government procurement records
companies (CLOUD Act exposed)
analyzed
Methodology
This audit is based on publicly available information. Sources include the Government of Canada's Proactive Disclosure database, Shared Services Canada's published cloud service provider frameworks, provincial procurement portals (Ontario, Quebec, British Columbia, Alberta), publicly available departmental IT strategies and annual reports, and Access to Information disclosures.
We identified SaaS tools through contract disclosures, vendor mentions in departmental documents, job postings referencing specific platforms, and published IT modernization strategies. Each identified tool was then mapped against Upper Harbour's Canadian Technology Sovereignty Index to determine parent company jurisdiction and CLOUD Act exposure status.
This audit does not claim to be exhaustive. Government SaaS usage is broader than what procurement records capture — many tools are adopted at the departmental level without centralized procurement. The actual exposure is likely higher than what we document here.
Federal government findings
The Government of Canada's IT procurement is primarily managed through Shared Services Canada (SSC). The federal government has established framework agreements with major cloud service providers and has published guidance on secure cloud use. Despite these frameworks, the majority of SaaS tools in use are operated by US-parented companies.
Core productivity and infrastructure
| Tool | Category | Parent HQ | CLOUD Act | CA Residency |
|---|---|---|---|---|
| Microsoft 365 | Productivity | US (Washington) | Exposed | Available |
| Microsoft Azure | Cloud infrastructure | US (Washington) | Exposed | Available (Canada Central/East) |
| AWS | Cloud infrastructure | US (Washington) | Exposed | Available (Montreal/Calgary) |
| Google Workspace | Productivity | US (California) | Exposed | Partial (Enterprise) |
| Salesforce | CRM | US (California) | Exposed | Available (Hyperforce) |
| ServiceNow | IT Service Mgmt | US (California) | Exposed | Available |
| SAP | ERP | Germany | Not exposed | Available |
| Adobe | Creative/Document | US (California) | Exposed | Partial |
Communication and collaboration
| Tool | Parent HQ | CLOUD Act | Notes |
|---|---|---|---|
| Microsoft Teams | US (Washington) | Exposed | Bundled with M365; primary collaboration tool |
| Slack | US (Salesforce subsidiary) | Exposed | Used in some departments/agencies |
| Zoom | US (California) | Exposed | Adopted during COVID; still in use |
| Webex | US (Cisco subsidiary) | Exposed | GC-approved video conferencing |
Specialized and departmental
| Tool | Category | Parent HQ | CLOUD Act |
|---|---|---|---|
| Dynamics 365 | Business applications | US (Microsoft) | Exposed |
| GitHub | Development | US (Microsoft) | Exposed |
| Atlassian (Jira/Confluence) | Project management | US (Delaware inc.) | Exposed |
| Okta | Identity/SSO | US (California) | Exposed |
| Splunk | Security/observability | US (Cisco subsidiary) | Exposed |
| Cloudflare | CDN/Security | US (California) | Exposed |
Of the 45+ SaaS tools we identified in federal government use, approximately 67% are operated by US-parented companies and subject to the CLOUD Act. The core digital infrastructure of the Government of Canada — productivity, communication, cloud hosting, CRM, identity management — runs predominantly on US-jurisdictioned platforms. Canadian data residency is configured where available, but as our research consistently shows, residency does not equal sovereignty.
Provincial findings
The structural problem
The pattern across all levels of government is consistent: Canadian government IT infrastructure is overwhelmingly dependent on US-parented SaaS vendors. This isn't because Canadian alternatives don't exist — it's because the US vendors (particularly Microsoft, Salesforce, and AWS) have dominant market positions, extensive government certification programs, and deeply embedded procurement relationships.
The Government of Canada's 2025 Digital Sovereignty Framework explicitly acknowledges this challenge. It identifies "global technology market dependencies" as a strategic risk, noting that most digital products and services used by the government are provided by a small number of major global technology companies. The framework calls for supplier diversification and investment in domestic digital capacity.
But the gap between policy aspiration and operational reality is wide. Migrating core government IT from Microsoft 365 to a Canadian-sovereign alternative would be an enormous undertaking — measured in years and hundreds of millions of dollars. In the near term, Canadian governments will continue to operate with significant CLOUD Act exposure, mitigated by contractual safeguards, residency configurations, and encryption measures that reduce but do not eliminate jurisdictional risk.
Implications
For government IT leaders: The sovereignty gap is real and documented. The question is not whether to acknowledge it, but how to manage it. Priority actions include mapping your full SaaS stack to parent jurisdictions (not just your cloud provider), ensuring Canadian data residency is configured on every tool that offers it, executing DPAs with sovereignty-relevant provisions, and documenting your risk assessment rationale.
For SaaS vendors selling to government: Sovereignty documentation is becoming a procurement differentiator. Vendors that can demonstrate Canadian-headquartered operations, Canadian data residency, and independence from CLOUD Act jurisdictions will have a meaningful advantage in government procurement. See our guide on data sovereignty for government procurement.
For policymakers: The gap between the Digital Sovereignty Framework's aspirations and operational reality needs a bridge. Investment in Canadian SaaS alternatives for critical government functions — particularly productivity, communication, and identity management — would reduce systemic CLOUD Act exposure. The current approach of relying on contractual safeguards with US vendors is a mitigation strategy, not a sovereignty strategy.
HarbourScan uses Upper Harbour's 715-tool sovereignty database to map any organization's SaaS stack to parent jurisdictions — including government organizations. Run a free assessment →