{"id":35487,"date":"2025-07-07T10:56:18","date_gmt":"2025-07-07T14:56:18","guid":{"rendered":"https:\/\/www.millerthomson.com\/?p=35487"},"modified":"2026-04-01T16:44:05","modified_gmt":"2026-04-01T20:44:05","slug":"bill-c-8-canadas-cybersecurity-overhaul-reboots","status":"publish","type":"post","link":"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/bill-c-8-canadas-cybersecurity-overhaul-reboots\/","title":{"rendered":"Bill C-8: Canada\u2019s cybersecurity overhaul reboots"},"content":{"rendered":"\n<p>As we continue to see high profile attacks on critical infrastructure in Canada, the US, and elsewhere the calls for specific Canadian regulations pertaining to affected sectors have remained consistent. With the current geopolitical climate, US security agencies have called for increased vigilance, which should come as no surprise. The European Union had responded to these threats by requiring EU Member States to transpose the <a href=\"https:\/\/eur-lex.europa.eu\/eli\/dir\/2022\/2555\/2022-12-27\/eng\">NIS2 Directive<\/a> into national law by October 2024.<\/p>\n\n\n\n<p>On June 18, 2025, Canada\u2019s Minister of Public Safety tabled <strong>Bill C-8<\/strong>, <a href=\"https:\/\/www.parl.ca\/DocumentViewer\/en\/45-1\/bill\/C-8\/first-reading\"><em>An Act respecting cyber security, amending the Telecommunications Act and making consequential amendments to other Acts<\/em><\/a>. If enacted, Bill C-8 would establish the <strong><em>Critical Cyber Systems Protection Act<\/em> (CCSPA)<\/strong>, a framework previously introduced in the last Parliament under <a href=\"https:\/\/www.parl.ca\/DocumentViewer\/en\/44-1\/bill\/C-26\/first-reading\">Bill C-26<\/a>. The CCSPA is designed to strengthen the protection of critical cyber systems deemed essential to national infrastructure and public safety.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Key sectors affected<\/h2>\n\n\n\n<p>The CCSPA would apply to industries that deliver \u201cvital services\u201d or operate \u201cvital systems\u201d, including:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Telecommunications services<\/li>\n\n\n\n<li>Interprovincial and international pipelines and power lines<\/li>\n\n\n\n<li>Nuclear energy systems<\/li>\n\n\n\n<li>Federally regulated transportation systems<\/li>\n\n\n\n<li>Banking institutions<\/li>\n\n\n\n<li>Financial clearing and settlement systems<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Compliance obligations<\/h2>\n\n\n\n<p>Designated operators of these vital services and systems would face several mandatory cybersecurity obligations, including:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Developing and maintaining a cybersecurity program<\/strong> designed to assess and manage organizational cyber risk on a regular basis<\/li>\n\n\n\n<li><strong>Mitigating cybersecurity risks in the supply chain<\/strong>, including third-party products and services<\/li>\n\n\n\n<li><strong>Reporting material changes<\/strong> in ownership, control, or use of third-party providers to the appropriate regulator<\/li>\n\n\n\n<li><strong>Complying with government-issued cybersecurity directions<\/strong>, while maintaining strict confidentiality regarding the direction\u2019s existence and content<\/li>\n\n\n\n<li><strong>Maintaining detailed records<\/strong> of the cybersecurity program and incidents, with all records stored within Canada<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">What\u2019s new and what\u2019s not<\/h2>\n\n\n\n<p>While largely identical to<strong> <\/strong>Bill C-26, Bill C-8 includes updated judicial review procedures for cybersecurity directions. Bill C-26 had previously advanced to third reading in the Senate but did not pass before Parliament was prorogued in January 2025.<\/p>\n\n\n\n<p>As a result, Bill C-8 must restart the full legislative process, including House and Senate readings, committee review, and report stages. However, due to the momentum behind Bill C-26 and the substantive overlap between the two, Bill C-8 may move swiftly through Parliament.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Business considerations<\/h2>\n\n\n\n<p>For organizations operating in affected sectors, early preparation is critical. Key considerations include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Conducting a readiness assessment<\/strong> to evaluate current cybersecurity posture<\/li>\n\n\n\n<li><strong>Reviewing vendor and third-party risk management practices<\/strong><\/li>\n\n\n\n<li><strong>Developing internal processes<\/strong> to comply with potential reporting, record-keeping, and confidentiality obligations<\/li>\n\n\n\n<li><strong>Understanding data localization requirements<\/strong>, given the mandate to store cybersecurity records within Canada<\/li>\n\n\n\n<li><strong>Monitoring legislative progress<\/strong> to anticipate compliance timelines<\/li>\n<\/ul>\n\n\n\n<p>Organizations should also assess whether they may be designated as operators under the Act and begin planning accordingly.<\/p>\n\n\n\n<p>For more background, see our previous analyses relating to Bill C-26:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.millerthomson.com\/en\/insights\/publications\/privacy-data-protection-and-cybersecurity-laws-in-canada\/\">Privacy, Data Protection, and Cybersecurity Laws in Canada<\/a> (Apr 29, 2024)<\/li>\n\n\n\n<li><a href=\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/ai-threats-cybersecurity-canadian-boards-cyber-risk-landscape\/\">AI poses new threats to cybersecurity: How Canadian boards can navigate the evolving cyber risk landscape to stay ahead of the curve<\/a> (Jun 07, 2023)<\/li>\n\n\n\n<li><a href=\"https:\/\/www.millerthomson.com\/en\/insights\/esg-and-carbon-finance\/tackling-privacy-cybersecurity-challenges-critical-parts-esg-success\/\">Tackling privacy and cybersecurity challenges as critical parts of ESG success<\/a> (Apr 11, 2023)<\/li>\n\n\n\n<li><a href=\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/successful-cyber-incident-preparedness\/\">Tactical and strategic steps for successful cyber incident preparedness<\/a>(Sep 30, 2022)<\/li>\n\n\n\n<li><a href=\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/bill-c26-cyber-security-canada-mandatory-reporting-cyber-incidents\/\">Bill C-26: A strengthening of Canada\u2019s cyber security through mandatory reporting of cyber incidents<\/a> (June 20, 2022)<\/li>\n<\/ul>\n\n\n\n<p>If you have any questions about your organization\u2019s cyber security practices, please reach out to a member of the Miller Thomson LLP&nbsp;<a href=\"https:\/\/www.millerthomson.com\/en\/expertise\/technology-ip-and-privacy\/\">Technology, IP and Privacy<\/a> Group.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As we continue to see high profile attacks on critical infrastructure in Canada, the US, and elsewhere the calls for specific Canadian regulations pertaining to affected sectors have remained consistent. With the current geopolitical climate, US security agencies have called for increased vigilance, which should come as no surprise. The European Union had responded to [&hellip;]<\/p>\n","protected":false},"author":122,"featured_media":32387,"parent":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[557],"insight-format":[416],"class_list":["post-35487","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology-ip-and-privacy"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.1.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Bill C-8: Canada\u2019s cybersecurity overhaul reboots | Miller Thomson<\/title>\n<meta name=\"description\" content=\"Canada has reintroduced its critical cyber systems legislation under Bill C-8, aimed at protecting key infrastructure sectors. Learn how this new bill builds on Bill C-26 and what compliance obligations affected organizations should prepare for.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/bill-c-8-canadas-cybersecurity-overhaul-reboots\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Bill C-8: Canada\u2019s cybersecurity overhaul reboots | Miller Thomson\" \/>\n<meta property=\"og:description\" content=\"Canada has reintroduced its critical cyber systems legislation under Bill C-8, aimed at protecting key infrastructure sectors. Learn how this new bill builds on Bill C-26 and what compliance obligations affected organizations should prepare for.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/bill-c-8-canadas-cybersecurity-overhaul-reboots\/\" \/>\n<meta property=\"og:site_name\" content=\"Miller Thomson\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/MillerThomsonLaw\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-07T14:56:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-01T20:44:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2025\/04\/insights_technology_servers.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1098\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sebastian Vives\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@millerthomson\" \/>\n<meta name=\"twitter:site\" content=\"@millerthomson\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sebastian Vives\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/bill-c-8-canadas-cybersecurity-overhaul-reboots\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/bill-c-8-canadas-cybersecurity-overhaul-reboots\/\"},\"author\":{\"name\":\"Sebastian Vives\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/#\/schema\/person\/be05481ca4ee617c24b33993ade4c881\"},\"headline\":\"Bill C-8: Canada\u2019s cybersecurity overhaul reboots\",\"datePublished\":\"2025-07-07T14:56:18+00:00\",\"dateModified\":\"2026-04-01T20:44:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/bill-c-8-canadas-cybersecurity-overhaul-reboots\/\"},\"wordCount\":562,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/bill-c-8-canadas-cybersecurity-overhaul-reboots\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2025\/04\/insights_technology_servers.jpg\",\"articleSection\":[\"Technology, IP and Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/bill-c-8-canadas-cybersecurity-overhaul-reboots\/#respond\"]}]},{\"@type\":[\"WebPage\",\"ItemPage\"],\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/bill-c-8-canadas-cybersecurity-overhaul-reboots\/\",\"url\":\"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/bill-c-8-canadas-cybersecurity-overhaul-reboots\/\",\"name\":\"Bill C-8: Canada\u2019s cybersecurity overhaul reboots | Miller Thomson\",\"isPartOf\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/bill-c-8-canadas-cybersecurity-overhaul-reboots\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/bill-c-8-canadas-cybersecurity-overhaul-reboots\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2025\/04\/insights_technology_servers.jpg\",\"datePublished\":\"2025-07-07T14:56:18+00:00\",\"dateModified\":\"2026-04-01T20:44:05+00:00\",\"description\":\"Canada has reintroduced its critical cyber systems legislation under Bill C-8, aimed at protecting key infrastructure sectors. Learn how this new bill builds on Bill C-26 and what compliance obligations affected organizations should prepare for.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/bill-c-8-canadas-cybersecurity-overhaul-reboots\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/bill-c-8-canadas-cybersecurity-overhaul-reboots\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/bill-c-8-canadas-cybersecurity-overhaul-reboots\/#primaryimage\",\"url\":\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2025\/04\/insights_technology_servers.jpg\",\"contentUrl\":\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2025\/04\/insights_technology_servers.jpg\",\"width\":1920,\"height\":1098,\"caption\":\"Male IT Specialist Holds Laptop and Discusses Work with Female Server Technician. They're Standing in Data Center, Rack Server Cabinet with Cloud Server Icon and Visualisation.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/bill-c-8-canadas-cybersecurity-overhaul-reboots\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.millerthomson.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Bill C-8: Canada\u2019s cybersecurity overhaul reboots\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/#website\",\"url\":\"https:\/\/www.millerthomson.com\/en\/\",\"name\":\"Miller Thomson\",\"description\":\"National law firm providing business law expertise and litigation and disputes services for businesses across Canada since 1957.\",\"publisher\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.millerthomson.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/#organization\",\"name\":\"Miller Thomson\",\"url\":\"https:\/\/www.millerthomson.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/miller-thomson.svg\",\"contentUrl\":\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/miller-thomson.svg\",\"width\":380,\"height\":50,\"caption\":\"Miller Thomson\"},\"image\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/MillerThomsonLaw\/\",\"https:\/\/x.com\/millerthomson\",\"https:\/\/www.linkedin.com\/company\/miller-thomson-llp\/\",\"https:\/\/www.youtube.com\/@millerthomson\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/#\/schema\/person\/be05481ca4ee617c24b33993ade4c881\",\"name\":\"Sebastian Vives\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9c50194d3d05da0f277cc6ce0c163d04a4150aed35e0d008c0cba4866c37cc31?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9c50194d3d05da0f277cc6ce0c163d04a4150aed35e0d008c0cba4866c37cc31?s=96&d=mm&r=g\",\"caption\":\"Sebastian Vives\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Bill C-8: Canada\u2019s cybersecurity overhaul reboots | Miller Thomson","description":"Canada has reintroduced its critical cyber systems legislation under Bill C-8, aimed at protecting key infrastructure sectors. Learn how this new bill builds on Bill C-26 and what compliance obligations affected organizations should prepare for.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/bill-c-8-canadas-cybersecurity-overhaul-reboots\/","og_locale":"en_US","og_type":"article","og_title":"Bill C-8: Canada\u2019s cybersecurity overhaul reboots | Miller Thomson","og_description":"Canada has reintroduced its critical cyber systems legislation under Bill C-8, aimed at protecting key infrastructure sectors. Learn how this new bill builds on Bill C-26 and what compliance obligations affected organizations should prepare for.","og_url":"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/bill-c-8-canadas-cybersecurity-overhaul-reboots\/","og_site_name":"Miller Thomson","article_publisher":"https:\/\/www.facebook.com\/MillerThomsonLaw\/","article_published_time":"2025-07-07T14:56:18+00:00","article_modified_time":"2026-04-01T20:44:05+00:00","og_image":[{"width":1920,"height":1098,"url":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2025\/04\/insights_technology_servers.jpg","type":"image\/jpeg"}],"author":"Sebastian Vives","twitter_card":"summary_large_image","twitter_creator":"@millerthomson","twitter_site":"@millerthomson","twitter_misc":{"Written by":"Sebastian Vives","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/bill-c-8-canadas-cybersecurity-overhaul-reboots\/#article","isPartOf":{"@id":"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/bill-c-8-canadas-cybersecurity-overhaul-reboots\/"},"author":{"name":"Sebastian Vives","@id":"https:\/\/www.millerthomson.com\/en\/#\/schema\/person\/be05481ca4ee617c24b33993ade4c881"},"headline":"Bill C-8: Canada\u2019s cybersecurity overhaul reboots","datePublished":"2025-07-07T14:56:18+00:00","dateModified":"2026-04-01T20:44:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/bill-c-8-canadas-cybersecurity-overhaul-reboots\/"},"wordCount":562,"commentCount":0,"publisher":{"@id":"https:\/\/www.millerthomson.com\/en\/#organization"},"image":{"@id":"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/bill-c-8-canadas-cybersecurity-overhaul-reboots\/#primaryimage"},"thumbnailUrl":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2025\/04\/insights_technology_servers.jpg","articleSection":["Technology, IP and Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/bill-c-8-canadas-cybersecurity-overhaul-reboots\/#respond"]}]},{"@type":["WebPage","ItemPage"],"@id":"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/bill-c-8-canadas-cybersecurity-overhaul-reboots\/","url":"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/bill-c-8-canadas-cybersecurity-overhaul-reboots\/","name":"Bill C-8: Canada\u2019s cybersecurity overhaul reboots | Miller Thomson","isPartOf":{"@id":"https:\/\/www.millerthomson.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/bill-c-8-canadas-cybersecurity-overhaul-reboots\/#primaryimage"},"image":{"@id":"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/bill-c-8-canadas-cybersecurity-overhaul-reboots\/#primaryimage"},"thumbnailUrl":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2025\/04\/insights_technology_servers.jpg","datePublished":"2025-07-07T14:56:18+00:00","dateModified":"2026-04-01T20:44:05+00:00","description":"Canada has reintroduced its critical cyber systems legislation under Bill C-8, aimed at protecting key infrastructure sectors. Learn how this new bill builds on Bill C-26 and what compliance obligations affected organizations should prepare for.","breadcrumb":{"@id":"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/bill-c-8-canadas-cybersecurity-overhaul-reboots\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/bill-c-8-canadas-cybersecurity-overhaul-reboots\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/bill-c-8-canadas-cybersecurity-overhaul-reboots\/#primaryimage","url":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2025\/04\/insights_technology_servers.jpg","contentUrl":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2025\/04\/insights_technology_servers.jpg","width":1920,"height":1098,"caption":"Male IT Specialist Holds Laptop and Discusses Work with Female Server Technician. They're Standing in Data Center, Rack Server Cabinet with Cloud Server Icon and Visualisation."},{"@type":"BreadcrumbList","@id":"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/bill-c-8-canadas-cybersecurity-overhaul-reboots\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.millerthomson.com\/en\/"},{"@type":"ListItem","position":2,"name":"Bill C-8: Canada\u2019s cybersecurity overhaul reboots"}]},{"@type":"WebSite","@id":"https:\/\/www.millerthomson.com\/en\/#website","url":"https:\/\/www.millerthomson.com\/en\/","name":"Miller Thomson","description":"National law firm providing business law expertise and litigation and disputes services for businesses across Canada since 1957.","publisher":{"@id":"https:\/\/www.millerthomson.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.millerthomson.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.millerthomson.com\/en\/#organization","name":"Miller Thomson","url":"https:\/\/www.millerthomson.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.millerthomson.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/miller-thomson.svg","contentUrl":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/miller-thomson.svg","width":380,"height":50,"caption":"Miller Thomson"},"image":{"@id":"https:\/\/www.millerthomson.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/MillerThomsonLaw\/","https:\/\/x.com\/millerthomson","https:\/\/www.linkedin.com\/company\/miller-thomson-llp\/","https:\/\/www.youtube.com\/@millerthomson"]},{"@type":"Person","@id":"https:\/\/www.millerthomson.com\/en\/#\/schema\/person\/be05481ca4ee617c24b33993ade4c881","name":"Sebastian Vives","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.millerthomson.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9c50194d3d05da0f277cc6ce0c163d04a4150aed35e0d008c0cba4866c37cc31?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9c50194d3d05da0f277cc6ce0c163d04a4150aed35e0d008c0cba4866c37cc31?s=96&d=mm&r=g","caption":"Sebastian Vives"}}]}},"_links":{"self":[{"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/posts\/35487","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/users\/122"}],"replies":[{"embeddable":true,"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/comments?post=35487"}],"version-history":[{"count":1,"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/posts\/35487\/revisions"}],"predecessor-version":[{"id":48872,"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/posts\/35487\/revisions\/48872"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/media\/32387"}],"wp:attachment":[{"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/media?parent=35487"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/categories?post=35487"},{"taxonomy":"insight-format","embeddable":true,"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/insight-format?post=35487"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}