1. All organizations (baseline)
Almost every Canadian business that collects personal information in commercial activity must address federal private-sector privacy law and often provincial equivalents where they apply.
| Framework | What it requires (summary) |
|---|---|
| PIPEDA (Personal Information Protection and Electronic Documents Act) | Accountability, consent, limiting collection, safeguards, openness, individual access, and challenging compliance. Breaches posing a real risk of significant harm must be reported to the OPC and affected individuals. |
| Provincial privacy laws (e.g. BC PIPA, Alberta PIPA, Quebec Law 25) | Where substantially similar, they apply instead of PIPEDA for provincially regulated private-sector activity. Quebec imposes strict consent, DPIA-style assessments, and tight timelines for breaches. |
| Bill C-27 (Digital Charter Implementation Act, as introduced) | Proposes the Consumer Privacy Protection Act (CPPA) to replace PIPEDA parts, and the Artificial Intelligence and Data Act (AIDA) for high-impact AI systems. Track Royal Assent and in-force dates with counsel. |
| CASL (Canada’s anti-spam law) | Consent, identification, and unsubscribe rules for commercial electronic messages. Penalties for serious violations can be substantial. |
2. Financial services
Banks, insurers, credit unions, fintechs, and money services face layered rules beyond PIPEDA.
| OSFI (Office of the Superintendent of Financial Institutions) | Guidelines on technology, cyber, and operational resilience for federally regulated financial institutions (e.g. cyber security and technology risk expectations, third-party risk). |
| FINTRAC / PCMLTFA | Anti-money laundering and terrorist financing obligations: client identification, record keeping, reporting, and safeguarding of sensitive program data. |
| Provincial securities commissions | Market participants may face cybersecurity and privacy-related reporting or conduct standards. |
Insurance: Carriers expect MFA, logging, privileged access control, vendor due diligence, and tested incident response.
3. Healthcare and life sciences
Canada does not use HIPAA. Health information is governed mainly by provincial health information laws (e.g. BC’s E-Health and health authority rules, Ontario PHIPA, etc.) plus PIPEDA or provincial PIPA for non-health commercial data.
- Custodians and affiliates must follow designated information manager agreements, breach protocols, and often stricter security than generic SMB standards.
- Clinical research and pharmacies may have additional college or Health Canada adjacent obligations for records.
4. Legal and professional services
Law societies and professional bodies impose client confidentiality, records retention, and competence (including technology competence) requirements. PIPEDA or provincial PIPA still governs personal information held by the firm.
5. Retail, e-commerce, and payments
PIPEDA or provincial privacy law applies to customer data. If you store, process, or transmit card data, PCI DSS (contractual through acquirers and brands) effectively becomes mandatory for compliance with card network rules.
6. Critical infrastructure and vital systems
Bill C-26 (the Critical Cyber Systems Protection Act, as enacted within the broader cyber security framework) targets designated operators in vital sectors (for example telecommunications, energy, banking, transport, and other prescribed areas). It introduces governance, reporting, and compliance duties for critical cyber systems.
Operators should work with sector regulators and counsel on applicability, timelines, and evidence of control effectiveness.
7. Charities and not-for-profit
Many NFPs are subject to PIPEDA when engaging in commercial activities (donations can be nuanced; counsel should classify). CRA rules govern receipting, record retention, and governance. Donor and volunteer data still deserves the same security baseline as for-profit SMBs.
8. Technology and SaaS
Vendors processing data for clients need clear data processing agreements, subprocessors, breach notification SLAs, and often SOC 2 or ISO reports for enterprise sales. Export and residency commitments may trigger PIPEDA cross-border disclosure requirements and Quebec or provincial transfer rules.
Cyber insurance (Canada)
Insurers align questionnaires with the same controls regulators expect: MFA, EDR, backups, email authentication, and incident playbooks. See our BC cyber insurance article for a detailed checklist.
Map controls to your obligations
We help BC and Canadian organizations implement MFA, EDR, backup testing, logging, and documentation that satisfy both insurers and regulators.
Request a compliance-ready IT assessment