[...]
2 The following definitions apply in this Act.
- terrorist group
-
terrorist group has the same meaning as in subsection 83.01(1) of the Criminal Code. (groupe terroriste)
[...]
Marginal note:Cybersecurity Authorizations — federal infrastructures
-
27 (1) The Minister may issue a Cybersecurity Authorization to the Establishment that authorizes it, despite any other Act of Parliament, to, in the furtherance of the cybersecurity and information assurance aspect of its mandate, access a federal institution’s information infrastructure and acquire any information originating from, directed to, stored on or being transmitted on or through that infrastructure for the purpose of helping to protect it, in the circumstances described in paragraph 184(2)(e) of the Criminal Code, from mischief, unauthorized use or disruption.
-
Marginal note:Cybersecurity Authorizations — non-federal infrastructures
(2) The Minister may issue a Cybersecurity Authorization to the Establishment that authorizes it, despite any other Act of Parliament, to, in the furtherance of the cybersecurity and information assurance aspect of its mandate, access an information infrastructure designated under subsection 21(1) as an information infrastructure of importance to the Government of Canada and acquire any information originating from, directed to, stored on or being transmitted on or through that infrastructure for the purpose of helping to protect it, in the circumstances described in paragraph 184(2)(e) of the Criminal Code, from mischief, unauthorized use or disruption.
[...]
Marginal note:Prohibited conduct
-
32 (1) In carrying out any activity under an authorization issued under subsection 29(1) or 30(1), the Establishment must not
-
Marginal note:Definition of bodily harm
(2) In subsection (1), bodily harm has the same meaning as in section 2 of the Criminal Code.
[...]
Marginal note:Cybersecurity and information assurance
[...]
Marginal note:No civil or criminal liability
49 No person who acts in accordance with an authorization issued under subsection 26(1), 27(1) or (2), 29(1), 30(1) or 40(1) or who aids, in good faith, a person who they believe on reasonable grounds is acting in accordance with such an authorization incurs any criminal or civil liability for anything reasonably done further to the authorization.
Marginal note:Exclusion of Part VI of Criminal Code
50 Part VI of the Criminal Code does not apply in relation to an interception of a communication under the authority of an authorization issued under subsection 26(1), 27(1) or (2), 29(1), 30(1) or 40(1) or in relation to a communication so intercepted.
[...]
57 For the purposes of the Access to Information Act, if any record, as defined in section 3 of that Act, of any other government institution, as defined in that section, or of any other organization is contained in or carried on the Establishment’s information infrastructure on behalf of that institution or organization, the record is not under the Establishment’s control.
[...]