I'm going to come back to the example of the Canada Border Services Agency.
With respect to CBSA, what we're talking about is an agency that has enormous powers. It has powers of search. It has powers of seizure. It takes the position that any cellphone, laptop, device coming across the Canadian border can be searched at will. In fact, someone was recently charged for not giving up their password, or at least those were the news reports. I don't know the details of the case.
We're talking about an agency that has enormous powers. Now we're talking about this agency where everything this agency does is covered by the definition in the information sharing act. There is nothing that CBSA does that would not be covered by that definition. Why we're using that definition instead of the CSIS definition or some other more restrictive definition is very unclear.
But when Canadians come across the border and you have your laptop or your cellphone searched, and you have this sent to 17 other agencies that are on the list—and those are just the ones that are currently on the list.... There could be a number of other agencies added to the list at any time.
The question is where do we draw the line in terms of where the information comes from and why it's necessary. We're not talking about terrorism, because if we were, the definition set out in the CSIS Act could be used. In this case, a much broader definition is being applied, and that's really what we're concerned about.