What the government isn’t telling you about C-22
The centrepiece of Bill C-22 is a requirement that electronic service providers — meaning internet companies, messaging platforms, cloud services, and potentially even hardware companies — build and maintain technical capabilities that allow government access to private communications and data. The government calls this "lawful access infrastructure." Security experts call it a backdoor that anyone could walk through.1,2,3,4
The government says our privacy is protected because Bill C-22 won’t force these companies to introduce "systemic vulnerabilities" to their systems. But this is privacy theatre: the government reserves the right to reinterpret what "systemic vulnerability" means, or any other definition used by C-22, whenever it chooses to, without returning to Parliament. That’s not a simple oversight: that’s a protection that’s hollow by design. Security experts say that any intercept capability built into a platform's infrastructure is a systemic vulnerability by any widely used technical definition. 5,6
The Salt Typhoon precedent
Bill C-22 isn’t just breaking our privacy from our own government; it would break it for every bad actor in the world. That’s because there’s no such thing as privacy loophole for just “good guy” domestic state actors; a technical vulnerability for one party is a vulnerability anyone with access can use.
This isn't a hypothetical concern. In late 2024, Chinese state hackers penetrated multiple major US telecommunications companies — AT&T, Verizon, and others — and maintained access to their networks for months.7,8 They got in through the lawful intercept infrastructure US telecoms were legally required to build under CALEA, the significantly narrower US equivalent to what Bill C-22 proposes for Canada. The backdoor built for American law enforcement became the door Chinese intelligence walked through– and up to a million people's private data was compromised.
So is Bill C-22 just as bad as America’s CALEA? No – it is much worse! Unlike CALEA, C-22 reaches messaging apps, cloud services, and other online platforms that US law never covered. And it adds something CALEA never required: a requirement to actually store Canadians' data in advance.
The metadata retention database
Bill C-22 explicitly authorizes regulations that will require companies to retain categories of metadata — including transmission data for up to one year. Metadata doesn't include the content of your messages — but it doesn't need to. It can include a complete picture of who you contacted, when, for how long, from where, and on what device. A year of your location data, communications patterns, and device activity paints a detailed picture of anyone's life: where you sleep, where you worship, which doctors you visit, which protests you attend.9,10
This database must exist for every covered Canadian, whether or not anyone is under investigation. The warrant requirement governs who can legally search it. It does nothing to stop a hostile actor from breaking in and taking it.
The government writes its own rules — some in secret
Section 47(1)(c) of the bill gives the Governor in Council the power to change the interpretation of "any term or expression" in the law by regulation long after C-22 passes.11,12 That includes the meaning of "electronic protection," "systemic vulnerability," "encryption," and "metadata."
That’s asking Parliament to pass an empty enabling device, not a lawful access system; the government will change what it all means later, quietly, without debate. This is not a normal drafting choice. It means the protections written into the statute are placeholders, to be reinterpreted to meaninglessness when future governments decide they’re inconvenient.
The foreign access question
Bill C-22 also amends the Mutual Legal Assistance in Criminal Matters Act to make it easier for foreign governments to access data held by Canadian companies about Canadians. The existing process requires both ministerial approval and a Canadian judicial order before foreign requests are honoured. The bill's amendment creates a fast track pathway for enforcing foreign decisions about transmission data and subscriber information — and whether a Canadian judge will still review that request is left for our Minister of Public Safety to decide.13,14
These problems are too deep to patch
Last year, more than 10,000 Canadians from OpenMedia’s community spoke up against Bill C-2, the government’s previous surveillance legislation, and stopped it in its tracks.15,16
But now its core architecture is back in C-22; and paired with a new nation-wide system for retaining a full year of every Canadian’s metadata, they’re much, much worse. The breadth of this surveillance state in the making cannot be fixed by amendments. The only answer is full withdrawal of Bill C-22.