On February 1, 2024, the Standing Committee on Public Safety and National Security (Committee) began its study of Bill C-26, An Act respecting cyber security, amending the Telecommunications Act and making consequential amendments to other Acts (Bill C-26 or Bill), nearly one year after it completed its second reading in the House of Commons.
On June 14, 2022, the government tabled Bill C-26. If it passes, it would enact the Critical Cyber Systems Protection Act (CCSPA or Act). The CCSPA imposes a series of cybersecurity-related obligations on private-sector entities in four federally regulated sectors: telecommunications, finance, energy and transportation. The Act would apply to industries providing “vital services” or “vital systems” as set out in Schedule 1 and classes of designated operators identified in Schedule 2 of the CCSPA.
The vital services and systems currently set out in Schedule 1 are:
The CCSPA would provide the Governor in Council (i.e., Federal Cabinet) with powers to add or remove sector-specific services and systems from Schedule 1.
The CCSPA would impose five key cybersecurity compliance obligations on designated operators:
The CCSPA would be enforced through an administrative monetary penalty scheme, to be developed further in regulation. The CCSPA authorizes a maximum penalty of C$15-million for designated operators and C$1-million for directors and officers. Non-compliance with certain provisions of the CCSPA may alternatively be prosecuted as an offence punishable with criminal fines and/or imprisonment. Furthermore, industry regulators will have expanded powers to compel information, conduct inspections of the premises of designated operators and issue notices of non-compliance to ensure compliance with the CCSPA.
In order to become law, Bill C-26 must complete its Committee study, pass a third reading in the House of Commons and three readings in the Senate. Although its future is uncertain, the compliance obligations required by the CCSPA represent cybersecurity best practices that most organizations should implement to strengthen their cybersecurity posture, protect critical assets and guard against third-party risk.
For more information, please contact: