Mr. Speaker, in response to parts (a)(i)-(ii) of the question, the Authorization Regime is an instrument to facilitate the delivery of certain, needed activities in areas controlled by a terrorist group, rather than an instrument to facilitate the allocation of funds. By statute, decisions to issue authorizations are based on weighing the benefits and risks of an activity. The Government of Canada cannot publicly disclose information regarding authorization holders, as it would reveal sensitive or potentially identifiable information.
With respect to part (b)(i), the Government of Canada has received eleven applications from Government of Canada departments.
With respect to part (b)(ii), the Government of Canada has received four applications from outside of the government.
In terms of part (b)(iii), to date, two authorizations as well as one request for renewal have been granted. Due to privacy considerations and safeguards in place to protect sensitive or potentially identifiable information, the Government of Canada does not disclose specific details pertaining to applications and or granted authorizations. However, overall, the applications received have involved activities to be conducted in the geographic areas of Afghanistan, Gaza, and Syria.
With respect to part (b)(iv), due to privacy considerations and safeguards in place to protect sensitive or potentially identifiable information, the Government of Canada cannot publicly disclose this information.
In terms of part (c), applications are reviewed on a case-by-case basis. The length of time required to process an application will vary depending on the complexity of the application and the comprehensiveness of the information provided. By statute, the Minister of Foreign Affairs and/or the Minister of Immigration, Refugees and Citizenship Canada, and the Minister of Public Safety each have responsibilities with respect to reviewing and assessing applications.
The Government of Canada acknowledges that some applicants have chosen to pause or delay their projects while awaiting decisions regarding their application. Due to privacy considerations and safeguards in place to protect sensitive or potentially identifiable information, the Government of Canada does not disclose specific details pertaining to applications.
Further, the Government of Canada does not provide legal advice to the public with respect to this program, and it is up to the applicant to determine whether to halt or delay their project while an application is undergoing assessment.
With respect to part (d), the Authorization Regime does not maintain a list of countries or sub-regions for which an authorization is deemed necessary. It is up to the applicant to determine whether an authorization is required in their particular circumstances, based on the activities planned, mitigation measures they may employ, and their particular legal considerations.
To provide additional clarity for prospective applicants in determining whether an authorization is required, the Authorization Requirement Inquiry mechanism is available. This optional step allows prospective applicants to request additional information from the Minister of Public Safety regarding the need for an authorization in a specified geographic area. Directions for making a request for this information are available on the Authorization Regime webpage.
This process considers the dynamic nature of terrorism and allows for the most up-to-date assessment of terrorist entities and their control of specific geographic areas.
While PS’s Authorization Regime webpage and the Authorization Requirement Inquiry process provide information for prospective applicants, the Government of Canada does not provide legal advice to the public. It remains incumbent upon potential applicants to determine whether an authorization is required in their particular circumstances in consultation with their legal advisors.
With respect to part (e), pursuant to subsection 83.032(10) of the Criminal Code, the Minister of Public Safety is responsible for conducting a security review of each application.
Applications are assessed on a case-by-case basis. As such, the length of time required to process an application, including the completion of a security review, will vary depending on a number of factors, including the nature of the activities and the degree to which information in the application is sufficient when submitted. It is important to ensure that the security review of each application is comprehensive and thoroughly considers the risks and benefits of the proposed activities.