The Bill C-11 debate continued for hours in the House of Commons yesterday with a dispiriting discussion featuring MPs from all sides ignoring or exaggerating the implications of the bill. The debate often seemed to gravitate to two polar opposites: either the bill is China or North Korea-style censorship or it has no implications for freedom of expression and the regulation of user content. Both are false. To the claims of censorship, Bill C-11 is not China, Russia or Nazi Germany. As I’ve stated many times, it does not limit the ability to speak, but could impact the ability to be heard. That raises important implications for freedom of expression but it does not turn Canada into China. To the claims that user content regulation is excluded from the bill, Section 4.1(2)(b) and 4.2.2 clearly scope such content into the bill, an interpretation that has been confirmed by dozens of experts and the former Chair of the CRTC. Liberal and NDP MP claims to the contrary should be regarded as disinformation, a deliberate attempt to spread false information. Indeed, the Senate proposed a fix. The government rejected it. That was supposed to be the focus of the debate, yet Liberal MPs such as Kevin Lamoureux falsely claimed that there is no there there.
Post Tagged with: "larouche"

Law Bytes
Episode 245: Kate Robertson on Bill C-2’s Cross-Border Data Sharing Privacy Risks
byMichael Geist

October 6, 2025
Michael Geist
September 22, 2025
Michael Geist
September 15, 2025
Michael Geist
July 28, 2025
Michael Geist
July 21, 2025
Michael Geist
Search Results placeholder
Recent Posts
Government Reverses on Bill C-2: Removes Lawful Access Warrantless Demand Powers in New Border Bill
Why The Recent TikTok Privacy Ruling Swaps Privacy for Increased Surveillance
The Law Bytes Podcast, Episode 245: Kate Robertson on Bill C-2’s Cross-Border Data Sharing Privacy Risks
The Law Bytes Podcast, Episode 244: Kris Klein on the Long Road to a Right to be Forgotten Under Canadian Privacy Law
Government Doubles Down in Defending Bill C-2’s Information Demand Powers That Open the Door to Warrantless Access of Personal Information