Communications Security Establishment Act ( S.C. 2019, c. 13, s. 76)
31 Activities and classes of activities that an authorization issued under subsection 29(1) or 30(1) may authorize the Establishment to carry out may include any of the following:
- (a) gaining access to a portion of the global information infrastructure;
- (b) installing, maintaining, copying, distributing, searching, modifying, disrupting, deleting or intercepting anything on or through the global information infrastructure;
- (c) doing anything that is reasonably necessary to maintain the covert nature of the activity; and
- (d) carrying out any other activity that is reasonable in the circumstances and reasonably necessary in aid of any other activity, or class of activities, authorized by the authorization.
Marginal note: Prohibited conduct