Quantum PoliciesPost-Quantum, PQC, Quantum Security

No Single Law, No Single Excuse: How Canada Regulates PQC Without Saying “Quantum”

Canada’s visible PQC guidance – three documents published mid-2025 – is just the tip. Beneath it sits a layered enforcement framework spanning financial regulation, critical infrastructure law, privacy obligations, and securities disclosure that collectively creates binding pressure for quantum readiness. OSFI already requires federally regulated financial institutions to maintain “strong cryptographic technologies” and has issued a direct quantum readiness bulletin. The pending CCSPA would add penalties of up to C$15 million per violation per day. And PIPEDA’s technology-neutral “appropriate safeguards” standard has always evolved with emerging threats – a trajectory that inevitably leads to PQC.

For CISOs in critical infrastructure sectors, the real story is not the government-only roadmap but the convergence of these instruments into a regulatory stack that rivals the EU’s NIS2/DORA apparatus in practical enforcement teeth, if not yet in explicit PQC language.

I should disclose a bias. I spent years working in Canada on cyber protection of critical infrastructure, and was involved with early iterations of Bill C-26 – the legislation that, after dying on the order paper and being reintroduced as Bill C-8, will likely receive Royal Assent this year. Canadians can be too nice. I sometimes wished Ottawa would show more appetite for examination and enforcement, for the kind of blunt regulatory force that others wield so comfortably. But I never once thought the agencies were incompetent. The people building Canada’s cybersecurity framework – at CSE, at OSFI, at TBS – know exactly what they’re doing. Which is why it frustrates me when analysts glance at ITSM.40.001, see “recommended” language and government-only scope, and pronounce Canada behind the rest of the world on quantum security. Canada doesn’t regulate loudly. It doesn’t put “POST-QUANTUM” in the title of its critical infrastructure law. But the teeth are there.

The three visible PQC documents form an interlocking system

Canada’s explicit PQC framework consists of three documents published in deliberate sequence between June and October 2025, each serving a distinct function: technical guidance, procurement mechanism, and mandatory policy force.

ITSM.40.001 – Roadmap for PQC Migration (June 23, 2025) is the Canadian Centre for Cyber Security’s technical foundation. Published as advisory guidance (“we recommend”), it establishes a three-phase migration process – Preparation, Identification (cryptographic discovery), and Transition – with four hard milestones: departmental migration plans by April 2026, annual progress reporting starting April 2026, high-priority system migration complete by end of 2031, and full migration by end of 2035. The roadmap applies to all Government of Canada non-classified IT systems (UNCLASSIFIED through PROTECTED B) and defines completion strictly: quantum-vulnerable algorithms must be “disabled, isolated or tunnelled,” not merely supplemented. It recommends the three NIST-standardized PQC algorithms – ML-KEM (FIPS 203), ML-DSA (FIPS 204), and SLH-DSA (FIPS 205) – as specified in ITSP.40.111 (Version 4, effective March 2025). The roadmap explicitly acknowledges the Harvest Now, Decrypt Later (HNDL) threat as the primary driver for prioritizing systems that protect data confidentiality in transit over public networks. (My related post: Government of Canada Launches Post-Quantum Cryptography (PQC) Migration Roadmap.)

ITSM.00.501 – Recommended Contract Clauses for Cryptography (September 1, 2025) provides the procurement mechanism. Its example clauses require vendors to support PQC-compliant key establishment and digital signature schemes by end of 2026 – a deadline significantly more aggressive than the government’s own internal 2031 milestone. It mandates cryptographic agility (configurable algorithms, parameter sizes, key lengths), CMVP-validated cryptographic modules, and CAVP-validated algorithms. For service providers and cloud services, clauses must reference the current version of CCCS guidance rather than a fixed version, creating an auto-updating compliance obligation. While framed as advisory, the SPIN transforms these clauses into effective mandates. (My summary: Canada’s PQC Procurement Playbook: ITSM.00.501 Moves Post-Quantum From Strategy to Contract Language.)

The TBS SPIN – Migrating the Government of Canada to Post-Quantum Cryptography (October 9, 2025) is the mandatory policy instrument that gives the other two documents binding force. Issued under the authority of the Policy on Government Security and the Policy on Service and Digital, it applies to all organizations listed in Schedules IV and V of the Financial Administration Act – essentially every federal department and agency. Its most immediately consequential requirement: all contracts with a digital component entered after April 1, 2026 must include PQC procurement clauses aligned with ITSM.00.501. This single provision propagates PQC requirements through the entire federal supply chain, reaching deeply into the private sector. Non-compliance triggers the Framework for Management of Compliance, with consequences ranging from “maintaining dialogue” to “termination of employment” for responsible officials. The SPIN requires full cryptographic inventories in TBS’s Application Portfolio Management tool by April 2028 and system transitions beginning that same year. (My summary: Treasury Board’s PQC SPIN: Canada Turns Post‑Quantum Migration Into Dated, Auditable Requirements.)

The sequential publication – technical roadmap in June, procurement clauses in September, mandatory policy in October – was deliberately engineered. Each document references the others, creating an interlocking system where the Cyber Centre provides technical authority, the contract clauses create market pressure, and the SPIN provides enforcement.

OSFI’s Guideline B-13 already creates implicit PQC obligations for banks

The layer most immediately enforceable for the financial sector sits not in the PQC-specific documents but in OSFI Guideline B-13 (Technology and Cyber Risk Management), effective since January 1, 2024. B-13 applies to all federally regulated financial institutions – banks, insurance companies, trust and loan companies, and foreign bank branches – and its principles-based requirements create several pathways to PQC obligation without mentioning quantum computing by name.

Principle 15 requires FRFIs to “implement and maintain strong cryptographic technologies to protect the authenticity, confidentiality and integrity of its technology assets,” including controls for “protection of encryption keys from unauthorised access, usage and disclosure throughout the cryptographic key management life cycle.” As quantum computing advances, the definition of “strong” will necessarily shift to include post-quantum algorithms. Principle 2 requires technology strategies that consider “emerging threats and technologies.” Principle 14 mandates proactive threat intelligence and anticipation of new challenges as technology evolves. Principle 5 requires updated inventories of all technology assets – the cryptographic discovery that is the essential precondition for PQC migration.

OSFI has moved beyond implicit expectations. In April 2024, it issued a Technology Risk Bulletin on Quantum Readiness directly to financial institutions – the full text is not publicly available, but its existence signals active supervisory attention. In December 2023, OSFI and FCAC jointly issued a questionnaire to FRFIs specifically requesting information on quantum computing preparedness. The results informed a September 2024 joint risk report on AI and quantum computing at FRFIs.

The enforcement context makes this particularly significant. In September 2025, OSFI announced a fundamental shift in its approach to Administrative Monetary Penalties: lower tolerance for contraventions, more frequent issuance, and higher penalty amounts. OSFI levied $530,000 in AMPs in fiscal 2024-25, up from $68,000 the prior year – a 680% increase signaling the end of its historically light-touch enforcement model. OSFI’s Superintendent can also direct institutions to remedy deficiencies, impose enhanced monitoring, watch-list or stage institutions, and require increased capital and liquidity buffers. For a CISO at a Canadian bank, the message is clear: OSFI is watching quantum readiness, and the consequences of falling behind are escalating.

Guideline B-10 (Third-Party Risk Management), effective May 1, 2024, adds another dimension. FRFIs must assess and manage technology risks in their third-party vendor relationships – a requirement that extends quantum risk exposure through the entire vendor supply chain. When an FRFI’s core banking provider, HSM vendor, or cloud infrastructure partner lacks PQC capability, B-10 makes that the FRFI’s problem to manage.

The CCSPA will bring $15 million penalties to critical infrastructure cybersecurity

The most consequential piece of Canada’s PQC enforcement stack is still moving through Parliament. The Critical Cyber Systems Protection Act (CCSPA) – originally Part 2 of Bill C-26, which died when Parliament was prorogued in January 2025, and reintroduced as Bill C-8 in June 2025 – passed second reading on October 3, 2025 and is currently under committee study. Law firm analyses widely expect adoption in 2026.

CCSPA would impose mandatory cybersecurity obligations on designated operators of critical cyber systems across six federally regulated sectors: telecommunications, banking, pipeline and power line systems, nuclear energy, transportation, and clearing and settlement systems. Designated operators would be required to establish a cybersecurity program within 90 days of designation, covering risk identification and management (including supply chain risks), system protection, incident detection, and impact minimization. Cybersecurity incidents must be reported to CSE within 72 hours.

The penalty framework is substantial. Organizations face Administrative Monetary Penalties of up to C$15 million per violation, with each day of non-compliance constituting a separate violation. Individuals face up to C$1 million per day. Criminal penalties include imprisonment of up to 5 years on indictment. Directors and officers may be personally liable.

CCSPA does not mention post-quantum cryptography. It is deliberately technology-neutral. But three mechanisms make it a powerful PQC enforcement tool:

  • Cyber Security Directions: The Governor in Council can issue binding orders requiring designated operators to take specific measures to protect critical cyber systems. This could directly mandate PQC migration for specific operators or entire sectors within specified timeframes.
  • Regulatory power: Section 135 empowers the GIC to make regulations on cybersecurity program content, which could incorporate cryptographic standards including PQC requirements.
  • Telecom Act Section 15.2(2)(l): The Minister may “require that a telecommunications service provider implement specified standards” – a direct pathway to mandating PQC standards for telecom networks.

The enforcement architecture assigns oversight to existing sector regulators: OSFI for banking systems and Bank of Canada for clearing and settlement systems. This means the same regulator already issuing quantum readiness bulletins to financial institutions would gain statutory enforcement authority with $15 million daily penalties.

Privacy and securities law add two more pressure layers

PIPEDA’s evolving safeguard standard creates a sleeper PQC obligation. Section 4.7 (the Safeguards principle) requires personal information to be “protected by security safeguards appropriate to the sensitivity of the information,” with technological measures including “passwords and encryption” explicitly listed. Critically, the Office of the Privacy Commissioner has interpreted this as a dynamic obligation: organizations must “continually ensure it adequately protects the personal information in its care as technologies evolve and as new risks emerge.” The OPC has precedent finding organizations non-compliant for failing to keep pace with current security practices. As CSE guidance increasingly positions PQC as necessary and the HNDL threat becomes widely recognized, the “appropriate safeguards” standard will inevitably encompass quantum-safe cryptography – particularly for sensitive financial and health data with long information lifespans.

Current PIPEDA penalties are modest ($100,000 per violation), but the provincial landscape already bites harder. Quebec’s Law 25 (Loi modernisant des dispositions législatives en matière de protection des renseignements personnels), fully in force since September 2024, imposes administrative monetary penalties of up to 4% of gross global revenue – a GDPR-scale enforcement mechanism operating right now within Canadian borders. Law 25 requires organizations handling Quebecers’ personal information to implement security measures “appropriate to the sensitivity” of the data, and its penalty framework gives the Commission d’accès à l’information real punitive authority. For any organization storing long-lived sensitive data with quantum-vulnerable encryption in Quebec, the Law 25 safeguard standard is already evolving toward PQC.

At the federal level, new privacy legislation is expected in 2025-2026. The now-dead Bill C-27 proposed penalties of up to C$25 million or 5% of gross global revenue – a direction that signals where enforcement is heading. Meanwhile, the Privacy Commissioner has restructured the OPC around a new Compliance Promotion and Enforcement Sector (January 2025) and is increasingly pursuing Federal Court enforcement applications rather than relying on voluntary compliance.

Canadian Securities Administrators (CSA) disclosure requirements add a governance-level obligation. CSA Multilateral Staff Notice 51-347 (2017) requires issuers to disclose cybersecurity risks that are “as detailed and entity specific as possible” and avoid boilerplate. The materiality test – probability of breach multiplied by anticipated magnitude – applies to quantum computing risk. As CSE assesses cryptographically relevant quantum computers “could be available as soon as the 2030s,” publicly traded Canadian financial institutions and payment companies will face increasing pressure to disclose their HNDL exposure, PQC migration timelines, and transition costs. Failure to disclose material quantum risk could expose boards to securities liability.

Canada’s financial sector is already quietly preparing

While explicit PQC mandates for Canada’s private financial sector remain absent, the industry is not idle. The Canadian Forum for Digital Infrastructure Resilience (CFDIR) published “Canadian National Quantum-Readiness Best Practices and Guidelines“, developed by a working group that included Payments Canada, BMO, CIBC, Desjardins, Manulife Bank, National Bank of Canada, Royal Bank of Canada, Scotiabank, Sun Life, and TD alongside quantum-safe ecosystem vendors including evolutionQ, Crypto4A, Entrust, and ISARA.

The Bank of Canada is investing directly in quantum-safe infrastructure. In April 2024, it engaged evolutionQ in research on quantum-safe cybersecurity technologies for a potential Canadian digital dollar (CBDC), exploring quantum-safe encryption and crypto-agility as core design requirements. The Bank also maintains a Quantum Lab for advanced analytics and has published research on quantum algorithms for improving payment system efficiency. Under the proposed CCSPA, the Bank of Canada would become the designated regulator for clearing and settlement systems – giving it direct enforcement authority over the core payment infrastructure.

The G7 Cyber Expert Group released a coordinated PQC transition roadmap for the financial sector in November 2024, further establishing international expectations that major economies’ financial systems will migrate to quantum-safe cryptography. Canada’s participation in this initiative creates additional soft pressure on its domestic financial institutions.

Payments Canada’s core clearing and settlement systems – Lynx and the ACSS – depend on public-key cryptography that will require migration, as does Interac’s heavily cryptographic infrastructure. But the quantum exposure extends well beyond finance: telecom networks, energy grid control systems, nuclear facility operations, and transportation management systems all rely on the same vulnerable asymmetric cryptography. The CCSPA’s six designated sectors each face their own version of this problem.

How Canada’s iceberg compares to the EU and US approaches

All three major Western jurisdictions exhibit the same “iceberg” pattern: PQC-specific guidance visible at the surface, with broader cybersecurity and critical infrastructure laws providing the enforcement backbone beneath.

The EU’s approach is the most explicitly layered. NIS2’s Article 21 requires cryptographic policies that “take into account the state of the art” – language that will mandate PQC once it becomes the recognized standard. DORA’s Regulatory Technical Standards go further, explicitly requiring monitoring of “threats from quantum advancements” as a present-tense obligation. Penalties reach €10 million or 2% of global turnover under NIS2 and include personal liability for management under both NIS2 and DORA. The EU’s coordinated PQC Roadmap targets critical system migration by 2030 – one year ahead of Canada’s 2031 deadline.

The US approach is the most prescriptive. NSA’s CNSA 2.0 specifies exact algorithms with category-specific deadlines: PQC preferred in software signing by 2025, mandatory for new national security system acquisitions by 2027, complete migration by 2035. OMB M-23-02 requires annual cryptographic inventories from all civilian federal agencies, with an estimated government-wide cost of $7.1 billion. The US enforces primarily through federal procurement – agencies must comply with OMB directives, and the contracting chain creates private-sector compliance pressure.

Canada’s approach is the most principles-based but not the weakest. Where the EU relies on “state of the art” language and the US on procurement mandates, Canada uses a combination of:

  • Government procurement propagation: The SPIN’s requirement that all new contracts include PQC clauses after April 2026 reaches every technology vendor selling to the federal government
  • Sector-specific supervisory pressure: OSFI’s B-13 and quantum readiness bulletins create expectations for financial institutions backed by escalating AMPs
  • Pending statutory authority: CCSPA’s Cyber Security Directions mechanism provides the legal instrument for mandating specific technical measures, with penalties comparable to EU levels
  • Supply chain cascade: B-10 third-party risk requirements force quantum risk management throughout the vendor ecosystem

The key gap is timeline. Canada’s 2031 deadline for high-priority systems trails the EU’s 2030 target by one year and the US NSA’s 2027 acquisition requirement by four years. Canada also currently lacks the explicit PQC language found in DORA’s RTS or the proposed NIS2 amendment. But the enforcement machinery exists, and the regulatory direction is unambiguous.

DimensionCanadaEUUS
Critical system deadlineEnd of 2031End of 20302027 (new acquisitions)
Full migration deadlineEnd of 2035End of 20352035
Maximum penaltyC$15M/day (CCSPA)€10M or 2% turnover (NIS2)Procurement disqualification
Personal liabilityDirectors/officers (CCSPA)Management (NIS2 Art. 20, DORA Art. 5)Agency heads (NSM-10)
Financial sector specificOSFI B-13 + quantum bulletinDORA + RTS quantum languageFFIEC/NIST framework alignment
Private sector scopePending (CCSPA six sectors)NIS2 18+ sectorsProcurement chain cascade
Explicit PQC mandateGovernment only (SPIN)PQC Roadmap + proposed NIS2 amendmentOMB M-23-02 + CNSA 2.0

The CSE guidance ecosystem extends well beyond the roadmap

The Canadian Centre for Cyber Security has published a comprehensive PQC guidance ecosystem that extends well beyond the three headline documents:

  • ITSP.40.111 (March 2025, Version 4): The foundational cryptographic algorithm guidance now includes ML-KEM, ML-DSA, and SLH-DSA as recommended PQC algorithms, with future updates to set deprecation timelines for non-PQC public-key systems
  • ITSAP.00.017 (updated February 2025): General-audience guidance for preparing organizations for the quantum threat, recommending cryptographic inventories, vendor engagement, and sensitivity/lifespan evaluation of data – applicable to all organizations, not just government
  • ITSE.00.017: Technical companion addressing the quantum computing threat to asymmetric cryptography (RSA, ECC, Diffie-Hellman) with a three-step assessment framework
  • ITSAP.40.018 (May 2022): Guidance on achieving cryptographic agility – the capability to interchange algorithms without major system changes, explicitly linked to PQC preparation
  • National Cyber Threat Assessment 2025-2026: Identifies quantum computing as one of three technological trends with disruptive potential, warning that “encrypted information stolen by threat actors today can be held and decrypted when quantum computers become available”

Canada’s $360 million National Quantum Strategy (January 2023) provides the policy and funding umbrella, with a dedicated mission to “ensure the privacy and cyber-security of Canadians in a quantum-enabled world through a national secure quantum communication network and a post-quantum cryptography initiative.” The 2025 National Cyber Security Strategy (“Securing Canada’s Digital Future”) further embeds quantum resilience as a national priority. The CMVP – jointly managed by CCCS and NIST – ensures that Canadian cryptographic validation requirements automatically incorporate NIST’s PQC standards, creating a shared North American validation infrastructure.

Importantly, these cryptographic baselines extend into cloud deployments. Government of Canada cloud guardrails require organizations to use CSE-approved algorithms and protocols in cloud environments, as specified in ITSP.40.111 and protocol configuration guidance (ITSP.40.062). This means PQC expectations are not confined to on-premises systems — they follow government data into commercial cloud platforms, creating another procurement-driven compliance pathway for cloud service providers.

Two more levers: supplier certification and export controls

Two additional mechanisms extend Canada’s PQC pressure beyond the headline documents, and they deserve attention precisely because they operate in the background.

The first is the Canadian Program for Cyber Security Certification (CPCSC), which launched Phase 1 on March 12, 2025, initially targeting defence procurement. Level 1 certification requirements begin in April 2026, with the Standards Council of Canada building an accreditation ecosystem for third-party assessors and higher certification levels being progressively incorporated into select defence contracts. CPCSC is adapted from NIST Special Publications and tied to the Cyber Centre’s ITSP.10.171 – the standard for protecting specified Government of Canada information in non-government systems.

ITSP.10.171 makes an assumption that critical infrastructure CISOs should note carefully: Government of Canada information carries the same value whether it resides inside or outside government environments, and safeguards must be consistent regardless of where data is processed. Its control families include “System and communications protection” and “Supply chain risk management.” As quantum risk becomes a recognized cryptographic vulnerability, these control families – paired with CPCSC’s certification and audit requirements – create a practical route to PQC readiness for any organization that handles government data, even absent an explicit “quantum” clause in their contracts. The CPCSC is not a PQC regulation today. But it is precisely the kind of structured supplier certification program through which cryptographic modernization requirements will flow.

The second mechanism is more unusual: export controls. In February 2025, the federal government released its Sensitive Technology List, identifying eleven key areas where Canadian intellectual property should be closely guarded. Quantum science and technology appears explicitly on the list, alongside advanced digital infrastructure, AI, and advanced sensing. The 2024 Order Amending the Export Control List added specified quantum computers – those supporting 34 or more physical qubits with low error rates – along with qubit devices and quantum control components.

Under the Export and Import Permits Act, “technology” encompasses not just hardware but technical data and technical assistance. Controlled transfers can occur through email, screen-sharing, or teleconference – meaning organizations working with quantum technologies face export control screening obligations for international collaborations, data room segregation requirements, and staff training needs. For organizations developing or implementing PQC solutions that intersect with quantum technologies, these controls create compliance obligations that run alongside cryptographic modernization. More broadly, their existence signals that Ottawa treats quantum capabilities as strategically significant — a posture that informs the entire regulatory environment for quantum-related technologies.

Conclusion: Canada’s enforcement stack is building fast

The narrative that Canada has “only government-facing PQC guidance” misses the structural reality. Canada’s regulatory approach resembles a construction project with the foundation poured and the framing going up: OSFI B-13 is already enforceable, the TBS SPIN is already mandatory for government procurement chains, OSFI’s quantum readiness expectations are already communicated to financial institutions, and CCSPA – with its $15 million daily penalties – is moving through Parliament with broad political support and expected passage in 2026.

For CISOs operating in Canada’s critical infrastructure sectors, the practical implication is that PQC preparation is not a 2030 problem. The April 2026 procurement clause deadline means any vendor selling cryptographic products or services to the Government of Canada needs PQC capability within months. OSFI’s escalating enforcement posture means quantum risk must appear in technology risk assessments now. And when CCSPA receives Royal Assent, the Governor in Council will have authority to issue binding Cyber Security Directions – directions that could mandate PQC migration on government-defined timelines with criminal penalties (even personal) for non-compliance.

Canada’s framework is not a single regulation. It is a regulatory ecosystem converging on the same outcome from multiple directions – sector-specific supervision, critical infrastructure law, privacy obligations, procurement mandates, and securities disclosure. The iceberg is real, and the enforcement mass beneath the waterline is growing.

Quantum Upside & Quantum Risk - Handled

My company - Applied Quantum - helps governments, enterprises, and investors prepare for both the upside and the risk of quantum technologies. We deliver concise board and investor briefings; demystify quantum computing, sensing, and communications; craft national and corporate strategies to capture advantage; and turn plans into delivery. We help you mitigate the quantum risk by executing crypto‑inventory, crypto‑agility implementation, PQC migration, and broader defenses against the quantum threat. We run vendor due diligence, proof‑of‑value pilots, standards and policy alignment, workforce training, and procurement support, then oversee implementation across your organization. Contact me if you want help.

Talk to me Contact Applied Quantum

Marin

I am the Founder of Applied Quantum (AppliedQuantum.com), a research-driven consulting firm empowering organizations to seize quantum opportunities and proactively defend against quantum threats. A former quantum entrepreneur, I’ve previously served as a Fortune Global 500 CISO, CTO, Big 4 partner, and leader at Accenture and IBM. Throughout my career, I’ve specialized in managing emerging tech risks, building and leading innovation labs focused on quantum security, AI security, and cyber-kinetic risks for global corporations, governments, and defense agencies. I regularly share insights on quantum technologies and emerging-tech cybersecurity at PostQuantum.com.
Share via
Copy link
Powered by Social Snap