Back to List
Canada's Bill C-22: Lawful Access Returns with Warrantless Access Changes and Persistent Surveillance Risks
Industry NewsLegislationPrivacyGovernment

Canada's Bill C-22: Lawful Access Returns with Warrantless Access Changes and Persistent Surveillance Risks

Canada's Bill C-22, the Lawful Access Act, has been introduced, marking a new phase in the long-standing debate over lawful access. This bill follows a previous attempt to include similar provisions in Bill C-2, which faced significant backlash due to rules permitting widespread warrantless access to personal information, deemed constitutionally questionable. Bill C-22 addresses two primary aspects: law enforcement access to personal information held by communication service providers and the development of surveillance capabilities within Canadian networks. The bill is divided into two parts, with the first focusing on "timely access to data and information" and the second establishing the Supporting Authorized Access to Information Act (SAAIA). Initial assessments suggest improvements in the data access component compared to the earlier Bill C-2.

Hacker News

The decades-long battle over lawful access in Canada has entered a new phase with the introduction of Bill C-22, officially known as the Lawful Access Act, on March 13, 2026. This legislative development follows a previous attempt last spring to embed lawful access provisions within Bill C-2, a border measures bill that represented the new government’s initial piece of substantive legislation. The lawful access elements within Bill C-2 were met with immediate and strong opposition due to their inclusion of unprecedented rules that would have permitted widespread warrantless access to personal information. These rules were widely considered to be on very shaky constitutional ground, prompting the government to ultimately reset its approach to lawful access by proceeding with the border measures in a separate bill.

However, the issue of lawful access has resurfaced with Bill C-22. This new bill covers two main aspects central to lawful access. Firstly, it addresses law enforcement access to personal information that is held by communication service providers, such as Internet Service Providers (ISPs) and wireless providers. Secondly, it focuses on the development of surveillance and monitoring capabilities within Canadian networks. The structure of Bill C-22 itself is divided into two distinct parts. The first half of the bill is dedicated to dealing with "timely access to data and information." The second half is responsible for establishing the Supporting Authorized Access to Information Act (SAAIA).

Initial analysis of Bill C-22 suggests that the component concerning access to data and information shows significant improvement compared to its predecessor. The earlier iteration of a new information demand power, as seen in Bill C-2, was noted for its astonishing breadth, covering a scope far wider than what is now proposed. Further extensive coverage of this bill is anticipated, including detailed discussions on relevant blogs and podcasts.

Related News

Meta and Thinking Machines Lab Engage in Competitive Talent Poaching Strategy
Industry News

Meta and Thinking Machines Lab Engage in Competitive Talent Poaching Strategy

The competitive landscape of artificial intelligence talent acquisition is intensifying as Meta and Thinking Machines Lab engage in a reciprocal exchange of high-level personnel. Recent reports indicate that while Meta has been actively poaching talent from Thinking Machines Lab to bolster its internal AI capabilities, the movement of professionals is not unidirectional. This 'two-way street' dynamic highlights the fluid nature of the AI labor market, where top-tier researchers and engineers are frequently transitioning between established tech giants and specialized research laboratories. The movement underscores the high demand for specialized AI expertise as companies vie for dominance in the rapidly evolving sector. This talent exchange reflects broader industry trends where human capital remains the most critical asset for innovation and competitive advantage in the field of machine learning and advanced computing.

Industry News

Security Analysis of Rodecaster Duo Firmware Reveals Default SSH Access and Unsigned Update Mechanism

A technical investigation into the Rodecaster Duo audio interface has uncovered significant details regarding its internal software architecture and security posture. After capturing a firmware update—delivered as a standard gzipped tarball—researchers discovered that the device lacks signature verification for firmware images, allowing for potential user modification. Most notably, the device features SSH enabled by default, utilizing public-key authentication with pre-installed RSA keys. While the lack of firmware signing offers a level of user ownership and customizability rare in modern consumer electronics, the presence of default network services like SSH highlights a specific design choice by Rode. The analysis also revealed a dual-partition boot system designed to prevent device bricking during the update process, providing a glimpse into the 'horrific reality' of industry firmware standards.

Apple Leadership Transition: John Ternus to Succeed Tim Cook as Elon Musk Eyes Cursor Acquisition
Industry News

Apple Leadership Transition: John Ternus to Succeed Tim Cook as Elon Musk Eyes Cursor Acquisition

The technology landscape is bracing for a monumental shift as Apple CEO Tim Cook prepares to step down in September 2026. Hardware chief John Ternus has been named as the successor, tasked with leading the tech giant through an evolving ecosystem that differs significantly from the one Cook managed for over a decade. Simultaneously, the industry is buzzing with reports regarding Elon Musk's interest in acquiring the AI-powered coding platform Cursor for a staggering $60 billion. These developments signal a dual transformation in the sector: a changing of the guard at one of the world's most valuable companies and a massive valuation surge for AI-driven development tools that are reshaping how software is built.