Legislative Summary for Bill C-46

Legislative Summary
Legislative Summary of Bill C-46: Investigative Powers for the 21st Century Act
Dominique Valiquet, Legal and Legislative Affairs Division
Publication No. 40-2-LS-661-E
PDF 347, (13 Pages) PDF
2009-09-24

Background

A. Purpose of the Bill

Bill C-46: An Act to amend the Criminal Code, the Competition Act and the Mutual Legal Assistance in Criminal Matters Act (short title: Investigative Powers for the 21st Century Act) was introduced in the House of Commons on 18 June 2009 by the Minister of Justice, the Honourable Robert Douglas Nicholson.

The purpose of the bill is to modernize certain offences in the Criminal Code (the Code) and the Competition Act to take into account new communications technologies and to equip law enforcement agencies with new investigative tools that are adapted to computer crimes. To facilitate collaboration with foreign law enforcement agencies, the bill also amends the Mutual Legal Assistance in Criminal Matters Act.

B. Principal Amendments in the Bill

The bill aims to update Canadian criminal law. More specifically, the principal amendments in the bill:

  • make it an offence to lure a child by any means of telecommunication (clause 3);
  • create a new offence consisting of agreeing with a person, by a means of telecommunication, to commit an abduction or a sexual offence against a minor (clause 4);
  • provide that hate propaganda offences can be committed by any means of communication and including making hate material available (clause 7);
  • create the offence of possession of a computer virus for the purpose of committing mischief (clause 12);
  • make it possible for law enforcement agencies to make a demand or obtain a court order for the preservation of electronic evidence (clause 15);
  • creating new judicial production orders for obtaining data relating to the transmission of communications or data for tracking a thing or individual (clause 15);
  • create warrants for obtaining transmission data in real time and for the remote activation of tracking devices in certain types of technologies (clause 21);
  • modernize the deceptive marketing practices offences in the Competition Act (clauses 28 to 30);
  • amend the Mutual Legal Assistance in Criminal Matters Act so the new production orders can be used by Canadian authorities who receive assistance requests from other countries (clause 36).

Some provisions of the bill came out of public consultations on lawful access held by representatives of Justice Canada, Industry Canada and the Solicitor General of Canada in 2002;(1) these include, specifically, the provisions relating to preservation and production.

C. Convention on Cybercrime

Canada signed the Council of Europe’s Convention on Cybercrime in November 2001, and the Additional Protocol on hate propaganda in July 2005. The Convention criminalizes certain offences committed using computer systems, and it provides for legal tools that are adapted to new technologies, such as preservation and production orders.(2)

The Convention also provides for an order to produce data concerning subscribers(3) that is similar in some ways to a request to provide subscriber information as set out in Bill C-47,(4) which was introduced at the same time as Bill C-46. Together, bills C-46 and C-47 will mean that Canada is able to ratify the Convention on Cybercrime and the Additional Protocol to the Convention.

Description and Analysis

A. Amendments to the Criminal Code

1. Modernization of Offences

a. Luring a Child (Clause 3)

The existing offence of luring a child consists of communicating, “by means of a computer system,” with a minor for the purpose of facilitating the commission of a sexual offence or abduction.(5) Clause 3 of the bill replaces the expression “by means of a computer system” with “by a means of telecommunication.”(6) The new expression, which is frequently used in the Code, has the advantage of referring to any new communications technology, avoiding disputes about whether a particular device is a computer.

b. Agreement by Telecommunication to Commit an Offence Against a Minor (Clauses 4, 16 and 20)

The offence of luring makes it a crime to communicate directly with a minor for the purpose of facilitating the commission of a sexual offence or abduction.(7) Clause 4 of the bill creates a new offence: anyone who “agrees with a person,” using a means of telecommunication, such as the Internet, to commit an abduction or sexual offence against a minor.

Like the offence of luring, this new offence is punishable by imprisonment for a term of not more than 10 years and may be used in undercover investigations; that is, a peace officer may pose as a person with whom the offender enters into an agreement to commit an offence against a minor (new subsection 172.2(5) of the Code).

As well, a person convicted of the new offence will be registered in the national sex offender registry (clause 20 of the bill) and, unless the court decides otherwise, will have to submit a DNA sample for storage in the national DNA database (clause 16 of the bill).

c. Hate Propaganda (Clauses 6 and 7)

Hate propaganda offences must be committed against an “identifiable group.” Clause 6 of the bill adds “national origin” to the definition of “identifiable group.”.(8)

Clause 7 of the bill provides that the offences of public incitement of hatred and wilful promotion of hatred may be committed by any means of communication and include making hate material available, by creating a hyperlink that directs web surfers to a website where hate material is posted, for example.

d. Device for Theft of Telecommunication Services (Clause 10)

At present, section 327 of the Code makes it a crime to possess, manufacture or sell a device used for the theft of telecommunication services. Clause 10 of the bill essentially adds importing such a device or making it available. As well, the bill makes this indictable offence a hybrid offence; that is, the prosecutor will have the option of proceeding by indictment or summary conviction.

e. Computer Virus (Clause 12)

Under the existing provisions of the Code, only spreading or attempting to spread a computer virus(9) constitutes an offence.(10) In accordance with the requirements of the Convention on Cybercrime,(11) clause 12 of the bill makes it illegal to possess a computer virus for the purpose of committing mischief, and also makes it an offence to import and make available a computer virus.

f. False, Indecent or Harassing Communications (Clause 13)

The existing provisions of the Code regarding the offences of sending a message in a false name and sending false information, indecent remarks or “harassing” messages (the French term “harassants” currently used in subsection 372(3) of the Code is replaced by “harcelants” in the bill) refer to certain communication technologies used to commit those offences, such as telegram, radio and telephone.(12) Clause 13 of the bill amends those offences by removing the references to those specific communication technologies and, for some of those offences, substituting a reference to any means of telecommunication. As a result, it will be possible to lay charges in respect of those offences regardless of the transmission method or technology used.

Additionally, the bill provides that the offences consisting of transmitting false information, indecent remarks or harassing messages will now be hybrid offences. Accordingly, the maximum sentence for the offences relating to indecent and harassing communications will be increased to imprisonment for two years, in the event that the prosecutor decides to proceed by indictment.

2. New Investigative Tools

a. Preservation Demand and Order (Clause 15)

Information in electronic form may be easily and quickly destroyed or altered. Clause 15 of the bill therefore adds a new investigative tool to the Code to preserve this type of evidence, which may take one of two forms: a preservation demand or a preservation order. A preservation demand is made by a peace officer (new s. 487.012 of the Code), while a preservation order is made by a judge, on application by a peace officer (new s. 487.013 of the Code).

A preservation demand or order directs a person, such as a telecommunications service provider (TSP), to preserve “computer data”(13) that is “in their possession or control”(14) when they receive the demand or order. However, a TSP may still voluntarily preserve data and provide it to a law enforcement agency, even where there is no demand or order (new s. 487.0195 of the Code).

This new investigative tool is different from the data retention measure in effect in some countries,(15) which compels TSPs to collect and retain data for a prescribed period for all their subscribers, whether or not they are the subjects of an investigation. On the other hand, a preservation demand or order relates only to a particular telecommunication or person, in the context of a police investigation. A preservation demand or order may be given to a TSP only where there are “reasonable grounds to suspect”(16) that an offence has been or will be committed(17) (new subsections 487.012(2) and 487.013(2) of the Code). However, the person who is suspected of the offence may not be compelled to retain data under a preservation demand or order (new subsections 487.012(3) and 487.013(5) of the Code).(18)

Preservation demands and orders are temporary measures: they are generally in effect long enough to allow the law enforcement agency to obtain a search warrant or production order. The maximum length of a preservation demand is 21 days, and the demand may be made only once (new subsections 487.012(4) and (6) of the Code); the maximum length of a preservation order is 90 days (new subsection 487.013(6) of the Code).

A person to whom a preservation demand or order is made is required, after the demand or order expires, or after the data have been given to the law enforcement agency under a production order or search warrant, to destroy the computer data that would not be retained in the ordinary course of business (new ss. 487.0194 and 487.0199 of the Code).

Contravention of a preservation demand or order is an offence punishable, respectively, by a fine of not more than $5,000 (new s. 487.0197 of the Code) or a fine of not more than $250,000 and imprisonment for a term of not more than six months or both (new s. 487.0198 of the Code).

b. Production Orders (Clause 15)

A production order is made by a judge and is similar to a search warrant, the difference being that the person in possession of the information must produce it on request, rather than the law enforcement agency’s going to the site to obtain the information by searching and seizing it. A law enforcement agency with a production order will be able to more readily obtain documents that are in another country, for example.

The Code already provides a procedure for obtaining a general production order, that is, an order that applies regardless of the type of information a law enforcement agency is seeking.(19) Issuance of the order is based on the existence of reasonable grounds to believe that an offence has been committed. The Code also provides for specific production orders, that is, orders for obtaining certain precise information, such as banking information or telephone call logs.(20) Issuance of specific production orders is based on the reasonable grounds to suspect that an offence has been or will be committed.

Clause 15 of the bill creates new specific production orders, issuance of which is based on the existence of reasonable grounds to suspect that an offence has been or will be committed, which allow a peace officer to obtain two types of information from a TSP:(21) “transmission data” (new s. 487.016 of the Code) and “tracking data” (new s. 487.017 of the Code).(22)

Essentially, “transmission data” are data that indicate the origin, destination, date, time, duration, type and volume of a telecommunication (e.g., a telephone call or Internet communication), but does not include the content of the telecommunication.(23) This type of data is useful: for example, it may be used to identify all TSPs involved in the transmission of data and identify the initial TSP and thus determine the origin of a telecommunication (new s. 487.015 of the Code). “Tracking data” relate to the location of a thing or individual.

These new production orders allow law enforcement agencies to obtain historical transmission or tracking data, that is, data already in the possession of the TSP when it receives the order. To obtain these types of data in real time, law enforcement agencies need a warrant.

A review procedure is provided for challenging any type of production order, existing or new (new s. 487.0193 of the Code).(24) A person who has received an order may apply to a judge to revoke or vary it if production is unreasonable (25) or discloses privileged information. (26) As for a preservation order, violation of a production order is punishable by a fine of not more than $250,000 and imprisonment for a term of not more than six months, or both (new s. 487.0198 of the Code).

c. Warrant for a Tracking Device (Clause 21)

At present, section 492.1 of the Code allows a peace officer with a warrant(27) to secretly install a “tracking device”(28) (e.g., a GPS device) on a thing, if there are reasonable grounds to suspect that an offence has been or will be committed and that information that would assist in the police investigation, notably the whereabouts of a person, can be obtained through the use of such a tracking device.

Clause 21 of the bill retains this type of warrant, but makes a distinction between a warrant to install a tracking device on a thing, for example a vehicle, to track its movements (new subs. 492.1(1) of the Code) and a warrant to install that kind of device on a thing usually carried or worn by an individual to track the individual’s location and movements (new subsection 492.1(2) of the Code). A warrant to track the movements of a thing is based on the existing standard, reasonable grounds to suspect that an offence has been or will be committed, while a more stringent standard applies to a warrant to track the movements of an individual: the existence of reasonable grounds to believe that an offence has been or will be committed.

In addition to allowing a tracking device to be installed, the bill allows law enforcement agencies to remotely activate devices of that kind that are found in certain types of technology, such as cellular telephones or the GPS devices in certain cars (new subsection 492.1(3) of the Code).

The maximum duration of a warrant for a tracking device is still 60 days. However, that period is extended to one year in the case of a terrorism offence or organized crime offence (new subss. 492.1(5) and (6) of the Code).(29)

d. Warrant for a Transmission Data Recorder (Clause 21)

At present, subsection 492.2(1) of the Code allows a peace officer with a warrant(30) to secretly install a number recorder on a telephone or telephone line, if there are reasonable grounds to suspect that an offence has been or will be committed and information that would assist in the police investigation could be obtained through the use of this kind of recorder. The law enforcement agency could thus obtain the “incoming” and “outgoing” telephone numbers for a telephone that was being tapped.

Clause 21 of the bill provides for a warrant that authorizes a peace officer to install and activate a transmission data recorder(31) (new s. 492.2 of the Code). As before, the warrant will allow law enforcement agencies to obtain telephonic data, but also to obtain data indicating the origin and destination of an Internet communication, for example. Police services will thus be able to have access to these transmission data in real time. As well, as in the case of a warrant to install a telephone number recorder, the new warrant is based on the requirement that there are reasonable grounds to suspect that an offence has been or will be committed.

B. Amendments to the Competition Act

1. Preservation and Production Orders (Clause 24)

The new provisions of the Code concerning demands and orders for the preservation of computer data and orders for the production of transmission data and banking information will apply to certain investigations under the Competition Act. The Commissioner of Competition will thus be able to use these new investigative tools to obtain evidence relating to deceptive marketing practices and restrictive trade practices.

2. Modernization of Offences (Clauses 28 to 30)

Clauses 28 to 30 of the bill modernize certain deceptive marketing practices offences, such as deceptive telemarketing and making misrepresentations about a product or service, and replace the reference to “telephone” as the means of committing these offences with “any means of telecommunication” used for communicating orally.

C. Amendments to the Mutual Legal Assistance in Criminal Matters Act

The Mutual Legal Assistance in Criminal Matters Act was enacted in 1988 and gives Canadian courts the power to issue compulsory measures, such as subpoenas and search warrants, to obtain evidence in Canada on behalf of a foreign state for use in a criminal investigation and prosecution being conducted by that state. The legislation aims to promote cooperation among states by establishing a system for exchanging information and evidence.(32)

1. Searches by the Commissioner of Competition (Clause 32)

The bill authorizes the Commissioner of Competition to execute search warrants issued under the Mutual Legal Assistance in Criminal Matters Act.

2. Production Orders (Clause 36)

The bill provides that the production orders for obtaining banking information, transmission data or tracking data described in the Criminal Code may be used by Canadian authorities who receive assistance requests from their international partners.


Endnotes

*  Notice: For clarity of exposition, the legislative proposals set out in the bill described in this Legislative Summary are stated as if they had already been adopted or were in force. It is important to note, however, that bills may be amended during their consideration by the House of Commons and Senate, and have no force or effect unless and until they are passed by both houses of Parliament, receive Royal Assent, and come into force. [ Return to text ]

  1. See Justice Canada, Industry Canada, and Solicitor General Canada, Lawful Access – Consultation Document, 25 August 2002.
  2. Council of Europe, Convention on Cybercrime, 23 November 2001, arts. 16, 17 and 19.
  3. Ibid., art. 18.
  4. Bill C-47: An Act regulating telecommunications facilities to support investigations, 2nd Session, 40th Parliament.
  5. S. 172.1 of the Code. The term “computer system” is defined in subsection 342.1(2) of the Code.
  6. The Interpretation Act (R.S.C. 1985,c. I-21, subsection 35(1)) defines “telecommunications” as follows: “‘telecommunications’ means the emission, transmission or reception of signs, signals, writing, images, sounds or intelligence of any nature by any wire, cable, radio, optical or other electromagnetic system, or by any similar technical system.”
  7. S. 172.1 of the Code.
  8. Under the present definition, “identifiable group” means “any section of the public distinguished by colour, race, religion, ethnic origin or sexual orientation” (subsection 318(4) of the Code).
  9. In this legislative summary, the term “computer virus” includes other malicious code, such as computer worms.
  10. Subsection 430(1.1) of the Code. See also s. 342.2.
  11. Article 6 of the Convention.
  12. Ss. 371 and 372 of the Code.
  13. The definition of “computer data” is given in subclause 11(4) of the bill. Essentially, it means data that can be processed by computer.
  14. The use of this expression in the bill means that, in response to a demand or order, TSPs will probably have to retain computer data in addition to what they collect in the ordinary course of business.
  15. See European Parliament, Directive 2006/24/EC  PDF (85 Kb, 10 pages) on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC, 15 March 2006.
  16. The reasonable grounds to suspect that an offence has been or will be committed requirement is less stringent than the usual requirement, reasonable grounds to believe that an offence has been or will be committed. Although the reasonable grounds to suspect requirement is rarer, it is currently provided in certain other provisions of the Code.
  17. This includes an offence under the law of a foreign state.
  18. Similarly, production orders may not compel the suspect in an investigation to disclose information (see new ss.  487.014 to 487.018 of the Code).
  19. S. 487.012 (see also new s. 487.014 of the Code, introduced by the bill, which provides for a similar general production order).
  20. Subsections 487.013(1) and (4) (see also new s. 487.018 of the Code, introduced by the bill) and subsection 492.2(2).
  21. Subsections 487.013(1) and (4) (see also new s. 487.018 of the Code, introduced by the bill) and subsection 492.2(2).
  22. See the definitions of these types of data in new s. 487.011 of the Code.
  23. Article 1 of the Convention on Cybercrime contains a similar definition, but uses the term “traffic data.”
  24. A similar procedure is currently provided in s. 487.015 of the Code.
  25. A recent decision of the Supreme Court of Canada shed some light on the question of whether a TSP must be reimbursed for the costs associated with executing an order to produce telephone call data. The Court held that a variety of factors should be considered, including the breadth of the order being sought, the size and economic viability of the object of the order and the extent of the order’s financial impact on the TSP from which production is sought (Tele-Mobile Co. v.  Ontario, [2008] 1 S.C.R. 305).
  26. A production order may contain conditions to protect information covered by solicitor-client privilege (new subsection 487.019(1) of the Code).
  27. Where there are exigent circumstances and the conditions for obtaining a warrant exist, a warrant is not necessary. The same is true in the case of a search and the transmission date recorder (s. 487.11 of the Code; see also clause 18 of the bill).
  28. Under the definition in new subsection 492.1(8) of the Code, this is essentially a device that may be used to record or transmit tracking data in real time.
  29. This lengthened duration of the warrant is consistent with the current situation relating to wiretapping for terrorism and organized crime offences (s. 186.1 of the Code).
  30. See s. 487.11 of the Code and clause 18 of the bill, which do not require a warrant in exigent circumstances.
  31. See the definition in new subs. 492.2(6) of the Code.
  32. This information comes from Department of Justice, Federal Prosecution Service, Deskbook – Part VIII: International Assistance, “Chapter 43: Mutual Legal Assistance in Criminal Matters.”

© Library of Parliament