approach proposed in Bill C‑8 is very technical. It's basically very focused on protecting the operations of critical infrastructure, but it pays little attention to privacy. There was discussion earlier about all the little details that could allow individuals to be targeted. The protection of freedom of expression and that sort of thing isn't as well defined in Bill C‑8, so that's certainly a challenge.
As for overlaps, it's clear that Bill C‑8 would encroach on a lot of jurisdictions, particularly those of Quebec's ministry of cybersecurity and digital technology, or MCN, which is responsible for ensuring the security of all of Quebec's critical infrastructure, ministries and paragovernmental organizations. That means that there would be a clear overlap. It would remain to be seen whether the MCN could ultimately retain certain rights, certain powers, when it already has little, in a way. Would it retain its powers with respect to Bill C‑8 or the federal government? There's a sense that Bill C‑8 would prevail in that regard.
There's one place where there isn't any overlap. The MCN doesn't have that much power when it comes to imposing certain security requirements on private companies, such as telecoms. That means that Bill C‑8 would have an advantage in that regard because there isn't an overlap, but really, it would be important to do some matching, or what's called mapping, when it comes to oversight. That's a matter of—