The Privacy Data Protection and Cybersecurity Edition 5 PDF
The Privacy Data Protection and Cybersecurity Edition 5 PDF
Protection and
Cybersecurity
Law Review
Fifth Edition
Editor
Alan Charles Raul
lawreviews
Editor
Alan Charles Raul
lawreviews
© 2018 Law Business Research Ltd
PUBLISHER
Tom Barnes
ACCOUNT MANAGERS
Jack Bagnall, Sophie Emberson, Katie Hodgetts
RESEARCHER
Keavy Hunnigal-Gaw
EDITORIAL COORDINATOR
Thomas Lawson
HEAD OF PRODUCTION
Adam Myers
PRODUCTION EDITOR
Anna Andreoli
SUBEDITOR
Martin Roach
The publisher acknowledges and thanks the following for their learned assistance
throughout the preparation of this book:
ALLENS
ASTREA
BTS&PARTNERS
JUN HE LLP
M&M BOMCHIL
MATHESON
NNOVATION LLP
NOERR
SANTAMARINA Y STETA, SC
SK CHAMBERS
i
© 2018 Law Business Research Ltd
CONTENTS
Chapter 4 ARGENTINA����������������������������������������������������������������������������������������������������������������������53
Adrián Lucio Furman, Mercedes de Artaza and Francisco Zappa
Chapter 5 AUSTRALIA������������������������������������������������������������������������������������������������������������������������64
Michael Morris
Chapter 6 BELGIUM���������������������������������������������������������������������������������������������������������������������������77
Steven De Schrijver
Chapter 7 BRAZIL��������������������������������������������������������������������������������������������������������������������������������98
Fabio Ferreira Kujawski and Alan Campos Elias Thomaz
Chapter 8 CANADA���������������������������������������������������������������������������������������������������������������������������109
Shaun Brown
Chapter 9 CHINA������������������������������������������������������������������������������������������������������������������������������125
Marissa (Xiao) Dong
Chapter 10 COLOMBIA����������������������������������������������������������������������������������������������������������������������136
Natalia Barrera Silva
Chapter 11 GERMANY������������������������������������������������������������������������������������������������������������������������146
Olga Stepanova
iii
© 2018 Law Business Research Ltd
Contents
Chapter 13 HUNGARY�����������������������������������������������������������������������������������������������������������������������169
Tamás Gödölle
Chapter 14 INDIA��������������������������������������������������������������������������������������������������������������������������������189
Aditi Subramaniam and Sanuj Das
Chapter 15 IRELAND��������������������������������������������������������������������������������������������������������������������������206
Anne-Marie Bohan
Chapter 16 JAPAN��������������������������������������������������������������������������������������������������������������������������������220
Tomoki Ishiara
Chapter 17 MALAYSIA������������������������������������������������������������������������������������������������������������������������237
Shanthi Kandiah
Chapter 18 MEXICO���������������������������������������������������������������������������������������������������������������������������251
César G Cruz-Ayala and Diego Acosta-Chin
Chapter 19 POLAND���������������������������������������������������������������������������������������������������������������������������266
Anna Kobylańska, Marcin Lewoszewski, Maja Karczewska and Aneta Miśkowiec
Chapter 20 RUSSIA������������������������������������������������������������������������������������������������������������������������������277
Vyacheslav Khayryuzov
Chapter 21 SINGAPORE���������������������������������������������������������������������������������������������������������������������287
Yuet Ming Tham
Chapter 22 SPAIN���������������������������������������������������������������������������������������������������������������������������������304
Leticia López-Lapuente and Reyes Bermejo Bosch
Chapter 23 SWITZERLAND��������������������������������������������������������������������������������������������������������������317
Jürg Schneider, Monique Sturny and Hugh Reeves
Chapter 24 TURKEY����������������������������������������������������������������������������������������������������������������������������338
Batu Kınıkoğlu, Selen Zengin and Kaan Can Akdere
iv
© 2018 Law Business Research Ltd
Contents
v
© 2018 Law Business Research Ltd
Chapter 1
GLOBAL OVERVIEW
2018 has been a watershed year for the privacy field. This overview highlights some of the
year’s key developments that are discussed in detail in the succeeding chapters.
Obviously, the European Union’s General Data Protection Regulation (GDPR) has
been the main attraction. Companies subject to the GDPR have expended and will continue
to expend enormous efforts and funds to understand and diagram their data-processing
operations. They have also needed to design rigorous new compliance mechanisms, and
to implement elaborate systems for providing data subject rights such as access, deletion,
rectification and portability.
Now that the GDPR has gone live, as of 25 May 2018, it remains to be seen how the
Member State data protection authorities will deploy their significant new penalty authority
to enforce substantially more stringent standards. Will US tech companies continue to bear
the brunt of EU enforcement wrath, or will the DPAs scrutinise inwards as well?
The world will also be watching to see whether enforcement by the various EU DPAs
conforms to acceptable standards of transparency, fairness, due process and consistency. With
potential penalties of up to 4 per cent of a company’s global turnover at stake, it is likely that
the new European Data Protection Board (EDPB) will have its work cut out to harmonise
the data protection policies of increasingly fractious national governments. Will the full range
of EU DPAs have the resources, legal authority and administrative experience to enforce the
GDPR both fully and fairly?
Perhaps most importantly, will it turn out that the GDPR was worth it?
Given the burdens of complying with the GDPR and the potential for inhibiting
technological and commercial innovation, will Europe’s citizens be better or worse off under
the GDPR? The correct judgement on this crucial point will depend on whether the privacy
benefits of GDPR will outweigh its costs.
One hopes that someone is really paying attention to this question. It will require the
acquisition of significant amounts of relevant empirical data to answer it. While privacy and
data protection are fundamental rights in the European Union – as they are in most of the
world – no society has concluded that privacy rights are absolute. Accordingly, the European
Union’s citizens will be well served if EU officials make the effort to monitor the full spectrum
of GDPR costs and benefits, and then assess those impacts against the actual privacy risks the
GDPR prevents or penalises.
1
© 2018 Law Business Research Ltd
Global Overview
In the United States, privacy regulation has also taken flight – in California. The
‘Golden State’ has adopted the California Consumer Privacy Act (CCPA). That statute will,
in January 2020, become by far the most prescriptive privacy law in the United States (not
counting federal financial, health, telecom and children’s privacy laws).
The CCPA focuses on requiring explanation and transparency of data collection practices
and data uses by companies operating in California (or processing the data of California
residents). However, the CCPA is arguably somewhat more reasonable and less restrictive than
the GDPR. The CCPA turns primarily on ‘opt-out’ rather than the GDPR’s abiding preference
for ‘opt-in’. Moreover, the CCPA does not require burdensome logging of data-processing
practices, and does not authorise enormous potential penalties or private litigation (except
with regard to data breaches involving exfiltration of personal data). To be sure, however, the
CCPA does authorise data subject rights similar to those of the GDPR, namely access, deletion
and portability. Time will tell whether the CCPA constrains technological innovation as much
as the GDPR certainly will. A final point to consider is that the CCPA may yet be subject to
further legislative amendment prior to its 1 January 2020 date, and will in addition be subject
to interpretative regulations by the state’s Attorney General.
California is not the only US jurisdiction moving on privacy. Besides new legislation
in other states, the cities of San Francisco and Chicago have also taken steps in the direction
of regulating privacy and data protection at the municipal level. While little may come of
the local policy idiosyncrasies, (and the CCPA would largely pre-empt the San Francisco
ordinance), all this policymaking activity has inspired the federal government to consider
proposing its own privacy legislation. Federal standards could pre-empt or obviate states from
going in 50 different directions (as they have done on data breach notification laws).
At the time of writing, the White House had not yet released its privacy proposals,
but they are expected to be published before 2019. In the meantime, the Federal Trade
Commission (FTC) has embarked on a substantial series of hearings to examine privacy,
big data, artificial intelligence and numerous other consumer protection and competition
issues. The FTC is likely to consider very closely what ‘information injuries’ are sufficiently
concrete to justify regulatory restriction or enforcement penalties in the realm of alleged
privacy or data protection violations. Unlike the European Union, in the United States
sanctions are typically only imposed or authorised where the injury at issue is (1) concrete
and particularlised (i.e., experienced by specific individuals) and (2) de facto and real, rather
than wholly abstract. While the United States recognises that intangible injuries may be real
and not merely abstract, it will not necessarily be possible to predicate enforcement or private
litigation on pure dignitary harm or mild emotional distress. Illusory, trivial or technical
privacy harms would not generally support regulation or penalties.
India’s Supreme Court recently held that privacy is a fundamental human right, and
the national government is actively considering a comprehensive privacy and data protection
regime. India’s proposed new privacy framework is now embodied in draft legislation,which
is open for public comment until 30 September 2018. The proposed law appears to follow
the EU regime closely. If it is ultimately enacted in this form, we will see whether the new
India law enhances or impedes India’s rise as a major hub of technological innovation and
digital commerce. India is also considering possible data localisation requirements for storage
of personal data in-country and use of local service providers. This could obviously have
international trade repercussions.
For the United Kingdom, the key data protection will be – as it will be for many
regulatory policy issues – Brexit. In April 2018, the Information Commissioner, Elizabeth
2
© 2018 Law Business Research Ltd
Global Overview
Denham, stated that the Information Commissioner’s Office (ICO) is preparing for the
post-Brexit environment, ‘in order to ensure that the information rights of UK citizens are
not adversely affected’ by Brexit.
In the meantime, the UK Data Protection Act 2018 came into force on 23 May 2018. It
repealed the 1998 UK Data Protection Act, and introduced certain specific derogations that
specify how the GDPR applies in UK law. The Act also addressed certain national security
privacy provisions, as well as the powers and obligations of the ICO. The ICO has published
extensive guidance on the GDPR.
China continues to release numerous national standards regarding cybersecurity for
public comment. These regulatory provisions include ‘Measures on Security Assessment of
the Cross-Border Transfer of Personal Information and Important Data’ (which incorporate
requirements regarding data localisation and security) as well as the ‘Regulations on Security
Protection of Critical Information Infrastructures’. Certain cybersecurity standards are already
effective, however, and government agencies are becoming more active in enforcement. To
be sure, many specific requirements, procedures and details are still waiting to be developed.
Nonetheless, companies are proceeding to implement internal compliance programmes for
cybersecurity and the protection of personal information. Under the existing Cybersecurity
Law of China, companies are well advised to consider how and whether their existing business
operations and practices warrant modification to ensure the requisite level of cybersecurity
protection.
In Russia, the requirements for data localisation remain an important concern for
international businesses. All personal data of Russian citizens must be stored and processed
in the territory of Russia, and the location of such databases must be reported to the Russian
data protection authority. Greater stringency of enforcement and more litigation are expected
in the years ahead. The ‘Yarovaya Law’ also continues to pose concerns for telecom and
internet companies. They are now required to store the contents of telephone calls and text
messages for six months, and metadata for one year, and they must also provide significant
additional assistance for government access and surveillance.
On 5 February 2018, the Asia Pacific Economic Cooperation (APEC) data protection
framework saw Singapore join the United States (2012), Mexico (2013), Japan (2014),
Canada (2015), and South Korea (2017) as an approved APEC economy participating in the
APEC Cross-Border Privacy Rules system. APEC continues to grow slowly as countries and
companies wait to see what develops.
Japan and the European Union announced on 17 July 2018 that they had agreed to
grant reciprocal adequacy to their respective data protection regimes. To achieve this mutual
recognition, the European Union had established certain conditions, including that Japan
agree to treat trade union membership and sexual orientation as sensitive information
categories; that data subject rights be accorded to information deleted within six months;
and that original purpose limitations be respected; that Japan ensure that EU data transferred
out of Japan to non-EU countries retain the same level of protection outside of Japan as in
Japan. Also of note in Japan is a pending judicial ruling regarding a data breach case (Benesse
Corporation). The decision here may define the obligations of businesses to protect personal
information and the resulting damages from data breaches.
In addition to joining APEC, Singapore passed the Cybersecurity Act, which is
primarily a criminal statute. However, it also created a new Commissioner of Cybersecurity
with significant powers to prevent and respond to cybersecurity incidents. It also set up a
licensing scheme for providers of certain cybersecurity services. As yet, no regulations or
guidance have been provided for general business cybersecurity practices.
3
© 2018 Law Business Research Ltd
Global Overview
Canada finalised regulations to provide additional detail regarding the privacy breach
notification requirement under the federal Personal Information Protection and Electronic
Documents Act (PIPEDA). From 1 November 2018, private companies subject to PIPEDA
will be required to notify affected individuals and report to the Privacy Commissioner where
a breach of security safeguards would result in a real risk of significant harm to individuals. In
2018, the Federal Court of Canada also affirmed that PIPEDA applies to commercial entities
outside Canada if they process personal information about Canadians. Privacy-related
litigation in Canada is also expected to grow in the near term.
In Mexico, a significant cyberattack on financial institutions in 2018 is being
investigated by the Attorney General. The national data protection authority (INAI) is also
investigating to determine whether this incident constitutes a data breach. In addition,
INAI has provided non-binding guidance on the status of biometric data as sensitive when
(1) it refers to the most intimate sphere of the data subject, (2) can lead to discrimination,
and (3) illegitimate use could result in material risk to the data subject. INAI also provided
non-binding guidance for protecting personal data on social media.
In July 2018, Brazil adopted a comprehensive data protection law, known as the LGPD.
This omnibus privacy regime is modelled closely on the GDPR. The LGPD also established
a National Data Protection Authority. Significantly, an important case is pending before
the Supreme Court regarding the legality of encryption technology. The issue concerns the
role of encryption technology in preventing disclosure of communications content to law
enforcement.
And, of course, much privacy and cybersecurity policymaking activity is taking place
around the rest of the world as well.
***
The outline above highlights the in-depth treatment of the different jurisdictions
discussed in detail below. As noted at the outset, 2018 may prove to be a turning point in
global privacy and data protection policymaking. ‘Cambridge Analytica’ – shorthand for the
active measures of Russia, and perhaps other geopolitical actors, to manipulate social media
to interfere with the political processes of Western democracies – will likely become rallying
cry for advocates on a par with the ‘Snowden’ impact on the privacy community in 2013.
In order to ensure that policymakers do not learn the wrong lessons from these dramatic
events, it will be important for governments to focus precisely on combating real rather
than imagined (or negligible) privacy risks. Such calculations are essential to achieve smart
regulation rather than foolish over-regulation.
While privacy is, naturally, a fundamental right in democratic countries, governments
must nonetheless justify their privacy regulations to their citizens. Without such rigorous
justification, which entails a careful balancing of fundamental rights and other important
social objectives, data protection policy could end up not actually being beneficial to society.
Bad policy will delay or even deny technological development and deployment, thereby
stunting social advancement and restricting consumer choice and economic options.
‘Artificial intelligence’ applications are likely to become the next proving ground for how
smart regulators are. In all, however, the nurturing and preservation of human dignity and
liberty will remain essential – of course.
4
© 2018 Law Business Research Ltd
Chapter 2
William RM Long, Géraldine Scali, Francesca Blythe and Alan Charles Raul 1
I OVERVIEW
In the EU, data protection is principally governed by the EU General Data Protection
Regulation (GDPR),2 which came into force on 25 May 2018 and is applicable in all EU
Member States. The GDPR repeals the Data Protection Directive 95/46/EC,3 regulates
the collection and processing of personal data across all sectors of the EU economy and
introduces new data protection obligations for data controllers and processors alongside new
rights for EU individuals.
The GDPR has created a single EU-wide law on data protection and has empowered
Member State data supervisory authorities (DSAs) with significant enforcement powers,
including the power to impose fines of up to 4 per cent of annual worldwide turnover or €20
million, whichever is greater, on organisations for failure to comply with the data protection
obligations contained in the GDPR.
Set out in this chapter is a summary of the main provisions of the GDPR. We then cover
guidance provided by the EU’s Article 29 Working Party (which has, since 25 May 2018,
been replaced by the European Data Protection Board (EDPB)) on the topical issues of cloud
computing and whistle-blowing hotlines. We conclude by considering the EU’s Network and
Information Security Directive (the NIS Directive).
II THE GDPR
The GDPR imposes a number of obligations on organisations processing the personal data of
individuals in the EU (data subjects). The GDPR also provides several rights to data subjects
in relation to the processing of their personal data.
Failure to comply with the GDPR and Member State data protection laws enacted to
supplement the data protection requirements of the GDPR can amount to a criminal offence
and can result in significant fines and civil claims from data subjects who have suffered as a
result.
1 William RM Long and Alan Charles Raul are partners, Géraldine Scali is a counsel and Francesca Blythe is
an associate at Sidley Austin LLP.
2 Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the
protection of natural persons with regard to the processing of personal data and on the free movement of
such data, and repealing Directive 95/46/EC (General Data Protection Regulation).
3 European Parliament and Council Directive 95/46/EC of 24 October 1995 on the protection of
individuals with regard to the processing of personal data and on the free movement of such data.
5
© 2018 Law Business Research Ltd
European Union Overview
Although the GDPR sets out harmonised data protection standards and principles, the
GDPR grants EU Member States the power to maintain or introduce national provisions to
further specify the application of the GDPR in Member State law.
6
© 2018 Law Business Research Ltd
European Union Overview
g processing: any operation or set of operations performed upon personal data, whether
or not by automated means, such as collection, recording, organisation, structuring,
storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission,
dissemination or otherwise making available, alignment or combination, restriction,
erasure or destruction. This definition is so broad that it covers practically any activity
in relation to personal data.
7
© 2018 Law Business Research Ltd
European Union Overview
e storage limitation principle:11 personal data must be kept in a form that permits
identification of data subjects for no longer than is necessary for the purposes for which
the personal data are processed;
f integrity and confidentiality: personal data must be processed in a manner that ensures
appropriate security of personal data as described below; and
g accountability: the GDPR’s principle of accountability under Article 5(2) of the
GDPR is a central focus of the data protection requirements in the GDPR and requires
controllers to process personal data in accordance with data protection principles found
in the GDPR. Article 24 of the GDPR further provides that controllers implement
appropriate technical and organisational measures to ensure and to be able to
demonstrate that data processing is performed in accordance with the GDPR.
In addition, organisations must carry out a DPIA when using new technologies; and where
the processing is likely to result in a high risk to the rights and freedoms of data subjects.
Article 35(4) of the GDPR requires the DSA to publish a list of activities in relation to
which a DPIA should be carried out. If the controller has appointed a Data Protection Officer
(DPO), the controller should seek the advice of the DPO when carrying outthe DPIA.
Importantly, Article 36(1) of the GDPR states that where the outcome of the DPIA
indicates that the processing involves a high risk, which cannot be mitigated by the controller,
the DSA should be consulted prior to the commencement of the processing.
A DPIA involves balancing the interests of the controller against those of the data
subject. Article 35(7) of the GDPR states that a DPIA should contain at a minimum:
a a description of the processing operations and the purposes, including, where applicable,
the legitimate interests pursued by the controller;
b an assessment of the necessity and proportionality of the processing operations in
relation to the purpose of the processing;
8
© 2018 Law Business Research Ltd
European Union Overview
The Article 29 Working Party (WP29) noted in its guidelines on DPIAs that the reference
to the ‘rights and freedoms’ of data subjects under Article 35 of the GDPR while primarily
concerned with rights to data protection and privacy also includes other fundamental rights
such as freedom of speech, freedom of thought, freedom of movement, prohibition on
discrimination, right to liberty and conscience and religion.12
The WP29 introduced the following nine criteria that should be considered by
controllers when assessing whether their processing operations require a DPIA, owing to
their inherent high risk13 to data subjects rights and freedoms:
a evaluation or scoring, including profiling and predicting, especially from ‘aspects
concerning the data subject’s performance at work, economic situation, health, personal
preferences or interests, reliability or behaviour, location or movements’;
b automated-decision making with legal or similar significant effects – processing that
aims at taking decisions on data subjects producing ‘legal effects concerning the natural
person’ or which ‘similarly significantly affects the natural person’. For example, the
processing may lead to the exclusion or discrimination against data subjects. Processing
with little or no effect on data subjects does not match this specific criterion;
c systematic monitoring – processing used to observe, monitor or control data subjects,
including data collected through networks or ‘a systematic monitoring of a publicly
accessible area’. This type of monitoring is a criterion because the personal data may be
collected in circumstances where data subjects may not be aware of who is collecting
their data and how their data will be used;
d sensitive data or data of a highly personal nature – this includes special categories of
personal data as defined in Article 9 of the GDPR (for example information about
individuals’ political opinions), as well as personal data relating to criminal convictions
or offences as defined in Article 10 of the GDPR. An example would be a hospital
keeping patients’ medical records or a private investigator keeping offenders’ details.
Additionally, beyond the GDPR, there are some categories of data that can be
considered as increasing the possible risk to the rights and freedoms of data subjects.
These personal data are considered as sensitive (as the term is commonly understood)
because they are linked to household and private activities (such as electronic
communications whose confidentiality should be protected), or because they impact
the exercise of a fundamental right (such as location data whose collection questions
the freedom of movement) or because their violation clearly involves serious impacts
in the data subject’s daily life (such as financial data that might be used for payment
fraud);
12 Article 29 Working Party, Guidelines on Data Protection Impact Assessment (DPIA) and determining
whether processing is ‘likely to result in a high risk’ for the purposes of Regulation 2016/679, WP 248, as
last revised and adopted on 4 October 2017, page 6.
13 Article 29 Working Party, Guidelines on Data Protection Impact Assessment (DPIA) and determining
whether processing is ‘likely to result in a high risk’ for the purposes of Regulation 2016/679, WP 248, as
last revised and adopted on 4 October 2017, pages 9–11.
9
© 2018 Law Business Research Ltd
European Union Overview
e data processed on a large scale: the GDPR does not define what constitutes large-scale.
In any event, the WP29 recommends that the following factors, in particular, be
considered when determining whether the processing is carried out on a large scale:
• the number of data subjects concerned, either as a specific number or as a
proportion of the relevant population;
• the volume of data and/or the range of different data items being processed;
• the duration, or permanence, of the data processing activity; and
• the geographical extent of the processing activity.
f matching or combining datasets, for example originating from two or more data
processing operations performed for different purposes or by different controllers in a
way that would exceed the reasonable expectations of the data subject;
g data concerning vulnerable data subjects – the processing of this type of data is a
criterion because of the increased power imbalance between the data subjects and the
data controller, meaning the data subjects may be unable to easily consent to, or oppose,
the processing of their data, or exercise their rights. Vulnerable data subjects may
include children as they can be considered as not able to knowingly and thoughtfully
oppose or consent to the processing of their data and employees; and
h innovative use or applying new technological or organisational solutions, for example,
combining use of finger print and face recognition for improved physical access control.
The GDPR makes it clear that the use of a new technology, defined in ‘accordance with
the achieved state of technological knowledge’ can trigger the need to carry out a DPIA.
This is because the use of such technology can involve novel forms of data collection
and usage, possibly with a high risk to data subjects’ rights and freedoms. Furthermore,
the personal and social consequences of the deployment of a new technology may be
unknown.
When the processing in itself ‘prevents data subjects from exercising a right or using a service
or a contract’. This includes processing operations that aim to allow, modify or refuse data
subjects’ access to a service or entry into a contract. An example of this is where a bank screens
its customers against a credit reference database in order to decide whether to offer them a
loan.
Additionally, the WP29 noted that the mere fact the controller’s obligation to conduct
a DPIA has not been met does not negate its general obligation to implement measures to
appropriately manage risks to the rights and freedoms of the data subject when processing
their personal data.14 In practice, this means controllers are required to continuously assess
the risks created by their processing activities in order to identify when a type of processing is
likely to result in a high risk to the rights and freedoms of the data subject.
The WP29 recommend that as a matter of good practice, controllers should continuously
review and regularly reassess their DPIAs.15
14 Article 29 Data Protection Working Party Guidelines on Data Protection Impact Assessment (DPIA) and
determining whether processing is ‘likely to result in a high risk’ for the purposes of Regulation 2016/679,
WP 248, as last revised and adopted on 4 October 2017, page 6.
15 Article 29 Data Protection Working Party Guidelines on Data Protection Impact Assessment (DPIA) and
determining whether processing is ‘likely to result in a high risk’ for the purposes of Regulation 2016/679,
WP 248, as last revised and adopted on 4 October 2017, page 14.
10
© 2018 Law Business Research Ltd
European Union Overview
DPOs
Article 37 of the GDPR requires both controllers and processors to appoint DPOs where:
a the processing is carried out by a public authority or body, except where courts are
acting in their judicial capacity;
b the core activities of the controller or processor consist of processing operations that,
by virtue of their nature, scope or purpose, require regular and systematic monitoring
of data subjects on a large scale; or
c the core activities of the controller or processor consist of processing on a large scale
special categories of personal data pursuant to Article 9 of the GDPR or personal data
about criminal convictions and offences pursuant to Article 10 of the GDPR.
The WP29, in its guidance on DPOs, note that ‘core activities’ can be considered key
operations16 required to achieve the controller or processor’s objectives. However, it should
not be interpreted as excluding the activities where the processing of personal data forms an
‘inextricable’ part of the controller or processor’s activities. The WP29 provides the example
of the core activity of a hospital being to provide healthcare. However, it cannot provide
healthcare effectively or safely without processing health data, such as patients’ records.17
Any DPO appointed must be appointed on the basis of their professional qualities and
expert knowledge of data protection law and practices.18 The WP29 note personal qualities
of the DPO should include integrity and high professional ethics, with the DPO’s primary
concern being enabling compliance with the GDPR.19
Staff members of the controller or processor may be appointed as a DPO, as can a
third-party consultant. Once the DPO has been appointed, the controller or processor must
provide their contact details to their DSA.20
16 Article 29 Working Party, Guidelines on Data Protection Officers (‘DPOs’), WP 243, as last revised and
adopted on 5 April 2017, page 20.
17 Article 29 Working Party Guidelines on Data Protection Officers (‘DPOs’), WP 243, as last revised and
adopted on 5 April 2017, page 7.
18 Article 37(5) of the GDPR.
19 Article 29 Working Party Guidelines on Data Protection Officers (‘DPOs’), WP 243. as last revised and
adopted on 5 April 2017, page 12.
20 Article 37(7) of the GDPR.
11
© 2018 Law Business Research Ltd
European Union Overview
The GDPR also provides the option, where controllers or processors do not meet the
processing requirements necessary to appoint a DPO, to voluntarily appoint one.23
The WP29 recommends in its guidance on DPOs that even where controllers or
processors come to the conclusion that a DPO is not required to be appointed, the internal
analysis carried out to determine whether or not a DPO should be appointed should be
documented to demonstrate that the relevant factors have been taken into account properly.24
12
© 2018 Law Business Research Ltd
European Union Overview
Personal data that relates to a data subject’s racial or ethnic origin, political opinions, trade
union membership, religious or philosophical beliefs, and the processing of genetic data,
biometric data for the purpose of uniquely identifying a natural person, data concerning
health or data concerning a natural person’s sex life or sexual orientation (sensitive personal
data) can only be processed in more narrowly defined circumstances.26 The circumstances that
are often be most relevant to a business are where the data subject has explicitly consented to
the processing or the processing is necessary for the purposes of carrying out its obligations in
the field of employment and social security and social protection law.
The WP29 state in its guidance on consent, that where controllers intend to rely on
consent as a lawful processing ground, they have a duty to assess whether they will meet all
of the GDPR requirements to obtain valid consent.27 Valid consent under the GDPR is a
clear affirmative act that should be freely given, specific, informed and an unambiguous
indication of the data subject’s agreement to the processing of their personal data. Consent
is not regarded as freely given where the data subject has no genuine or free choice or is
not able to refuse or withdraw consent without facing negative consequences. For example,
where the controller is in a position of power over the data subject, such as an employer, the
employee’s consent is unlikely to be considered freely given or a genuine or free choice, as to
choose to withdraw consent or refuse to give initial consent in the first place could result in
the employee facing consequences detrimental to their employment.
As the WP29 notes, consent can only be an appropriate lawful basis for processing
personal data if the data subject is offered control and a genuine choice with regard to
accepting or declining the terms offered or declining them without negative effects.28 Without
such genuine and free choice, the WP29 notes the data subject’s consent becomes illusory
and consent will be invalid, rendering the processing unlawful.29
Provision of information
Certain information needs to be provided by controllers to data subjects when controllers
collect personal data about them, unless the data subjects already have that information.
Article 13 of the GDPR provides a detailed list of the information required to be provided
to data subjects either at the time the personal data is obtained or immediately thereafter,
including:
a the identity and contact details of the controller (or the controller’s representative);
b the contact details of the DPO, where applicable;
c the purposes of the processing;
d the legal basis for the processing;
e the recipients or categories of recipients of the personal data;
f where the personal data is intended to be transferred to a third country, reference to the
appropriate legal safeguard to lawfully transfer the personal data;
g the period for which the personal data will be stored or where that is not possible, the
criteria used to determine that period;
13
© 2018 Law Business Research Ltd
European Union Overview
h the existence of rights of data subjects to access, correct, restrict and object to the
processing of their personal data;
i the right to lodge a complaint with a DSA; and
j whether the provision of personal data is a statutory or contractual requirement or a
requirement necessary to enter into a contract.
In instances where the personal data are not collected by the controller directly from the data
subject concerned, the controller is expected to provide the above information to the data
subject, in addition to specifying the source of the personal data, within a reasonable time
period after obtaining the personal data, but no later than a month after having received the
personal data or if the personal data is to be used for communication with the data subject,
at the latest, at the time of the first communication to that data subject.30 In cases of indirect
collection, it may also be possible to avoid providing the required information if to do so
would be impossible or involve a disproportionate effort, or if the personal data must remain
confidential subject to an obligation of professional secrecy regulated by Union or Member
State law or obtaining or disclosure of personal data is expressly laid down by Union or
Member State law to which the controller is subject.31
The WP29 notes that in order to ensure the information notices are concise, transparent,
intelligible and easily accessible under Article 12 of the GDPR, controllers should present
the information efficiently and succinctly to prevent the data subjects from experiencing
information fatigue.32
14
© 2018 Law Business Research Ltd
European Union Overview
processor. Under such an agreement, the processor will remain liable for the failure of the
sub-processor to perform its data protection obligations under the agreement between the
processor and the sub-processor.34
Additionally, controllers are required, with the assistance of the processors, where applicable,
to report personal security breaches that are likely to result in a risk to the rights and
freedoms of the data subject, to the relevant DSA without undue delay and, where feasible,
not later than 72 hours after having first become aware of the personal data breach. Where
the processor becomes aware of a personal data breach it is under an obligation to report
the breach to the controller. Upon receiving notice of the breach from the processor, the
controller is then considered aware of the personal data breach and has 72 hours to report the
breach to the relevant DSA.
The WP29 note in its guidance on personal data breaches that the controller should
have internal processes in place that are able to detect and address a personal data breach.36
The WP29 provide the example of using certain technical measures such as data flow and
log analysers to detect any irregularities in processing of personal data by the controller.37
Importantly, the WP29 note that once a breach is detected it should be reported upwards
to the appropriate level of management so it can be addressed and contained effectively.
These measures and reporting mechanisms could, in the view of the WP29, be set out in the
controller’s incident response plans.38
Exceptions
Controllers are exempted from notifying a personal data breach to the relevant DSA if it is
able to demonstrate that the personal data breach is unlikely to result in a risk to the rights
and freedoms of data subjects. In assessing the level of risk, the following factors should be
taken into consideration:
15
© 2018 Law Business Research Ltd
European Union Overview
39 Article 29 Data Protection Working Party Guidelines on Personal Data Breach Notification under
Regulation 2016/679, WP 250, as last revised and adopted on 6 February 2018, page 26.
16
© 2018 Law Business Research Ltd
European Union Overview
40 The EEA consists of the 28 EU Member States together with Iceland, Liechtenstein and Norway.
41 Article 45 of the GDPR.
42 The US–EU Safe Harbor Framework was approved in 2000. Details of the Safe Harbor Agreement
between the EU and the United States can be found in European Commission Decision 520/2000/EC.
43 Judgment of the Court (Grand Chamber) of 6 October 2015 – Maximillian Schrems v. Data Protection
Commissioner.
44 Commission Implementing Decision (EU) 2016/1250 of 12 July 2016.
45 Article 46 of the GDPR.
46 Article 46(2)(c) of the GDPR.
17
© 2018 Law Business Research Ltd
European Union Overview
presumed to be adequately protected. However, model contracts have been widely criticised
as being onerous on the parties. This is because they grant third-party rights to data subjects
to enforce the terms of the model contract against the data exporter and data importer, and
require the parties to the model contract to give broad warranties and indemnities. The clauses
of the model contracts also cannot be varied and model contracts can become impractical
where a large number of data transfers need to be covered by numerous model contracts.
However, the status of model contracts is currently uncertain, as following questions as to
the validity of model contracts from the Irish Data Protection Commissioner, the Irish High
Court has referred the questions to the CJEU for a preliminary ruling to determine the legal
status of model contracts.
An alternative means of authorising transfers of personal data outside the EEA is the
use of binding corporate rules. This approach may be suitable for multinational companies
transferring personal data within the same company, or within a group of companies. Under
the binding corporate rules approach, the company would adopt a group-wide data protection
policy that satisfies certain criteria and, if the rules bind the whole group, then those rules
could be approved by the relevant DSA as providing adequate data protection for transfers
of personal data throughout the group. The WP29 have published various documents47 on
binding corporate rules, including a model checklist for the approval of binding corporate
rules,48 a table setting out the elements and principles to be found in binding corporate rules49
and recommendations on the standard application for approval of controller and processor
binding corporate rules.50
In addition to binding corporate rules and other data transfer solutions, the transfer
of personal data outside of the EEA can occur via the use of approved codes of conduct or
certification mechanisms.
47 WP 133 – Recommendation 1/2007 on the Standard Application for Approval of Binding Corporate Rules
for the Transfer of Personal Data adopted on 10 January 2007.
WP 154 – Working Document setting up a framework for the structure of Binding Corporate Rules
adopted on 24 June 2008.
WP 155 – Working Document on Frequently Asked Questions (FAQs) related to Binding Corporate
Rules adopted on 24 June 2008 and last revised on 8 April 2009.
WP 195 – Working Document 02/2012 setting up a table with the elements and principles to be
found in Processor Binding Corporate Rules adopted on 6 June 2012.
WP 195a – Recommendation 1/2012 on the standard application form for approval of Binding
Corporate Rules for the transfer of personal data for processing activities adopted on 17 September 2012.
WP 204 – Explanatory Document on the Processor Binding Corporate Rules last revised and adopted
on 22 May 2015.
48 WP 108 – Working Document establishing a model checklist application for approval of binding corporate
rules adopted on 14 April 2005.
49 WP 153 – Working Document setting up a table with the elements and principles to be found in binding
corporate rules adopted on 24 June 2008.
50 WP 264 – Recommendation on the Standard Application form for Approval of Controller Binding
Corporate Rules for the Transfer of Personal Data – Adopted on 11 April 2018.
WP 265 – Recommendation on the Standard Application form for Approval of Processor Binding
Corporate Rules for the Transfer of Personal Data – Adopted on 11 April 2018.
18
© 2018 Law Business Research Ltd
European Union Overview
Under the right of access to personal data, the controller is required to provide a copy of the
personal data undergoing processing.
This right is not absolute, but subject to a number of limitations, including the right
to obtain a copy of the personal data shall not adversely affect the rights and freedoms of
others.51 According to Recital 63 of the GDPR, these rights may include trade secrets or other
intellectual property rights. As such, before disclosing information in response to a subject
access request, controllers should first consider whether the disclosure would adversely affect
the rights of any third party’s personal data; and the rights of the controller and in particular,
its intellectual property rights. However, even where such an adverse effect is anticipated,
the controller cannot simply refuse to comply with the access request. Instead, the controller
would need to take steps to remove or redact information that could impact the rights or
freedoms of others.
Where the controller processes a large quantity of the data subject’s personal data, as
would likely be the case in respect of an organisation and its employees, the controller has a
right to request that, before the personal data is delivered, the data subject should specify the
19
© 2018 Law Business Research Ltd
European Union Overview
information or processing activities to which the request relates.52 However, caution should
be exercised when requesting further information from the data subject as it is likely that
under the GDPR a controller will not be permitted to narrow the scope of a request itself.
Where the controller is able to demonstrate that the data subject’s request for access
to the personal data the controller holds is manifestly unfounded or excessive because of
its repetitive nature, the controller can refuse to comply with the data subject’s request.53
However, in the absence of guidance or case law to provide parameters around the scope of
these exemptions, a strict interpretation should be considered for the concept of ‘manifestly
unfounded’ with repetitive requests being documented in order to fulfil the burden of proof
as to their excessive character.
If the controller has reasonable doubts concerning the identity of the data subject
making the access request, the controller can request the provision of additional information
necessary to confirm the identity of the data subject.54
If the controller is able to demonstrate that it is not in a position to identify the data
subject, it can refuse to comply with a data subject’s request to access their personal data.55
20
© 2018 Law Business Research Ltd
European Union Overview
b the data subject withdraws consent to the processing and there is no other legal ground
for the processing;60
c the data subject objects to the processing and there are no overriding legitimate grounds
for the processing;61
d the personal data has been unlawfully processed;62
e the personal data has to be erased for compliance with a legal obligation in Union or
Member State law to which the controller is subject;63 and
f the personal data has been collected in connection with an online service offered to a
child.64
However, the right of erasure is not absolute and is subject to certain restrictions or limitations:
a the data subject’s right of erasure will not apply where the processing is necessary for
exercising the right of freedom and expression and information;
b where complying with a legal obligation which requires processing by Union or
Member State law;
c reasons of public interest in the area of public health in accordance with Article 9(2)(h)
and (i);
d for archiving purposes in the public interest, scientific, historical research or statistical
research purposes;
e for the establishment, exercise or defence of legal claims;
f where the controller is able to demonstrate that the data subject’s request for rectification
of their personal data the controller holds is manifestly unfounded or excessive because
of its repetitive nature, the controller can refuse to comply with the data subject’s
request;65
g where the controller has reasonable doubts concerning the identity of the data subject
making the request, the controller can request the provision of additional information
necessary to confirm the identity of the data subject;66 and
h where the controller is able to demonstrate that it is not in a position to identify the
data subject, it can refuse to comply with a data subject’s request to access their personal
data.67, 68
21
© 2018 Law Business Research Ltd
European Union Overview
b the processing is unlawful and the data subject opposes the erasure of the personal data
and requests restriction of the processing;
c the controller no longer needs the personal data for the purposes of the processing, but
they are required by the data subject for the establishment, exercise or defence of legal
claims; or
d the data subject has objected to the processing pursuant to Article 21(1) of the GDPR,
pending the verification of whether the legitimate grounds of the controller override
those of the data subject.
The right of the data subject to request the restriction of the processing of their personal data
is not absolute and is qualified:
a where the controller is able to demonstrate that the data subject’s request for rectification
of their personal data the controller holds is manifestly unfounded or excessive because
of its repetitive nature, the controller can refuse to comply with the data subject’s
request;69
b where the controller has reasonable doubts concerning the identity of the data subject
making the request, the controller can request the provision of additional information
necessary to confirm the identity of the data subject;70 and
c where the controller is able to demonstrate that it is not in a position to identify the
data subject, it can refuse to comply with a data subject’s request to access their personal
data.71
22
© 2018 Law Business Research Ltd
European Union Overview
The right of the data subject to object to the processing of their personal data is not absolute:
a where the data subject can demonstrate compelling legitimate grounds for the
processing which overrides the interests, rights and freedoms of the data subject or
where the processing is necessary for the establishment, exercise or defence of legal
claims;77 or
b where the processing is necessary for research purposes, there is an exemption to the
right of data subjects to object where the processing is necessary for the performance of
a task carried out for reasons of public interest.78
73 Article 29 Working Party, Guidelines on the right to data portability, WP 242, adopted on
13 December 2016 (as last revised and adopted on 5 April 2017), page 3.
74 Article 29 Working Party, Guidelines on the right to data portability, WP 242, adopted on
13 December 2016 (as last revised and adopted on 5 April 2017), page 10.
75 Article 29 Working Party, Guidelines on the right to data portability, WP 242, adopted on
13 December 2016 (as last revised and adopted on 5 April 2017), page 10.
76 Article 29 Working Party, Guidelines on the right to data portability, WP 242, adopted on
13 December 2016 (as last revised and adopted on 5 April 2017), page 3.
77 Article 21(1) of the GDPR.
78 Article 21(6) of the GDPR.
23
© 2018 Law Business Research Ltd
European Union Overview
In determining whether the processing falls within this scope, the WP29 has published
guidance stating that DSAs will interpret ‘substantially affects’ on a case-by case basis taking
into account:
a the context of the processing;
b the type of data;
c the purpose of the processing and a range of other factors, including, for example,
whether the processing causes, or is likely to cause, damage, loss or distress to data
subjects; or
d involves the processing of a wide range of personal data.
Assuming a controller is engaged in cross-border processing, it will need to carry out the
main establishment test. If a controller has establishments in more than one Member State,
its main establishment will be the place of its ‘central administration’ (which is not defined
in the GDPR) unless this differs from the establishment in which the decisions on the
purposes and means of the processing are made and implemented, in which case the main
establishment will be the latter.79
For processors, the main establishment will also be the place of its central administration.
However, to the extent a processor does not have a place of central administration in the
EU, the main establishment will be where its main processing activities are undertaken. The
WP29 in its guidance on lead supervisory authorities, make it clear that the GDPR does not
24
© 2018 Law Business Research Ltd
European Union Overview
permit ‘forum shopping’80 and that where a company does not have an establishment in the
EU, the one-stop-shop mechanism does not apply and it must deal with DSAs in every EU
Member State in which it is active.81
Importantly under Article 60 of the GDPR, other concerned DSAs can also be involved
in the decision-making for a cross-border case. According to the GDPR, a concerned DSA
will participate where:
a the establishment of the controller or processor subject to the investigation is in the
concerned DSA’s Member State;
b data subjects in the concerned DSA’s Member State are substantially or are likely to be
substantially affected by the processing of the subject of the investigation; or
c a complaint has been lodged with that DSA.82
In the case of a dispute between DSAs, the EDPB shall adopt a final binding decision.83 The
GDPR also promotes cooperation among Member State DSAs by requiring the lead DSA
to submit a draft decision on a case to the concerned DSA, where they will have to reach a
consensus prior to finalising any decision.84
EDPB
The EDPB is an independent EU-wide body, which contributes towards ensuring the
consistent application of the GDPR across all EU Member States, and promotes cooperation
between EU DSAs. The EDPB is comprised of representatives from all EU DSAs, the
European Data Protection Supervisor, the EU’s independent data protection authority, and
a European Commission representative, who has a right to attend EDPB meetings without
voting rights.
Enforcement rights
The GDPR provides data subjects with a multitude of enforcement rights in relation to the
processing of their personal data:
a Right to lodge a complaint with the DSA: Article 77 of the GDPR provides data
subjects with the right to lodge a complaint with a DSA, in the Member State of the
data subject’s habitual residence, place of work or place of the alleged infringement of
the GDPR, where the data subject considers that the processing of his or her personal
data infringes the data protection requirements of the GDPR.
b Right to an effective judicial remedy against a controller or processor: Article 79 of the
GDPR provides data subjects with the right to bring a claim against a controller or a
processor before the courts of the Member State where the controller or processor is
established in, or where the data subject has his or her habitual residence, unless the
controller or processor is a public authority of a Member State acting in the exercise of
its public powers.
80 Article 29 Working Party, Guidelines for identifying a controller or processor’s lead supervisory authority,
WP244, adopted on 13 December 2016 and revised on 5 April 2017, page 8.
81 Article 29 Working Party, Guidelines for identifying a controller or processor’s lead supervisory authority,
WP244, adopted on 13 December 2016 and revised on 5 April 2017, page 10.
82 Article 4(22) of the GDPR.
83 Article 65(1) of the GDPR.
84 Article 60 of the GDPR.
25
© 2018 Law Business Research Ltd
European Union Overview
c Right to compensation and liability: Article 82 of the GDPR provides data subjects
with the right to receive compensation from the controller or processor where the data
subject has suffered material or non-material damage as a result of an infringement of
the GDPR.
Administrative fines
Notably, Article 83 of the GDPR grants DSAs the power to impose substantial fines on
controllers or processors for the infringement of the GDPR. The GDPR provides a two-tier
structure for fines, where the following will result in fines of up to €10 million or 2 per cent
of annual turnover, whichever is greater:
a failure to ensure appropriate technical and organisational measures are adopted when
determining the means of processing the personal data in addition to the actual
processing itself;
b failing to comply with the Article 28(3) of the GDPR, where any processing of personal
data must be governed by a written data processing agreement;
c maintaining records as a controller of all processing activities under its responsibility;
d conducting data protection impact assessments; and
e notifying personal data breaches to the data subject and data supervisory authorities,
respectively.85
The GDPR states that certain infringements of the GDPR merit a higher penalty and will
be subject to higher fines of up to €20 million or 4 per cent of annual turnover, whichever is
the greater.86 These include:
a infringements of the basic principles of processing personal data, including conditions
for obtaining consent;
b failing to comply with data subjects’ rights requests; and
c failing to ensure there are appropriate safeguards for the transfer of personal data
outside the EEA.
These extensive penalties represent a significant change in the field of data protection that
should ensure that businesses and governments take data protection compliance seriously.
DSAs are not limited to enforcement and investigative powers, but also have corrective87 and
authorisation and advisory88 powers.
26
© 2018 Law Business Research Ltd
European Union Overview
27
© 2018 Law Business Research Ltd
European Union Overview
Relevant in the context of health data is Article 9(2)(j) of the GDPR, which includes the
legal ground regarding where the processing is necessary for scientific research purposes. To
rely on this legal ground the processing must comply with Article 89(1) of the GDPR, which
requires that the processing be subject to appropriate safeguards to ensure technical and
organisational measures are in place and in particular, to comply with the principle of data
minimisation.
28
© 2018 Law Business Research Ltd
European Union Overview
The European Commission’s original timetable for the ePrivacy Regulation was for it to
apply from 25 May 2018 and coincide with the coming into force of the GDPR. However,
owing to ongoing political negotiations between the European Council (which represents
EU Member States) and the European Parliament, the ePrivacy Regulation is not expected to
come into force until 2019 at the earliest.
In April 2017, the Article 29 Working Party issued an opinion on the proposed
ePrivacy Regulation, which welcomed some elements of the proposal but also identified areas
of ‘grave concern’, including with regard to cookie tracking walls.100 The EDPB published a
statement on 25 May 2018 noting the ‘widespread’ use of ‘over-the-top’ services, which bypass
traditional forms of distribution such as cable or satellite pay-TV services, for internet-based
29
© 2018 Law Business Research Ltd
European Union Overview
content-distribution services and formed the view that the ePrivacy Regulation ‘should
provide protection for all types of electronic communications, including those carried out by
“Over-the-Top Services”’.101
IV CLOUD COMPUTING
In its guidance on cloud computing adopted on 1 July 2012,102 the EU’s WP29 states
that the majority of data protection risks can be divided into two main categories: lack of
control over the data; and insufficient information regarding the processing operation itself.
The lawfulness of the processing of personal data in the cloud depends on adherence to
the principles of the now repealed EU Data Protection Directive that are considered in the
WP29 opinion, and some of which are summarised below. It would be reasonable to expect
that the EDPB will issue new guidance on cloud computing and data protection to reflect
new requirements under the GDPR. For the purposes of this section, references to the Data
Protection Directive should be read as references to the GDPR.
iii Security104
Under the Data Protection Directive, a data controller must have in place adequate
organisational and technical security measures to protect personal data and should be able to
demonstrate accountability. The WP29 opinion comments on this point, reiterating that it is
of great importance that concrete technical and organisational measures are specified in the
cloud agreement, such as availability, confidentiality, integrity, isolation and portability. As
a consequence, the agreement with the cloud provider should contain a provision to ensure
that the cloud provider and its subcontractors comply with the security measures imposed by
the client. It should also contain a section regarding the assessment of the security measures
101 Statement of the EDPB on the revision of the ePrivacy Regulation and its impact on the protection of
individuals with regard to the privacy and confidentiality of their communications.
102 WP 196 – Opinion 5/2012 on Cloud Computing.
103 Article 6(b) of the Data Protection Directive.
104 Article 17(2) of the Data Protection Directive.
30
© 2018 Law Business Research Ltd
European Union Overview
of the cloud provider. The agreement should also contain an obligation for the cloud provider
to inform the client of any security event. The client should also be able to assess the security
measures put in place by the cloud provider.
iv Subcontractors
The WP29 opinion indicates that sub-processors may only be commissioned on the basis
of a consent that can be generally given by the controller in line with a clear duty for the
processor to inform the controller of any intended changes in this regard, with the controller
retaining at all times the possibility to object to the changes or to terminate the agreement.
There should also be a clear obligation on the cloud provider to name all the subcontractors
commissioned, as well as the location of all data centres where the client’s data can be hosted.
It must also be guaranteed that the cloud provider and all the subcontractors shall act only
on instructions from the client. The agreement should also set out the obligation on the part
of the processor to deal with international transfers, for example, by signing contracts with
sub-processors, based on the EU model contract clauses.
v Erasure of data105
The WP29 opinion states that specifications on the conditions for returning the personal data
or destroying the data once the service is concluded should be contained in the agreement.
It also states that data processors must ensure that personal data are erased securely at the
request of the client.
viii Confidentiality
The WP29 opinion recommends that an agreement with the cloud provider should contain
confidentiality wording that is binding both upon the cloud provider and any of its employees
who may be able to access the data.
31
© 2018 Law Business Research Ltd
European Union Overview
V WHISTLE-BLOWING HOTLINES
The WP29 published an Opinion in 2006 on the application of the EU data protection rules
to whistle-blowing hotlines108 providing various recommendations under the now repealed
Data Protection Directive, which are summarised below. It would be reasonable to expect that
the EDPB will issue new guidance on whistle-blowing hotlines to reflect new requirements
under the GDPR. For the purposes of this section, references to the Data Protection Directive
should be read as references to the GDPR.
108 WP 117 – Opinion 1/2006 on the application of EU data protection rules to internal whistle-blowing
schemes in the fields of accounting, internal accounting controls, auditing matters, fight against bribery,
banking and financial crime.
32
© 2018 Law Business Research Ltd
European Union Overview
be appropriate to limit the number of persons eligible for reporting alleged misconduct
and the number of persons who might be incriminated. However, the recommendations
acknowledged that in both cases the categories of personnel involved may still sometimes
include all employees in the fields of accounting, auditing and financial services.
33
© 2018 Law Business Research Ltd
European Union Overview
Where there is a substantial risk that such notification would jeopardise the ability of the
company to effectively investigate the allegation or gather evidence, then notification to the
incriminated person may be delayed as long as the risk exists.
The whistle-blowing scheme also needs to ensure compliance with the individual’s
right, under the Data Protection Directive, of access to personal data on them and their right
to rectify incorrect, incomplete or outdated data. However, the exercise of these rights may be
restricted to protect the rights of others involved in the scheme and under no circumstances
can the accused person obtain information about the identity of the whistle-blower, except
where the whistle-blower maliciously makes a false statement.
viii Security
The company responsible for the whistle-blowing scheme must take all reasonable technical
and organisational precautions to preserve the security of the data and to protect against
accidental or unlawful destruction or accidental loss and unauthorised disclosure or access.
Where the whistle-blowing scheme is run by an external service provider, the EU data
controller needs to have in place a data processing agreement and must take all appropriate
measures to guarantee the security of the information processed throughout the whole process
and commit themselves to complying with the data protection principles.
34
© 2018 Law Business Research Ltd
European Union Overview
VI E-DISCOVERY
The WP29 has published a working document providing guidance to data controllers in
dealing with requests to transfer personal data to other jurisdictions outside the EEA for use
in civil litigation109 and to help them to reconcile the demands of a litigation process in a
foreign jurisdiction with EU data protection obligations.
The main suggestions and guidelines include the following:
a Possible legal bases for processing personal data as part of a pretrial e-discovery
procedure include consent of the data subject and compliance with a legal obligation.
However, the WP29 states that an obligation imposed by a foreign statute or regulation
may not qualify as a legal obligation by virtue of which data processing in the EU
would be made legitimate. A third possible basis is a legitimate interest pursued by
the data controller or by the third party to whom the data are disclosed where the
legitimate interests are not overridden by the fundamental rights and freedoms of
the data subjects. This involves a balance-of-interest test taking into account issues of
proportionality, the relevance of the personal data to litigation and the consequences
for the data subject.
b Restricting the disclosure of data if possible to anonymised or redacted data as an initial
step and after culling the irrelevant data, disclosing a limited set of personal data as a
second step.
c Notifying individuals in advance of the possible use of their data for litigation purposes
and, where the personal data is actually processed for litigation, notifying the data
subject of the identity of the recipients, the purposes of the processing, the categories
of data concerned and the existence of their rights.
d Where the non-EEA country to which the data will be sent does not provide an
adequate level of data protection, and where the transfer is likely to be a single transfer
of all relevant information, then there would be a possible ground that the transfer is
necessary for the establishment, exercise or defence of a legal claim. Where a significant
amount of data is to be transferred, the WP29 previously suggested the use of binding
corporate rules or the Safe Harbor regime. However, Safe Harbor was found to be
invalid by the CJEU in 2015. The Safe Harbor regime was, however, effectively replaced
on 12 July 2016 by the Privacy Shield. In the absence of any updates from the WP29
to its e-discovery working document, it can be assumed that the use of Privacy Shield is
also an appropriate means of transferring significant amounts of data. It also recognises
that compliance with a request made under the Hague Convention would provide a
formal basis for the transfer of the data.
It would be reasonable to expect that the EDPB will issue new guidance on e-discovery, in
light of the entry into force of Article 48 of the GDPR.
Article 48 of the GDPR facilitates the transfer of personal data from the EU to a third
country on the basis of a judgment of a court or tribunal or any decision of an administrative
authority of a third country where the transfer is based on a mutual legal assistance treaty
(MLAT) between the requesting third country and the EU Member State concerned.110 As
109 WP 158 – Working Document 1/2009 on pretrial discovery for cross-border civil litigation adopted on
11 February 2009.
110 Article 48 of the GDPR.
35
© 2018 Law Business Research Ltd
European Union Overview
MLATs between EU Member States and third countries are not widespread, there is a further
exception for data controllers to rely on. The GDPR states that the restrictive requirements
in which a judicial or administrative request from a third country to transfer personal data
from the EU to that third country is only permissible on the basis of an MLAT, is ‘without
prejudice to other grounds for transfer’ in the GDPR.
Accordingly, this enables data controllers in the EU facing e-discovery requests to
transfer personal data to a jurisdiction outside of the EU to rely on transfer mechanisms such
as EU standard contractual clauses and binding corporate rules. In the absence of a transfer
mechanism, the GDPR provides certain derogations for several specific situations in which
personal data can in fact be transferred outside the EEA:
a where the data subject has explicitly consented to the proposed transfer, after having
been informed of the possible risks of such transfers for the data subject due to the
absence of an adequacy decision and appropriate safeguards;
b the transfer is necessary for the performance of a contract between the data subject and
the controller;
c the transfer is necessary for the conclusion or performance of a contract concluded in
the interest of the data subject;
d the transfer is necessary for important reasons of public interest under EU law or the
law of the Member State in which the controller is subject;
e the transfer is necessary for the establishment, exercise or defence of legal claims;
f the transfer is necessary to protect the vital interests of the data subject, where the data
subject is physically or legally incapable of giving consent; and
g the transfer is made on the basis of compelling legitimate interests of the controller,
provided the transfer is not repetitive and only concerns a limited number of data
subjects.111
36
© 2018 Law Business Research Ltd
European Union Overview
ii Cooperation network
The competent authorities in EU Member States, the European Commission and ENISA
will form a cooperation network to coordinate against risks and incidents affecting network
and information systems.117 The cooperation network will exchange information between
authorities and also provide early warnings on information security risks and incidents, and
agree on a coordinated response in accordance with an EU–NIS cyber-cooperation plan.
Member States had until May 2018 to implement the NIS Directive into their national laws.
37
© 2018 Law Business Research Ltd
European Union Overview
Organisations should review the provisions of the NIS Directive and of any draft or
finalised Member State implementing legislation and begin amending their cybersecurity
practices and procedures to ensure compliance.
VIII OUTLOOK
The past 12 months have seen a number of key developments in the European data protection
world, most notable is the entry into force of the GDPR, described as the most lobbied
piece of European legislation in history, receiving over 4,000 amendments in opinions from
committees in the European Parliament as well as from numerous industries. The EDPB has
begun to issue guidance on aspects of the GDPR. To date, the EDPB has published guidance
on the certification criteria for international data transfers and on Article 48 of the GDPR.
These guidance documents, together with those published by Member State DSAs should
provide businesses with a clearer sense of how to comply with the GDPR in practice.
Data subjects in the EU have made use of the substantial data protection rights provided
by the GDPR at a rapid pace. On the day the GDPR came into force, privacy campaigner
Max Schrems and his non-profit organisation None of Your Business filed four complaints
with two Member State DSAs against two global technology companies for infringing the
data protection requirements of the GDPR, in particular its obligation, when relying on
consent as a lawful processing ground, to obtain informed and specific consent.
Additionally, the adoption of the GDPR was intended to harmonise data protection
laws across all EU Member States. However, there is growing concern over significant national
divergences of data protection laws in EU Member States, in particular with the application
38
© 2018 Law Business Research Ltd
European Union Overview
and interpretation of the GDPR. One area where national divergence of data protection
could cause potential problems, is in the life sciences sector due to the national derogations
in the GDPR that allow Member States to introduce further conditions with regard to the
processing of health data.
A key development in the framework of European data protection and an area to watch
is Brexit and the UK’s departure from the EU on 29 March 2019 and its attempts to agree
on a potential adequacy agreement with the European Commission in relation to the lawful
transfer of personal data from the EEA to the UK. This is because on 29 March 2019, the
UK will become a third country and will face restrictions on any transfer and processing of
personal data of EU data subjects from the EEA to the UK.
39
© 2018 Law Business Research Ltd
Chapter 3
APEC OVERVIEW
I OVERVIEW
The Asia-Pacific Economic Cooperation (APEC) is an organisation of economic entities in
the Asia-Pacific region formed to enhance economic growth and prosperity in the region.
It was established in 1989 by 12 Asia-Pacific economies as an informal ministerial-level
dialogue group. Because APEC is primarily concerned with trade and economic issues, the
criterion for membership is being an economic entity rather than a nation. For this reason,
its members are usually described as ‘APEC member economies’ or ‘APEC economies’. Since
1993, the heads of the member economies have met annually at an APEC Economic Leaders
Meeting, which has since grown to include 21 member economies as of July 2018: Australia,
Brunei, Canada, Chile, China, Hong Kong, Indonesia, Japan, Korea, Malaysia, Mexico, New
Zealand, Papua New Guinea, Peru, the Philippines, Russia, Singapore, Taiwan, Thailand, the
United States and Vietnam.2 Collectively, the 21 member economies account for more than
half of world real GDP in purchasing power parity and over 44 per cent of total world trade.3
The main aim of APEC is to fulfil the goals established in 1994 at the Economic Leaders
Meeting in Bogor, Indonesia of free and open trade and investment in the Asia-Pacific area for
both industrialised and developing economies. APEC established a framework of key areas
of cooperation to facilitate achievement of these ‘Bogor Goals’. These areas, also known as
the three pillars of APEC, are the liberalisation of trade and investment, business facilitation
and economic and technical cooperation. In recognition of the exponential growth and
transformative nature of electronic commerce, and its contribution to economic growth in
the region, APEC established an Electronic Commerce Steering Group (ECSG) in 1999,
which began to work towards the development of consistent legal, regulatory and policy
1 Ellyce R Cooper and Alan Charles Raul are partners at Sidley Austin LLP. The current authors wish to
thank Catherine Valerio Barrad, who was the lead author for the original version of this chapter and made
substantial contributions to prior updates. She was formerly a partner at Sidley and is now university
counsel for San Diego State University. Sheri Porath Rockwell, an associate at Sidley Austin LLP, assisted in
preparing this chapter.
2 The current list of APEC member economies can be found at www.apec.org/About-Us/About-APEC/
Member-Economies.aspx.
3 See www.apec.org/FAQ.
40
© 2018 Law Business Research Ltd
APEC Overview
environments in the Asia-Pacific area.4 It further established the Data Privacy Subgroup
under the ECSG in 2003 to address privacy and other issues identified in the 1998 APEC
Blueprint for Action on Economic Commerce.5
Because of varied domestic privacy laws among the member economies (including
economies at different stages of legislative recognition of privacy), APEC concluded that a
regional agreement that creates a minimum privacy standard would be the optimal mechanism
for facilitating the free flow of data among the member economies (and thus promoting
electronic commerce). The result was the principles-based APEC Privacy Framework, which
was endorsed by the APEC economies in 2005. Although consistent with the original
Organisation for Economic Co-operation and Development (OECD) Guidelines, the APEC
Privacy Framework also provided assistance to member economies in developing data privacy
approaches that would optimise the balance between privacy protection and cross-border
data flows.
Unlike other privacy frameworks, APEC does not impose treaty obligation requirements
on its member economies. Instead, the cooperative process among APEC economies relies
on non-binding commitments, open dialogue and consensus. Member economies undertake
commitments on a voluntary basis. Consistent with this approach, the APEC Privacy
Framework is advisory only and thus has few legal requirements or constraints.
In 2011, APEC implemented the Cross-Border Privacy Rules (CBPR) system, under
which companies trading within the member economies develop their own internal business
rules consistent with the APEC privacy principles to secure cross-border data privacy. In
2015, APEC developed the Privacy Recognition for Processors (PRP) system, a corollary
to the CBPR system for data processors. APEC is also working with the EU to study the
potential interoperability of the APEC and the EU’s new General Data Protection Regulation
(GDPR), building upon the issuance in 2014 of a joint referential document mapping
requirements of APEC and the EU’s former data protection regime.
The APEC Privacy Framework, the CBPR and PRP systems, the cooperative privacy
enforcement system and APEC–EU collaborative efforts are all described in more detail
below.
4 The ECSG was originally established as an APEC senior officials’ special task force, but in 2007 was
realigned to the Committee on Trade and Investment. This realignment underscores the focus within the
ECSG, and its Data Privacy Subgroup, on trade and investment issues.
5 APEC endorsed the Blueprint in 1998 to ‘develop and implement technologies and policies, which build
trust and confidence in safe, secure and reliable communication, information and delivery systems, and
which address issues including privacy’. See APEC Privacy Framework (2005), Paragraph 1 (available at
www.apec.org/Groups/Committee-on-Trade-and-Investment/~/media/Files/Groups/ECSG/05_ecsg_
privacyframewk.ashx).
41
© 2018 Law Business Research Ltd
APEC Overview
regulatory structures to build public confidence in the safety and security of electronic data
flows (including consumers’ personal data) to realise the potential of electronic commerce.
This recognition was the impetus behind the development of the Privacy Framework. Thus,
the APEC objective of protecting informational privacy arises in the context of promoting
trade and investment, rather than primarily to protect basic human rights as in the European
Union.
The APEC Privacy Framework represents a consensus among economies with different
legal systems, cultures and values, and that at the time of endorsement were at different stages
of adoption of domestic privacy laws and regulations. Thus, the Framework provided a basis
for the APEC member economies to acknowledge and implement basic principles of privacy
protection, while still permitting variation among them. It further provides a common basis
on which to address privacy issues in the context of economic growth and development, both
among the member economies and between them and other trading entities. The Privacy
Framework was updated in 2015 to account for the development of new technologies and
developments in the marketplace and to ensure that the free flow of information and data
across borders is balanced with effective data protections.6 While updates were made to
the preamble and commentary sections, the basic principles of the Framework remained
unchanged. Further updates to the Privacy Framework are in the planning stages.7
6 https://www.apec.org/Groups/Committee-on-Trade-and-Investment/Electronic-
Commerce-Steering-Group.aspx.
7 https://www.apec2018png.org/media/press-releases/revise-framework-conducive-for-e-commerce-
environment.
42
© 2018 Law Business Research Ltd
APEC Overview
impede governmental activities within the member economies that are authorised by law,
and thus the principles allow exceptions that will be consistent with particular domestic
circumstances.8 The Framework specifically recognises that there ‘should be flexibility in
implementing these Principles’.9
Principle II – notice
The notice principle addresses the information that a data controller must include in a notice
to individuals when collecting their personal information. It also requires that all reasonable
steps be taken to provide the notice either before or at the time of collection and if not, then
as soon after collection as is reasonably practicable. The principle further provides for an
exception for notice of collection and use of publicly available information.
43
© 2018 Law Business Research Ltd
APEC Overview
Principle V – choice
The choice principle directs that, where appropriate, individuals be provided with mechanisms
to exercise choice in relation to the collection, use and disclosure of their personal information,
with an exception for publicly available information. This principle also contemplates that, in
some instances, consent can be implied or is not necessary.
Principle IX – accountability
This principle requires that a data controller be accountable for complying with measures that
give effect to the nine principles and that, when transferring personal information, it should
take reasonable steps to ensure that the recipients also protect the information in a manner
that is consistent with the principles. This has often been described as the most important
innovation in the APEC Privacy Framework and it has been influential in encouraging other
privacy regulators to consider similar accountability processes tailored to the risks associated
with that specific data.
Unlike other international frameworks, the APEC Privacy Framework neither restricts
the transfer of data to countries without APEC-compliant data protection laws nor requires
such a transfer to countries with APEC-compliant laws. Instead, APEC adopted the
accountability principle in lieu of data import and export limitations as being more consistent
with modern business practices and the stated objectives of the Privacy Framework.
44
© 2018 Law Business Research Ltd
APEC Overview
the member economies to implement it without requiring or proposing any particular means
of doing so. It suggests that there are ‘several options for giving effect to the Framework [. . .]
including legislative, administrative, industry self-regulatory or a combination of these policy
instruments’.11 The Framework advocates ‘having a range of remedies commensurate with the
extent of the actual or potential harm to individuals resulting from [] violations’ and supports
a choice of remedies appropriate to each member economy.12 The Privacy Framework does
not contemplate a central enforcement entity.
Thus, the APEC Privacy Framework contemplates variances in implementation across
member economies. It encourages member economies to share information, surveys and
research and to expand their use of cooperative arrangements (such as the Cross-Border
Privacy Enforcement Arrangement (CPEA (see Section III.iii)) to facilitate cross-border
cooperation in investigation and enforcement.13
45
© 2018 Law Business Research Ltd
APEC Overview
18 https://www.huntonprivacyblog.com/2018/03/08/singapore-joins-the-apec-cbpr-and-prp-systems/
#more-14134 (Australia, the Philippines and Chinese Taipei are actively working to join CBPR and PRP
systems).
19 See www.cbprs.org/Government/GovernmentDetails.aspx.
20 A privacy enforcement authority is ‘any public body that is responsible for enforcing Privacy Law, and that
has powers to conduct investigations or pursue enforcement proceedings’. ‘Privacy Law’ is further defined
as ‘laws and regulations of an APEC Economy, the enforcement of which have the effect of protecting
personal information consistent with the APEC Privacy Framework’. APEC Cross-Border Privacy Rules
System, Policies, Rules and Guidelines, at 10.
21 See cbprs.blob.core.windows.net/files/JOP%20Charter.pdf; and cbprs.blob.core.windows.net/files/
JOP%20Protocols.pdf.
22 See www.cbprs.org/default.aspx.
46
© 2018 Law Business Research Ltd
APEC Overview
b submission of a letter of intent to participate addressed to the chairs of the APEC ECSG,
the Data Privacy Subgroup and the CBPR system Joint Oversight Panel providing:
• confirmation of CPEA participation;
• identification of the APEC CBPR system-recognised accountability agent that
the economy intends to use;
• details regarding relevant domestic laws and regulations, enforcement entities
and enforcement procedures; and
c submission of the APEC CBPR system programme requirements enforcement map.
The Joint Oversight Panel of the CBPR issues a findings report that addresses whether the
economy has met the requirements for becoming an APEC CBPR system participant. An
applicant economy becomes a participant upon the date of a positive findings report.
Accountability agents
The APEC CBPR system uses APEC-recognised accountability agents to review and certify
participating organisations’ privacy policies and practices as compliant with the APEC CBPR
system requirements, including the APEC Privacy Framework. Applicant organisations may
participate in the CBPR system only upon this certification and it is the responsibility of
the relevant accountability agent to undertake certification of an applicant organisation’s
compliance with the programme requirements. An accountability agent makes no
determination as part of the CBPR verification programme regarding whether the applicant
organisation complies with domestic legal obligations that may differ from the CBPR system
requirements.
APEC CBPR system requirements for accountability agents23 include:
a being subject to the jurisdiction of a privacy enforcement authority in an APEC
economy participating in the CBPR system;
b satisfying the accountability agent recognition criteria;24
c agreeing to use the CBPR intake questionnaire to evaluate applicant organisations (or
otherwise demonstrate that propriety procedures meet the baseline requirements of the
CBPR system); and
d completing and signing the signature and contact information form.25
Proposed accountability agents are nominated by an APEC member economy and, following
an application and review process by the Joint Oversight Panel, may be approved by the
ECSG upon recommendation by the Panel. Any APEC member economy may review the
recommendation as to any proposed accountability agent and present objections to the
ECSG. Once an application has been approved by the ECSG, the accountability agent is
deemed ‘recognised’. Complaints about a recognised accountability agent are reviewed by
the Joint Oversight Panel, which has the discretion to request investigative or enforcement
assistance from the relevant privacy enforcement authority in the APEC economy where the
agent is located.
No accountability agent may have an actual or potential conflict of interest, nor may
it provide services to entities it has certified or that have applied for certification. It must
23 http://www.cbprs.org/Agents/CBPRsRequirements.aspx.
24 See cbprs.blob.core.windows.net/files/Accountability%20Agent%20Recognition%20Criteria.pdf.
25 See cbprs.blob.core.windows.net/files/Signature%20and%20Contact%20Information.pdf.
47
© 2018 Law Business Research Ltd
APEC Overview
continue to monitor certified organisations for compliance with the APEC CBPR system
standards and must obtain annual attestations regarding this compliance. It must publish its
certification standards and must promptly report all newly certified entities, as well as any
suspended or terminated entities to the relevant privacy enforcement authorities and the
CBPR Secretariat.
Accountability agents can be either public or private entities and may also be a privacy
enforcement authority. Under certain circumstances, an APEC economy may designate an
accountability agent from another economy.
Accountability agents are responsible for ensuring that any non-compliance is remedied
in a timely fashion and reported, if necessary, to relevant enforcement authorities.
If only one accountability agent operates in an APEC economy and it ceases to
function as an accountability agent for any reason, then the economy’s participation in the
CBPR system will be suspended and all certifications issued by that accountability agent
for businesses will be terminated until the economy once again fulfils the requirements for
participation and the organisations complete another certification process.
The CBPR system website contains a chart of recognised accountability agents, their
contact information, date of recognition, approved APEC economies for certification
purposes and links to relevant documents and programme requirements.26
As of July 2018, the CBPR system recognises two accountability agents: TRUSTe
and the Japan Institute for Promotion of Digital Economy and Community. TRUSTe
is recognised to certify only organisations subject to the jurisdiction of the United States
Federal Trade Commission (FTC). The Japan Institute for Promotion of Digital Economy
and Community (now called JIPDEC) is recognised to certify organisations under the
jurisdiction of the Ministry of Economy, Trade and Industry of the government of Japan.
26 See www.cbprs.org/Agents/AgentDetails.aspx.
27 A current list of APEC-certified organisations can be found at https://cbprs.blob.core.windows.net/files/
Copy%20of%20APEC%20CBPR%20Compliance%20Directory_June2018%20Update_.xlsx.
48
© 2018 Law Business Research Ltd
APEC Overview
PRP system
Because the CBPR system (and the APEC Framework) applies only to data controllers, who
remain responsible for the activities conducted by processors on their behalf, APEC member
economies and data controllers encouraged the development of a mechanism to help identify
qualified and accountable data processors. This led, in 2015, to the APEC PRP programme,
which is a mechanism by which data processors can be certified by an accountability agent.28
This certification can provide assurances to APEC economies and data controllers regarding
the quality and compatibility of the processor’s privacy policies and practices. The PRP does
not change the allocation of responsibility for the processor’s practices to the data controller
and there is no requirement that a controller engage a PRP-recognised processor to comply
with the Framework’s accountability principle.
The Joint Oversight Panel of the CBPR administers the PRP program pursuant to the
Charter of the APEC Cross-Border Privacy Rules and Privacy Recognition for Processors
Systems Joint Oversight Panel and the Protocols of the APEC Joint Oversight Panel with
Regard to the Privacy Recognition for Processors System.29 The rules governing certification
and ongoing accountability closely track the CBPR framework, requiring the Joint Oversight
Panel to engage in a similar evaluative process (e.g., issuing a findings report) as it does for
data controllers pursuant to CBPR rules.30
As of July 2018, two APEC countries have joined the PRP system – the United States
and Singapore – with more expected to follow.31
49
© 2018 Law Business Research Ltd
APEC Overview
Among other things, the CPEA promotes voluntary information sharing and
enforcement by:
a facilitating information sharing among privacy enforcement authorities within APEC
member economies;
b supporting effective cross-border cooperation between privacy enforcement authorities
through enforcement matter referrals and parallel or joint enforcement actions; and
c encouraging cooperation and information sharing with enforcement authorities of
non-APEC member economies.
The CPEA was endorsed by the APEC ministers in 2009 and commenced in 2010 with
five participating economies: Australia, China, Hong Kong China, New Zealand and the
United States. Any privacy enforcement authority from any APEC member economy may
participate and each economy may have more than one participating privacy enforcement
authority. As of July 2018, CPEA participants included over two dozen Privacy Enforcement
Authorities from 10 APEC economies.32
Under the CPEA, any privacy enforcement authority may seek assistance from a privacy
enforcement authority in another APEC economy by making a request for assistance. The
receiving privacy enforcement authority has the discretion to decide whether to provide such
assistance.
Participation in the CPEA is a prerequisite to participation by an APEC economy in the
CBPR system. As a result, each participating APEC economy must identify an appropriate
regulatory authority to serve as the privacy enforcement authority in the CBPR system. That
privacy enforcement authority must be ready to review and investigate a CBPR complaint if
it cannot be resolved by the certified organisation or the relevant accountability agent, and
take whatever enforcement action is necessary and appropriate. As more member economies
join the CBPR system, this enforcement responsibility is likely to become more prominent.
IV INTEROPERABILITY
Given the global nature of personal information flows, APEC’s Data Privacy Subgroup has
been involved in collaborative efforts with other international organisations with the goal of
improving trust and confidence in the protection of personal information and, ultimately,
to enable the associated benefits of electronic commerce to flourish across the APEC region.
While privacy regimes such as the APEC Privacy Framework are drafted at the level of
principles, there are often very significant differences in the legal and policy implementation
of those principles in different economies around the world. In an effort to bridge those
differences and find commonality between the two largest privacy systems, in 2012 APEC
endorsed participation in a working group to study the interoperability of the APEC and EU
data privacy regimes.
In August 2017, the APEC/EU Working Group met to discuss the impact GDPR will
have on their undertaking.33 These discussions followed the working group’s 2014 release of
a document (the Referential) that mapped the CBPR system requirements and rules under
32 https://www.apec.org/Groups/Committee-on-Trade-and-Investment/Electronic-
Commerce-Steering-Group/Cross-border-Privacy-Enforcement-Arrangement.aspx.
33 https://www.apec.org/Groups/Committee-on-Trade-and-Investment/Electronic-
Commerce-Steering-Group/Data-Privacy-Subgroup-Meeting-with-European-Union.
50
© 2018 Law Business Research Ltd
APEC Overview
the EU’s former data protection regime, the EU Data Protection Directive. The Referential
identified common and divergent elements of both systems to help multinational companies
develop global privacy compliance procedures that were compliant with both systems. In its
August 2017 meeting, the Working Group agreed to work to develop a new joint work plan
to update its previous work in light of GDPR, focusing on mechanisms that can be used to
facilitate cross-border data flows and data protection enforcement between the APEC region
and the EU.
34 https://www.mci.gov.sg/~/media/mcicorp/images/budget%20workplan/cos%202018/factsheets/
factsheet%20-%20singapore%20joins%20apec%20cross-border%20privacy%20rules%20and%20
privacy%20recognition%20for%20processors%20systems.pdf?la=en.
35 See In re Very Incognito Tech, Inc, FTC, No. 162 3034, final order, 21 June 2016.
36 www.ftc.gov/news-events/press-releases/2017/02/three-companies-settle-ftc-charges-they-deceived
-consumers-about.
51
© 2018 Law Business Research Ltd
APEC Overview
37 In November 2017, the FTC approved settlements with three companies that deceived consumers by
falsely claiming participation in the EU-US Privacy Shield programme, https://www.ftc.gov/news-events/
press-releases/2017/11/ftc-gives-final-approval-settlements-companies-falsely-claimed.
52
© 2018 Law Business Research Ltd
Chapter 4
ARGENTINA
I OVERVIEW
Data protection was introduced to the Argentine legal system following the 1994
constitutional reform, with the incorporation of the habeas data procedure.2 With this
constitutional reform, data protection rights in Argentina acquired constitutional protection
and, thus, are considered fundamental rights that cannot be suppressed or restricted without
sufficient cause.
In October 2000, Congress passed Law No. 25,326 (the Data Protection Law),
which focused directly on data protection. The Data Protection Law defined several data
protection-related terms and included general principles regarding data collection and
storage, outlining the data owner’s rights and setting out the guidelines for the treatment of
personal data. It is an omnibus law largely based on the EU Data Protection Directive 95/463
in force at that time, and the subsequent local legislation issued by the European countries
(mainly Spain). Moreover, on 30 June 2003, the European Union issued a resolution
establishing that Argentina had a level of protection consistent with the protection granted
by the Directive with respect to personal data. The issuance of the General Data Protection
Regulation (GDPR) might require a reassessment of this recognition.
In 2014, Law No. 26,951 (the Do-Not-Call Law) created the do-not-call registry and
expanded the protection of data owner’s rights. This regulation allows the data owner to block
contact from companies advertising, selling or giving away products and services. Companies
offering products and services by telephonic means must register with the Agency and consult
the list of blocked numbers on a monthly basis before engaging in marketing calls.
On 27 September 2017, the Committee of Ministers of the European Council, assessed
Argentina’s Data Protection regime and accepted the country’s request to be invited to join
the Convention for the Protection of Individuals with regard to Automatic Processing of
Personal Data. As of the date of this publication, the Convention was in process of being
internalised to the local legal framework.
1 Adrián Lucio Furman is a partner and Mercedes de Artaza and Francisco Zappa are associates at M&M
Bomchil.
2 Section 43, Paragraph 3 of the National Constitution states that, ‘Any person can file this action to obtain
access to any data referring to himself or herself, registered in public or private records or databases,
intended to supply information; and in the case of false data or discriminatory data, to request the
suppression, rectification, confidentiality or updating of the same. The secret nature of the source of
journalistic information shall not be impaired.’
3 Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection
of individuals with regard to the processing of personal data and on the free movement of such data.
53
© 2018 Law Business Research Ltd
Argentina
The Agency of Access to Public Information (the Agency)4 is the enforcement authority
in charge of applying the Data Protection Law and the Do-Not-Call Law. Among other
responsibilities, the Agency is in charge of administrating the do-not-call registry, assisting
individuals regarding their rights, receiving claims and carrying out inspections of companies
to assess their compliance with the Data Protection Law.
4 The Agency of Access to Public Information was created by Decree 746 dated 26 September 2017 which
amended the Ministries Law No. 26.951.
5 Section 4 of the Draft.
6 Section 12 of the Draft.
7 Section 12 of the Draft.
54
© 2018 Law Business Research Ltd
Argentina
has granted his or her express consent to the treatment (with the exception of such cases in
which, by law, the granting of such consent is not required); (2) the treatment is necessary:
to protect the vital interest of the data owner and the latter – or its representatives – are
physically or legally unable to provide consent in a timely manner; for the fulfilment of
labour and social security obligations in relation to the data treatment itself or to the data
owner; for the recognition, exercise or defence of rights in a judicial procedure; for historical,
statistical or scientific purposes, in which case dissociation of data must take place; for
public health or sanitary assistance; (3) the treatment is carried out by health institutions
or professionals, foundations, civil associations of non-profit organisations with political,
philosophical, religious or union purposes in connection to their members. The treatment of
sensitive data is also allowed when the data has been made public by the data owner.
Following the Regulation (EU) 2016/679 of the European Parliament and of the
Council, the Draft expressly addresses and regulates the consent given by children or teenagers
for the treatment of their personal data.8 The Draft establishes that such consent shall be
deemed valid when it is applied to the processing of data directly linked to information
services specifically designed and suitable for children or teenagers. Teenagers can grant their
consent from 13 years of age. For children under 13 years old, the treatment of their personal
data shall be considered lawful only if consent is granted by the child’s parent or guardian.
Another relevant addition by the Draft is the inclusion of standard procedures and
relevant guidelines to be followed by data processors in the event of security and data
breaches. In particular, the Draft incorporates the obligation for the person responsible
for the data treatment to document and report data incidents to the data owner and the
enforcement authority with no delay, and preferably within 72 hours of the acknowledgment
of the security breach, unless the breach is unlikely to present a risk to the data owner.9
Regarding the data owner’s rights,10 the Draft extends the scope of the information
to be provided to the data owner when exercising its right of access, stating that the data
owner must be informed of not only the existing data and the purposes of its treatment,
but also, inter alia, (1) the recipients or categories of recipients to whom the personal data
has been or will be transferred; (2) the data owner rights, and (3) the existence of automatic
decision-making processes, including profiling.
Additionally, the right to data portability is incorporated,11 which establishes that
when electronic services that comprise personal data treatment are provided, the data owner
will have the right to obtain from the person responsible a copy of the personal data in a
structured and commonly used format that allows its subsequent use or its direct transference
from responsible entity to responsible entity when it is technically possible.
With respect to users and managers of files, records and databases, specific guidelines
related to proactive responsibility are established:12 among the technical and organisational
measures to be taken, the person responsible for the treatment should include inter alia,
internal or external audits, the adoption of a ‘privacy policy’ or the adherence to binding
55
© 2018 Law Business Research Ltd
Argentina
The main rights for data owners contained in the Data Protection Law are the right of
information, access and suppression: exercising this information right, data owners can
request from the person responsible for the database their personal information that has
been collected, the purpose of the collection and the identity of the person responsible for
it. Additionally, personal data that is totally or partially inaccurate or incomplete should be
deleted and replaced or, if necessary, completed by the file manager when the inaccuracy or
incompleteness of the information is known. Data owners do not have to pay to exercise
these rights. This right of access can be exercised (1) directly, through the person responsible
56
© 2018 Law Business Research Ltd
Argentina
for the database; (2) through the Data Protection Agency; or (3) through the habeas data
procedure. To guarantee these rights, data must be stored in a way that allows the exercise
of the right of access of the owner. Data must be destroyed when it is no longer necessary or
relevant for the purposes for which it was collected.
57
© 2018 Law Business Research Ltd
Argentina
10/2015 regulates the use of closed-circuit television cameras in public spaces. The Disposition
establishes that the use of these cameras is lawful when the data handler has obtained the data
owner’s prior and informed consent. Consent shall be deemed as granted by the data owner
if the data collector includes signs indicating the existence of these cameras, the purpose
of the data collection, the person responsible for the treatment and the relevant contact
information. A template of this sign is included in the Disposition. The relevant database
must be registered and the data collector must implement a manual for its use.
iv Technological innovation
The Data Protection Law has not been amended recently. For that reason, several technological
innovations fall outside its scope.
The use of cookies, for example, was not included in the legislation. Nevertheless,
by application of the Data Protection principles, companies trying to obtain information
through them must obtain the user’s consent to collect information.15
The use of Big Data, on the other hand, presents a much deeper issue. Through Big
Data, companies collect large amounts of information and its different uses are not always
clearly determinable since data is often reused – so violating one of the Data Protection Law’s
main principles, which is specifying to the data owner the purpose of the data collection.
Moreover, data treated must be accurate, true and not excessive in relation to the purpose.
In many cases, it is not possible to assess that all information is accurate. Because of the large
volume of information provided, some of it is bound to be inaccurate.16 The Data Protection
Law has fallen behind in regulating the use of Big Data. The collection of excessive amounts
of information is only of benefit to the user, and regulation of Big Data must recognise this
new and useful way of treating data and always respect the user’s rights.
The Agency has enacted several regulations aimed at reducing the technological gap
generated between the enactment of the Data Protection Law and the present day. For
example, Disposition 10/2015 establishes that companies using closed-circuit television
cameras must implement a policy that includes the means of data collection, a reference to the
place, dates and hours of operation of the cameras, technical and confidentiality mechanisms
to be used, ways of exercising the data owner’s rights and, if applicable, reasons that justify
obtaining a picture of the individuals entering the facilities.
Moreover, Disposition 18/2015 establishes ‘best practice guidelines for data collection
through apps’. In addition to explaining specifically how data protection principles operate
in this matter, the Disposition establishes that the privacy policy should be clear and easily
accessible for users. Moreover, the privacy policy for apps designed for use on phones or
tablets must be shown in a useful way for users, bearing in mind the size restrictions that apply
to these devices. The use of icons, pictures, distinctive colours and sounds is recommended;
extra care is requested when the app is suitable for children or teenagers.
Lastly, Disposition 20/2015 regulates the collection of photos, films, sounds or any
other data in digital format through VANTs or drones .
15 Osvaldo Alfredo Gozaini, Habeas Data, Protection of Personal Data (Rubinzal-Culzoni), p. 325.
16 Luciano Gandola, ‘Conflicts between Big Data and the Data Protection Law’, Infojus.
58
© 2018 Law Business Research Ltd
Argentina
17 See footnote 3.
18 Section 12 of the Data Protection Law.
59
© 2018 Law Business Research Ltd
Argentina
60
© 2018 Law Business Research Ltd
Argentina
companies ample time to adapt to the new legislation and being proactive in responding to
enquiries and explaining misconceptions. Nowadays, 18 years after the enactment of the
Data Protection Law, the Agency is being more proactive in carrying out inspections and is
stricter with its enforcement and punitive capabilities.
The vast majority of recent fines have been for violation of the Do-Not-Call Law,
resulting in a large number of administrative proceedings and claims. Some fines have also
been imposed in the recent past on companies failing to comply with their obligations under
the Data Protection Law (mainly failure to register or renew registrations for their databases
and failure to comply with security measures).
On a judicial level, most of the case law regarding personal data protection is connected
to financial companies and the information they provide to consumer credit reporting
agencies regarding their customers’ debts. In most cases, the proceedings relate to financial
companies’ failure to update their registries once debts have been paid or the statute of
limitations applied.
In this context, the Supreme Court has also stated that the ‘right to be forgotten’ has
constitutional rank and must be respected. These cases have all been filed under the habeas
data regime.
19 Court of Appeals in Civil Matters, Docket No. 8735/2018, Instituto Patria v. IGJ, 24 May 2018.
61
© 2018 Law Business Research Ltd
Argentina
62
© 2018 Law Business Research Ltd
Argentina
X OUTLOOK
The future landscape in Argentina regarding personal data protection includes the almost
certain enactment of a new law, in line with the new technologies that have emerged since
the year 2000.
It is not certain whether the Draft will be sent to Congress and finally passed, but it is
the first stepping stone and is certainly one of the Agency’s objectives. We believe that a new
law, in line with the GDPR, will be enacted within the next two years. In the meantime, many
local companies processing European citizens’ personal data had to adjust their procedures
and processing of personal data to the provisions of the GDPR.
63
© 2018 Law Business Research Ltd
Chapter 5
AUSTRALIA
Michael Morris1
I OVERVIEW
The principal legislation protecting privacy in Australia is the federal Privacy Act 1988 (the
Privacy Act). The Privacy Act establishes 13 Australian privacy principles (APPs), which
regulate the handling of personal information by many private sector organisations and by
federal government agencies.
The body responsible for enforcing the Privacy Act is the Office of the Australian
Information Commissioner (OAIC). In practice, the Information Commissioner (the
Commissioner) is responsible for the majority of the privacy-related functions of the OAIC,
including the investigation of complaints made by individuals.
Substantive amendments to the Privacy Act came into effect on 12 March 2014. In
particular, from that date, substantial monetary penalties (currently, up to A$420,000 for
individuals or A$2.1 million for corporations) can now be imposed for ‘serious’ or ‘repeated’
interferences with the privacy of individuals.
Although this chapter is principally concerned with the Privacy Act, each Australian
state and territory has also passed legislation that protects information held about individuals
by state and territory government organisations.
Privacy also receives some protection through developments to the common law,
particularly developments in the law relating to confidential information.2 However, to
date the Australian courts have not recognised a specific cause of action to protect privacy,
although there has been judicial suggestion that such a development may be open.3
There is no general charter of human rights in Australia,4 and as such there is no general
recognition under Australian law of privacy being a fundamental right.
64
© 2018 Law Business Research Ltd
Australia
5 Available at www.oaic.gov.au/resources/about-us/corporate-information/annual-reports/
oaic-annual-report-201617/oaic-annual-report-2016-17.pdf
6 Section 6D.
7 Section 16 of the Privacy Act.
8 Section 7B(4) of the Privacy Act.
9 Section 7C(1) of the Privacy Act.
10 Section 7B(3) of the Privacy Act.
11 Section 13B of the Privacy Act.
65
© 2018 Law Business Research Ltd
Australia
• philosophical beliefs;
• membership of a professional or trade association;
• membership of a trade union;
• sexual orientation or practices; or
• criminal record;
that is also personal information;
b health information about an individual;
c genetic information about an individual that is not otherwise health information;
d biometric information that is to be used for the purpose of automated biometric
verification or biometric identification; or
e biometric templates.
Generally, an organisation must not collect sensitive information about an individual unless
the individual has consented to the collection and the personal information is reasonably
necessary for one or more of the organisation’s functions or activities. An organisation
may collect sensitive information about an individual without consent in certain limited
circumstances; for example, where collection is required by Australian law.
66
© 2018 Law Business Research Ltd
Australia
Where personal information is not collected directly from the individual, an organisation
must take reasonable steps to make sure the individual is informed of the same matters in
respect of its indirect collection.
In the case of sensitive information, the secondary use or disclosure under item (a) above
must be directly related to the primary purpose.
67
© 2018 Law Business Research Ltd
Australia
68
© 2018 Law Business Research Ltd
Australia
13 Section 7.11, Privacy Guidelines, ‘Chapter 7: Australian Privacy Principle 7 – Direct marketing: Version
1.0, February 2014’ available at www.oaic.gov.au/images/documents/privacy/applying-privacy-law/
app-guidelines/chapter-7-app-guidelines-v1.pdf.
69
© 2018 Law Business Research Ltd
Australia
The consent required by APP 8 has to be an informed consent, and in many cases its
requirements are likely to be difficult to satisfy in practice. Further, in many cases the overseas
recipient will not be subject to a similar overseas law that is enforceable by the individual.
Accordingly, in most cases, the organisation must take ‘reasonable steps’ to ensure that the
overseas recipient does not breach the APPs prior to disclosing that information to the
overseas recipient. The Guidelines indicate that taking reasonable steps usually involves the
organisation obtaining a contractual commitment from the overseas recipient that it will
handle the personal information in accordance with the APPs.
The Commissioner has published in its Guidelines further information as to its expectations
with respect to the contents of the privacy policy.
Aside from the specific obligation to have and maintain a privacy policy, APP 1.2
requires an organisation to take such steps as are reasonable in the circumstances to implement
practices, procedures and systems relating to the organisation’s functions or activities that will
ensure that the organisation complies with the APPs.
This is an overarching obligation applying to organisations in Australia and is generally
understood as requiring organisations in Australia to implement the principles of ‘privacy
by design’. Helpful guidance as to what the Commissioner expects organisations to do to
comply with this general obligation was published by the Commissioner in May 2015.14
14 ‘Privacy management framework: enabling compliance and encouraging good practice’, available at www.
oaic.gov.au/resources/agencies-and-organisations/guides/privacy-management-framework.pdf.
70
© 2018 Law Business Research Ltd
Australia
71
© 2018 Law Business Research Ltd
Australia
Enforceable undertaking from Avid Life Media (ALM) following website attack
One of the enforcement powers available to the Commissioner is to accept an enforceable
undertaking from an organisation it is investigating for breaches of privacy. Such an undertaking
is likely to be offered by the organisation in the course of resolving an investigation by the
Commissioner into its activities. The undertakings are enforceable by the Commissioner in
the Federal Court.
ALM operates a number of adult dating websites, including ‘Ashley Madison’. It is
based in Canada, but its websites have users around the world, including Australia.
In July 2015, a cyber attacker announced the ALM website had been hacked and
threatened to expose the personal information of Ashley Madison users unless ALM shut
down its controversial website. ALM did not agree to the demand and, as a consequence,
information that the hacker claimed was stolen from ALM (including profile information,
account information and billing information from approximately 36 million user accounts)
was published. This prompted the Commissioner and the Office of the Commissioner of
Canada to launch a joint investigation into ALM’s privacy practices.
The OAIC was satisfied that ALM was an organisation with an Australian link as it
carried on business and collected personal information in Australia (despite not having a
physical presence in Australia). The investigation identified a number of contraventions of
the APPs, including with regard to ALM’s practice of indefinite data retention and ALM not
having an appropriate information security framework in place.
The Commissioner accepted an enforceable undertaking from ALM to address the
concerns identified.
72
© 2018 Law Business Research Ltd
Australia
73
© 2018 Law Business Research Ltd
Australia
In coming to the conclusion that the mobile network data was not personal information,
the AAT appears to have been influenced by evidence from Telstra that its mobile network
data were kept separate and distinct from customer databases, rarely linked to these databases
and not ordered or indexed by reference to particular customers.
On 14 January 2016, having considered the AAT’s decision, the Commissioner filed
a notice of appeal from a tribunal to the Federal Court of Australia. The Federal Court
dismissed the Commissioner’s appeal on 19 January 2017. In dismissing the appeal, the
Court confirmed that if information is not ‘about an individual’, the information will not be
personal information and, accordingly, the Privacy Act will not apply.
Enforceable undertaking from the Australian Red Cross following inadvertent disclosure
by a third-party contractor
On 5 September 2016, a file containing personal information of approximately 550,000
individuals was inadvertently posted to a publicly accessible section of the Australian Red
Cross (the Red Cross) website by a third-party contractor. This included ‘personal details’ and
identifying information such as names, gender, addresses and sexual history.
The Red Cross was only made aware of this breach after an unknown individual notified
the Red Cross through multiple intermediaries on 25 October 2016. Upon notification, the
Red Cross took a number of immediate steps to contain the breach. This included notifying
affected individuals, undertaking a risk assessment of the information compromised and
conducting a forensic analysis on the exposed server.
The Commissioner found that the Red Cross did not breach the obligation relating to
unauthorised disclosure of personal information, as it did not disclose personal information,
this was done by a third-party employee. In addition, it was found that although the
Red Cross did not physically hold the personal information, it retained ownership of the
information because of the terms of its contract with the third-party contractor. Because of
its ownership of the personal information, the Red Cross had an obligation to protect this
personal information against unauthorised access or disclosure. The Commissioner concluded
that the Red Cross had breached this obligation by failing to properly assess the adequacy
of its third-party contractor’s security practices and by failing to include control measures to
mitigate the risks of contracting with a third party in its contractual arrangements.
The Red Cross accepted an enforceable undertaking on 28 July 2017 to engage
an independent review of its third-party management policy and standard operating
procedure. The third-party contractor also entered into an enforceable undertaking with the
Commissioner’s office to establish a data breach response plan and update its data protection
policy.
74
© 2018 Law Business Research Ltd
Australia
75
© 2018 Law Business Research Ltd
Australia
X OUTLOOK
On 31 August 2017, the OAIC released its Corporate Plan 2017–2018.21 The Corporate
Plan indicates that the OAIC will focus on the following activities in the coming year:
compliance with the new Notifiable Data Breaches scheme; conducting targeted privacy
audits (assessments) in areas of national security, national health and identity management to
assess organisations’ compliance with the Privacy Act; and the development of an Australian
Public Services Privacy Governance Code.
21 Available at www.oaic.gov.au/resources/about-us/corporate-information/key-documents/
corporate-plan-2017-18.pdf.
76
© 2018 Law Business Research Ltd
Chapter 6
BELGIUM
Steven De Schrijver1
I OVERVIEW
The Belgian legislative and regulatory approach to privacy, data protection and cybersecurity
is quite comprehensive. The most important legal provisions can be found in the following:
a the General Data Protection Regulation 2016/679 (GDPR), which is the EU regulation
on data protection and privacy;
b Article 22 of the Belgian Constitution, which provides that everyone is entitled to the
protection of his or her private and family life;
c the Act of 30 July 2018 on the Protection of Natural Persons with regard to the
Processing of Personal Data (the Data Protection Act)(replacing the former Belgian
Data Protection Act of 8 December 1992 with effect as of 5 September 2018). It
concerns the further implementation of the GDPR and Directive 2016/680 regarding
the processing of data by competent authorities for the purposes of the prevention,
investigation, detection or prosecution of criminal offences;
d the Act of 3 December 2017 on the establishment of the Data Protection Authority;
e Book XII (Law of the Electronic Economy) of the Code of Economic Law, as adopted
by the Act of 15 December 2013;
f the Act of 13 June 2005 on Electronic Communications (the Electronic Communications
Act); and
g the Act of 28 November 2000 on Cybercrime.
77
© 2018 Law Business Research Ltd
Belgium
as the 179th most exposed country of 183 countries, in comparison with 2016, when it was
ranked first, and therefore the most exposed country. However, in 2018 Belgium has risen
to be the 33rd most exposed country of 187 countries. Belgium scores high due to offering
a higher percentage of exposed services in relation to its allocated IP address space. Belgium
scores badly for, among other things, having a larger percentage of unencrypted port systems
for email access. Cybercrime costs Belgium about €3 billion every year.
Furthermore, while the NotPetya ransomware virus did cause some damage within
multinationals in Belgium, the federal cyber-emergency team (CERT) reports that efforts
made after the WannaCry ransomware attack have paid off, as the damage in Belgium was
limited. The responsibilities of the CCB and CERT are discussed further in Section IX.
Belgium is now looking to also improve cybersecurity in the military field, with the Belgian
army recruiting 92 computer experts in 2017, and planning to recruit up to 200, to form a
‘cyber-army’ responsible for protecting possible military targets. In addition, the police units
want to increase the number of cyberspecialists to 700 by 2030.
78
© 2018 Law Business Research Ltd
Belgium
Belgium and the technical impossibility of Skype cooperating was irrelevant because Skype
itself had created this impossibility by organising its operations in the way it did. Skype
has the duty to make sure it is able to comply with its obligations under Belgian law, and
therefore needs to organise itself so it is able to lend its assistance to law enforcement upon
request. Skype lodged an appeal against this judgment with the Court of Appeal of Antwerp,
which followed the Court of First Instance’s reasoning (see Section VI). Skype has filed for
appeal with the Belgian Supreme Court, which is still pending.
79
© 2018 Law Business Research Ltd
Belgium
journalistic purposes and for the purpose of academic, artistic or literary expression, and
additional exceptions for the processing for the purpose for archiving in the public interest or
for scientific or historical research or statistical purposes.
The Belgian legislation set 13 as the age from which children may provide consent for
the use of an information service, lower than the age of 16 set by the GDPR.
Regarding the processing of genetic, biometric and health data, or data related to
criminal convictions and offences, the Belgian legislator has set out measures that must be
taken, such as maintaining a list of persons entitled to consult the data, together with a
description of their functions, related to the processing of such data, which are bound by a
legal or contractual duty of confidentiality. The controller or processor must make a list of
these persons available to the DPA on request. Although the latter obligation is not part of
the GDPR, it existed previously under the Belgian Data Protection Act of 8 December 1992
and its implementing acts. Where applicable, affected entities must implement the new
requirements under the Data Protection Act.
Concerning the processing of criminal data, the Belgian legislator has added additional
grounds to process data, similar as those that had already been provided for in the Belgian
Data Protection Act of 8 December 1992. As with the processing of genetic, biometric and
health data, the persons entitled to consult these data must be designated, bound by a legal
or contractual duty of confidentiality, and a list must be kept at the disposal of the DPA. The
following are additional grounds for processing of criminal data:
a by private companies, if necessary for the management of litigation to which the
company is a party;
b by legal advisers if necessary to defend the interests of a client;
c if necessary for substantial public interest reasons or to perform a task in the public
interest; and
d if necessary for archiving, scientific, historical research or statistical purposes.
The Belgian legislator has also included specific exceptions to data subject rights for processing
for journalistic, academic, artistic or literary purposes, as well as for archiving in the public
interest or for scientific or historical research or statistical purposes. For journalistic, academic,
artistic or literary expression purposes, some of the articles of the GDPR such as consent,
information obligation, right to restrict processing and right to object do not apply. It is
noteworthy that disclosure of the register, personal data breach notifications and the duty to
cooperate with the DPA also does not apply if this would jeopardise an intended publication
or constitute a prior control.
Concerning archiving in the public interest or for scientific or historical research or
statistical purposes, the data subject’s rights are also restricted if these rights would render
it impossible or seriously impair the achievement of these purposes. However, additional
requirements are also imposed, such as an explanation in the records of why these data are
processed, why an exercise of the data subject’s rights would impair the achievement of the
purposes and a justification for the use of data without pseudonymising these data – as well as
if necessary a data processing impact assessment. Data subjects should be informed whether
the data are pseudonymised, as well as why the exercise of their rights would impair the
achievement of the aforementioned purposes.
Belgium-based data controllers and processors should review their data protection
documentation (for example, their privacy notices) to update any references to the Belgian
Data Protection Act of 8 December 1992.
80
© 2018 Law Business Research Ltd
Belgium
The new Data Protection Act consolidates the patchy Belgian data protection regulatory
framework. For example, it incorporates the provisions of the Act of 25 December 2016 on
the processors of passenger data.
In implementing Directive 2016/680 on the processing of personal data by criminal
authorities, the Data Protection Act imposes certain requirements on government entities
that before were hardly affected by the Belgian Data Protection Act of 8 December 1992. For
example, army forces and intelligence and security services must now comply with requests
from data subjects to exercise certain data protection rights, albeit in a restricted fashion.
The processing must comply with the general principles of data processing, which implies
that personal data is to be:
a processed fairly and lawfully in a transparent matter;
b collected for specific, explicit and legitimate purposes, and not processed in a manner
incompatible with those purposes;
c adequate, relevant and not excessive;
d accurate and, where necessary, up to date;
e kept in an identifiable form for no longer than necessary; and
f processed in a manner that ensures appropriate security of the personal data.
Sensitive personal data (i.e., personal data related to racial or ethnic origin, political opinions,
sexual orientation, religious or political beliefs, trade union membership, the processing of
genetic data, biometric data for the purpose of uniquely identifying a natural person, data
concerning health or data concerning a natural person’s sex life or sexual orientation or
judicial information) may only be processed in accordance with the GDPR if the processing:
a is carried out with the data subject’s explicit written consent for one or more specified
purposes;
81
© 2018 Law Business Research Ltd
Belgium
b is necessary for a legal obligation in the field of employment, social security and social
protection law in as far as it is authorised by law providing for appropriate safeguards
for the fundamental rights and interests of the data subject;
c is necessary to protect the vital interests of the data subject where the data subject is
unable (physically or legally) to give consent;
d is carried out in the course of its legitimate activities with appropriate safeguards by
a non-profit body and relates to members of that body or persons who have regular
contact with it and that the personal data are not disclosed outside that body without
the consent of the data subjects;
e relates to data manifestly made public by the data subject;
f is necessary for legal claims;
g is necessary for reasons of substantial public interest, which shall be proportionate to
the aim pursued, respect the essence of the right to data protection and provide for
suitable and specific measures to safeguard the fundamental rights and the interests of
the data subject;
h is necessary for medical reasons;
i is necessary for reasons of public interest in the area of public health on the basis of law
which provides for suitable and specific measures to safeguard the rights and freedoms
of the data subject, in particular professional secrecy; or
j is necessary for archiving purposes in the public interest, scientific or historical research
purposes or statistical purposes based on law which shall be proportionate to the aim
pursued, respect the essence of the right to data protection and provide for suitable
and specific measures to safeguard the fundamental rights and the interests of the data
subject.
Regarding consent, it must be added that parental consent is required for the processing of
personal data concerning information services for children under the age of 13 (as opposed
to the age of 16 in Article 8.1 of the GDPR).
As mentioned before, the new Data Protection Act also further regulates possible
exceptions regarding the processing of the above special categories of data in implementation
of the GDPR.
In practice, however, the ground of legitimate interest is frequently relied upon (rather
than consent) as a ground for processing non-sensitive personal data. It should be noted,
however, that the DPA finds that obtaining the unambiguous consent of the data subject is
best practice and that the legitimate interest condition is only a residual ground for processing.
Except with respect to the processing of sensitive personal data, where consent of the data
subject must be provided in writing, Belgian law does not impose any formalities regarding
obtaining consent to process personal data. Such consent may be express or implied, written
or oral, provided it is freely given, specific and informed. However, as consent should be
unambiguous as well, it is recommended to obtain express and written consent for evidential
purposes.
With respect to the processing of employees’ personal data, the DPA finds that such
processing should be based on legal grounds other than consent, in particular the performance
of a contract with the data subject, since obtaining valid consent from employees is considered
difficult (if not impossible) given their subordinate relationship with the employer.
As far as the data subjects’ right of access, correction and removal is concerned, the
GDPR provides that a data controller must provide a data subject access to his or her data
82
© 2018 Law Business Research Ltd
Belgium
upon request. The data subject has the right to have inaccurate data corrected or deleted and,
in certain cases, he or she may object to decisions being made about him or her based solely
on automatic processing.
Since the GDPR is in effect, data controllers no longer need to notify the DPA of all
types of data processing operations. Instead, they are bound to keep records of their processing
activities. It is now up to the controller to be able to prove that it has obtained consent for its
data processing or has a legitimate reason for doing so under the GDPR.
The DPA has issued a recommendation regarding data processing records to be held in
2017. In this recommendation, the DPA explains that both the controller and the processor
must keep records, regardless of whether they are natural or legal persons, or if they are entities
without legal personality. These records must be made available upon first request. Exceptions
can be made, but these are not absolute. For small entities, the DPA recommends that records
are held in any case, even if they would fall under an exception. The DPA, however, does not
object to the fact that the records do not include occasional, incidental processing of data.
The recommendation further includes additional information regarding the Records, such as
how it relates to the previous notifications, how these notifications can be used as a starting
point for establishing the records, and how the records require a broader registration of data
processing that the old notifications did. Old notifications will remain available online for
one year after the entry into effect of the GDPR on 25 May 2018. The records can be held
in any language, but the DPA may request the data controller or processor to provide them
with a translation in one of the national languages. Therefore, if possible, it is advised to keep
the records in Dutch, French or German in order to avoid additional costs.
A new obligation under the GDPR is also the appointment of a data protection officer
(DPO) in specific cases, such as for public authorities, or when there is large-scale systematic
monitoring of personal data or large-scale processing of sensitive data. On 24 May 2017,
the DPA issued a recommendation to help data controllers and data processors with the
preparation for the implementation of the obligations under the GDPR.
The DPO is not a new concept, as the Directive 95/46/EG did already provide for
member states to foresee in a similar non-obligatory function, the appointment whereof
would exempt the data controller from making a mandatory notification. In the former
Data Protection Act of 1992, however, this function was not linked to an exemption of the
notification, but rather an additional requirement that could be imposed by Royal Decree for
situations where deemed necessary. A general Royal Decree was never issued in this regard,
but specific legislation (such as for specific public databases, the police, and hospitals) did
foresee in a mandatory appointment of a person with such a function.
Under the legislation pre-dating the GDPR, the ‘old’ DPO had a more limited function
and mostly provided its institution or company with advice regarding compliance. Under the
GDPR, the DPO has a much more prominent role, and the DPA considers them to be the
cornerstone of accountability. For this reason, the DPA wishes to distance itself from its older
advice regarding this function, and emphasises that under the GDPR, the appointment of the
appropriate person as a DPO must be investigated separately. In this regard, the appointment
of a DPO for government agencies has been reiterated and further regulated in the Data
Protection Act.
83
© 2018 Law Business Research Ltd
Belgium
Noteworthy in an EU context is the fact that jointly with the entry into force of the
GDPR, the Network and Information Security Directive (the NIS Directive) should have
been transposed into national law by the EU Member States by 25 May 2018. In addition
to the specific data protection rules above, the NIS Directive adds a legal basis for higher
cybersecurity standards in respect of certain ‘essential’ services. The Belgian implementation
of the NIS Directive is currently still being drafted. The Belgian government has finalised its
draft Act, and it is expected that this will soon be presented to the parliament for approval.
Currently, the draft Act will appoint authorised government entities on two different
levels, and with separate functions. A national public entity will be charged with monitoring
compliance and coordination of the implementation of this Act. On a sectoral level, sectoral
authorities will be charged with monitoring compliance for their respective sectors.
The NIS Directive applies in particular to operators of essential services (OESs). OESs
can be found in the following industries:
a energy (electricity, oil and gas);
b transportation (air, rail, water and road);
c banking and financial market infrastructure;
84
© 2018 Law Business Research Ltd
Belgium
To ensure an adequate level of network and information security in these sectors and to
prevent, handle and respond to incidents affecting networks and information systems, the
NIS Directive sets out the following obligations for these OESs:
a the obligation to take appropriate technical and organisational measures to manage the
risks posed to their network and information systems, and to prevent or minimise the
impact in the event of a data breach; and
b the obligation to notify the competent authority, without undue delay, of all incidents
with a ‘significant impact’ on the security of the core services provided by these
operators. To assess the impact of an incident, the following criteria should be taken
into account: (1) the number of users affected; (2) the duration of the incident; (3) the
geographical spread with regard to the area affected by the incident; and (4) in relation
to certain OESs, the disruption of the functioning of the service and the extent of the
impact on economic and societal activities.
The notification obligations, preventive actions and sanctions under the NIS Directive should
increase transparency regarding network and information security and heighten awareness of
cybersecurity risks in the above-mentioned essential services.
The Draft Act foresees in the identification of OES and establishes the safety
requirements both on a national and sectoral level, as well as how this is monitored through
internal and external audits, and sanctions for non-compliance.
Concerning computer security incidents, computer security incident response teams are
established on a national and sectoral level, as well as the procedures regarding the reporting
of safety incidents.
Cookies
The use of cookies is regulated by Article 129 of the Electronic Communications Act. This
must be read in conjunction with the GDPR, which in Article 30 clarifies that if cookies
can be used to identify the user, this constitutes a processing of personal data. The latest
amendment to the Electronic Communications Act provides, in line with the requirements
of the GDPR, that cookies may only be used with the prior explicit consent of the data
subject (i.e., opt-in rather than opt-out consent), who must be informed of the purposes of
the use of the cookies as well as his or her rights under the GDPR and the Data Protection
Act. The consent requirement does not apply to cookies that are strictly necessary for a service
requested by an individual. The user must be allowed to withdraw consent free of charge.
85
© 2018 Law Business Research Ltd
Belgium
On 4 February 2015, the DPA issued an additional draft recommendation on the use of
cookies in which it provided further guidance regarding the type of information that needs to
be provided and the manner in which consent should be obtained. This requires an affirmative
action by the user, who must have a chance to review the cookie policy beforehand. This
policy must detail each category of cookie with their purposes, the categories of information
stored, the retention period, how to delete them and any disclosure of information to third
parties.
According to the DPA, consent cannot be considered validly given by ticking a box in
the browser settings.
In January 2017, the European Commission published the draft text of the new
e-Privacy Regulation, which will become directly applicable in Belgium and replace all the
current national rules relating to, inter alia, cookies after its adoption. Both the European
Parliament and the Council have published their respective drafts. The three EU entities are
now in the middle of their ‘trilogue’ negotiations to determine the final text. The current
draft Regulation would possibly allow consent to be given through browser settings provided
that this consent entails a clear affirmative action from the end user of terminal equipment to
signify his or her freely given, specific, informed and unambiguous consent to the storage and
access of third-party tracking cookies in and from the terminal equipment. This entails that
internet browser providers will have to significantly change the way their browsers function
for consent to be validly given via browser settings.
In addition, the proposal clarifies that no consent has to be obtained for
non-privacy‑intrusive cookies that improve the internet experience (e.g., shopping-cart
history) or cookies used by a website to count the number of visitors. It was initially foreseen
that the e-Privacy Regulation would enter into force simultaneously with the GDPR, but
the negotiations have been postponed. The finalisation of the Regulation is foreseen in 2019,
after which (much like the GDPR) a transitory period will most likely be foreseen before the
Regulation becomes enforceable.
Electronic marketing
Electronic marketing and advertising is regulated by the provisions of Book XII (Law of
the Electronic Economy) of the Code of Economic Law, which has transposed Directive
2002/58/EC of the European Parliament and the Council of 12 July 2002, as adopted by
the Act of 15 December 2013, as well as the Royal Decree of 4 April 2003 providing for
exceptions.
The automated sending of marketing communications by telephone without human
intervention or by fax is prohibited without prior consent.
When a company wants to contact an individual personally by phone (i.e., in a
non-automated manner) for marketing purposes, it should first check whether the individual
is on the ‘do-not-call-me’ list of the non-profit organisation DNCM. Telecom operators
should inform their users about this list and the option to register online. If the individual
is registered on the list, the company should obtain the individual’s specific consent before
contacting him or her.
Furthermore, the proposal for the new e-Privacy Regulation (already referred to above)
in the context of cookie rules) obliges marketing callers to always display their phone number
or use a special prefix that indicates a marketing call. Again, as this is only a draft text, it is not
certain that this obligation will effectively be imposed on marketing callers.
86
© 2018 Law Business Research Ltd
Belgium
Likewise, the use of emails for advertising purposes is prohibited without the prior,
free, specific and informed consent of the addressee pursuant to Section XII.13 of the Code
of Economic Law. This consent can be revoked at any time, without any justification or any
cost for the addressee. The sender must clearly inform the addressee of its right to refuse the
receipt of any future email advertisements and on how to exercise this right using electronic
means. The sender must also be able to prove that the addressee requested the receipt of
electronic advertising. The sending of direct marketing emails does not require consent if they
are sent to a legal entity using ‘impersonal’ electronic contact details (e.g., info@company.
be) which also do not fall within the scope of the GDPR. The use of addresses such as john.
[email protected], which include personal data, however, remains subject to the requirement
for prior consent.
Other exceptions could also apply regarding electronic advertisements, such as for
existing clients to whom advertisements are sent for similar products or services, given that
the client did not object thereto. These exceptions are based on national legislation predating
the GDPR, however. It remains to be seen how the DPA will continue to interpret these
exceptions after 25 May 2018, and whether it believes they comply with the strict criteria for
processing data under the GDPR. We believe it is likely this will remain the case, as the DPA
may accept that they fall under the ‘legitimate interest’ category, for which it has in the past
already accepted that the maintenance of customer relationships could provide a legitimate
interest.
Unless individuals have opted out, direct marketing communications through
alternative means are allowed. Nonetheless, the GDPR prescribes a general obligation for
data controllers to offer data subjects the right to opt out of the processing of their personal
data for direct marketing purposes.
Camera surveillance
On 16 April 2018, the Camera Surveillance Act was amended, both regarding use by law
enforcement and use outside of law enforcement. The changes entered into effect on the
25th of May 2018, the same day that the GDPR entered into force. The changes reflect the
changes to privacy law brought forward by the GDPR. To install camera surveillance, it is
now required that the police, rather than the DPA, be informed. This will take place via an
online application.
The data controller will also need to keep a separate record concerning the processing of
these data. Further details on this record will be determined by Royal Decree.
It is also required for data controllers who install a surveillance camera in ‘publicly
accessible venues’ to indicate the existence thereof with a visible sign in proximity of the
camera, as well as the provision in proximity of the camera of a screen that displays the images
being recorded.
Regarding the scope of the Camera Surveillance Law, a surveillance camera falling
within the scope of this Act is: a fixed (temporarily or permanent) or mobile observation
system, with as purpose to survey and guard certain areas which processes images for this
purpose.
The purpose is further elaborated in Article 3 of the Camera Surveillance Law as being
either of the following:
a prevention, ascertaining or investigation of crimes against persons or goods; or
87
© 2018 Law Business Research Ltd
Belgium
The use of surveillance camera’s regulated by other special legislation or by public authorities
does not fall within the scope of the Camera Surveillance Law. If surveillance cameras are used
merely to monitor the safety, health, protection of the assets of the company and monitoring
of the production process and the labour by the employee, the Camera Surveillance Law is
not applicable. However, if the surveillance camera’s would also be used with as purpose one
of the purposes listen above in accordance with Article 3 of the Camera Surveillance Law, the
Camera Surveillance Law will apply and precede any other legislation.
Employee monitoring
Employee monitoring is strictly regulated under Belgian law. Apart from the rules embedded
in the Camera Surveillance Act of 16 April 2018, which will apply if the surveillance of
employees would fall within its scope as discussed above, the monitoring of employees
by means of surveillance cameras in particular is subject to the provisions of Collective
Bargaining Agreement No. 68 of 16 June 1998. Pursuant to this Agreement, surveillance
cameras are only allowed in the workplace for specific purposes:
a the protection of health and safety;
b the protection of the company’s assets;
c control of the production process; and
d control of the work performed by employees.
In the latter case, monitoring may only be on a temporary basis. Employees must also be
adequately informed of the purposes and the timing of the monitoring.
With respect to monitoring of emails and internet use, Collective Bargaining
Agreement No. 81 of 26 April 2002 imposes strict conditions. Monitoring cannot be carried
out systematically and on an individual basis. A monitoring system of emails and internet
use should be general and collective, which means that it may not enable the identification
of individual employees. The employer is only allowed to proceed with the identification
of the employees concerned if the collective monitoring has unveiled an issue that could
bring damage to the company or threaten the company’s interests or the security of its IT
infrastructure. If the issue only relates to a violation of the internal (internet) policies or
the code of conduct, identification is only allowed after the employees have been informed
of the fact that irregularities have been uncovered and that identification will take place if
irregularities occur again in the future. In 2012, the DPA issued a specific recommendation
on workplace cyber-surveillance. In this regard, the DPA advises employers to encourage
employees to label their private emails as ‘personal’ or to save their personal emails in a folder
marked as private. Furthermore, companies should appoint a neutral party to review a former
or absent employee’s emails and assess whether certain emails are of a professional nature and
should be communicated to the employer.
Finally, GPS monitoring in company cars is only allowed under Belgian law with
respect to the use of the company car for professional reasons. Private use of the company car
(i.e., journeys to and from the workplace and use during private time) cannot be monitored.
88
© 2018 Law Business Research Ltd
Belgium
89
© 2018 Law Business Research Ltd
Belgium
a policy sometimes also includes rules on email and internet use. Some companies include
the privacy and data protection information in their work regulations. This is the document
that each company must have by law and that sets out the respective rights and obligations of
workers and employers. The work regulations also provide workers with information about
how the company or institution employing them works and how work is organised.
The appointment of a chief privacy officer is not very common in Belgium, except
within large (and mostly multinational) corporations. Such corporations often also have
regional privacy officers. In smaller companies, the appointment of a chief privacy officer
is rare. However, given the increasing importance of privacy and data security, even smaller
companies often have employees at management level in charge of data privacy compliance
(often combined with other tasks). Of course, with the GDPR, this will become different as
for many companies it will now be required to appoint a Data Protection Officer (see above).
The GDPR contains an obligation to conduct a data protection impact assessment
(DPIA) for high-risk data processing activities. The DPA has taken the liberty of issuing
recommendations on the DPIA requirement of the GDPR. In addition to the non-exhaustive
list of processing activities as envisaged by the GDPR (i.e., any processing that entails a
systematic and extensive evaluation of personal aspects that produce legal effects; any
processing on a large scale of special categories of data; and any systematic monitoring of
a publicly accessible area on a large scale), the DPA clarifies its position on what qualifies
as high risk, when a DPIA must be conducted, what it should entail and when it should be
notified of the results of a DPIA. The main takeaway of the DPA’s statement is that it should
only be notified of processing activities where the residual risk (i.e., the risk after mitigating
measures have been taken by the controller) remains high. Whether the DPA’s position will
be supported at EU level remains to be seen, since the interpretation of DPIA methodologies
is in principle an EU-level matter.
A substantial number of companies have conducted privacy audits certainly now
in view of the implementation of the GDPR to get a clear view on their data flows and
security measures. These audits have often resulted in the implementation of overall privacy
compliance projects, including the review and update of IT infrastructure, the conclusion
of data transfer agreements or adoption of BCRs and the review and update of existing data
processing agreements with third parties.
In large organisations, it is considered best practice to have written information security
plans. Although this is also not required by law, it proves very useful, as companies are
required to present a list of existing security measures when they notify their data processing
operations to the DPA. The DPA has also recommended that companies have appropriate
information security policies to avoid or address data security incidents. This has become
even more important now in view of the short deadlines for data breach notifications under
the GDPR.
On 14 June 2017, the DPA published a recommendation on processing-activity
record-keeping as discussed above. As from the entry into force of the GDPR in 2018,
organisations processing personal data within the EU must maintain Records of their
processing activities. Organisations with fewer than 250 employees are exempted from
keeping such records, unless their processing activities:
a are likely to result in a risk to the rights and freedoms of data subjects (e.g., automated
decision-making);
b are not occasional; or
c include sensitive data.
90
© 2018 Law Business Research Ltd
Belgium
91
© 2018 Law Business Research Ltd
Belgium
the ‘service’ it offers can be used in Belgium via the internet. It also stated that the fact
that the public prosecutor sent the request to disclose personal data directly to Yahoo! in
the United States (without making use of the procedures set out in the applicable treaties
regarding mutual legal assistance in criminal matters) did not make the request invalid or
unenforceable.
This latter decision essentially implies that foreign entities offering an online service
(or software) are subject to Belgian criminal law as soon as the software service can be
used in Belgium, and that the Belgian public prosecutor has the power to enforce Belgian
criminal law against such foreign entities without the intervention or assistance of the judicial
authorities of the state of residence of these entities. Obviously, this position taken by the
Supreme Court would also imply that foreign judicial authorities could enforce their national
criminal law against service providers located in Belgium and do so without assistance from
the Belgian courts.
Finally, on 1 December 2015, the Supreme Court put an end to the legal proceedings
by rejecting the appeal, thereby confirming the Court of Appeal’s decision, which has caused
important implications for the international system of mutual legal assistance in criminal
matters.
Analogously, the Court of First Instance of Mechelen condemned Skype
Communications SARL, a Luxembourg-based entity, for refusing to set up a wiretap in
Mechelen in its ruling of 27 October 2016. The wiretap concerned was ordered by the
Mechelen examining judge in the framework of an investigation into a Skype user. Again,
the Belgian authorities ignored the European Convention on Mutual Assistance in Criminal
Matters and imposed the wiretap order directly on Skype in Luxembourg. The Court of
Mechelen applied a similar reasoning to that applied by the Supreme Court in the Yahoo!
case and held that the alleged offence, namely the refusal to provide technical assistance, can
be deemed to have occurred in the place where the information should have been received,
regardless of where the operator was established.
Notably, the context of the Skype case is quite different from the situation in the Yahoo!
case. While the Yahoo! case involved the mere refusal to disclose information to the Belgian
authorities (Section 46 bis Section 1 of the Belgian Code of Criminal Procedure), the Skype
case concerns the provision of metadata and the refusal to set up a wiretap (Article 88 bis
Section 2 and Article 90 quater Section 2 of the Belgian Code of Criminal Procedure).
The latter is undeniably a completely different type of measure, encompassing not only
the provision of information, but also material acts by Skype and the necessary technical
infrastructure to perform them, which Skype did not have in Belgium. Unsurprisingly, Skype
appealed against this judgment before the Court of Appeal of Antwerp, but the Court of
Appeal confirmed the judgment by the Court of First Instance of Mechelen. Notably, the
Court confirmed the fact that Skype has the duty to make sure it has the necessary technical
infrastructure to perform the measures requested (the wiretap), even if this would result in
a large cost for Skype. Skype appealed against this judgment before the Belgian Supreme
Court. This appeal is currently still pending.
92
© 2018 Law Business Research Ltd
Belgium
The DPA’s mission is, inter alia, to monitor compliance with the provisions of the
GDPR and the Data Protection Act. To this end, the DPA has general power of investigation
with respect to any type of processing of personal data and may file a criminal complaint with
the public prosecutor. It may also institute a civil action before the president of the court of
first instance. Whereas this is where the scope of authority ended for the original Privacy
Commission, the reformed DPA (in light of the GDPR) is an independent administrative
authority with legal personality and extensive investigative and sanctioning powers, composed
of six different bodies: an executive committee, a general secretariat, a front-line service, a
knowledge centre, an inspection service and a dispute chamber.
The executive committee, composed of the leaders of the five other bodies, is responsible
for the adoption of the DPA’s general policies and strategic plan.
A general secretariat is responsible for the reception and processing of complaints and
to inform citizens about their data protection rights.
The inspection service functions as the investigating body of the DPA, with a wide
array of investigative powers (e.g., interrogation of individuals).
The front-line service has a singular role in providing guidance (e.g., with regard to
adequate data protection techniques under the GDPR) and supervising data controllers and
processors and their compliance with data protection legislation.
Led by six experts in the field, the knowledge centre provides public decision-makers
with the necessary expertise to understand the technologies likely to impact on the processing
of personal data.
The dispute chamber, composed of a president and six judges, is able to impose
sanctions of up to €20 million or up to 4 per cent of the total worldwide annual turnover of
the infringing company.
As well as the above-mentioned bodies being established under the auspices of the
reformed DPA, an independent think tank is set up to reflect society as a whole, both
participants in the creation of the digital world and those affected by it, and to provide the
executive committee with a broad vision and guidance as it negotiates current and future data
protection challenges.
Another novelty of the new DPA is that, along with natural persons, legal persons,
associations or institutions will also be able to lodge a complaint of an alleged data protection
infringement.
In spite of the expansion of the DPA’s powers, the government had initially announced
not to increase its budget. However, it has been reported that the government has put aside
€1.6 million for the new DPA to be able to perform its new tasks.
While the new DPA with its new bodies had to be fully functional from 25 May 2018,
it ran into some difficulties concerning the nomination of its members. Until this is
completed, the new DPA will continue to be headed by its former management, but with all
new competences and functions.
93
© 2018 Law Business Research Ltd
Belgium
The European Court of Justice recently concurred in its judgement in Case C‑210/162
with Advocate General Bot and in its judgment stated that the promotion and sale of
advertising space by Facebook Germany was inextricably linked to the contested data
processing, and therefore German law is applicable. In his non-binding opinion, Advocate
General Bot had stated in 2017 that Facebook should indeed adhere to the national privacy
rules of EU Member States if it collects and processes data from users in those Member
States and has a physical establishment (e.g., a sales office) on their territory. Hence, the
advocate general opposed Facebook’s argument that it should comply only with Ireland’s
privacy legislation, the country where it has its European headquarters.
In addition to the Facebook case, the most important enforcement cases before the
Belgian courts are the Yahoo! and Skype cases, discussed in Sections II and VI.
94
© 2018 Law Business Research Ltd
Belgium
would have jurisdiction over foreign entities providing online services or software to users in
Belgium, even if they are not present in Belgium. This is certainly an issue to follow up, as it
may have an important impact on the territorial scope of application of Belgian law.
It should be noted that the GDPR applies to data controllers having no presence at
all (establishment, assets, legal representative, etc.) in the EU but who process EU citizens’
personal data in connection with goods or services offered to those EU citizens; or who
monitor the behaviour of individuals within the EU.
Since becoming operational at the end of 2015, the CCB has carried out several awareness
campaigns; for instance, in the context of the Petya ransomware cyberattacks and the ‘CEO
fraud’ (a large-scale scam where cybercriminals contact a company as the alleged CEO of
another big company with a request to make an important payment into the first company’s
bank account).
Furthermore, the management of CERT, which has been in the hands of Belnet since
2009, was transferred to the CCB in December 2016. The transfer of all CERT activities
is part of the continuing coordination of Belgian cybersecurity and is aimed at assisting
companies and organisations in the event of cyber incidents by providing advice both about
finding solutions when such incidents arise and about preventing incidents occurring.
Additionally, the Belgian Cyber Security Coalition, which is a partnership between
parties from the academic world, public authorities and the private sector, was established in
October 2014. Currently, more than 50 key participants from across the three sectors are active
members. These include large financial institutions, universities, consultancy companies,
professional organisations and government bodies. The main goals of the Coalition are to
raise awareness about cybersecurity, exchange know-how, take collective actions in the fight
against cybercrime and support governmental and sectoral bodies in setting policies and
determining ways to implement these policies.
With respect to data breach notifications, Article 114/1, Section 2 of the Electronic
Communications Act requires companies in the telecommunications sector to notify
immediately (within 24 hours) personal data breaches to the DPA, which must transmit a
copy of the notification to the Belgian Institute for Postal Services and Telecommunications.
If there is a breach of personal data or the privacy of individuals, the company must also
95
© 2018 Law Business Research Ltd
Belgium
notify the data subjects affected by the breach. It is expected that the Belgian implementation
of the NIS-Directive will provide for a detailed procedure regarding breaches for operators of
essential services (see above).
The Belgian Data Protection Act of 8 December 1992 did not, however, provide for
a general data breach notification obligation, as is provided for in the GDPR. In 2013, the
DPA was confronted by a series of data security incidents of which it only became aware after
those incidents were published in the media. Unable to change the legislation itself (which,
of course, would require legislative intervention), the DPA issued a recommendation upon
its own initiative stating that it considered data breach notifications to be an inherent part of
the general security obligations incumbent on any data controller.
With the entry into force of the GDPR, Article 33 of the GDPR now provides for
a duty for the data controller to report personal data breaches to the DPA without undue
delay, and where feasible, not later than 72 hours after having become aware of it. This
notification must describe the nature, communicate the details of the DPO or other contacts
where more information can be obtained, describe the likely consequences of the breach and
describe the measures taken or proposed to be taken by the controller to address the breach.
A communication can in some cases also be necessary to the data subject, if there is a high
risk to their the rights and freedoms. It must be noted that the DPA’s recommendation also
stresses that, in the event of public incidents, the DPA must be informed within 48 hours of
the causes and damage. Although the concept of a ‘public incident’ is not explained in greater
detail, this could refer to an incident in which a breach has occurred that is likely to become
known to the public or the DPA via, for example, the media, the internet, or complaints
from individuals.
In relation to data security, the International Chamber of Commerce in Belgium
and the Federation of Enterprises in Belgium, together with the B-CCentre, have taken
the initiative to create the Belgian Cyber Security Guide in cooperation with Ernst &
Young and Microsoft. The Guide is aimed at helping companies protect themselves against
cybercriminality and data breaches. To that effect, it has listed 10 key security principles
and 10 ‘must do’ actions, including user education, protecting and restricting access to
information, keeping IT systems up to date, using safe passwords, enforcing safe-surfing
rules, applying a layered approach to viruses and other malware, and making and checking
backup copies of business data and information.
X OUTLOOK
With regard to the entry into force of the GDPR this year, the overall focus of the DPA
will obviously be on assisting companies, data controllers and data processors with the
implementation of this new EU data protection framework. To this end, the DPA had
launched a new separate section dedicated to the GDPR on its website and a 13-step plan
for companies involved in data collection or processing, or both, to help them comply
with the forthcoming new rules of the GDPR. That said, months after the entry into force
of the GDPR, its website, containing many specific guidelines regarding data protection
compliance, still has not been fully updated to reflect the changes made by the GDPR.
Apart from the strengthening of the investigative and sanctioning powers of the DPA
(see Section VII), we do not expect the GDPR to result in any major changes to the Belgian
96
© 2018 Law Business Research Ltd
Belgium
situation in practice. Belgium’s legislation and the interpretation given to it by the DPA have
traditionally been in line with EU law and the positions of the European Commission and
the Article 29 Working Party (now the European Data Protection Board).
As mentioned above (see Section VII), the investigative and sanctioning powers of the
DPA will be significantly expanded under the GDPR. In the event of a complaint being lodged
with the DPA or of a data breach incident, it will have broader competence to examine the
complaint and to impose higher sanctions on the alleged violator. In its assessment of alleged
data protection violations, the DPA will definitely check whether sufficient efforts have been
made to meet the requirements laid down in the GDPR. Therefore, actual enforcement of
data protection legislation may now become more frequent, although it remains to be seen
which resources the DPA will have available to actually enforce compliance with the GDPR.
Other than the GDPR, upcoming legislation includes the implementation of the
NIS-Directive, meaning that Belgium may obtain a more structured landscape as regards
cybersecurity and continuity of essential services. Upcoming European legislation also
includes the e-Privacy legislation, which will override the GDPR and provide for more
clarity regarding specific issues that may arise concerning privacy in connection with online
interactions.
97
© 2018 Law Business Research Ltd
Chapter 7
BRAZIL
I OVERVIEW
The Brazilian Federal Constitution guarantees privacy protection as a fundamental right of
all individuals. The Brazilian Civil Code, the Consumer Protection Code, the Information
Access Act, the Banking Secrecy Act, the Wiretap Act and the Internet Act are the main
statutes governing the processing of personal data, although such statutes apply in specific
circumstances, such as in a consumer relationship, in case of data collected online, in case of
data controlled by the government, etc.
After years of legislative process, the Brazilian Congress finally approved and the
President enacted Law 13,709, of 14 August 2018, the Brazilian Data Protection Law
(LGPD). The LGPD was significantly inspired by the General Data Protection Regulation
(GDPR) of the European Union. The LGPD establishes detailed rules for the collection,
use, processing and storage of personal data in Brazil. This statute is applicable to private
and public entities in all economic sectors, both in the digital and physical environment.
The LGPD will become effective on 16 February 2020. While the final text of the LGPD
approved by Congress provided for the creation of the National Data Protection Authority
(DPA), the President vetoed the creation of such entity owing to a flaw in the legislative
process. Under Brazil Federal Constitution, the creation of independent regulatory agencies
and public functions can only be made by means of a bill submitted to Congress by the
President. In the original bill on data protection submitted by the President through the
Ministry of Justice, the DPA was not actually created. If the creation of the DPA had not
been vetoed by the President, an important constitutional debate would have taken place and
the authority of the DPA would have been disputed. It is expected that the President will
send another draft bill to the Congress in order to correct the flaw, and allow for the DPA to
be properly established as it comes into effect.
Until then, the Public Prosecutor’s Office, the Ministry of Justice, consumer protection
authorities (such as the Consumer Protection and Defence Authority (PROCON)) and
sector-specific regulatory agencies (such as the Brazilian Central Bank, the Brazilian Securities
and Exchange Commission, among others) are handling matters of potential violations
of privacy rights in Brazil. Among such authorities, the Federal Prosecutors of the Federal
District created a data privacy division, which has turned out to be the most proactive body
in prosecuting companies in connection with potential data privacy violations.
1 Fabio Ferreira Kujawski is a partner and Alan Campos Elias Thomaz is an associate at Mattos Filho, Veiga
Filho, Marrey Jr e Quiroga Advogados.
98
© 2018 Law Business Research Ltd
Brazil
2 The LGPD is not applicable to processing activities (1) performed by natural persons, exclusively for
private and non-economic purposes; (2) for journalistic, artistic and academic purposes; (3) for public and
state security, and national defence purposes; (4) for investigation and prosecution of criminal offences; and
(5) for data transiting through Brazil, without any processing in the country.
99
© 2018 Law Business Research Ltd
Brazil
processing (i.e., digital or nor) and where the processor is headquartered, provided that the
processing is carried out in Brazil; the processing relates to the offer or supply of goods or
services in Brazil; or the data was collected in Brazil.
Under the LGPD, personal data is defined as ‘information related to an identified
or identifiable natural person’. Any processing activity shall be made in accordance with
the principles set forth therein3 and based on one or more of following legal bases for data
processing provided for in such law:
a consent;
b compliance with a legal or regulatory obligation;
c when necessary for the performance of a contract or preliminary procedures related to
contract of which the data subject is a party, at the request of the data subject;
d when necessary to meet the legitimate interest of the data controller or third parties;
e regular exercise of rights in judicial, administrative or arbitral proceedings;
f protection of the life or physical safety of the data subject or third party;
g protection of health, in proceedings carried out by health professionals or by health
entities;
h by research bodies, to carry out studies, guaranteed, whenever possible, the
anonymisation of personal data;
i by the public administration, for the execution of public policies; and
j protection of credit.
The LGDP draws a distinction between personal data and sensitive data and imposes a higher
bar for allowing processing of this kind of data.4 Sensitive data shall mean any information
related to a data subject concerning racial or ethnic origin, religious beliefs, political opinions,
membership of trade unions or religious, philosophical or political organisations, health,
sexual life, genetics or biometrics.
When relying on consent, the LGPD imposes specific requirements. So, the consent
shall be prior, free, informed and unequivocal. For sensitive data, in addition to such
requirements, the consent must be specific and given separately from other consents.
3 The principles of the LGPD are as follows: free access (free and easy consultation of data processing
activities and their duration); transparency (clear, accurate and easily accessible information); purpose
(processing must be carried out for legitimate, specific, explicit and stated purposes, and no further
processing shall take place when incompatible with such purposes); adequacy (processing shall be
compatible with the stated purpose); data quality (assurance that the data is accurate, clear, relevant and up
to date); data minimisation or necessity (processing shall be limited to the minimum information necessary
to achieve its purpose, using relevant, proportional and not excessive data); security (use of technical and
administrative measures capable of protecting personal data from unauthorised access and from accidental
or unlawful events of destruction, loss, alteration, communication or dissemination); prevention (adoption
of measures to prevent the occurrence of damages); non-discrimination (processing should not be unlawful
or discriminatory); accountability (demonstration of effective measures for complying with the rules);
4 The lawful bases for processing sensitive data include: (1) consent; (2) compliance with a legal or regulatory
obligation; (3) regular exercise of rights, including in contract and in judicial, administrative and arbitral
proceedings; (4) protection of life or physical safety of the data subject or third party; (5) protection
of health, in proceedings carried out by health professionals or by health entities; (6) when necessary
to guarantee the prevention of fraud and safety of the data subject, in the process of identification and
authentication in registries of electronic systems; (7) by the public administration, for shared processing
of data necessary for the performance of public policies set forth in law or regulation; and (8) by research
bodies, to carry out studies, guaranteed, wherever possible, the anonymisation of data.
100
© 2018 Law Business Research Ltd
Brazil
Several other rights have been granted to data subjects, such as the right to obtain
information regarding the processing of data, right to access, to rectify and erase data, right
to withdraw the consent, to receive information to whom the data has been shared, the right
to data portability and the right to obtain the review of automated decisions.
The new law also provides for limitations to international data transfers as further
detailed below. The LGPD also contemplates data incident reporting obligations (see
Section IX below).
Anonymised data is out of the realm of the LGPD. Anonymised data was defined as a
data of an individual who cannot be identified, using reasonable technical means available at
the time the processing takes place.
Other statutes dealing with the processing of personal data, such as the Consumer
Protection Code, the Wiretap Act, the Banking Secrecy Act, the Information Access Act
and the Internet Act shall continue to apply, to the extent that they do not conflict with the
LGPD.
5 In the GDPR, ‘controller’ means the natural or legal person, public authority, agency or other body which,
alone or jointly with others, determines the purposes and means of the processing of personal data; where
the purposes and means of such processing are determined by Union or Member State law, the controller or
the specific criteria for its nomination may be provided for by Union or Member State law; and ‘processor’
means a natural or legal person, public authority, agency or other body which processes personal data on
behalf of the controller.
6 Data incident may be considered as ‘unauthorised access and from accidental or unlawful destructions,
loss, change, communications, transmission, or any other occurrence resulting from inadequate or illegal
processing’.
101
© 2018 Law Business Research Ltd
Brazil
incidents to the DPA and, in some cases, to the affected data subjects; (4) perform privacy
impact assessments (where required by the DPA); and (5) appoint a data protection officer,
who will be in charge of handling personal data within the organisation.
In addition, data controllers shall make easily accessible to the data subject a fairly
detailed privacy notice, stating clear, adequate and ostensive information on the purposes
of the data processing; form and duration of the data processing; contact information of
the controller; information regarding the shared use of personal data by the controller;
responsibilities of the processing agents; and data subjects’ rights.
If the privacy notice is drafted in such a way as to significantly reduce the privacy rights
recognised by law, there is a chance that it shall be deemed invalid. Even before the LGPD,
Brazilian courts have been systematically striking down privacy notice provisions that imply
a waiver of all or substantially all of an individual’s privacy rights.
There is no requirement for registration of databases in Brazil.
The LGPD also defines the mandatory reporting of data incidents, as further detailed
below.
Internet Act
Under the Internet Act, internet connection providers (i.e., those that offer telecommunications
connectivity for internet access) cannot monitor or store any information concerning the use
of the internet by their users. Internet connection providers are required to retain connection
logs for a minimum period of 12 months. Connection logs must include the date, time and
duration of an internet connection made by a certain IP address provided by the connection
provider to the user.
Internet application providers (i.e., those that offer any kind of functionality to their
users through the internet, such as social networks, e-commerce websites, etc.) shall store
access logs for at least six months. In such cases, access logs must include the date, time and
duration of connections to the internet application made by a certain IP address.
Under the Internet Act, express consent is always required for collecting data online.
Upon the creation of the LGPD, we are of the opinion that the other lawful basis provided
for in the new statute shall also apply to data collected online. Furthermore, the consent
attributes shall be those approved by the LGPD and no longer those of the Internet Act. In
other words, no express consent shall be required for data collected online when the LGPD
becomes effective.
102
© 2018 Law Business Research Ltd
Brazil
Health
The Medical Ethical Conduct Code (Federal Council of Medicine, Resolution 1,931/2009)
provides for certain rules on the protection of patients’ information and medical records. A
specific resolution issued by the Federal Council of Medicine governs the use of computer
systems for storage, handling and retention of such data, authorising the replacement of
paper with electronically stored information. In any case, with the enactment of the LGPD,
the processing of sensitive data (which includes medical information) shall only occur on the
basis expressly allowed by the LGPD.
Employees
Employees are subject to data protection rights under the LGPD. The employers are allowed
to process employees’ data for the purposes of managing the employment relationship.
The legal basis for processing may be compliance with legal obligation, performance of a
labour contract or legitimate interest of the controller. Therefore, consent is not required for
processing data relating to the management of labour relationship, even in case of sensitive
data. Employee data may be used by the employer and transferred to other affiliate entities
for the purpose of managing the employment relationship (for use by a centralised back
office, HR-related activities, etc.), provided that the requirements of international transfer
are observed.
Employers are allowed to monitor the use of equipment and IT systems offered by
the employer, so employees should not expect privacy on such environments. The majority
of legal scholars and most of the decisions rendered by the court of appeals sustain this
position. All equipment and devices provided by the employer to their employees for the
exercise of the employees’ functions within the company shall be deemed company property
and therefore may be subject to surveillance. For companies that install their systems into
employee’s devices (BYOD), we also believe that surveillance on such devices is possible to
the extent that it focuses only on the employer’s information. Finally, Brazilian laws do not
103
© 2018 Law Business Research Ltd
Brazil
restrict the use of surveillance video systems, provided that the recording or videotaping is
not performed in areas where any kind of embarrassment is inflicted on the employee (e.g.,
cameras installed in bathrooms).
Electronic marketing
Marketing campaigns by email are likely to be deemed legitimate under the opt-in or ‘soft
opt-in’ system, but shall always allow the data subject to opt-out from receiving such messages.
The telecommunications regulators determined that mobile carriers are only allowed to send
promotional messages to their users who have expressly accepted receiving them.
Child protection
The Child and Adolescent Act (Law No. 8,069/1990) stipulates that the offer, exchange,
delivery, transmission, distribution, publication or disclosure of photographs, videos or other
materials containing explicit sex scenes or child pornography is a criminal activity, which
will be subject to a penalty of up to eight years of imprisonment. The LGPD adds additional
protection to child’s personal data. Among other provisions, it determines that information
should be provided in a simple, clear and accessible manner to the child and the processing
agent shall use reasonable efforts to verify that the consent was given by the child’s legal
representative.
Exercise of profession
Other federal statutes cover legal profession privilege, such as attorney–client privilege.
Technological innovation
Brazil has a new data protection legislation, which may significantly increase data subjects’
rights and control over their data. While the protection of personal data is certainly positive
in many instances, the law should not be interpreted in a way to materially impact the
development of new technologies that may bring important benefits to the country.
As such, the use of anonymised data should be encouraged and right of privacy shall be
read in conjunction with other principles and values embraced by other laws and the Federal
Constitution.
Section 2 of the LGPD states that innovation, economic and technologic development
and free enterprise constitute cornerstones of the new law. As a result, significant importance
shall be given to the controller’s legitimate interest in processing data, as well as processing to
meet public interest objectives (such as health, education, agriculture, smart cities and urban
mobility, among so many others). Many upcoming technologies in the space of IOT and
artificial intelligence are boosting innovation and being instrumental for this technological
revolution. Government and enforcement authorities should be aware that their actions may
significantly impact the pace by which the country may benefit from all such developments.
The key is to balance privacy rights with all other rights afforded to individuals and
legal entities. No right should be interpreted on a stand-alone basis.
104
© 2018 Law Business Research Ltd
Brazil
Until the LGPD becomes effective, there is no specific regime or regulation regarding the
transfer of data outside Brazil. As a rule, if the notice or consent was provided (when required)
and the relevant privacy policy expressly provides for the international data transfers,
international transfer was allowed.
Except for sector-specific regulations (e.g., applicable to the processing of government
and financial data), Brazilian laws do not impose data localisation requirements.
105
© 2018 Law Business Research Ltd
Brazil
7 One exception to this rule relates to the rights of police authorities and prosecutors to request limited
information (such as name, ID number, address and parents’ name of an individual) without a court order.
106
© 2018 Law Business Research Ltd
Brazil
the same violation should not give rise to a double penalty. Therefore, if there is a violation
of privacy rights, the penalties of the Internet Act or the penalties under the LGPD should
apply but not both.
107
© 2018 Law Business Research Ltd
Brazil
X OUTLOOK
With the approval of the LGPD, organisations will have to adapt their privacy policies,
notices and internal processes to become compliant with the new legislation. Multinational
organisations are likely to be subject to more than one regulatory regime on the matter,
such as those that process data related to individuals located in Brazil and in the European
Union, which will have to comply not only with the LGPD, but also with the GDPR. More
awareness and protection of data subjects’ rights and increasing enforcement action from
Brazilian authorities are certainly expected in years to come.
8 Specific information needs to be provided, including, at least: (1) a description of the data and individuals
affected; (2) the risks related to the data incident; (3) the reasons why the notification to the DPA has been
delayed, if applicable; and (4) the technical and security measures taken to protected the data, and the
measures that were or will be taken to revert or mitigate the effects of the data incident.
9 Unlike the GDPR, there is no particular deadline for notification (e.g., 72 hours). In any case, it cannot be
unreasonably delayed and the DPA or any further decree may impose a maximum reporting time frame.
108
© 2018 Law Business Research Ltd
Chapter 8
CANADA
Shaun Brown1
I OVERVIEW
Privacy in Canada is regulated through a mix of constitutional, statutory and common law.
The most fundamental protection is provided by Section 8 of the Charter of Rights and
Freedoms, which states that ‘everyone has the right to be secure against unreasonable search
or seizure’. This ensures a reasonable expectation of privacy for citizens in relation to the state.
There are also laws that apply to the collection, use and disclosure of personal
information by organisations in the public and private sectors at the federal, provincial and
territorial levels. Finally, organisations in both sectors are increasingly required to defend
privacy-related lawsuits based on statutory and common law torts.
This chapter focuses on the aspects of Canadian privacy law that apply to private sector
organisations.
109
© 2018 Law Business Research Ltd
Canada
is intended to apply.4 The committee also recommended that the government wait to assess
the impact of such clarifications before determining whether and how to proceed with the
private right of action.
The government published its response to the INDU report in March 2018, agreeing
that the Act and its regulations require clarification to reduce the costs of compliance and
improve enforcement, without committing to any time frame to address such concerns.5
On 27 March 2018, the federal government published final regulations6 that
provide further detail on the pending privacy breach notification requirement under the
federal Personal Information Protection and Electronic Documents Act (PIPEDA).7 As of
1 November 2018, private sector organisations subject to the law will be required to notify
affected individuals and report to the Privacy Commissioner of Canada any breach of security
safeguards resulting in a real risk of significant harm to individuals.
In February 2018, the Standing Committee on Access to Information, Privacy and
Ethics (ETHI) tabled Its report following a detailed review of PIPEDA.8 ETHI made several
recommendations for significant changes to the law, which centred around four themes:
consent; online reputation; stronger enforcement powers of the Privacy Commissioner of
Canada; and, the impact of the European Union’s General Data Protection Regulation
(GDPR) on PIPEDA’s adequacy. If implemented, the committee’s recommendations would
align PIPEDA much more closely with GDPR.
The government issued its response to the ETHI report on 19 June 2018.9 The response
generally acknowledged the concerns raised in the report and reiterated that any proposed
change would require further study and need to account for the views of all stakeholders.
The government did not agree with the review’s recommendation that PIPEDA include
a framework for de-indexing and erasure of personal information given the potentially
far-reaching impacts of both rights (e.g., their potential impact on freedom of speech and on
public records) and its inconsistency with the commercial application of PIPEDA.
The Federal Court of Canada affirmed that PIPEDA applies to organisations that
collect, use and disclose personal information about Canadians in the course of commercial
activity, even where those organisations have no physical presence in Canada.10 Moreover,
the Supreme Court of Canada effectively created a new form of implied consent under
4 House of Commons Standing Committee on Industry, ‘Science and Technology, Canada’s Anti-Spam
Legislation: Clarifications are in order’ (Report) (Ottawa: December 2017), online: <https://www.
ourcommons.ca/DocumentViewer/en/42-1/INDU/report-10/>.
5 Minister of Innovation, Science and Economic Development, ‘Government Response to the tenth report of
the standing committee on industry, science, and technology,’ (Response) (Ottawa, 2018), online: <http://
www.ourcommons.ca/content/Committee/421/INDU/GovResponse/RP9762984/421_INDU_Rpt10_
GR/421_INDU_Rpt10_GR-e.pdf>.
6 Canada Gazette, Part II: Volume 152, Number 8, Breach of Security Safeguards Regulations:
SOR/2018-64, http://gazette.gc.ca/rp-pr/p2/2018/2018-04-18/html/sor-dors64-eng.html.
7 SC 2000, c 5.
8 House of Commons Standing Committee on Access to Information, Privacy and Ethics, ‘Towards Privacy
by Design: Review of the peronsal information protection and electronic documents act’ (Report) (Ottawa:
February 2018), online: <https://www.ourcommons.ca/DocumentViewer/en/42-1/ETHI/report-12/>.
9 ibid.
10 A.T. v. Globe24h.com, 2017 FC 114 (CanLII).
110
© 2018 Law Business Research Ltd
Canada
PIPEDA when it found that a debtor who defaulted on a loan had given implied consent to
the debtor’s bank to disclose a mortgage statement to the lender so that it could enforce a
judgment through the sale of the debtor’s home.11
111
© 2018 Law Business Research Ltd
Canada
In the context of OBA, given the fact that the purpose behind collecting information is to create
profiles of individuals that in turn permit the serving of targeted ads; given the powerful means
available for gathering and analyzing disparate bits of data and the serious possibility of identifying
affected individuals; and given the potentially highly personalised nature of the resulting advertising,
it is reasonable to take the view that the information at issue in behavioural advertising not only
implicates privacy but also should generally be considered ‘identifiable’ in the circumstances. While
such an evaluation will need to be undertaken on a case-by-case basis, it is not unreasonable to
generally consider this information to be ‘personal information’.18
14 Dagg v. Canada (Minister of Finance) [1997] 2 SCR, dissenting, 403 at Paragraph 68.
15 Morgan v. Alta Flights Inc (2006) FCA 121, affirming (2005) FC 421.
16 Canada (Information Commissioner) v. Canada (Transportation Accident Investigation and Safety Board),
2006 FCA 157, Paragraph 34.
17 PIPEDA Case Summary #2009-010 – Report of Findings: Assistant Commissioner recommends Bell
Canada inform customers about Deep Packet Inspection.
18 Office of the Privacy Commissioner of Canada, ‘Policy Position on Online Behavioural Advertising’,
6 June 2012, www.priv.gc.ca/en/privacy-topics/advertising-and-marketing/behaviouraltargeted-advertising/
bg_ba_1206.
112
© 2018 Law Business Research Ltd
Canada
There are few precedents in Canadian law that have restrained this expansive approach to
interpreting personal information.
To varying degrees, privacy laws contain exceptions for business contact information,
including the name, title and contact information for a person in a business context. As of
June 2015, ‘business contact information’, including the ‘position name or title, work address,
work telephone number, work fax number or work electronic address’ of an individual was
excluded from PIPEDA.
Principle 1 – accountability
‘An organisation is responsible for personal information under its control and shall designate
an individual or individuals who are accountable for the organisation’s compliance with the
following principles.’
Accountability speaks to the obligations of organisations to establish privacy-related
policies and procedures, and to designate staff who are responsible for ensuring that an
organisation is compliant with privacy legislation. Organisations are also expected to provide
employees with privacy training.
The accountability principle imposes obligations on organisations to ensure that
personal information is adequately protected when transferred to a third party for processing.
Accordingly, organisations that rely on service providers to process personal information
on their behalf (e.g., payroll services) must, through contractual means, ensure that
personal information will be handled and protected in accordance with privacy legislation.
This requirement applies regardless of whether personal information is transferred to an
organisation within or outside Canada.
Principle 3 – consent
‘The knowledge and consent of the individual are required for the collection, use, or disclosure
of personal information, except when inappropriate.’
Of the 10 principles, consent is possibly the single most important and complex
requirement. As a general rule, organisations are required to have consent before collecting,
113
© 2018 Law Business Research Ltd
Canada
using or disclosing personal information. For consent to be valid under PIPEDA, it must
be reasonable to expect that the individual would understand the nature, purposes and
consequences of the collection, use or disclosure of his or her personal information.
Consent can either be express or implied. Although the concept is somewhat flexible,
‘express consent’ generally means that a person provides some form of affirmative indication
of their consent. It is for this reason that express consent is often equated with ‘opt-in’ consent.
Alternatively, as stated in the CSA Model Code, ‘implied consent arises where consent may
be reasonably inferred based on the action or inaction of the individual’.
Whether consent can be express or implied depends on a few factors. Express consent is
almost always required whenever ‘sensitive’ personal information is involved. This includes, for
example, information pertaining to a person’s race or ethnicity, health or medical condition,
or financial information (e.g., income, payment information).
The concept of ‘primary purpose and secondary purposes’ is also relevant to the form of
consent required. A primary purpose is one that is reasonably necessary to provide a product
or service; for example, the collection and use of an individual’s address may be necessary
to deliver a product ordered online. In this case, consent would be implied to collect and
disclose an individual’s mailing address to a delivery company.
However, marketing or advertising is almost always considered a secondary purpose. For
example, an organisation would require express consent to collect and disclose an individual’s
mailing address to a third party for the purpose of sending marketing materials.19
Note that organisations are prohibited from requiring an individual to consent to the
collection, use or disclosure of personal information for a secondary purpose as a condition
of providing a product or service.20
A third form of consent, which is sometimes viewed as falling between express and
implied consent, is ‘opt-out’ consent. Opt-out consent means that an individual is provided
with notice and the opportunity to express non-agreement to a given collection, use or
disclosure. Otherwise, consent will be assumed. The Privacy Commissioner has held that it is
acceptable to rely on opt-out consent so long as the following conditions are met:
a the personal information is demonstrably non-sensitive in nature and context;
b the context in which information is shared is limited and well-defined as to the nature
of the personal information to be used or disclosed and the extent of the intended use
or disclosure;
c the organisation’s purposes are limited and well defined, stated in a reasonably clear
and understandable manner, and brought to the individual’s attention at the time the
personal information is collected;
d the organisation obtains consent for the use or disclosure at the time of collection, or
informs individuals of the proposed use or disclosure, and offers the opportunity to opt
out, at the earliest opportunity; and
19 An exception to this rule is PIPEDA Case Summary #2009-008 – Report of Findings into the Complaint
Filed by the Canadian Internet Policy and Public Interest Clinic (CIPPIC) against Facebook Inc under
the Personal Information Protection and Electronic Documents Act, in which the Assistant Privacy
Commissioner of Canada held that because revenues from advertising allow Facebook to offer a free service,
the collection, use and disclosure of personal information for advertising is therefore a ‘primary purpose’,
and ‘persons who wish to use the service must be willing to receive a certain amount of advertising’. As
such, it is acceptable for Facebook to require users to consent to certain forms of adverts as a condition of
using the site.
20 This is often referred to as ‘refusal to deal’.
114
© 2018 Law Business Research Ltd
Canada
There are a number of exceptions to the need to obtain consent for the collection, use or
disclosure of personal information, including the following:
a for a purpose that is clearly in the interest of the individual and consent cannot be
obtained in a timely way (e.g., emergencies);
b for purposes related to law enforcement activities, or to comply with warrants or court
orders;
c where personal information is ‘publicly available’ as defined under privacy legislation;22
and
d in business transactions (e.g., sale of a business), provided that the parties agree to
only use and disclose personal information for purposes related to the transaction,
protect the information with appropriate security safeguards, and return or destroy the
information where the transaction does not go through.
115
© 2018 Law Business Research Ltd
Canada
Principle 6 – accuracy
‘Personal information shall be as accurate, complete and up to date as is necessary for the
purposes for which it is to be used.’
Organisations have an obligation to ensure that personal information is accurate and up
to date; however the degree of accuracy may depend on the purpose for which the information
is used. For example, there may be a heightened obligation to ensure the accuracy of credit
information given that this information forms the basis of significant financial decisions
about an individual.23
Despite this general obligation, organisations are prohibited from routinely updating
personal information where it is unnecessary to do so.
Principle 7 – safeguards
‘Personal information shall be protected by security safeguards appropriate to the sensitivity
of the information.’
Organisations are required to implement physical, administrative and technical
measures to prevent the loss, theft, and unauthorised access, disclosure, copying, use or
modification of personal information.
Canadian law is not prescriptive with respect to safeguards. Moreover, specific measures
can depend on certain factors, such as the sensitivity of information involved, foreseeable risks
and harms, and the costs of security safeguards. That said, the Privacy Commissioner expects
that organisations implement certain measures – such as: the use of encryption technologies
whenever possible, and especially where sensitive personal information is involved; limiting
access to personal information to those employees who require access and who are required to
sign an oath of confidentiality; and maintaining audit logs of databases containing personal
information.
The Alberta Personal Information Protection Act was the first private sector law
with an explicit requirement to notify individuals in the case of a security breach.24 Once
in force, recent amendments to PIPEDA will require organisations to notify the Privacy
Commissioner and affected individuals of any breach of safeguards if it is reasonable to
believe in the circumstances that the breach poses a real risk of significant harm. Failure
to comply with the new notification requirements once they are in force could result in a
penalty of up to C$100,000.
Principle 8 – openness
‘An organisation shall make readily available to individuals specific information about its
policies and practices relating to the management of personal information.’
As stated above, the openness principle is closely related to Principle 2 – identifying
purposes. Essentially, this Principle requires organisations to provide privacy policies (or
notices). Privacy policies are expected to meet the following requirements:
a provide a full description of what information is collected, used and disclosed, and for
what purposes;
23 The Federal Court emphasised this obligation in Nammo v. TransUnion of Canada Inc, 2010 FC 1284,
in which the applicant was denied a loan as a result of information provided by TransUnion that was
described as ‘grossly inaccurate’. The Court awarded damages of C$5,000.
24 See Personal Information Protection Act, SA 2003, Sections 34.1 and 37.1.
116
© 2018 Law Business Research Ltd
Canada
The Privacy Commissioner also emphasises the value of augmenting privacy notices with
other forms of notice, including ‘just in time’ notices (e.g., through pop-ups and interstitial
pages) and layering notices to provide further information about more complex issues for
those who seek such information and icons where applicable (e.g., the ‘Ad Choices’ icon for
OBA).
In 2013, the Privacy Commissioner participated in the Global Privacy Enforcement
Network Internet Privacy Sweep, which looked at privacy policies on 326 websites in Canada
and 2,186 websites worldwide. The Commissioner noted concerns in almost half of the
Canadian websites.25 In an example of ‘naming and shaming’, the Commissioner called out
specific examples of privacy policies that he considered constituted the ‘good, the bad and
the ugly of privacy policies’.26
25 Office of the Privacy Commissioner of Canada, ‘Global Internet Sweep finds significant privacy
policy shortcoming’ (Ottawa: 13 August, 2013), online: <www.priv.gc.ca/en/opc-news/news-and-
announcements/2013/nr-c_130813>.
26 Office of the Privacy Commissioner of Canada, ‘Initial Results from our internet privacy sweep: the good,
the bad, the ugly’ (Ottawa: 13 August, 2013), online: http://blog.priv.gc.ca/index.php/2013/08/13/
initial-results-from-our-internet-privacy-sweep-the-good-the-bad-and-the-ugly/.
117
© 2018 Law Business Research Ltd
Canada
Organisations are required to designate a person who can respond to questions and
complaints, and establish a process for responding to questions and complaints.
27 For the purposes of this chapter, OBA refers generally to the delivery of advertisements to web browsers
that are targeted based on a user’s behaviour online, and the collection, use and disclosure of data for those
purposes.
28 Office of the Privacy Commissioner of Canada, ‘Policy Position on Online Behavioural Advertising’,
6 June 2012, www.priv.gc.ca/en/privacy-topics/advertising-and-marketing/behaviouraltargeted-advertising/
bg_ba_1206.
29 In early 2014, the Privacy Commissioner found that Google had violated PIPEDA by using sensitive
personal information to target and serve through its AdSense service. Google had allowed its customers
to serve targeted adverts for Continuous Positive Airway Pressure devices to internet users identified as
suffering from sleep apnoea. Although the Privacy Commissioner has stated that companies can rely on a
form of opt-out, implied consent for OBA, adverts targeted at sleep apnoea suffers did not qualify for this
approach given that this involves the collection and use of sensitive, health-related personal information.
See Privacy Commissioner of Canada, PIPEDA Report of Findings #2014-001 – Report of Findings:
Use of sensitive health information for targeting of Google ads raises privacy concerns, 14 January 2014,
www.priv.gc.ca/en/opc-actions-and-decisions/investigations/investigations-into-businesses/2014/
pipeda-2014-001.
118
© 2018 Law Business Research Ltd
Canada
Consistent with past guidance on the issue, the OPC emphasises the need for clear and
understandable descriptions of OBA, given the challenges of clearly explaining such a
complex issue.
The OPC has published research and guidance in recent years that considers the
application of privacy law to other technologies and issues, including facial recognition,30
wearable computing,31 drones32 and genetic information.33
30 Office of the Privacy Commissioner of Canada, ‘Automated Facial Recognition in the Public and Private
Sectors: Report prepared by the Research Group of the Office of the Privacy Commissioner of Canada’,
March 2013, www.priv.gc.ca/en/opc-actions-and-decisions/research/explore-privacy-research/2013/
fr_201303.
31 Office of the Privacy Commissioner of Canada, ‘Wearable Computing – Challenges and opportunities
for privacy protection: Report prepared by the Research Group of the Office of the Privacy Commissioner
of Canada’, January 2014, www.priv.gc.ca/en/opc-actions-and-decisions/research/explore-privacy-
research/2014/wc_201401.
32 Office of the Privacy Commissioner of Canada, ‘Will the proliferation of domestic drone use in
Canada raise new concerns for privacy?’: Report prepared by the Research Group of the Office of the
Privacy Commissioner of Canada, March 2013, www.priv.gc.ca/en/opc-actions-and-decisions/research/
explore-privacy-research/2013/drones_201303.
33 Office of the Privacy Commissioner of Canada, ‘Genetic Information, the Life and Health Insurance
Industry and the Protection of Personal Information: Framing the Debate’, December 2012, www.priv.
gc.ca/en/opc-actions-and-decisions/research/explore-privacy-research/2012/gi_intro.
119
© 2018 Law Business Research Ltd
Canada
i General
Organisations should:
34 Subject to limited exceptions, public sector bodies in British Columbia and Nova Scotia are required to
ensure that personal information in their custody or control is only stored or accessed in Canada; see the
Freedom of Information and Protection of Privacy Act, RSBC 1996, Chapter 165, s 30.1, and the Personal
Information International Disclosure Protection Act, SNS 2006, c 3, s 5. These laws can pose challenges
for service providers located outside Canada that seek to do business with public sector bodies in those
jurisdictions.
35 Office of the Privacy Commissioner of Canada, Guidelines for Processing Personal Data Across Borders,
January 2009, www.priv.gc.ca/media/1992/gl_dab_090127_e.pdf.
36 ibid.
37 ibid.
38 Personal Information Protection Act, SA 2003, c P-6.5, s 6(1).
39 ibid., s 13.1(1).
120
© 2018 Law Business Research Ltd
Canada
a establish detailed internal privacy policies for ensuring compliance with privacy
legislation that address things such as who is responsible for compliance with privacy
legislation;
b establish the various types of personal information collected, used and disclosed, and
for what purposes;
c provide training for employees;
d establish administrative, physical and technical security measures for the protection of
personal information;
e record transfers of personal information;
f record retention periods and the destruction of personal information;
g record the outsourcing of and third-party access to personal information;
h respond to requests for access to personal information;
i respond to inquiries and complaints about information handling practices; and
j identify and respond to security breaches.
ii Privacy notices
Organisations must have privacy notices for communicating privacy-related information to
the public. This typically consists of an online privacy policy, but can be combined with
other means such as written pamphlets, layered privacy notices and just-in-time notifications
provided at the point of sale, online and in mobile applications.
121
© 2018 Law Business Research Ltd
Canada
There are also other laws that permit transfers to foreign agencies for specific purposes,
including the Proceeds of Crime (Money Laundering) and Terrorist Financing Act,41 the
Department of Immigration and Citizenship Act,42 and the Canadian Security Intelligence
Service Act.43
Foreign governments cannot directly compel an organisation located in Canada to
disclose information. However, personal information about Canadians can be accessed
by foreign governments once transferred to those jurisdictions. Canada does not have any
‘blocking statutes’ or specific procedures for resisting access by foreign governments to
personal information about Canadians.
ii Private litigation
Privacy-related litigation has become more common in recent years, as courts are increasingly
willing to recognise privacy as a compensable cause of action.
The following four provinces have established a statutory tort for invasion of privacy:
British Columbia,45 Manitoba,46 Newfoundland and Labrador,47 and Saskatchewan.48 A
common law tort for invasion of privacy was explicitly recognised for the first time in Ontario
in 2012 in Jones v. Tsige.49 The court awarded relatively modest damages at C$10,000 in that
41 SC 2000, c 17.
42 SC 1994, c 31.
43 RSC, 1985, c C-23.
44 Chitrakar v. Bell TV, 2013 FC 1103.
45 Privacy Act, RSBC 1996, c 373.
46 Privacy Act, RSM 1987, c P125.
47 Privacy Act, RSN 1990, c P-22.
48 Privacy Act, RSS 1978, c P-24.
49 2012 ONCA 32.
122
© 2018 Law Business Research Ltd
Canada
case, stating that damages for privacy invasions should be generally limited to a maximum
of C$20,000. In a controversial 2017 decision, a small claims court in Ontario rewarded a
plaintiff C$4,000 for intrusion upon seclusion.50 In 2016, the Ontario Superior Court cited
a new tort referred to as the ‘public disclosure of embarrassing facts’ in a case arising out of
the non-consensual publication of intimate images on the internet.51 The Court awarded
damages of C$100,000, which is by far the largest award in a privacy-related case involving
a single plaintiff to date.
There have been a growing number of data breach-related class actions in the past few
years, involving defendants such as:
a Home Depot;52
b Bank of Nova Scotia;53
c Human Resources and Skills Development Canada;54
d Health Canada;55
e Durham Region Health;56 and
f Rouge Valley Health System.57
Although case law involving privacy breach class actions remains limited, precedents arising
from class certification and settlement approval proceedings suggest that some courts are
sceptical of class actions based on vague allegations of potential harm. For example, in the
class action against Home Depot, the court reduced the fees to class counsel previously agreed
by the parties, with the court stating that: ‘The case for Home Depot being culpable was
speculative at the outset and ultimately the case was proven to be very weak.’58 However,
settlements may be much higher where plaintiffs can provide more specific evidence of harm
resulting from a breach.59
123
© 2018 Law Business Research Ltd
Canada
complainant was Canadian and much of the data had to come from Canada.60 The Court
noted it was not required to find that PIPEDA applies extraterritorially to reach such a
conclusion. It also stated that the fact that an investigation might be ineffective is irrelevant
to the legal questions of jurisdiction.
X OUTLOOK
Privacy-related litigation will continue to grow and should be a top priority for organisations
doing business in Canada. While the government has yet to set a schedule for implementing
the recommendations listed in the 2017 statutory review of CASL, its positive response to
the review’s recommendations should be noted – particularly in regards to clarifying issues
surrounding the Act’s interpretation. Given the review’s recommendations, it appears that the
private right of action under CASL will continue to be delayed until the government clarifies
the more pressing provisions of CASL.
Organisations should also be cognisant that data breach notification requirements
under PIPEDA are in effect of 1 November 2018.
124
© 2018 Law Business Research Ltd
Chapter 9
CHINA
I OVERVIEW
China does not have an omnibus data protection law as such. In 2005, some legal scholars
published a discussion draft for a PRC data protection law, which was reportedly the basis
for the State Council draft. However, to date, the State Council has not published the draft
data protection law. In fact, data protection law is not included in the 12th National People’s
Congress (NPC) legislative plan, which applies to the period 2013–2018.2
Despite the lack of a unified law, China currently has a system of legal rules in place in
relation to the protection of personal information, albeit a complicated system. In 2012, the
Standing Committee of the NPC issued the Decision on Strengthening Internet Information
Protection3 (the NPC Decision), which requires enterprises and, in particular, internet service
providers, to protect the personal electronic information of Chinese citizens with several
general principles. Following the NPC Decision, a sector-specific legal regime in respect
of personal information has gradually formed in China, with various departments of the
State Council such as the Ministry of Industry and Information Technology (MIIT), the
State Administration for Industry and Commerce (SAIC), the National Health and Family
Planning Commission (NHFPC) and the People’s Bank of China (PBOC) respectively
issuing personal protection rules under their own administrative authority over the past
few years, and in some circumstances these have overlapped. In the absence of a unified
legal definition, ‘personal information’ is defined under many industry-specific rules and
generally refers to the information relating to an individual that, alone or in combination
with other information, can be used to identify an individual. All these regulations and rules
have identified a number of general principles for processing personal information (e.g.,
personal information collection should follow the principles of legitimacy, appropriateness
and necessity, and should be subject to the relevant individual’s consent).
The issuance, on 7 November 2016, of the Cybersecurity Law of the PRC (CSL) is
also considered a milestone. The CSL, which became effective from 1 June 2017, includes
provisions relating to both cybersecurity protection obligations and data privacy obligations.
If an individual’s right to privacy is infringed, the individual may bring a civil lawsuit
against the injuring party to seek redress under the Tort Liability Law. Further, sale of personal
information or illegal acquisition of personal information may constitute a criminal offence.
1 Marissa (Xiao) Dong is a partner at Jun He LLP. Passages of this chapter were originally published in ‘Data
Protection Considerations for Commercial Arrangements between the EU and China’, August 2013, and
‘Data Privacy and Security Law Develops Quickly in China’, August 2015
2 See www.gov.cn/jrzg/2013-10/30/content_2518276.htm.
3 See www.gov.cn/jrzg/2012-12/28/content_2301231.htm.
125
© 2018 Law Business Research Ltd
China
From a legal point of view, China’s personal information legal system is still far less
effective and robust than that of the United States or of the EU. It has also long been debated
in China whether, in terms of legislation and practice, the country should follow the route
of the United States or of the EU. While learning from both models, China has not yet
committed to one or other of these approaches, and in fact the Chinese way, as it has been
formed in practice, is somewhat of a mixture of both. With a view to cracking down on the
serious abuse of personal information, Chinese legislators have introduced a broader scope
of personal information offences in the recently promulgated amendment to the Criminal
Law. Furthermore, in judicial practice, in a recent civil case, Ms Zhu Ye v. Baidu, the Chinese
court ruled that the use of cookies by internet service providers, and accordingly delivering
targeted advertising, does not violate the right of privacy of Chinese citizens, which has been
read by the press as a judgment in favour of the ‘new economy’. Chinese companies and
multinationals in China are gradually paying more attention to their practice of collection
and utilisation of personal information in China, with some promoting industry-specific
standards to provide guidance in the still comparatively grey areas.
In brief, although from an overall perspective the abuse of personal information is still
a very serious reality, and people living in China still suffer unsolicited calls, emails and text
messages, the attitude and rules of the governmental authorities, the practice of companies,
the understanding of courts and, more importantly, public awareness are changing in a fast
and sometimes dramatic fashion in this information era, which is unlike anything that any
other nation, or even the world, has previously experienced.
126
© 2018 Law Business Research Ltd
China
a compliance with a series of requirements of tiered cyber protection systems (Article 21);
b verification of users’ real identity (an obligation for certain network operators)
(Article 24);
c formulation of cybersecurity emergency response plans (Article 25); and
d assistance and support to investigative authorities where necessary for the protection of
national security and investigation of crimes (Article 28).
The CSL, for the first time under PRC law, clearly imposes a series of heightened security
obligations for critical information infrastructure operators (CIIOs), including:
a internal organisation, training, data backup and emergency response requirements
(Article 34);
b storage of personal information and other important data must be secured within the
PRC territory, in principle (Article 37);
c procurement of network products and services that may affect national security must
pass the security inspection of the relevant authorities (Article 35); and
d annual assessments of cybersecurity risks and reports on the results of those assessments
and improvement measures to be submitted to the relevant authorities (Article 38).
As regards personal information, the CSL reiterates the obligations of network operators
regarding the protection of personal information that appear across existing laws and
regulations, including the mandate to observe the principle of lawfulness, necessity and
appropriateness in the collection and use of personal information and to observe the
‘inform-and-consent’ requirements (Article 41), to use personal information only for the
purpose agreed upon by the relevant individual (Article 41), to adopt security protection
measures for personal information (Article 42), and to protect the individual’s right to
access and correct personal information (Article 43). In addition, the CSL also incorporates
some new rules on personal information protection, including data breach notification
requirements (Article 42), and data anonymisation as an exception for inform-and-consent
requirements (Article 42), and the individual’s right to request that network operators make
corrections to or delete their personal information if the information is wrong or used beyond
the agreed purpose (Article 43).
Criminal offence
Article 253 of the Criminal Law (as provided in Amendment VII to the Criminal Law)4 applies
where any individual (including staff of governmental authorities and companies engaged
in industrial sectors, including finance, telecommunications, transportation, education and
healthcare) sells or illegally provides personal information obtained in his or her employment
and where the circumstances are ‘serious’. It is also applicable if an individual illegally
acquires such information by stealing or by any other means and where the circumstances
are serious. Legal consequences of such acts include fixed-term imprisonment of up to three
years, criminal detention or fines. In the event that an entity commits either of these crimes,
the entity is subject to a fine, and the individual in charge and other individuals directly
responsible for the criminal activity are subject to the punishments listed above.
4 See www.gov.cn/flfg/2009-02/28/content_1246438.htm.
127
© 2018 Law Business Research Ltd
China
Amendment IX to the Criminal Law,5 which became effective from 1 November 2015,
has amended Article 253, and has broadened the scope of personal information-related
offences and increased legal liability.
The Supreme People’s Court and the Supreme People’s Procuratorate also promulgated
the Interpretation by the Supreme People’s Court and the Supreme People’s Procuratorate
on Issues Concerning the Application of Law in Handling Criminal Cases of Infringing
on Citizens’ Personal Information and relevant typical cases, effective from 1 June 2017,
providing more details as to how Article 253 should be interpreted and implemented.
Tort liability
The Tort Liability Law,6 effective as of 1 July 2010, includes many provisions that specifically
or generally relate to the protection of personal data, and in particular, in Article 2, defines
the ‘civil rights and interests’ protected under the Law, specifically listing 18 types of right and
including the right of privacy. This is the first time under PRC law that the right of privacy
has been treated as an independent type of civil right, and no longer attached to the right
of reputation. Under the Tort Liability Law, the violation of the right of privacy and other
personal and property rights and interests is clearly provided as constituting a tort. An injured
party can seek redress against the injuring party.
5 See www.npc.gov.cn/npc/lfzt/rlys/node_25714.htm.
6 See www.gov.cn/flfg/2009-12/26/content_1497435.htm.
7 See www.saic.gov.cn/zcfg/fl/xxb/201310/t20131030_139167.html.
128
© 2018 Law Business Research Ltd
China
Cookies
The use of cookies is a good example of the above-mentioned issues, and there have been
contradictory views around key aspects of the use of cookies. On 15 March 2013, World
Consumer Rights Day, the Chinese Central Television Station specially reported that
consumers’ personal information was being divulged when they surfed the web, and accused
many websites of prying into internet users’ privacy.8 The report caused widespread public
panic. Although many industry participants sought to clarify the facts around the use of
cookies, many people were still not clear about how cookies work exactly and whether
indeed their privacy had been invaded. From a legal point of view, many issues are not
clear because of the lack of detailed rules. For example, the specific reference of the consent
requirement for the purpose of utilising the personal information of individuals is not clear
under certain circumstances, whether implied consent is sufficient in all scenarios, or to what
extent business operators must disclose to users or consumers details of proposed future use
of information collected. The Chinese Advertising Association is actively promoting industry
standards for targeted advertising and mobile internet advertising,9 and it is still waiting to see
whether these standards will be widely accepted and implemented in practice.
In the first civil case regarding internet advertising and the online collection and use
of personal information, involving Chinese search engine giant Baidu, a Ms Zhu claimed
that Baidu’s targeted advertising on its partners’ websites, using cookies set when she used
the search engine, infringed her right to privacy. Interestingly, the appellate court’s judgment
contrasted with the opinions of the court of first instance in many aspects. The appellate court
decided three important points at variance with the judgment of the court of first instance:
that the information collected by Baidu cookies does not contain personal information
under PRC law; that the network user does not suffer cognisable injury by receiving targeted
adverts on websites within Baidu’s advertising alliance; and that the notification and consent
8 See finance.qq.com/a/20130315/007380.htm.
9 See net.china.com.cn/ywdt/hyxw/txt/2014-03/17/content_6745655.htm, news.cnad.com/html/
Article/2015/0311/20150311170912131.shtml.
129
© 2018 Law Business Research Ltd
China
mechanism provided on Baidu’s search engine website is legal and sufficient. Although the
Chinese court judgment does not have a binding effect, it provides important guidelines and
may affect other similar cases in the future.
Cloud computing
Cloud computing has posed new challenges to the law, in particular because it is not
completely transparent as to where and how the information is stored and processed in ‘the
cloud’, or how prevention of hacker attacks and the security of information stored in the
cloud may be assured. As mentioned in the Opinions for Promoting Creative Development
of Cloud Computing and Fostering a New Sector of Information Industry issued by the
State Council, China is faced with various issues with respect to cloud computing, along with
development opportunities. These issues include lack of service capacity and core technology,
insufficient sharing of information resources and high levels of information security risk. In
the Opinions, the State Council’s demands include:
a facilitating research into applications of personal and enterprise information in a cloud
computing environment;
b promulgation of laws and systems relating to information protection;
c rules relating to collection, storage, transfer, deletion and international transfer of
information; and
d information security law.
10 See www.gov.cn/gzdt/2013-07/19/content_2451360.htm.
11 See www.gov.cn/gzdt/att/att/site1/20131119/7845c441d9c213f568c201.doc.
130
© 2018 Law Business Research Ltd
China
12 See www.gov.cn/flfg/2007-06/22/content_658488.htm.
13 See www.gov.cn/gongbao/content/2011/content_1918924.htm.
131
© 2018 Law Business Research Ltd
China
Foreign Corrupt Practices Act purposes) and their Chinese subsidiaries need to transfer
documents overseas. Under the State Secrets Protection Law (2010)14 and the Measures
for Implementing the State Secrets Protection Law (2014),15 no documents or materials
containing state secrets are allowed to be carried, transmitted, posted or transported outside
China without approval from the competent governmental authorities. However, the term
‘state secrets’ is broadly defined, covering extensive matters such as major decisions on
state affairs, national defence and activities of the armed forces, diplomatic activities and
foreign affairs, national economic and social development, science and technology, activities
safeguarding national security, and the investigation of criminal offences. The lack of an
explicit list or guidelines specifying what information constitutes state secrets, or procedures
to recognise state secrets, have contributed, in practice, to extreme difficulty in dealing with
information that might be considered as containing state secrets.
Furthermore, the Information Security Technology Guide for Personal Information
Protection within Information Systems for Public and Commercial Services16 (the
Guidelines) was issued on 15 November 2012, and became effective from 1 February 2013.
The Guidelines, however, do not serve as a statutory law but as a non-mandatory national
standard. Nevertheless, as many important internet service providers have been participating
in the process of their drafting, the Guidelines are expected to be observed, or at least used
as reference in establishing internal rules, by many industry participants, and some believe
the Guidelines may serve as a basis for future legislation on personal information protection.
The Guidelines set out both general principles and specific requirements with respect to the
collection, processing, transmission, utilisation and management of personal information in
various information systems. In particular, in respect of cross-border transfers of data, the
Guidelines provide that in the absence of explicit law or regulation, and without the approval
of the industry administrative authority, a Chinese data controller should not transfer any
personal information to a data controller registered overseas. Although this recommendation
is not mandatory, it reflects the attitude of the governmental authorities that have participated
in the issuance of the Guidelines, and we would expect there may be increasingly strict legal
requirements in this regard in the future.
Notably, CAC released a draft of the Measures on Security Assessment on the
Cross-Border Transfer of Personal Information and Important Data for public comment and
it has yet to be finalised. The Draft requires, in addition to the data localisation and security
assessment on CIIOs, that all ‘network operators’ should also carry out security assessments
for cross-border transfers of personal information and important data collected and produced
by them in the course of their operations within China. The Draft regulates cross-border data
transfers by way of both ‘self-assessment’ and assessment by authorities. In brief, network
operators are required to carry out self-assessment for all cross-border transfers of data, while
cross-border transfers of data satisfying certain tests must be submitted to the applicable
industrial regulatory authority or the national cyberspace authority for assessment.
The National Information Security Standardisation Technical Committee (TC 260)
released a draft of the Information Security Technology Guidelines for Cross-Border Data
Transfer Security Assessment for public comment (and a second draft has already been
released). As an important ancillary document to the CSL, the Guidelines put forward detailed
14 See www.gov.cn/flfg/2010-04/30/content_1596420.htm.
15 See www.gov.cn/zwgk/2014-02/03/content_2579949.htm.
16 See tech.qq.com/a/20110211/000264.htm.
132
© 2018 Law Business Research Ltd
China
recommendations on the assessment process, assessment methods and points regarding the
data export security assessment. Although the Guidelines do not have mandatory legal force,
they may be adopted and referred to in data export activities by network operators in various
industries, since existing laws and regulations fail to provide detailed guidance. In data export
assessments, enterprises need to comprehensively take into account factors such as the consent
of the individuals whose personal data is being exported, the necessity for the data export, the
security protection measures of the data exporters and data recipient, and the political and
legal environment of the receiving country or region.
133
© 2018 Law Business Research Ltd
China
information. Although there have been sanctions imposed by the SAIC and the PBOC
in certain localities for the leaking or abuse of personal information, there have been no
milestone cases yet. CAC is the designated enforcement authority for the CSL and following
the entry into effect of the CSL it has already been active, starting investigations into practices
in this area.
There have already been various privacy lawsuits, even before the Tort Liability Law
became effective, and at that time claims were brought for infringement of the right to
reputation. However, there is still no unified interpretation of what constitutes privacy of
individuals and what circumstances would be treated as infringements of privacy rights.
Although many judgments rendered by local courts have provided their views and guidance
on this matter, these cases are not legally binding. There are still controversial views held by
different local courts on this matter.
134
© 2018 Law Business Research Ltd
China
activities, which may have a significant impact on the operation of internet and tech firms
in China. For example, according to the CTL, telecom and internet service providers are
required to provide technical interfaces and technical assistance in decryption and other
efforts to public and national security authorities engaged in the lawful conduct of terrorism
prevention and investigation. However, the provisions of the CTL still lack details as to how
these requirements will be implemented, which remains to be seen in practice.
As mentioned above, the CSL entered into effect on 1 June 2017 and has become the
fundamental law in China for the protection of cybersecurity and personal information.
X OUTLOOK
As with the rest of the world, in China, threats to cybersecurity have been the subject of more
intense focus by governmental authorities and public and private companies. Over the past
few years, there has been an increase in China in the amount of legislation regarding personal
information protection and cybersecurity law, and how these new laws and regulations will
be implemented remains to be seen.
The CSL is considered a legislative milestone in China in this field. The CSL is the
first law in the PRC specially focused on cybersecurity matters. With the entry into effect on
1 June 2017 of the CSL, internet companies and other industries in China are now subject to
a wide array of stricter, more comprehensive obligations, and face more severe punishments
for violations. As an omnibus law on cybersecurity issues, the CSL has many provisions
that are still very general and abstract, and the detailed requirements for implementation
and enforcement depend on subsequent and more specific implementation regulations, and
on opinions from relevant authorities. We can expect the relevant regulatory authorities to
continue to promulgate series of implementation regulations to clarify certain requirements
under the CSL, such as regulations on tiered cybersecurity protection systems, the specific
scope and protection measures regarding CII, the protection of minors on networks, the
mandatory security certification and the test requirements for key network devices and
special cybersecurity products, and national security reviews of the network products and
services procured by CIIOs.
In view of these legislative changes, companies will have to consider whether they need
to adjust their business operations and practices accordingly and enhance their cybersecurity
protections to ensure full compliance with the CSL. Given that the specific details of
implementation of the CSL requirements are not yet entirely clear, companies will also
have to follow closely any subsequent releases of regulations and opinions by the relevant
governmental authorities. In the year ahead, companies are also looking forward to seeing
new regulations, standards and movement by the Chinese regulators, and how the draft
regulations and standards are to be issued and implemented in practice.
135
© 2018 Law Business Research Ltd
Chapter 10
COLOMBIA
I OVERVIEW
Article 15 of the Colombian Constitution of 1991 sets forth the fundamental rights of
every individual to intimacy and privacy. Furthermore, Article 15 acknowledges the right
to know about, update and rectify personal information that has been collected in public or
private databases. This right is considered to be a development of the right to intimacy and a
dimension of individual freedom, and is widely known as the habeas data right.
Until 2008, the scope of the habeas data right was developed mostly by constitutional
case law and some activity-specific regulation, but there were no general or industry-specific
laws regarding the matter. In 2008, Congress enacted Law 1266, with the main purpose of
regulating use of financial and commercial personal data and, particularly, the use of financial,
credit and commercial data used with the purpose of credit scoring. The right developed by
Law 1266 is known as financial habeas data.
More recently, in 2012, Congress enacted Law 1581 with the purpose of establishing a
more comprehensive legal framework, applicable to almost all commercial, non-commercial
and governmental activities. Law 1581 determines the definitions and principles that govern
data processing, establishes the rights of data subjects and duties of data controllers and
processors, sets forth requirements for international data transfers, creates the National
Registry of Databases and designates the Superintendence of Industry and Commerce (SIC)
as the data protection authority, among others.
Colombian data protection regulation is inspired and follows the principles of the
European data protection regulation. However, Colombian data protection law is highly
focused on consent and provides few exceptions to the general rule that all processing must
be authorised by the data subject.
Before Law 1266 of 2008 and Law 1581 of 2012, few Colombian organisations were
aware of the need to adopt measures to protect personal information or had implemented
an organisational culture around privacy. Since the enactment of these laws, both public
and private entities have begun the process of aligning formally and substantially with the
requirements of the law. However, it is important to take into account that many aspects of
the law and regulation remain unclear and are being still developed by the data protection
authority, controllers and processors.
136
© 2018 Law Business Research Ltd
Colombia
ii Principles
Law 1581 sets forth the main principles applicable to the processing of data,4 as follows:
a Legality: data processing is a regulated activity that must comply with the law and
applicable regulation.
b Purpose: all processing must have a legitimate and constitutional purpose that has been
notified to the data subject.
2 Later amended by Circular 008 of 2018, to include Japan in the list of countries that have adequate levels
of data protection.
3 Regulatory Decrees No. 1727 of 2009, 2952 of 2010, 1377 of 2013 and 886 of 2014.
4 Law 1581, Title II, Article 4.
137
© 2018 Law Business Research Ltd
Colombia
c Freedom (consent): personal data may only be processed after acquiring prior, express
and informed consent from the data subject. Personal data may not be obtained or
divulged without prior authorisation, or without a legal or judicial mandate that
exempts processing from consent.
d Veracity or quality: information subject to processing must be truthful, complete, exact,
updated, demonstrable and comprehensible. The processing of partial, incomplete or
fractioned data that may be misleading is prohibited.
e Transparency: controllers and processors must guarantee data subjects the right to
obtain information regarding all data that concerns him or her, at any time and without
restriction.
f Restricted access and circulation: processing is subject to limitations imposed by the
nature of the data and constitutional and legal provisions. Processing may only be
carried out by persons authorised by the data subject or the persons permitted by law.
Except for public information, personal data should not be available in the internet
or any other massive communication or dissemination media, unless the access is
technically controlled to provide access only to data subjects or authorised third parties.
g Security: data processing requires the adoption of all technical, human and administrative
measures that are necessary to provide security and avoid unauthorised or fraudulent
adulteration, loss, consult, use or access of the data.
h Confidentiality: everyone who intervenes in the processing of personal data not
classified as public, is required to guarantee the confidentiality of the information.
iii Definitions
Law 1581 sets forth the following definitions:
a Controller: a natural person or legal entity, private or public, that decides the database
and the processing of the data, whether by itself or together with third parties.
b Processor: a natural person or legal entity, private or public, that performs processing
on behalf of the controller, whether by itself or in association with others.
c Personal data: any information linked or that may be associated with one or more
determinate or determinable natural person.
d Database: an organised set of data that is the object of processing.
e Data subject: a natural person whose data is the object of processing.
f Processing: any operation or set of operations regarding personal data, such as collection,
storage, use, circulation or suppression.
iv Classification of data
Data privacy laws provide the following classification of data.
Public data
Personal data that is not semi-private, private or sensitive. Among others, the following data is
considered to be public: data related to marital status, profession, qualification as a merchant
or public servant, etc. Because of its nature, public data may be contained, among others, in
public records, official bulletins or judicial decisions (not sealed).
Private data
Data that is only relevant to the data subject owing to its intimate and confidential nature.
138
© 2018 Law Business Research Ltd
Colombia
Sensitive data
Data that affects the intimacy of the data subject or that has the potential of generating
discrimination against the data subject when unduly used. Examples of sensitive data is that
which reveals the racial or ethnic origin of the data subject, his or her political orientation,
religious or philosophical convictions, participation in unions, human rights organisations or
political parties, as well as those data related to health, sexual health or biometric data.
Semi-private data
Data that does not have an intimate, confidential or public nature, and knowledge or
publishing of which interests not only the data subject but also a group of people or society
in general.
Although Law 1581 was passed almost seven years ago and many organisations and entities
began complying with the law, it was not until a couple of years ago that most organisations
started implementing a real culture around data protection. This change was fostered by
the obligation to register databases in the National Registry of Databases, which requires
companies to assess and declare the level of compliance with the law.
Furthermore, the legislation establishes that data subjects will be entitled to:
a know, update and rectify their personal data with data controllers and processors. This
right may be exercised, inter alia, relating to partial, inexact, incomplete, fragmented
and misleading data, or whose processing is explicitly forbidden or has not been
authorised by law;
b request proof of the authorisation granted to the data controller;
c be informed by the data controller about the use made of their personal data;
d file complaints with the Superintendence of Industry and Commerce for violations of
the data protection regulation;
e withdraw the authorisation, or request data suppression when the data processing
fails to comply with the principles, rights and legal and constitutional guarantees. The
139
© 2018 Law Business Research Ltd
Colombia
iv Technological innovation
Regulatory framework
Law 1581 does not include a specific regulatory framework for privacy issues created by
technological innovation. However, its principles and rules apply to any activity related to
the use of personal data, including those activities related to online tracking, behavioural
advertising, location tracking, use of cookies, profiling, etc.
In our opinion, the strict consent-driven approach of Law 1581 may unfortunately
disincentivise technological innovation, owing to the constant change of purposes and uses
that technological advances entail, which are sometimes difficult to foresee at the moment
when consent is collected from the data subject.
Biometric data
It is important to note that Law 1581 specifically classifies biometric data (which includes
facial recognition data) as ‘sensitive’ data, and provides specific requirements to acquire
consent to use such data.
140
© 2018 Law Business Research Ltd
Colombia
Cloud computing
In 2015, SIC issued a guideline for using cloud computing according to the data protection
regulation. This guideline establishes special recommendations for clients and providers when
hiring or offering cloud computing services.
Big data
The National Council for Economic and Social Policies (CONPES), has recently issued a
paper8 that recommends that the government makes a plan of action in order to: (1) increase
the availability of data of public entities in order for the data to be accessible, usable and of
quality; (2) provide legal certainty for the mining of personal data; (3) increase the available
qualified professionals to process data; and (4) generate a data culture in the country.
Regarding the legal framework, the CONPES recommends that the country creates a
better classification of personal data and defines more clearly the conditions of data processing
in light of the new technological advances and the principle of accountability.
Recently, the Colombian data protection authority issued a guideline that sets forth
the standards that a country must comply with in order to ‘provide an adequate level of
protection of personal data’, and has included a list of countries that already comply with
such standards.10
8 Council CONPES No. 3920 of ‘National Policy of Data Exploitation’, National Department of Planning.
9 Article 26, Law 1581 of 2012
10 According to Circular No. 005 of 2017, the following countries are considered to have an adequate level of
protection of personal data: Germany; Australia; Austria; Belgium; Cyprus; Costa Rica; Croatia; Denmark;
Slovakia; Slovenia; Estonia; Spain; the United States ; Finland; France; Greece; Hungary; Ireland; Iceland;
141
© 2018 Law Business Research Ltd
Colombia
In light of the above, transfers of data to countries included in the list published by
SIC, or that provide an adequate level of protection of personal data, are permitted. Transfers
sent to a country that does not provide an adequate level of protection of personal data
require a declaration of conformity from SIC.
Italy; Japan; Latvia; Lithuania; Luxembourg; Malta; Mexico; Norway; the Netherlands; Peru; Poland;
Portugal; the United Kingdom; the Czech Republic; the Republic of Korea; Romania; Serbia; Sweden; and
countries that are considered to have an adequate level of protection by the European Commission.
142
© 2018 Law Business Research Ltd
Colombia
was enacted in 2012, the deadline for organisations to comply with this requirement has not
yet ended. Owing to the novelty and cumbersomeness of the registration proceeding, the
government has extended the term for registration several times.
ii Penalties
SIC has the power to open investigations against any organisation that is considered to
be infringing the data protection laws and enforce the law. According to the results of the
investigation, SIC has the power to
a impose fines of up to 2,000 minimum wages;
b order the suspension of activities related to data processing for up to six months while
corrections are implemented;
c order temporary closure of all operations related to processing when correctives are not
implemented during the suspension; and
d order the immediate or definitive closure of operations related to sensitive data.
Since 2010, SIC has imposed more than 620 sanctions for a total of 21 million pesos.
143
© 2018 Law Business Research Ltd
Colombia
main database of the company, so the user continued to receive commercial information. The
graduation of the penalty took into account that this was not the first time the company had
been investigated for the same kind of complaint.
Private litigation
Law 1581 does not provide for specific remedies or financial recovery for private plaintiffs.
However, other actions such as class contractual or tort actions are also available to data
subjects, but are still not common.
144
© 2018 Law Business Research Ltd
Colombia
X OUTLOOK
Article 27 of Law 1581 established that the government must adopt a regulation regarding
binding corporate rules. Although SIC has conducted a study on the matter, the government
has not yet issued the regulation, but is expected to do so.
On the other hand, it is important to note that although the EU’s new General Data
Protection Regulation is not applicable in Colombia, many domestic organisations are
interested in complying with such regime in order to be able to offer their products or services
in the EU.
145
© 2018 Law Business Research Ltd
Chapter 11
GERMANY
Olga Stepanova1
I OVERVIEW
Germany has been and still is the forerunner on privacy and data protection law. In 1970,
the German state of Hesse enacted the world’s first Data Protection Act. The other states
soon followed, and on 1 January 1978, the first German Federal Data Protection Act
(BDSG) entered into force. These acts established basic principles of data protection, such
as the requirement of a legal permission or the data subject’s consent for any processing of
personal data. In 1983, the German Federal Constitutional Court held that the individual
even has a constitutional right to ‘informational self-determination’. The background of this
groundbreaking verdict was a census planned for the year 1983, which essentially focused on
the census of the entire German population by the means of electronic data processing. The
people of Germany were anything but pleased with this idea and – as a consequence – more
than 1,600 complaints were filed at the Federal Constitutional Court against the census
law that had been specifically adopted for the census by the German parliament. Finally, in
December 1983, the German Federal Constitutional Court declared certain provisions of the
Census Act to be unconstitutional.
Over time, the German Federal Data Protection Act was subsequently amended in
order to meet the requirements of a society in which data processing grew more important.
Especially, digitalisation raised a lot of questions, which needed to be handled. Keeping this
in mind, among others the legislator passed the German Telemedia Act (TMA) in 2007,
which stipulated the duty to safeguard data protection during the operation of telemedia
services. However, since data protection law and telemedia law got increasingly intersected by
the internet, it was planned by the European legislator that the ePrivacy Regulation replacing
the TMA would also come into force at the same time as the General Data Protection
Regulation (GDPR). The GDPR entered into force on 25 May 2018 as scheduled. The
ePrivacy Regulation is still subject to tripartite negotiations and will probably be applicable
in 2020. For this reason, the following text provides an overview of the current legal situation
in Germany, presenting the changes and the challenges of a new era of data protection in
connection with digitalisation.
146
© 2018 Law Business Research Ltd
Germany
As a regulation, the new framework does not have to be transposed into the different
national laws of the European countries but is directly applicable in all EU Member States.
However, as a specialty of the GDPR, the regulation also contains ‘opening clauses’ that
provide Member States with the discretion to introduce additional national provisions
to concretise and further specify the application of the GDPR for specific issues (e.g., in
connection with employees). To that end, the German parliament passed a new version of the
BDSG in April 2017. This new set of rules, the GDPR and the new German BDSG, both
became effective in May 2018.
It was interesting to see how the GDPR became popular in mass media, which happens
with very few laws, so even tabloid newspapers were reporting about upcoming changes every
day. Due to the fact that the GDPR has always been mentioned in connection with the high
penalties stipulated in Article 83 GDPR, a kind of public fear grew, which led to a high level
of insecurity, even among customers who used messaging services, email services and social
media.
Although the GDPR maintains the main concepts of data protection as we knew them
before, or amends details of them (e.g., data processing is still prohibited if not explicitly
permitted by the data subject or a law, the legal bases for the transfer of personal data into
non-EU countries or the obligation to designate a data protection officer), the new rules also
bring some important changes. Small companies and non-profit organisations, in particular,
are unsure about how to implement the GDPR.
First and foremost, the GDPR extended its territorial scope, which means that
non-European companies may also fall within its scope, making it the first worldwide data
protection law due to globalisation. It applies to (1) all companies worldwide that target
European markets and in this context process the personal data of European Union citizens
(irrespective of where the processing takes place) and (2) those that process the data of
European citizens in the context of their European establishments. The GDPR tightens
the rules for obtaining valid consent to process personal information. Still, valid consent is
one of the two possibilities to justify data processing, the other option is legal justification.
Companies will therefore have to assess their processes to make sure they process personal
data lawfully, and to review whether it is advisable to refrain from seeking consent but to
switch to legal justification with fewer prerequisites and no possibility of being revoked at
any time.
As a consequence, upon request of data protection authorities, companies have to
provide prove that they fulfil their obligations under the GDPR. The authorities do not
need to investigate and prove the infringements by themselves anymore. The GDPR also
introduced mandatory privacy impact assessments (PIAs). It requires data controllers to
conduct PIAs where privacy breach risks are high to minimise risks to data subjects. This
means that before organisations can begin projects involving special categories of personal
data, such as health, they will have to conduct a PIA and work with the data protection offices
to ensure they are in compliance with data protection laws as projects progress.
Additionally, the GDPR expanded liability beyond the data controllers. In the past,
only data controllers were considered responsible for data processing activities, but the GDPR
extended liability to all organisations that process personal data. The GDPR also covers any
organisation that provides data processing services to the data controller, which means that
even organisations that are purely service providers that work with personal data will need to
comply with rules such as data minimisation.
147
© 2018 Law Business Research Ltd
Germany
148
© 2018 Law Business Research Ltd
Germany
for a server-based session, shopping cart contents or anything else that may be accomplished
through the storage of text data. The cookie is considered to be personal data if it contains
data that allow the controller to identify the data subject. However, before the GDPR entered
into force, and as long as the relevant part of TMA was still applicable, cookies could have
been placed in Germany as long as the user had the option to object (opt out). Now, there
is no such privileged treatment anymore as the general requirements regarding a lawful
data processing are applicable for cookies too. The only question not answered so far by the
European Court of Justice (ECJ) is whether the use of cookies must inevitably be based on
the data subject’s consent (Article 6(1)(a) GDPR) or is it sufficient when the controller states
that this use is necessary for the purposes of his legitimate interest (Article 6(1)(f ) GDPR).
In any case, according to the German Data Protection Conference, prior consent is required
for the use of tracking mechanisms, which pursue the behaviour of affected persons on the
internet and create user profiles. That means, that informed consent within the meaning of
the GDPR is required in the form of a declaration or other clearly confirmatory action taken
prior to data processing (i.e., before cookies are placed on the user’s device).2
The reason for this discussion and the legal uncertainty is derived from the fact that the
ePrivacy Regulation did not enter into force on time and has not even been passed. So far,
it may be advisable to fulfil the requirements of the GDPR in its whole scope, which means
that consent has to be sought before tracking the user.
Social media
Social media becomes more popular each day as the number of users grows. The same applies
to the opportunities and smart solutions offered by using these media. Most social media
platforms are free of charge. Users pay with their personal data, even though many of them
are not even aware of this fact. That is why the European legislator stipulated in the principles
of processing in Article 5 GDPR inter alia that processing has to be transparent and the
processor shall be responsible for obeying this principle. Therefore, one can find a lot of
other regulations realising the legislator’s will by creating a sharp sword against Big Data
companies, which are often suspected of processing data in an unlawful way.
The first decision against Facebook was ruled by the ECJ just 11 days after the GDPR
became effective (ECJ, 5 June 2018 – C-210/16). Admittedly, the original case dates back
seven years. At that time, the German Schleswig-Holstein State Centre for Data Protection
had asked the Academy of Economics to delete its fansite on Facebook and issue a ban
order. The background to this was the fact that neither Facebook nor the Business Academy
informed visitors about the data they had collected. After several instances, the case finally
ended up before the German Federal Administrative Court, which referred the question
of the responsibility for the data collection of the fansite operators to the ECJ, because the
fansite operator only had very limited access to the data records of the individual fansite
visitors collected by Facebook.
For many, the ECJ’s relatively harsh verdict against fansite operators was surprising.
Although the main responsibility for data collection lies with Facebook, it is theoretically
possible for the page operators to place cookies on the visitor’s device, even if the visitor
does not have a Facebook account. According to the ECJ, this in addition to the fact that
2 https://www.ldi.nrw.de/mainmenu_Datenschutz/submenu_Technik/Inhalt/TechnikundOrganisation/
Inhalt/Zur-Anwendbarkeit-des-TMG-fuer-nicht-oeffentliche-Stellen-ab-dem-25_-Mai-2018/
Positionsbestimmung-TMG.pdf.
149
© 2018 Law Business Research Ltd
Germany
fansite operators receive the visitor’s user data (even if only anonymised) and can use these for
parameterisation lead to joint responsibility of the site operators. This is particularly because
of the fact that the collection of this data cannot (yet) be deactivated. Until Facebook grants
this option to its users, the common fansite operator remains jointly responsible for the
collection of user data. Even the ECJ takes account of the significant imbalance in the use of
data between Facebook and the operators of the respective fan page insofar as the degree of
responsibility can be assessed differently in individual cases, however, in the court’s opinion
Facebook and the fansite operators are still joint controllers. In the end, Facebook will have
to react to implementing mechanisms like cookie banners or others to give the user access
to information. However, this decision and the German Federal Court’s decision regarding
the obligation of Facebook to provide heirs with access to the digital postbox of the decedent
(BGH, 12 July 2018 – III ZR 183/17), clearly show that social media is now being regulated
more strictly.
150
© 2018 Law Business Research Ltd
Germany
of the Privacy Shield the United States is found to have an adequate level of data protection.
But the Privacy Shield itself is again the target of a great deal of criticism. There are currently
several complaints pending against the Privacy Shield at the European Court of Justice.
Data transfers to any other non-EU country may be justified by the derogation rules
of Article 49 GDPR. Accordingly, the international transfer of personal data is admissible if:
a the data subject has given his or her consent;
b the transfer is necessary for the performance of a contract between the data subject and
the controller or the implementation of pre-contractual measures taken in response to
the data subject’s request;
c the transfer is necessary for the conclusion or performance of a contract that has been
or is to be concluded in the interest of the data subject between the controller and a
third party;
d the transfer is necessary for Important reasons of public interest;
e the transfer is necessary or legally required on important public interest grounds, or for
the establishment, exercise or defence of legal claims;
f the transfer is necessary to protect the vital interests of the data subject; or
g the transfer is made from a register that is intended to provide information to the
public, and that is open to consultation either by the public in general or by any person
who can demonstrate a legitimate interest, to the extent that the conditions laid down
in law are fulfilled in the particular case.
The most relevant grounds are those given in (b), namely if the transfer is necessary to perform
a contract between the data subject and the controller. This includes international monetary
transactions and distance-selling contracts as well as employment contracts. All transfers in
this respect have to be essential for the purposes of the contract.
Any consent within the meaning of (a) will only be valid if the data subject was
informed about the risks that are involved in data transfers to countries that do not have an
adequate standard of data protection. In addition, the consent has to be based on the data
subject’s free will; this may be difficult if employee data are involved.
If none of the aforementioned exceptions applies, the transfer of personal data
to third countries with an inadequate level of data protection is nonetheless possible if,
among other requirements, the competent supervisory authority authorises the transfer.
Such an authorisation will only be granted when the companies involved adduce adequate
safeguarding measures to compensate for a generally inadequate standard of data protection,
see Article 49(1)2 GDPR. However, the primary safeguarding measures are the use of
standard contractual clauses issued by the European Commission and the establishment of
binding corporate rules.
151
© 2018 Law Business Research Ltd
Germany
The state data protection agencies are charged with supervising the data privacy
compliance of state entities, as well as all non-public entities whose principal place of business
is established in the state and that are not subject to the exclusive jurisdiction of the federal
supervisory authority. In states that have enacted a freedom of information act, the state
supervisory authorities are typically also charged with supervising the act’s application by
state entities.
The heads of the supervisory authorities are typically appointed by the federal and state
parliaments respectively, and are required to report to their respective parliaments.
152
© 2018 Law Business Research Ltd
Germany
However, in the event of unsatisfactory contact with the company data protection
officer, the supervisory authority and the civil courts can of course be called in.
VII OUTLOOK
The GDPR is still an unknown and often only can be understood by a teleological
interpretation. In Germany, there are 16 data protection authorities that follow different
interpretations of the GDPR text. This complicates advising in privacy matters. Therefore,
it will be interesting to see how the new laws will be interpreted by German and European
courts. Furthermore, we are looking forward to seeing what impact the GDPR will have on
companies, especially social media operators.
153
© 2018 Law Business Research Ltd
Chapter 12
HONG KONG
I OVERVIEW
The Personal Data (Privacy) Ordinance (PDPO) establishes Hong Kong’s data protection
and privacy legal framework. All organisations that collect, hold, process or use personal data
(data users) must comply with the PDPO, and in particular the six data protection principles
(DPPs) in Schedule 1 of the PDPO, which are the foundation upon which the PDPO is
based. The Office of the Privacy Commissioner for Personal Data (PCPD), an independent
statutory body, was established to oversee the enforcement of the PDPO.
Hong Kong was the first Asian jurisdiction to enact comprehensive personal data
privacy legislation and to establish an independent privacy regulator. Unlike the law in several
other jurisdictions in the region, the law in Hong Kong covers both the private and public
sectors. Hong Kong issued significant new amendments to the PDPO in 2012 with a key
focus on direct marketing regulation and enforcement with respect to the use of personal
data.
Despite Hong Kong’s pioneering role in data privacy legislation, the PCPD’s level of
activity with respect to regulatory guidance and enforcement has been relatively flat in the past
year. In addition, Hong Kong has not introduced stand-alone cybercrime or cybersecurity
legislation as other Asian countries have done. Certain sectoral agencies, notably Hong Kong’s
Securities and Futures Commission (SFC), have continued to press forward on cybersecurity
regulation for specific industries.
This chapter discusses recent data privacy and cybersecurity developments in Hong
Kong from August 2017 to July 2018. It will also discuss the current data privacy regulatory
framework in Hong Kong, and in particular the six DPPs and their implications for
organisations, as well as specific data privacy issues such as direct marketing, issues relating to
technological innovation, international data transfer, cybersecurity and data breaches.
154
© 2018 Law Business Research Ltd
Hong Kong
Management,3 the April 2016 Privacy Guidelines: Monitoring and Personal Data Privacy
at Work4 and the June 2016 guidance note on Proper Handling of Data Access Request
and Charging of Data Access Request Fee by Data Users.5 None of these publications are
legally binding, although failure to follow the codes of practice may give rise to negative
presumptions in any enforcement proceedings.
From mid-2016 to mid-2017, the PCPD did not issue any additional codes of practice
or guidelines, but did release three revisions to existing guidance notes:
a Guidance on Data Breach Handling and the Giving of Breach Notifications (revised
December 2016) (providing assistance to data users in handling breaches and mitigating
loss and damage);6
b Guidance on CCTV Surveillance and Use of Drones (revised March 2017) (setting
out recommendations on whether and how to use CCTV to properly protect data
privacy);7 and
c Proper Handling of Data Correction Request by Data Users (revised May 2017)
(providing a step-by-step approach on the proper handling of a data correction request
under the PDPO).8
From mid-2017 to mid-2018, the PCPD issued a new guidance note in December 2017
entitled Guidance on Election Activities for Candidates, Government Departments, Public
Opinion Research Organisations and Members of the Public.9 Additionally, the PCPD
released revised Guidance on CCTV Surveillance and Use of Drones.10
The PCPD reported that it had received 3,501 complaints in 2017, which included
1,968 complaints relating to the reported loss of laptops by the Registration and Electoral
Office containing personal data of election committee members and electors (the REO
Incident). Excluding those complaints, the remaining 1,533 complaints represents a 17 per
cent decrease from the 1,838 complaints received in 2016.11 Most of the complaints involved
were made against private sector organisations, with financial, property management, and
telecommunications companies leading the way. Forty-one per cent of the complaints related
to use of personal data without consent with about one-third complaining about the purpose
and manner of the data collection. The PCPD received 237 ICT-related privacy complaints
in 2017, representing a 3 per cent increase as compared to 2016. Most of these complaints
related to the use of mobile apps and social networking websites. The PCPD received notice
of 106 data breach incidents affecting 3.87 million persons in 2017 compared to 89 incidents
involving 104,000 individuals the year before; however, taking out the REO Incident
3 www.pcpd.org.hk/english/data_privacy_law/code_of_practices/files/PCPD_HR_Booklet_Eng_AW07_
Web.pdf.
4 www.pcpd.org.hk/english/data_privacy_law/code_of_practices/files/Monitoring_and_Personal_Data_
Privacy_At_Work_revis_Eng.pdf.
5 www.pcpd.org.hk/english/resources_centre/publications/files/DAR_e.pdf.
6 www.pcpd.org.hk/english/resources_centre/publications/files/DataBreachHandling2015_e.pdf
(The publication on the PCPD website has not yet been updated).
7 www.pcpd.org.hk/english/resources_centre/publications/files/GN_CCTV_Drones_e.pdf.
8 www.pcpd.org.hk/english/resources_centre/publications/files/dcr_e.pdf.
9 www.pcpd.org.hk/english/resources_centre/publications/files/electioneering_en.pdf.
10 www.pcpd.org.hk/english/resources_centre/publications/files/GN_CCTV_Drones_e.pdf.
11 www.pcpd.org.hk/english/news_events/media_statements/press_20180214.html.
155
© 2018 Law Business Research Ltd
Hong Kong
(which affected 3.78 million people), the number of affected individuals was only 86,000,
representing a decrease of 17 per cent as compared to 2016. Direct marketing complaints
decreased substantially in 2017, falling from 393 to 186 cases.
With respect to enforcement in 2017, the PCPD issued 26 warnings and three
enforcement notices as compared to 36 warnings and six enforcement notices in 2016.
Referrals to the police of cases for criminal prosecutions fell substantially compared to 2016,
from 112 to 19, almost all of which involved direct marketing violations. The number of
actual prosecutions remained relatively flat (four prosecutions in 2017 compared to five in
2016). All four prosecutions in 2017 resulted in convictions. One was for a company director
who failed to comply with a summons issued by the Privacy Commissioner, and the other
three concerned direct marketing violations. In January 2018, PARKnSHOP pled guilty
to using the personal data of a data subject in direct marketing without obtaining the data
subject’s consent, resulting in a HK$3,000 fine.12
The PCPD does not systematically publish decisions or reports based on the outcome
of its investigations. For the entirety of 2017 and up until June 2018, the PCPD published
one investigation report13 in 2017 (offering recommendations to estate agencies in ensuring
compliance with the requirements under the PDPO).
12 www.pcpd.org.hk/english/news_events/media_statements/press_20180102b.html.
13 www.pcpd.org.hk/english/enforcement/commissioners_findings/inspection_reports/files/R17-2201_Eng.
pdf.
14 www.police.gov.hk/ppp_en/04_crime_matters/tcd/legislation.html.
15 www.infosec.gov.hk/english/ordinances/corresponding.html.
16 www.infosec.gov.hk/english/crime/statistics.html.
17 www.sfc.hk/edistributionWeb/gateway/EN/consultation/doc?refNo=17CP4.
156
© 2018 Law Business Research Ltd
Hong Kong
18 www.sfc.hk/edistributionWeb/gateway/EN/circular/doc?refNo=17EC26.
19 www.hkma.gov.hk/media/eng/doc/key-information/guidelines-and-circular/2016/20161221e1.pdf.
20 www.hkma.gov.hk/media/eng/doc/key-information/guidelines-and-circular/2016/20161219e1.pdf.
157
© 2018 Law Business Research Ltd
Hong Kong
Data users are required to take all practicable steps to ensure that on or before the
collection of the data subjects’ personal data (or on or before first use of the data in respect of
item (d) below), the data subjects were informed of the following matters:
a the purpose of collection;
b the classes of transferees of the data;
c whether it is obligatory to provide the data, and if so, the consequences of failing to
supply the data; and
d the right to request access to and request the correction of the data, and the contact
details of the individual who is to handle such requests.
158
© 2018 Law Business Research Ltd
Hong Kong
of organisation-wide policies, guidelines and procedures. Apart from data destruction, the
guidance note also provides that the data can be anonymised to the extent that it is no longer
practicable to identify an individual directly or indirectly. In such cases, the data would no
longer be considered as ‘personal data’ under the PDPO. Nevertheless, it is recommended
that data users must still conduct a regular review to confirm whether the anonymised data
can be re-identified and to take appropriate action to protect the personal data.
159
© 2018 Law Business Research Ltd
Hong Kong
associated with the use of portable storage devices. Further, given the rapid development
of technology, it is recommended that this policy be updated and audited regularly. Some
technical controls recommended by the guidance note include encryption of the personal
data stored on the personal storage devices, and adopting systems that detect and block the
saving of sensitive information to external storage devices.
160
© 2018 Law Business Research Ltd
Hong Kong
ii Direct marketing
Hong Kong’s regulation of direct marketing deserves special attention from organisations
engaging in such activities. Unlike with violations of the DPPs, violations of the PDPO’s
direct marketing provisions are criminal offences, punishable by fines and by imprisonment.
The PCPD has demonstrated a willingness to bring enforcement actions in this area and to
refer particularly egregious violations for criminal prosecution.
161
© 2018 Law Business Research Ltd
Hong Kong
its customers that the supply of any other personal data to allow it to carry out specific
purposes, such as customer profiling and segmentation, is entirely voluntary, and obtain
written consent from its customers for such use.
Spam messages
Direct marketing activities in the form of electronic communications (other than person-to-
person telemarketing calls) are regulated by the Unsolicited Electronic Messages Ordinance
(UEMO). Under the UEMO, businesses must not send commercial electronic messages
to any telephone or fax number registered in the do-not-call registers. This includes text
messages sent via SMS, pre-recorded phone messages, faxes and emails. Contravention of
the UEMO may result in fines ranging from HK$100,000 to HK$1 million and up to five
years’ imprisonment.
In early 2014, the Office of the Communications Authority prosecuted a travel agency
for sending commercial facsimile messages to telephone numbers registered in the do-not-
call registers. This is the first prosecution since the UEMO came into force in 2007. The case
was heard before a magistrate’s court, but the defendant was not convicted because of a lack
of evidence.
Enforcement
Following prosecution referrals by the PCPD, Hong Kong courts handed down the first
penalties in direct marketing violations in 2015. In September 2015, the Hong Kong
Magistrates’ Court convicted the Hong Kong Broadband Network Limited (HKBN) for
violating the PDPO’s requirement that a data user cease using an individual’s personal data in
21 Report on Further Public Discussions on Review of the Personal Data (Privacy) Ordinance (April 2011).
162
© 2018 Law Business Research Ltd
Hong Kong
direct marketing upon request by that individual.22 The court imposed a fine of HK$30,000.
In a separate court action from September 2015, Links International Relocation Limited
pleaded guilty to a PDPO direct marketing violation for not providing required information
to a consumer before using his personal data in direct marketing.23 The court fined the
company HK$10,000.
Additional convictions and fines followed in 2015 and 2016 for direct marketing
violations. The most recent cases initiated by the PCPD resulting in fines and convictions
were a January 2017 guilty plea by DBS Bank for failing to comply with a customer request
to cease using personal data in direct marketing, resulting in a HK$10,000 fine,24 and a
December 2016 guilty plea from a watch company that failed to obtain consent and to
inform the consumer of his rights under the PDPO before engaging in direct marketing
to the consumer, resulting in a HK$16,000 fine.25 Given the large number of criminal
referrals by the PCPD with respect to direct marketing violations, we expect direct marketing
prosecutions to continue to be an active enforcement area.
Cloud computing
The PCPD published the information leaflet ‘Cloud Computing’ in November 2012, which
provides advice to organisations on the factors they should consider before engaging in
cloud computing. For example, organisations should consider whether the cloud provider
163
© 2018 Law Business Research Ltd
Hong Kong
has subcontracting arrangements with other contractors, and what measures are in place to
ensure compliance with the PDPO by these subcontractors and their employees. In addition,
when dealing with cloud providers that offer only standard services and contracts, the data
user must evaluate whether the services and contracts meet all security and personal data
privacy protection standards they require.
On 30 July 2015, the PCPD published the revised information leaflet ‘Cloud
Computing’ to advise cloud users on privacy, the importance of fully assessing the benefits
and risks of cloud services and the implications for safeguarding personal data privacy. The
new leaflet includes advice to organisations on what types of assurances or support they
should obtain from cloud service providers to protect the personal data entrusted to them.
Employee monitoring
In April 2016, the PCPD published the revised Privacy Guidelines: Monitoring and Personal
Data Privacy at Work, to aid employers in understanding steps they can take to assess the
appropriateness of employee monitoring for their business, and how they can develop
privacy-compliant practices in the management of personal data obtained from employee
monitoring. The guidelines are applicable to employee monitoring activities whereby personal
data of employees are collected in recorded form using the following means: telephone, email,
internet and video.
Employers must ensure that they do not contravene the DPPs of the PDPO while
monitoring employees’ activities. The PDPO has provided some additional guidelines on
monitoring employees’ activities and has recommended employers to do the following:
a Evaluate the need for employee monitoring and its impact upon personal data privacy.
Employers are recommended to undertake a systematic three-step assessment process:
• ‘assessment’ of the risks that employee monitoring is intended to manage and
weigh that against the benefits to be gained;
• ‘alternatives’ to employee monitoring and other options available to the employer
that may be equally cost-effective and practical but less intrusive on an employee’s
privacy; and
• ‘accountability’ of the employer who is monitoring employees, and whether the
employer is accountable and liable for failure to be compliant with the PDPO in
the monitoring and collection of personal data of employees.
b Monitor personal data obtained from employee monitoring. In designing monitoring
policies and data management procedures, employers are recommended to adopt a
three-step systematic process:
• ‘clarify’ in the development and implementation of employee monitoring
policies the purposes of the employee monitoring; the circumstances in which
the employee monitoring may take place; and the purpose for which the personal
data obtained from monitoring records may be used;
• ‘communication’ with employees to disclose to them the nature of, and reasons
for, the employee monitoring prior to implementing the employee monitoring;
and
• ‘control’ over the retention, processing and the use of employee monitoring data
to protect the employees’ personal data.
164
© 2018 Law Business Research Ltd
Hong Kong
ii Disclosure
Regulatory bodies in Hong Kong, such as the Hong Kong Police Force, the Independent
Commission Against Corruption and the Securities and Futures Commission, are obliged
to comply with the requirements of the PDPO during their investigations. For example,
regulatory bodies in Hong Kong are required to provide a PICS to the individuals prior to
collecting information or documents containing their personal data during investigations.
165
© 2018 Law Business Research Ltd
Hong Kong
ii Private enforcement
Section 66 of the PDPO provides for civil compensation. Individuals who suffer loss as a
result of a data user’s use of their personal data in contravention of the PDPO are entitled
to compensation by that data user. It is a defence for data users to show that they took
reasonable steps to avoid such a breach.
After the Amendment Ordinance came into force, affected individuals seeking
compensation under Section 66 of the PDPO may apply to the Privacy Commissioner for
166
© 2018 Law Business Research Ltd
Hong Kong
assistance and the Privacy Commissioner has discretion whether to approve it. Assistance by the
Privacy Commissioner may include giving advice, arranging assistance by a qualified lawyer,
arranging legal representation or other forms of assistance that the Privacy Commissioner
may consider appropriate.
Although Hong Kong does not currently have cybersecurity legislation, the government does
support a number of organisations dedicated to responding to cyber threats and incidents.
These entities include the Hong Kong Emergency Response Team Coordination Centre
(managed by the Hong Kong Productivity Council) for coordinating responses for local
enterprises and internet users, and the Government Computer Emergency Response Team
Hong Kong (a work unit established under the Office of the Government Chief Information
Officer), which is a team charged with coordinating and handling incidents relating to both
the private and public sectors. In addition, the Hong Kong Police Force has established the
Cyber Security and Technology Crime Bureau, which is responsible for handling cybersecurity
issues and combating computer crime.
167
© 2018 Law Business Research Ltd
Hong Kong
ii Data breaches
There is currently no mandatory data breach notification requirement in Hong Kong. In
October 2015 and then again in December 2016, the PCPD revised its Guidance on Data
Breach Handling and the Giving of Breach Notifications, which provides data users with
practical steps in handling data breaches and to mitigate the loss and damage caused to the
individuals involved. Although the PCPD noted in the Guidance that there are no statutory
notification requirements, the PCPD recommended that data users strongly consider
notifying affected persons and relevant authorities, such as the PCPD. In particular, after
assessing the situation and the impact of the data breach, the data users should consider
whether the following persons should be notified as soon as practicable:
a the affected data subjects;
b the law enforcement agencies;
c the Privacy Commissioner (a data breach notification form is available on the PCPD’s
website);
d any relevant regulators; or
e other parties who may be able to take remedial actions to protect the personal data
privacy and the interests of the data subjects affected (e.g., internet companies such as
Google and Yahoo! may assist in removing the relevant cached link from their search
engines).
X OUTLOOK
Hong Kong’s data privacy and protection framework is long-standing and relatively
mature. We expect that the PCPD will continue enforcement at generally the same levels,
with continued emphasis on direct marketing violations and prosecution referrals for such
violations.
In recent public statements, the PCPD has emphasised the importance of striking
a balance between privacy protection and free flow of information, engaging small- and
medium-sized businesses in promoting the protection of and respect for personal privacy,
and strengthening the PCPD’s working relationship with mainland China and overseas
data protection authorities. We expect that the PCPD and the Hong Kong government
will continue to emphasise the development of Hong Kong as Asia’s premier data hub and
to provide additional policy, promotional and incentive support to facilitate growth in the
region.
With respect to cybercrime and cybersecurity, we do not anticipate major legislation in
the near term and expect that sectoral regulators will continue to take the lead in these areas.
168
© 2018 Law Business Research Ltd
Chapter 13
HUNGARY
Tamás Gödölle1
I OVERVIEW
The new constitution of Hungary (the Fundamental Law) was adopted in 2011 and entered
into force on 1 January 2012.2 The Fundamental Law contains a section on ‘Freedom and
Responsibility’, which describes the fundamental rights of individuals. Article VI(1) of the
Fundamental Law generally provides that everyone is entitled to respect for his or her private
and family life, home, communications and good reputation, whereas Article VI(2) provides
for the right to the protection of personal data as well as for the right to access and disseminate
information of public interest. In addition, Article VI(3) states that an independent authority
shall be responsible for the enforcement of the protection of personal data and freedom of
access to data of public interest.
The Hungarian Civil Code, which was adopted in 2013 and entered into force on
15 March 2014, also contains provisions concerning privacy rights. The general rules on
the protection of personality rights (including the right for the protection of personal data)
are set out in the Civil Code, which provides the basic rules for civil law relationships.
Accordingly, personality rights can be exercised freely within the framework of the law and
within the rights of others. The exercise of such rights shall not be impeded by any other
person. However, personality rights shall not be considered as having been violated if the
person has given prior consent.
Although the above legislation contains general principles and clauses, the recent
introduction of the European General Data Protection Regulation (GDPR) has caused quite
a change in Hungary’s single legislative privacy regime. The general rules of the protection of
personal data and freedom of information from 25 May 2018 are contained in the GDPR
and Act CXII of 2011 on Informational Self-Determination and Freedom of Information
(the Privacy Act) will be secondary to the general rules that are to be applied throughout the
European Union. As of July 2018, the bill for the amendment of the Privacy Act, for the sake
of GDPR compliance, is being discussed by the Hungarian parliament. It is likely that the
final version of the Privacy Act will be published later in the summer. It is interesting that a
draft for the amendment had been issued for comments by professionals last autumn, but it
was withdrawn because the government was not satisfied with the draft, and now the same
amendment is being discussed by the parliament even though it suffers from the same defects
as last autumn, namely that the draft did not make use of the possible points of departure
from the GDPR text where it is allowed.
169
© 2018 Law Business Research Ltd
Hungary
In the meantime the Privacy Act underwent a minor modification so that the Hungarian
Data Protection Authority (DPA) has been appointed to act as a supervisory authority under
the GDPR. This minor amendment also stipulated that the legal consequences of a breach of
data protection laws will be punished with just a warning for the first time if this is possible
under the circumstances of the case.
The entity responsible for enforcing the data protection law is the DPA. The DPA aims
to guarantee the rights of individuals to exercise control over their privacy and to have access
to data of public interest and public data on the grounds of public interest. The GDPR and
the Privacy Act are regarded as background legislation for specific statutes regulating the
collection and processing of personal data.
The GDPR and the Privacy Act should be considered as the general legislation providing
rules regarding the protection of personal data and the disclosure of public data. Beyond this
scope, there are other sectoral acts (e.g., the Labour Code, Electronic Communications Act,
etc.) that provide additional data protection-related provisions. The processing of medical,
criminal, electoral and citizenship data is regulated by other acts.
In Hungarian data privacy regulation, the role of NGOs and self-regulatory industry
groups, as well as society or advocacy groups, is marginal, and there are no specific Hungarian
laws providing for government surveillance powers.
The government approved the National Cybersecurity Strategy, which determines the
national objectives and strategic directions, tasks and comprehensive government tools to
enable Hungary to enforce its national interests in Hungarian cyberspace, within the context
of the global cyberspace. The strategy aims to develop a free and secure cyberspace and to
protect national sovereignty.
170
© 2018 Law Business Research Ltd
Hungary
Personal data
The GDPR and the Privacy Act apply to all data processing and technical data processing
that is carried out in Hungary or that aims at Hungarian data subjects, and that pertains to
the data of physical persons. The GDPR and the Privacy Act regulate the processing of data
carried out wholly or partially by automatic means, and the manual processing of data.
Personal data are defined in Article 3.2 of the Act as any data relating to the data
subject – a specific (directly or indirectly identified or identifiable) natural person – and any
conclusion with respect to the data subject that can be inferred from that data, in particular
by reference to his or her name, identification code or to one or more factors specific to his
or her physical, physiological, mental, economic, cultural or social identity. For the purposes
of the GDPR, the term personal data is very similar: ‘personal data’ means any information
relating to an identified or identifiable natural person (‘data subject’); an identifiable natural
person is one who can be identified, directly or indirectly, in particular by reference to an
identifier such as a name, an identification number, location data, an online identifier or to
one or more factors specific to the physical, physiological, genetic, mental, economic, cultural
or social identity of that natural person.
Sensitive data
The term ‘special data’ (sensitive data) is defined by the Privacy Act as information on a
data subject’s racial and national origin, political opinion or party affiliation, religious or
ideological beliefs, or membership of any special interest organisations, as well as his or her
state of health, pathological addictions, sex life or criminal personal data.6 Now the GDPR
provides a similar term as follows: processing of personal data revealing racial or ethnic
origin, political opinions, religious or philosophical beliefs, or trade union membership,
and the processing of genetic data, biometric data for the purpose of uniquely identifying a
natural person, data concerning health or data concerning a natural person’s sex life or sexual
orientation shall be prohibited.
Please note that the basic standpoint of the GDPR is different from the approach of
the Privacy Act, as the GDPR prescribes that the processing of categories of sensitive data is
prohibited and they may be processed only if certain exceptions listed in GDPR Article 9(2)
are applicable.
171
© 2018 Law Business Research Ltd
Hungary
The Privacy Act also protects data of public interest and data that are public on grounds
of public interest. The term ‘data of public interest’ is defined to include any information or
knowledge, not falling under the definition of personal data, processed by an organ or person
performing a state or local government function or other public function determined by law.7
Data controller
A data controller has been defined by the Privacy Act as any natural or legal person, or
any organisation without legal personality, who or which, alone or jointly with others,
determines the purpose of the processing of personal data, makes decisions on data processing
(including those as to the means of the processing), and implements these decisions or has
them implemented by the technical data processor he or she has assigned, whereas the new
GDPR contains the following definition: ‘controller’ means the natural or legal person,
public authority, agency or other body which, alone or jointly with others, determines the
purposes and means of the processing of personal data; where the purposes and means of
such processing are determined by Union or Member State law, the controller or the specific
criteria for its nomination may be provided for by Union or Member State law.
Data processor
The Act identifies a ‘data processor’ as any natural or legal person or organisation without
legal personality that carries out the technical processing of personal data based on a contract
with the data controller – including the conclusion of a contract pursuant to a rule of law.
Under the GDPR ‘processor’ means a natural or legal person, public authority, agency or
other body that processes personal data on behalf of the controller.
The GDPR and the Act apply to both types of data processing entities, namely data
controllers and data processors, with some different provisions applying to technical data
processing.
The data controller is always responsible for the lawfulness of the instructions given for
the data processing operations of its outsourced data processor.
The data processor shall process personal data in compliance with the specific
instructions of the data controller; consequently, the processor cannot make any decisions
concerning data processing.
It has been noted that, as of 1 July 2013, a data processor may contract out processing
operations to another processor in line with the instructions of the data controller.8 This
regulation is also incorporated into the GDPR by default.
172
© 2018 Law Business Research Ltd
Hungary
DPA) prior to processing where a data protection impact assessment under Article 35 GDPR
indicates that the processing would result in a high risk in the absence of measures taken by
the controller to mitigate the risk.
Protection of consumers
The Direct Marketing Act identifies numerous obligations for marketing organisations to
ensure the protection of consumers, and particularly restricts the use of the name and home
address of natural persons for marketing purposes.10 Notably, the provisions of the Direct
Marketing Act are only applicable where the marketing materials are sent by post. Marketing
materials sent by electronic means are regulated by the Advertising Act and the e-Commerce
Act. In this regard the GDPR brings some novelties as Recital (47) contains that the processing
of personal data for direct marketing purposes may be regarded as carried out for a legitimate
interest and this implies that no consent is required as a legal basis for such data processing
which means a significant change from the previous Hungarian approach. It is also true that
the above indicated Hungarian Acts are in conflict with the GDPR as they have not been
amended yet, therefore the Hungarian situation may be regarded as dubious as long as the
domestic laws are not made to be compliant with the GDPR.
Before collecting information from an individual, the controller must indicate to the data
subject whether data processing is based on consent or relies on any other legal ground.
In addition, the data controller must provide the data subject with unambiguous and
detailed information on all the facts relating to the processing of his or her data in line with
Article 13/14 GDPR.
Regarding online data, Act CVIII of 2001 on Certain Issues of Electronic Commerce
Services and Information Society Services provides, inter alia, that information means any
173
© 2018 Law Business Research Ltd
Hungary
data, signal or image that can be processed, stored and transmitted by electronic means
irrespective of whether its content is protected by law; and information society service means
remote services provided by electronic means, generally for payment, and accessed by the
recipient of the service individually.
According to this Act, the service provider may process personal data that is suitable
and sufficient for the identification of the recipient of the service for the purposes of:
a drawing up a contract for the service in question;
b determining and modifying the contents and monitoring the performance of the
service;
c charging for the service; and
d enforcing claims relating to the service.
The recipient of the service shall be allowed – at all times before and during the course of
using the information society service – to prohibit the data processing.
174
© 2018 Law Business Research Ltd
Hungary
For the purposes of preliminary notices Articles 13 and 14 of the GDPR shall also be taken
into consideration.
Additionally, GDPR introduced a new regime for notifying data breaches to the DPA and
in certain cases to the data subjects. The detailed rules can be found in Articles 33 and 34
GDPR: in the case of a personal data breach, the controller shall without undue delay and,
where feasible, not later than 72 hours after having become aware of it, notify the personal
data breach to the supervisory authority, unless the personal data breach is unlikely to result
in a risk to the rights and freedoms of natural persons. The notification shall contain the
nature of the personal data breach, name and contact details of the data protection officer,
the likely consequences and the measures taken or proposed to be taken by the controller to
address the personal data breach.
When the personal data breach is likely to result in a high risk to the rights and freedoms
of natural persons, the controller shall communicate the personal data breach to the data
subject without undue delay.
175
© 2018 Law Business Research Ltd
Hungary
or the DPA.14 A data controller must delete data that is incomplete or inaccurate and cannot
be corrected in a lawful way, unless the deletion is prohibited by another law. It must also
destroy data when the purpose of processing has ceased to exist, or when the time limit for
the storage of the data has expired.
Right to objection
Article 21 of the Privacy Act and Article 21 of the GDPR grant data subjects the right to
object to the processing of their data in numerous circumstances. These include, for example,
when the processing is necessary only for enforcing a right or legitimate interest of the data
controller or third party, unless the data processing has been ordered by law.
When an objection has been filed, the data controller must suspend the use of the data
while investigating the complaint. It must respond to the request promptly, within a month.
Employee monitoring
The Labour Code generally authorises employers to introduce monitoring measures.15 It
allows employers to monitor the conduct of employees; however, such measures may be taken
only in the context of employment. Further, the means used for monitoring may not violate
the human dignity of the worker. To exclude all possibility of doubt, the Labour Code also
states that the private life of the employee cannot be monitored, which is in conformity with
the practice of the European Court of Human Rights. In addition, the employer must give
notice to employees, in advance, of the use of technical means serving to control or monitor
employees’ conduct.
176
© 2018 Law Business Research Ltd
Hungary
Restriction on cookies
In November 2009, the European Commission adopted Directive 2009/136/EC (2009
Directive), and this amendment was to be implemented in the laws of each of the European
Union Member States by 25 May 2011.
Article 3(5) of the 2009 Directive was implemented in Hungary by Section 155(4) of
the Hungarian Act on Electronic Communications, which generally provides that data may
177
© 2018 Law Business Research Ltd
Hungary
be stored or accessed on the terminal equipment of the subject end user or subscriber after
the provision of clear and comprehensive information, including the purpose of the data
processing, if the corresponding consent of the end user or subscriber has been granted.
Health
The processing of health data is governed by the provisions of the Act on Medical Care (Act
CLIV of 1997) as well as by the Act on Handling and Protecting Medical Data (Act XLVII
of 1997). The processing of human genetic data (and research) is governed by the Act on the
Protection of Human Genetic Data and the Regulation of Human Genetic Studies, Research
and Biobanks.
18 http://felugyelet.mnb.hu/data/cms2364896/vezkorlev_4_2012.pdf.
178
© 2018 Law Business Research Ltd
Hungary
The Act on Handling and Protecting Medical Data uses a very broad definition of
‘health data’. In the Act, health data are defined as:
a any data relating to the data subject’s physical, emotional or mental status, pathological
addiction, as well as the circumstances associated with disease, death or cause of death
that is communicated by the data subject or by any third person in relation to the data
subject, or experienced, examined, measured, extracted by or relating to the medical
health service; and
b any data in connection with or affecting the health service (including, for instance, any
conduct, environment or profession). Since health data are covered by the definition of
‘special data’ under the Privacy Act, the processing of such personal information is only
permitted with the written informed consent of the data subject or if explicitly ordered
by the act of legislation.
The Act on Handling and Protecting Medical Data identifies the legal purposes for which
health data may be processed.
For any other purposes not covered explicitly by the provisions of the Act, health data
and the related personal identification data may only be processed if the patient, or his or
her legal or duly authorised representative, granted his or her informed, written consent to
the processing.
The Act determines the scope of persons who may lawfully process health data. The Act
also regulates the strict secrecy obligations of medical personnel providing medical treatment.
Medical institutions must store health records for 30 years and must store final reports for 50
years, after which time the documentation must be destroyed.
Patients have the right to be informed about the handling of their health data. They
also have the right to access their health data.
Electronic communications
Under the provisions of the Electronic Communications Act of 2003, service providers are
generally authorised to process the personal data of end users and subscribers, always to the
extent required and necessary:
a for their identification for the purpose of drawing up contracts for electronic
communication services (including amendments to such contracts);
b to monitor performance;
c for billing charges and fees; and
d for enforcing any related claims.
Further, the Act provides that the provision of electronic communications services may not
be made dependent upon the user’s consent for processing his or her personal data; the Act on
Electronic Communications defines other purposes for processing personal data.19
Commercial communications
Several laws address the protection of personal data in the context of commercial
communications. These laws include Act CVIII of 2001 on Electronic Commerce and on
179
© 2018 Law Business Research Ltd
Hungary
Information Society Services (the e-Commerce Act),20 the 1995 Law on the Use of Name
and Address Information Serving the Purposes of Research and Direct Marketing (the Direct
Marketing Act), as well as the 2008 Act on the Basic Requirements and Certain Restrictions
of Commercial Advertising Activity (the Advertising Act).
In 2001, Hungary enacted the e-Commerce Act, which requires that each commercial
email clearly and unambiguously indicates that a commercial message is an electronic
advertisement, and that it provides the identity of the electronic advertiser or that of the
actual sender.21
The Advertising Act provides that unsolicited marketing material may not be sent to
an individual without having obtained the prior, express, specific, voluntary and informed
consent of the individual in compliance with the applicable provisions of the Privacy Act.22
The message must contain the email address and other contact details where the individual
may request the prohibition of the transmission of electronic advertisements.23 This approach
now may be changed by the above cited Recital (47) of the GDPR, however, as of now the
situation is rather uncertain in Hungary, especially in absence of the new e-Privacy Regulation
of the EU that will clarify the rules for direct marketing and consent.
The advertiser, advertisement service provider and publisher of electronic advertisements
are required to keep a register of persons who have given their consent to receiving
advertisements.24 The information about these individuals may be disclosed to any third
party solely upon the prior consent of the individual. Advertisers may send advertisements
through email or equivalent means (e.g., text messages) to those who are listed in the register.
The Direct Marketing Act significantly restricts the use of the name and home address
of natural persons for marketing purposes.25 Only a limited number of means may be used to
obtain the contact details of natural persons for establishing contact (permission email). These
sources include business contacts as well as phone books or statistical name listings, provided
that the data subjects were informed at the time of the data gathering, and advised regarding
the possibility that the data might be used for purposes other than originally intended, and
of their right to prohibit such use.26
180
© 2018 Law Business Research Ltd
Hungary
natural or legal person or organisation without legal personality, other than the data subject,
the data controller or the technical data processor. It follows therefore that the transfer does
not include data transfers between the data subject, the data controller or the data processor.
Data transfers within the Member States of the EEA are treated as a domestic data
transfer, while according to the GDPR data transfers are only such transfer that aim at
transferees located in non-EEA countries.
The Privacy Act permits the transfer of personal data to a data controller or to a data
processor processing personal data in a third country:
a if the data subject explicitly consents to such a transfer;
b in the event of emergency situations or in the vital interest of the data subject or a third
person; or
c for the execution of an international agreement on mutual legal assistance if an adequate
level of protection of personal data is ensured.
The GDPR has restructured the requirements concerning data transfers. According to the
GDPR data transfers to third countries are allowed in the following cases:
a Transfers on the basis of an adequacy decision: This is the case where the European
Commission has decided that the third country, a territory or one or more specified
sectors within that third country, or the international organisation in question ensures
an adequate level of protection.
b Transfers subject to appropriate safeguards: This option incorporates especially binding
corporate rules, standard data protection clauses adopted by the Commission or by the
DPA (SCCs) or an approved code of conduct.
c There are also derogations for specific situations when none of the above circumstances
are given. Such exceptions include when the data subject has explicitly consented to
the proposed transfer, after having been informed of the possible risks of such transfers
or when the transfer is necessary for the performance of a contract between the data
subject and the controller or when the transfer is necessary for the establishment,
exercise or defence of legal claims.
For future data transfers the rules of the GDPR are applicable, while the rules of the Privacy
Act will remain in force for a rather narrow scope of data processing activities where the
GDPR is not applicable.
181
© 2018 Law Business Research Ltd
Hungary
i Whistle-blowing system
Regarding the processing of employee data in whistle-blowing systems, Act CLXV of 2013
on Complaints and Public Interest Disclosure lays down the relevant rules.
The Act authorises employers to establish a system to investigate whistle-blowing
reports. Conduct that may be reported includes the violation of laws as well as codes of
conduct issued by the employer, provided that these rules protect the public interest or
significant private interests.
The employer must publicly disclose on its corporate website the rules of conduct the
violation of which may be subject to reporting, and a detailed description of the reporting
procedure in Hungarian.
The investigation of a report is mandatory for employers, and the reporting person
must be informed of the outcome of the investigation and of the measures taken. The identity
182
© 2018 Law Business Research Ltd
Hungary
of the reporting person may not be disclosed without his or her consent. The Act permits the
receipt and investigation of anonymous reports; however, the deadline for the investigation
of such reports cannot be extended.
According to the Labour Code, employers must consult with works councils before
implementing measures and internal regulations affecting large numbers of employees. This
would include the implementation of a modified or new whistle-blowing system.
183
© 2018 Law Business Research Ltd
Hungary
b monitoring compliance with the Privacy Act and other rules of law on data processing,
as well as with the provisions of internal data protection and data security rules and
requirements;
c investigating reports submitted to him or her; and
d providing the data controller or technical data processor with information relating to
the detection of any unlawful data processing activities.
According to the GDPR the controller and the processor shall designate a data protection
officer in any case where:
a the processing is carried out by a public authority or body, except for courts acting in
their judicial capacity;
b the core activities of the controller or the processor consist of processing operations
which, by virtue of their nature, their scope or their purposes, require regular and
systematic monitoring of data subjects on a large scale; or
c the core activities of the controller or the processor consist of processing on a large
scale of special categories of data and personal data relating to criminal convictions and
offences.
The data protection officer shall be designated on the basis of professional qualities and, in
particular, expert knowledge of data protection law and practices and the ability to fulfil his
or her tasks, which are:
a to inform and advise the controller or the processor and the employees who carry
out processing of their obligations pursuant to this Regulation and to other Union or
Member State data protection provisions;
b to monitor compliance with this Regulation, with other Union or Member State data
protection provisions and with the policies of the controller or processor in relation
to the protection of personal data, including the assignment of responsibilities,
awareness-raising and training of staff involved in processing operations, and the
related audits;
c to provide advice where requested as regards the data protection impact assessment and
monitor its performance;
d to cooperate with the supervisory authority; and
e to act as the contact point for the supervisory authority on issues relating to processing,
including the prior consultation referred to in Article 36, and to consult, where
appropriate, with regard to any other matter.
Pursuant to the data breach rules of the GDPR and of the Privacy Act, the DPO shall manage
the data security incident register, which contains records of incidents and shall notify the
DPA or the data subjects in some cases.
184
© 2018 Law Business Research Ltd
Hungary
and the Privacy Act and other data protection and data processing laws as well as freedom
of information laws in Hungary. Hungarian data protection and privacy laws are enforced
by the DPA and the Hungarian courts. No other organisations have an official role in data
protection regulation.
The DPA monitors the conditions of the protection of personal data and investigates
complaints. Representatives of the DPA may enter any premises where data are processed.
If they observe any unlawful data processing, they have the authority to make the data
controller discontinue the processing. The administrative procedure of the DPA is governed
by the General Provisions of the Act on Administrative Procedure and, in the event of breach
of the material provisions of the Act, the DPA is empowered to:
a request that an entity cease and desist from infringing the law;
b order the blocking, deletion or destruction of unlawfully processed data;
c prohibit the unlawful processing;
d suspend the transfer of data to foreign countries; and
e impose a fine of up to €20 million.
185
© 2018 Law Business Research Ltd
Hungary
Under the GDPR and the Act, the data controller, data processor and data subject are all
entitled to appeal to the court to contest an order of the DPA. Pending a final and binding
decision of the court, the data concerned must not be erased or destroyed, but processing
of the data must be suspended and the data blocked. Moreover, the general rights of appeal
under the Civil Procedure Act will still apply.
The DPA may initiate criminal proceedings with the body authorised to launch such
proceedings if it suspects that an offence has been committed during the course of the
procedure. The DPA shall initiate infringement or disciplinary proceedings with the body
authorised to launch such proceedings if it suspects that an infringement or disciplinary
violation has been committed during the course of the procedure.
The Privacy Act has established the Conference of Internal Data Protection Officers,
which is headed by the president of the DPA and secures the information exchange between
data protection officers.
28 NAIH/2016/5859/H.
29 NAIH/2017/1051/2/H.
186
© 2018 Law Business Research Ltd
Hungary
of customers (by not informing customers on all aspects of the data processing) and had
also processed customer personal data without a proper legal basis. Consequently, the DPA
imposed a data protection fine amounting to 1 million forints.
Recently the DPA has rather focused on the enquiries of data controllers, data
processors and data subjects concerning the implementation of the GDPR. Concerning these
enquiries the DPA issues guidelines that are published on their website. Please find below
some guidelines that can be considered as important or of general concern, albeit the DPA
always emphasises that these guidelines are not enforceable and not binding:
Conciliation panels (e.g., panels mediating consumer protection cases) qualify as public
authorities, therefore the rules of GDPR concerning public authorities shall be applied to
these panels as well, including the obligation for the appointment of data protection officer.
Data protection registries may be kept in English language but in the case of a
monitoring procedure by the supervisory authority it is the data controller’s duty to provide
the Authority with adequate Hungarian translation.
30 www.naih.hu.
187
© 2018 Law Business Research Ltd
Hungary
a data controller with a seat, business establishment, branch office, domicile or place of
residence in Hungary, or uses a device located in Hungary, except when this device serves
only to transit data traffic in the area of the European Union. If the Privacy Act applies, a data
controller shall appoint a representative for the territory of Hungary.
The forwarding of personal data by an employer to a data processor located outside
Hungary is not forbidden; however, it is subject to prior notification of the employee.
The new rules of the GDPR apply to the processing of personal data in the context of
the activities of an establishment of a controller or a processor in the Union, regardless of
whether the processing takes place in the Union or not. The GDPR applies to the processing
of personal data of data subjects who are in the Union by a controller or processor not
established in the Union, where the processing activities are related to (i) the offering of
goods or services, irrespective of whether a payment of the data subject is required, to such
data subjects in the Union or (ii) the monitoring of their behaviour as far as their behaviour
takes place within the Union.
This regulation creates a very wide territorial scope for the GDPR and for the supervisory
authority enforcing the GDPR rules. However, it remains uncertain how supervisory
authorities will have the resources to initiate investigations against foreign organisations.
IX OUTLOOK
The EU General Data Protection Regulation has brought significant changes to the
Hungarian data protection and privacy regime with effect from 25 May 2018 but taking into
consideration the short period of time since its applicability, it is hard to assess its actual short
and long-term effects.
188
© 2018 Law Business Research Ltd
Chapter 14
INDIA
I OVERVIEW
A decidedly inadequate collection of statutes currently governs cybersecurity and data
protection in India. Authorities constituted to regulate compliance and enforce penalties for
non-compliance under the Information Technology Act 2000 and the Information Technology
(Amendment) Act 2008 have been inactive for years, and very little significant jurisprudential
development has occurred on the subjects of cybersecurity, privacy and data protection over
the past few years. In 2013, the then government drafted a National Cybersecurity Policy,
which generated considerable interest both in India as well as abroad, particularly in view of
India’s position as an exponentially growing business process outsourcing destination. Sadly,
progress on the policy was stymied for reasons that have not been made public, reflecting
rather poorly on the government’s intention to provide clear, robust and watertight law on
these matters.
The foregoing is not to say that the urgent need for change in this respect has not been
recognised. In July 2016 the Joint Secretary for Cyber Laws and E-Security, R K Sudhanshu,
stated to the press that the government is in the process of developing new encryption and
cybersecurity policies as part of a thorough overhaul of the law regulating cybersecurity in
India.2
In 2017, the Minister for Law and IT, Ravi Shankar Prasad, said that the government
is finalising cybersecurity standards for mobile phones and has already issued notice to most
smartphone manufacturers asking them to furnish details related to cybersecurity.3
Following the government launch, in 2015, of a heavily advertised campaign called
Digital India, the major agenda of which was to create ‘digital infrastructure’ to facilitate
the digital delivery of services and increase digital literacy, the prime minister has been
involved in an aggressive attempt to compensate for lost time as regards the enhancement of
cybersecurity. Digital India triggered major investment flows into the technology sector, and
the campaign has caused questions to be raised in the media and academia about privacy and
the protection of data, which will hopefully spur the government on to legislate more clearly
and in detail on these subjects.
1 Aditi Subramaniam is an associate principal and Sanuj Das is a managing associate at Subramaniam &
Associates.
2 http://economictimes.indiatimes.com/news/economy/policy/government-finalising-cyber-security-
standards-for-mobile-phones/articleshow/60315930.cms.
3 https://economictimes.indiatimes.com/news/economy/policy/government-finalising-cyber-security-
standards-for-mobile-phones/articleshow/60315930.cms.
189
© 2018 Law Business Research Ltd
India
Subsequently, 2016 was a mixed bag of both encouraging and slightly disturbing
developments, although notably none of these developments resulted in the substantive
renovation or repair of statutory law, as has been repeatedly promised by the authorities for
several years, with the exception of the introduction of the Aadhar Act, to provide targeted
delivery of financial benefits.
The Aadhar Act was challenged in a series of petitions that questioned its constitutional
validity. A moot question raised in these petitions was whether privacy is a fundamental right
guaranteed under the Constitution of India. The verdict on these petitions was delivered this
year by a nine-judge constitutional bench of the Supreme Court, which held privacy to be a
fundamental right of every citizen under the Constitution.4
In addition to the litigious developments described above, 2017 saw the government
amending the Income Tax Act 1961–2017 to make it mandatory for taxpayers to link their
Permanent Account Numbers (PANs) to file income-tax returns, open bank accounts and
conduct financial transactions beyond a threshold, to curb tax evasion and money laundering.
The Department of Telecommunications has also mandatorily sought to use the Aadhar Act
as a tool for subscriber verification from existing mobile telephone subscribers and made
it mandatory for new connections.5 The policies of the government were criticised and
challenged in the Supreme Court, which has reserved a verdict that is expected later in 2018.
While the developments of previous years set the tone for 2018, an impetus to make
specific data protection legislation came with a private member’s bill – the Data Privacy
Bill 2017 – and the release of Justice BN Srikrishna Committee’s recommendations.6 These
developments are discussed in detail below.
4 http://images.newindianexpress.com/uploads/user/resources/pdf/2017/8/24/ALL_WP%28C%29_
No.494_of_2012_Right_to_Privacy_.pdf.
5 www.dot.gov.in/sites/default/files/2016_08_16%20eKYC-AS-II.pdf?download=1.
6 http://legalaffairs.gov.in/sites/default/files/Report-HLC.pdf.
190
© 2018 Law Business Research Ltd
India
legislation is in place to regulate either the former or the latter. The Act contains provisions
on the strict limitation on sharing the data collected, but also makes rather large exceptions
to these limitations that are a major cause for concern.7
In a writ petition before the apex court of the country, the Aadhar Act was challenged
as being ultra vires in relation to the Constitution owing to its severe violation of citizens’
fundamental right to privacy. It was put to the court that the Aadhar Act coerces individuals to
part with their personal information, including biometric details, and creates an environment
that can be used for surveillance. While the fate of the Aadhar Act is still undecided, one of
the biggest hurdles in the matter has been resolved by the Supreme Court in a landmark
judgment. A nine-judge constitution bench, presided over by the Chief Justice of India, was
posed the question of whether privacy is in fact a fundamental right guaranteed under the
Constitution.
The Court ruled on this question in the affirmative and in doing so observed that
it is not an absolute right but one subject to certain reasonable restrictions. On the data
protection aspect, the Court observed that the right of an individual to exercise control over
his or her personal data and to be able to control his or her own life would also encompass
the right to control his or existence on the internet. The judgment also states that consent
obtained from users has to be informed consent, given in an informed manner by users,
and cannot be shrouded in lengthy agreement terms, The Court even upheld the right of an
individual to be forgotten from the internet by observing that:
If we were to recognise a similar right, it would only mean that an individual who is no longer
desirous of his personal data to be processed or stored, should be able to remove it from the system
where the personal data/information is no longer necessary, relevant, or is incorrect and serves no
legitimate interest. Such a right cannot be exercised where the information/data is necessary, for
exercising the right of freedom of expression and information, for compliance with legal obligations,
for the performance of a task carried out in public interest, on the grounds of public interest in the
area of public health, for archiving purposes in the public interest, scientific or historical research
purposes or statistical purposes, or for the establishment, exercise or defence of legal claims. Such
justifications would be valid in all cases of breach of privacy, including breaches of data privacy.
The Supreme Court resumed hearing on the constitutional validity of the Aadhar Act itself in
May 2018 and after a marathon hearing lasting 38 days, reserved its judgment. Among other
issues, the Supreme Court’s judgment will shed light on whether the government is entitled
to collect citizens’ biometric and demographic data and the manner in which it is entitled
to do so.
7 www.thehindu.com/news/national/nine-issues-to-debate-on-aadhaar-bill/article8341611.ece.
191
© 2018 Law Business Research Ltd
India
The Information Technology Act (2000) (IT Act) and the Information Technology
(Amendment) Act 2008 8
The IT Act contains provisions for the protection of electronic data. The IT Act penalises
‘cyber contraventions’ (Section 43(a)–(h)), which attract civil prosecution, and ‘cyber
offences’ (Sections 63–74), which attract criminal action.
The IT Act was originally passed to provide legal recognition for e-commerce and
sanctions for computer misuse. However, it had no express provisions regarding data security.
Breaches of data security could result in the prosecution of individuals who hacked into the
system, under Sections 43 and 66 of the IT Act, but the Act did not provide other remedies
such as, for instance, taking action against the organisation holding the data. Accordingly, the
IT (Amendment) Act 2008 was passed, which, inter alia, incorporated two new sections into
the IT Act, Section 43A and Section 72A, to provide a remedy to persons who have suffered
or are likely to suffer a loss on account of their personal data not having been adequately
protected.
8 Links to pdf versions of the IT Act and Rules are available on the website of the Ministry of Electronics and
Information Technology: meity.gov.in/content/cyber-laws.
9 meity.gov.in/sites/upload_files/dit/files/GSR313E_10511(1).pdf.
10 meity.gov.in/sites/upload_files/dit/files/GSR314E_10511(1).pdf.
192
© 2018 Law Business Research Ltd
India
c the Information Technology (Guidelines for Cyber Cafe) Rules,11 which require
cybercafes to register with a registration agency and maintain a log of users’ identities
and their internet usage; and
d the Information Technology (Electronic Service Delivery) Rules,12 which allow the
government to specify that certain services, such as applications, certificates and
licences, be delivered electronically.
The IT Rules are statutory law, and the four sets specified above were notified on 11 April 2011
under Section 43A of the IT Act.
Penalties for non-compliance are specified by Sections 43 and 72 of the IT Act.
In 2011 and subsequently in 2014, draft versions of a proposed law referred to as the
Privacy Bill were released on the internet by a non-profit organisation called the Centre for
Internet and Society, which claimed that these drafts had been leaked by the Department of
Electronics and Information Technology.13 The Privacy Bill recognises an individual’s right to
privacy, but states also that certain circumstances, including protection of national integrity
or sovereignty, national security, prevention of crime and public order, warrant the invasion of
that privacy. In May 2016, the Minister for Communications and Information Technology,
Ravi Shankar Prasad, stated in the upper house of Parliament that the government is still
working on the proposed law.14
Additional legislation
In addition to the legislation described above, data protection may also sometimes occur
through the enforcement of property rights based on the Copyright Act (1957). Further,
other legislation such as the Code of Criminal Procedure (1973), the Indian Telegraph Act
1885, the Companies Act (1956), the Competition Act (2002) and, in cases of unfair trade
practices, the Consumer Protection Act (1986), would also be relevant. Finally, citizens may
also make use of the common law right to privacy, at least in theory – there is no significant,
recent jurisprudence on this.
A Data (Privacy and Protection) Bill 2017 (the Data Privacy Bill 2017) was introduced
in Parliament in July 2017 by a private member. Apart from intending to make the right to
privacy a statutory right and streamlining the data protection regime in India, it seeks the
establishment of a Data Privacy and Protection Authority for the regulation and adjudication
of privacy-related disputes. It is yet to be enacted into law.
Compliance regulators
CERT-In
Under Section 70B of the IT (Amendment) Act 2008, the government constituted
CERT-In, which the website of the Ministry of Electronics and Information Technology
refers to as the ‘Indian Computer Emergency Response Team’. CERT-In is a national nodal
agency responding to computer security incidents as and when they occur. The Ministry of
Electronics and Information Technology specifies the functions of the agency as follows:
11 meity.gov.in/sites/upload_files/dit/files/GSR315E_10511(1).pdf.
12 meity.gov.in/sites/upload_files/dit/files/GSR316E_10511(1).pdf.
13 https://cis-india.org/internet-governance/blog/leaked-privacy-bill-2014-v-2011.
14 www.medianama.com/2016/05/223-government-privacy-draft-policy.
193
© 2018 Law Business Research Ltd
India
Definitions
The legislation does not contain a definition of ‘personal data’. The IT Rules do define
personal information as any information that relates to a natural person that, either directly
or indirectly, in combination with other information available or likely to be available with a
body corporate, is capable of identifying such a person.
Further, the IT Rules define ‘sensitive personal data or information’ as personal
information consisting of information relating to:
a passwords;
b financial information, such as bank account, credit card, debit card or other payment
instrument details;
c physical, physiological and mental health conditions;
d sexual orientation;
e medical records and history;
f biometric information;
g any details relating to the above clauses as provided to a body corporate for the provision
of services; or
h any information received under the above clauses by a body corporate for processing,
or that has been stored or processed under lawful contract or otherwise.
Provided that any information is freely available or accessible in the public domain, or
furnished under the Right to Information Act 2005 or any other law for the time being in
force, it shall not be regarded as sensitive personal data or information for the purposes of
these rules.
15 www.cert-in.org.in.
16 catindia.gov.in/Default.aspx.
194
© 2018 Law Business Research Ltd
India
The draft of the proposed Privacy Bill 2011 defines ‘personal data’ as any data that
relates to a living, natural person, if that person, either directly or indirectly, in conjunction
with other data that the data controller has or is likely to have, can be identified from that
data. This includes any expression of opinion about said person.
The Data Privacy Bill 2017 also defines ‘sensitive personal data’ as follows:
a unique identifiers such as the Aadhar number or personal account number;
b physical and mental health, including medical history;
c biometric or genetic information;
d criminal convictions;
e banking credit and financial data; and
f narco analysis or polygraph test data.
The Privacy Bill 2011 and Data Privacy Bill 2017 contains more specific definitions of
the above terms, and also defines concepts not found in the current legislation, such as
‘processing’, ‘data controller’ and ‘data processor’.
Purpose limitation
Neither the IT Rules nor the IT Act specify a time frame for the retention of sensitive
personal information. However, the IT Rules state that a body corporate or any person on
its behalf holding sensitive personal data or information shall not retain that information for
longer than is required for the purposes for which the information may lawfully be used or is
otherwise required under any other law for the time being in force.
Data retention
Legislation is yet to be clarified on specific rules with respect to the retention of data by data
processors or handlers. The proposed Privacy Bill 2011 will clarify the law on retention of
personal data, stating as it does in Section 13 of Chapter II that personal data shall only be
retained for as long as is necessary to achieve the documented purpose, unless:
a it is required by law to be retained for a longer period;
b the data subject consents to its retention for a longer period;
195
© 2018 Law Business Research Ltd
India
c such retention is required by a contract between the data subject and the data controller;
or
d it is required to be so retained for historical, statistical or research purposes.
The Bill further states that all personal data that need no longer be retained in accordance
with the above shall either be destroyed or anonymised. During the process of destruction or
anonymisation, the data controller must ensure that unauthorised persons do not gain access
to the personal data. The destruction of personal data must be carried out in a manner that
ensures that it is impossible to re-identify the personal data once it has been destroyed.
Registration formalities
India currently does not have any legislative requirements with respect to registration or
notification procedures for data controllers or processors. However, the draft Privacy Bill
proposes to change this by introducing not only specific registration criteria and formalities,
but also sanctions for failure to register.
Rights of individuals
Access to data
Rule 5, Subsection 6 of the IT Rules mandates that the body corporate or any person on
its behalf must permit providers of information or data subjects to review the information
they may have provided. This situation will be clarified somewhat by the proposed Privacy
Bill 2011, which states that any data subject shall, provided he or she can prove her identity,
have the right to ask for confirmation from the data controller has complete control over
the personal data, request details with respect to who else − including any third parties − has
access to the personal data, and require the data controller to provide information about
the logic involved in the automated process of decision-making where the personal data in
question is being processed automatically for evaluation purposes.
The Bill states that data controllers must provide the required information to the data
subject within 45 days of receiving a request for it, provided that the request was accompanied
by the prerequisite fee, and that the data controller is obliged to inform the data subject that
the latter may legally ask the data controller to make any changes to inaccurate or deficient
personal data. Access to personal data may be denied only if the information cannot be given
out without also disclosing information about another data subject who could be identified
from that information, unless that data subject has consented to such disclosure.
196
© 2018 Law Business Research Ltd
India
the data subject has the right to request a data controller to destroy any personal data that he
or she considers either excessive in relation to the documented purpose of collection, or based
on incorrect facts, or processed unlawfully.
The Supreme Court of India in a nine-judge bench decision in August 2017 in KS
Puttaswamy & Ors v. Union of India & Ors17 also identified the right to be forgotten, in
physical and virtual spaces such as the internet, under the umbrella of informational privacy.
Disclosure of data
Data subjects also possess rights with respect to disclosure of the information they provide.
Disclosure of sensitive personal information requires the provider’s prior permission unless
either disclosure has already been agreed to in the contract between the data subject and the
data controller; or disclosure is necessary for compliance with a legal obligation.
The exceptions to this rule are if an order under law has been made, or if a disclosure
must be made to government agencies mandated under the law to obtain information for
the purposes of verification of identity; prevention, detection and investigation of crime; or
prosecution or punishment of offences.
Recipients of this sensitive personal information are prohibited from further disclosing
the information.
17 http://supremecourtofindia.nic.in/supremecourt/2012/35071/35071_2012_Judgement_24-Aug-2017.pdf.
197
© 2018 Law Business Research Ltd
India
Credit Information Companies (Regulation) Act 2005 and The Credit Information Companies
Regulations 2006 20
This legislation is essentially aimed at regulation of sharing and exchanging credit information
by credit agencies with third parties. Disclosure of data received by a credit agency is
prohibited, except in the case of its specified user and unless required by any law in force.
The regulations prescribe that the data collected must be adequate, relevant, and not
excessive, up to date and complete, so that the collection does not intrude to an unreasonable
extent on the personal affairs of the individual. The information collected and disseminated
is retained for a period of seven years in the case of individuals. Information relating to
criminal offences is maintained permanently while information relating to civil offences is
retained for seven years from the first reporting of the offence. In fact, the regulations also
prescribe that personal information that has become irrelevant may be destroyed, erased or
made anonymous.
18 http://lawmin.nic.in/ld/P-ACT/1983/The%20Public%20Financial%20Institutions%20(Obligation%20
as%20to%20Fidelity%20and%20Secrecy)%20Act,%201983.pdf.
19 http://fiuindia.gov.in/pmla2002.htm.
20 www.cibil.com/sites/default/files/pdf/cicra-act-2005.pdf.
198
© 2018 Law Business Research Ltd
India
Credit information companies are required to obtain informed consent from individuals
and entities before collecting their information. For the purpose of redressal, a complaint can
be written to the Reserve Bank of India.
Workplace privacy
In the present scenario, employers are required to adopt security practices to protect sensitive
personal data of employees in their possession, such as medical records, financial records
and biometric information. In the event of a loss to an employee due to lack of adequate
security practices, the employee would be entitled to compensation under Section 43A of the
Information Technology Act 2000. Other than this piece of legislation, there is no specific
legislation governing workplace privacy, although, in relation to the workplace, the effect of
the Supreme Court judgment on privacy as a fundamental right remains to be seen.
Children’s privacy
Section 74 of the Juvenile Justice (Care and Protection of Children) Act 2015 mandates that
the name, address or school, or any other particular, that may lead to the identification of a
child in conflict with the law or a child in need of care and protection or a child victim or
witness of a crime shall not be disclosed in the media unless the disclosure or publication is
in the child’s best interest.
21 https://rbidocs.rbi.org.in/rdocs/Publications/PDFs/86706.pdf.
22 https://fcraonline.nic.in/home/PDF_Doc/FC-RegulationAct-2010-C.pdf.
23 http://niti.gov.in/writereaddata/files/1.pdf.
199
© 2018 Law Business Research Ltd
India
200
© 2018 Law Business Research Ltd
India
1. A body corporate or a person on its behalf shall be considered to have complied with
reasonable security practices and procedures, if they have implemented such security practices
and standards and have a comprehensive documented information security programme and
information security policies that contain managerial, technical, operational and physical
security control measures that are commensurate with the information assets being protected
with the nature of business. In the event of an information security breach, the body corporate
or a person on its behalf shall be required to demonstrate, as and when called upon to do so by
the agency mandated under the law, that they have implemented security control measures as
per their documented information security programme and information security policies.
2. The international standard IS/ISO/IEC 27001 on ‘Information Technology – Security
Techniques – Information Security Management System – Requirements’ is one such standard
referred to in sub-rule (1).
3. Any industry association or an entity formed by such an association, whose members are
self-regulating by following other than IS/ISO/IEC codes of best practices for data protection
as per sub-rule (1), shall get its codes of best practices duly approved and notified by the
Central Government for effective implementation.
4. The body corporate or a person on its behalf who have implemented either IS/ISO/IEC
27001 standard or the codes of best practices for data protection as approved and notified
under sub-rule (3) shall be deemed to have complied with reasonable security practices and
procedures provided that such standard or the codes of best practices have been certified or
audited on a regular basis by entities through independent auditor, duly approved by the
Central Government. The audit of reasonable security practices and procedures shall be
carried out by an auditor at least once a year or as and when the body corporate or a person
on its behalf undertake significant upgradation of its process and computer resources.
There are no statutory registration or notification requirements for either data processors
or data controllers. The proposed Privacy Bills provide for the establishment of a Data
Protection Authority of India, and Chapter VII, Section 43 stipulates that the Authority shall
establish and maintain a National Data Controller Registry – ‘an online database to facilitate
the efficient and effective entry of particulars by data controllers’. If the Bill is enacted, data
controllers shall not be permitted to process any data belonging to any data subject for a
given documented purpose, unless they first make an entry in the Registry in a format to be
determined by the central government.
201
© 2018 Law Business Research Ltd
India
202
© 2018 Law Business Research Ltd
India
2016, stating that it would now share a limited amount of user information with Facebook
for optimised advertising and networking suggestions. The petitioners contended that this
change in policy compromised the privacy of the users of WhatsApp.
On 23 September 2016, the High Court of New Delhi passed an order directing
WhatsApp to ‘scrub’ all user data collected prior to 25 September for users who chose to
opt out of the service prior to this date. For users choosing to continue to make use of the
service, the High Court directed that only data collected after 25 September could be shared
by WhatsApp with Facebook and its group companies. The Court also directed DoT and
TRAI to examine the feasibility of bringing WhatsApp (and other internet-based messaging
applications) under a statutory regulatory framework, ordering that these respondents must
take an appropriate decision on this matter ‘at the earliest’.
This decision is significant in that it is the only emphatic recognition of the right to
privacy for individuals that our jurisprudence has seen in the past few years, other than the
landmark Supreme Court judgment striking down Section 66A of the IT Act in 2015.
In 2017, the petitioners filed an appeal before the Supreme Court challenging the order
of the High Court. The petitioners impugned the directions of the High Court and sought
directions of the Supreme Court since, according to the petitioners, the policy formulated
by WhatsApp was unconscionable and unacceptable. The Supreme Court is still hearing the
matter and it seems unlikely that the controversy will be resolved this year as well. However,
pursuant to the KS Puttaswamy judgment in 2017 – holding privacy a fundamental right –
the Supreme Court had constituted the Justice BN Srikrishna Committee to identify key
data protection issues in India and recommend methods of addressing them. The Committee
released its recommendations in August 2018, some of the salient recommendations being:
a the establishment of an autonomous body, styled the Arbitration Promotion Council
of India (APCI), having representatives from all stakeholders for grading arbitral
institutions in India;
b the recognition of professional institutes by the APCI, providing for the accreditation
of arbitrators;
c training workshops and interactions with law firms and law schools organised by the
APCI to train advocates with an interest in arbitration, with the goal of creating a
specialist arbitration bar;
d the creation of a specialist arbitration bench within courts to deal with such commercial
disputes;
e various provisions of the 2015 Amendments in the Arbitration and Conciliation Act
intended to make arbitration faster and more efficacious and incorporate international
best practices.
Finally, the Committee released the draft of the Personal Data Protection Bill 2018, which
if implemented, could address the issue around privacy of personal information in India.
Among other important inclusions, the Personal Data Protection Bill draft puts an emphasis
on informed user consent for the processing of personal data and enshrines the right to be
forgotten.
203
© 2018 Law Business Research Ltd
India
X OUTLOOK
There is no doubt that India urgently needs to take a keen look at its poorly regulated digital
spaces and at the virtual activities of individuals, private organisations and governmental
authorities alike. The several agencies performing cybersecurity operations in India, such
as the National Technical Research Organisation, the National Intelligence Grid and the
National Information Board, require robust policy and legislative and infrastructural support
from the Ministry of Electronics and Information Technology, and from the courts, to enable
them to do their jobs properly. The EU’s General Data Protection Regulation may provide
impetus for India in this regard, particularly given that not only will the regulation affect
25 http://supremecourtofindia.nic.in/supremecourt/2012/35071/35071_2012_Judgement_24-Aug-2017.pdf.
26 www.cnbc.com/2018/07/11/cambridge-analytica-must-answer-india-says-minister-prasad.html.
204
© 2018 Law Business Research Ltd
India
cross-border information flow (and India is a net information exporter), but also the EU has
exposed several lacunae in the standards applied by the Indian government to the protection
of data and enforcement of cybersecurity in a report following approval of its new data
protection regulation. While it seems that the government is concerned and keen to bring
about change in this sector, in view of India’s rather poor record in prioritising these matters,
optimism is not necessarily warranted at this stage.
205
© 2018 Law Business Research Ltd
Chapter 15
IRELAND
Anne-Marie Bohan1
I OVERVIEW
The data protection regime in Ireland is governed by the Data Protection Acts 1988 and 2003
(DPA), which transposed European Directive 95/46/EC on data protection (the Directive)
into Irish law. In addition, there are numerous sector-specific regulations in areas such as
employment,2 electronic communications,3 health data4 and genetic data.5 Ireland protects
privacy and data protection rights fundamentally at a constitutional level in Articles 40.3.1,
40.3.2 and 40.5 of the Irish Constitution.6 These rights are balanced against the freedom of
expression protected in Article 40.6 and none are regarded as absolute.7
Ireland is a signatory to the 1980 OECD Guidelines on the Protection of Privacy and
Transborder Flows of Personal Data, the Charter of Fundamental Rights of the European
Union and the European Convention on Human Rights and Fundamental Freedoms.
1 Anne-Marie Bohan is a partner at Matheson. The information in this chapter was accurate as of
October 2016 and the author wishes to thank Andreas Carney, who no longer works at the firm, for his
contribution to the chapter.
2 SI No. 337 of 2014 – Data Protection Act 1988 (Commencement) Order 2014 and SI No. 338 of 2014
– Data Protection (Amendment) Act 2003 (Commencement) Order 2014. These make it unlawful for
employers to require employees or applicants for employment to make an access request seeking copies
of personal data that are then made available to employers or prospective employers. This provision also
applies to any person who engages another person to provide a service.
3 SI No. 336/2011 – European Communities (Electronic Communications Networks and Services) (Privacy
and Electronic Communications) Regulations 2011 (E-Privacy Regulations). This deals with specific data
protection issues relating to use of electronic communication devices and particularly with direct marketing
restrictions.
4 SI No. 82/1989 – Data Protection (Access Modification) (Health) Regulations, 1989. This outlines certain
restrictions in the right of access relating to health data.
5 SI No. 687/2007 – Data Protection (Processing of Genetic Data) Regulations 2007. This outlines
restrictions in respect of processing genetic data in relation to employment.
6 Kennedy v. Ireland [1987] IR 587; Schrems v. Data Protection Commissioner [2014] IEHC 310.
7 Herrity v. Associated Newspapers (Ireland) Limited [2008] IEHC 249; X (an infant) v. Sunday Newspapers Ltd
(trading as ‘The Sunday World’) [2014] IEHC 696.
206
© 2018 Law Business Research Ltd
Ireland
207
© 2018 Law Business Research Ltd
Ireland
Transparency
Data subjects must be provided with information relating to the processing of their data.
This includes:
a the identity of the data controller or their representative, the data processor, or both;
b the purposes for which the data are intended to be processed; and
c any other information that is necessary, having regard to the specific circumstances in
which data are to be processed, including but not limited to details of recipients or
categories of recipients of the personal data and information as to the existence of the
right of access and the right to rectify data.
10 Sensitive personal data must also pass an additional legitimate basis for processing.
208
© 2018 Law Business Research Ltd
Ireland
Purpose limitation
Personal data should only be obtained for one or more specified, explicit and legitimate
purposes, and should not be further processed in a manner incompatible with those purposes.
Proportionality
Personal data collected must be adequate, relevant and not excessive in relation to the
purposes for which they are collected or are further processed.
Retention
Personal data should not be kept for longer than is necessary for the purpose for which they
were obtained. If the purpose for which the information was obtained has ceased and the
personal information is no longer required, the data must be deleted or disposed of in a secure
manner.
Access to data
Data subjects have the right to, free of charge, find out if an organisation or an individual
holds information about them. This includes the right to be given a description of the
personal data and to be told the purposes for which the data are held. A request for these data
must be made in writing by the data subject and the individual must receive a reply within
21 days according to the DPA.
Data subjects have the right to obtain a copy, within 40 days of a request, of any
personal data that relate to them that are held either on a computer or in a structured manual
filing system, or that are intended for such a system.
A number of exceptions to the right of access exist under the DPA, including legal
privilege, research data, data that comprise an opinion given in confidence (subject to certain
limitations) or data used for the investigation of offences.
209
© 2018 Law Business Research Ltd
Ireland
Objection to processing
Data subjects have the right to object to processing that is likely to cause damage or distress.
This right applies to processing that is necessary for the purposes of legitimate interests pursued
by the data controller to whom the personal data are or will be disclosed, or processing that
is necessary for the performance of a task carried out in the public interest or in the exercise
of official authority.
Objection to marketing
Data subjects have the right, by written request, to require a data controller to cease processing
data for that purpose and, where they are only retained for that purpose, they have the right
to have it erased. The data controller must do this within 40 days.
Under the E-Privacy Regulations, data subjects have the right to have their ‘opt-out’
preference recorded in the National Directory Database, which constitutes an objection to
direct telephone marketing to them.
Registration
It is obligatory for the following types of data controller to register with the ODPC if they
hold personal data:
a government bodies and public authorities;
b banks, financial and credit institutions and insurance undertakings;
c data controllers whose business consists wholly or mainly of direct marketing;
d data controllers whose business consists wholly or mainly in providing credit references;
e data controllers whose business consists wholly or mainly in collecting debts;
f internet access providers, telecommunications networks and service providers;
g data controllers that process genetic data (as specifically defined in Section 41 of the
Disability Act 2005); and
h health professionals processing personal data related to mental or physical health.
Data processors that process personal data on behalf of a data controller in any of the
categories listed above must also register.
Exemptions
Generally, all data controllers and processors must register unless an exemption applies, either
under Section 16(1)(a) or (b) of the DPA or under SI No. 657 of 2007. Under Section
16(1)(a) or (b) of the DPA, the following are excluded from registration:
a organisations that only carry out processing to keep, in accordance with law, a register
that is intended to provide information to the public;
b organisations that only process manual data (unless the personal data have been
prescribed by the ODPC as requiring registration); and
c organisations that are not established or conducted for profit and that are processing
personal data related to their members and supporters and their activities.
210
© 2018 Law Business Research Ltd
Ireland
Additionally, pursuant to SI No. 657 of 2007, the Irish Minister for Justice and Equality has
specified that the following data controllers and data processors are not required to register
(provided they do not fall within any of the categories noted above in respect of which no
exemption may be claimed):
a data controllers who only process employee data in the ordinary course of personnel
administration and where the personal data are not processed other than where it is
necessary to carry out such processing;
b solicitors and barristers;
c candidates for political office and elected representatives;
d schools, colleges, universities and similar educational institutions;
e normal commercial activity that by definition requires the processing of personal data
(e.g., keeping details of customers and suppliers). This exemption does not include
health professionals who process personal data relating to physical or mental health;
f companies that process personal data relating to past or existing shareholders, directors
or other officers of a company for the purpose of compliance with the Companies Acts;
g data controllers who process personal data with a view to the publication of journalistic,
literary or artistic material; and
h data controllers or data processors who operate under an approved data protection code
of practice.
If an exemption does apply, however, it is limited only to the extent to which personal data
are processed within the scope of that exemption.
The ODPC is obliged not to accept an application for registration from a data controller
who keeps ‘sensitive personal data’ unless the ODPC is of the opinion that appropriate
safeguards for the protection of the privacy of the data subjects concerned are being, and will
continue to be, provided by the controller.
Where the ODPC refuses an application for registration, it must notify the applicant
in writing and specify the reasons for the refusal. An appeal against such a decision can be
made to the circuit court.
211
© 2018 Law Business Research Ltd
Ireland
Finally, the data controller must ensure that a written contract is in place with the cloud
provider.
Biometrics
The ODPC has published guidance on the use of biometric data both in the workplace and
in schools, colleges and other educational institutions. The key issue in relation to biometric
data is proportionality. The data controller must assess whether the biometric system is
necessary and if there are less invasive alternatives available. Proportionality will depend on
a number of factors, including the nature of the workplace or educational institution, the
intended purpose of the system, efficiency and reliability. In the employment context, the
ODPC’s stated position is that consent is not generally satisfactory, as it can be argued that
it is not freely given in view of the typically imbalanced nature of the employer–employee
relationship. Employers should seek to rely on the ‘legitimate interest’ ground for processing
biometric data, but must ensure the right balance is struck between their interests and
the employees’ rights. In the context of educational institutions, the ODPC recommends
that consent is the only way of legitimising the processing of personal data. A clear and
unambiguous right to opt out of the biometric system must be given. It is important that data
subjects are made aware of the purpose of processing the biometric data.
The ODPC also highlights the importance of security in relation to biometric data,
taking into account, in particular, the state of technological development, the cost of
implementing security measures, the nature of the data being protected and the harm that
might result through the unlawful processing of the data. The ODPC recommends that the
personal data are deleted as soon as the employee or student permanently leaves.
The ODPC guidance recommends that employers and educational institutions conduct
a privacy impact assessment prior to implementing a biometric system. This should take into
account the need for such a system, the type of system required, the effect on data subjects
and any less invasive options available.
212
© 2018 Law Business Research Ltd
Ireland
Even where one of the above elements exists, the ODPC retains the power to prohibit the
transfer of personal data abroad to any country inside or outside the EEA.
In addition to the methods outlined above, the three methods by which Irish-based
businesses typically transfer personal data outside the EEA are as follows:
213
© 2018 Law Business Research Ltd
Ireland
a Use of ‘model clauses’ between the data controller and the person or organisation to
whom they intend to pass the information to abroad. These are contractual clauses
approved by the European Commission and that assure an adequate level of protection
for the personal data. They do not usually require the approval of the ODPC; however,
it can approve transfers based on contractual clauses that do not directly conform to the
European model clauses.
b Transfer to a country that is on the European Commission ‘adequate standard of
protection’ list, or US organisations that have agreed to be bound by the rules of the
Privacy Shield agreement (essentially a streamlined version of EU data protection law).
c A further method that is less frequent is using BCRs, whereby personal data can be
transferred to other companies within a group and based abroad, as long as certain
legally enforceable rules exist within the group whereby they must give the data an
adequate level of protection. This method is less frequently used because of the expense
and time involved in having these rules approved by the ODPC (which is a requirement
to be able to rely on them).
214
© 2018 Law Business Research Ltd
Ireland
Equality on a case-by-case basis. Generally, where proper undertakings are given by the
agency making the request, it will be granted and Irish companies will be compelled to
disclose the data.
Part 3 of the Criminal Justice (Mutual Assistance) Act 2008 provides for various forms
of mutual legal assistance to foreign law enforcement authorities. Part 3 relates to requests
for mutual assistance between Ireland and other EU Member States for cooperation in the
policing of telecommunications messages for the purposes of criminal investigations. The
Minister for Justice can also now request that tapping of communications be undertaken in
an EU Member State for an Irish-based criminal investigation and also outlines how requests
from other EU countries to Ireland for such interceptions should be processed.
The ODPC has not, as yet, issued official guidance in relation to foreign e-discovery
requests or requests for disclosure from foreign law enforcement agencies. However, it is
clear from statements by the government expressed prior to the most recent decision
in the Microsoft Warrant case that the government advocates the use of existing mutual
legal assistance treaties as a means of providing assistance in legal cases or law enforcement
investigations.
215
© 2018 Law Business Research Ltd
Ireland
personal data. This power is exercised by the ODPC issuing an enforcement notice. It is an
offence to fail to comply with an enforcement notice (although there is also a right of appeal
against such a notice as there is for an information notice referred to above).
Enforcement
The ODPC may bring summary legal proceedings for an offence under the DPA. However,
in contrast to the position in certain other jurisdictions such as the United Kingdom, the
ODPC does not have the power to impose fixed monetary penalties.
Sanctions
While most of the penalties for offences under the DPA are civil in nature, breaches of
data protection can also lead to criminal penalties. Summary legal proceedings for an
offence under the DPA may be brought and prosecuted by the ODPC. Under the DPA, the
maximum fine on summary conviction of such an offence is set at €3,000. On conviction
on indictment (such a conviction in Ireland is usually reserved for more serious crime), the
maximum penalty is a fine of €100,000.
The E-Privacy Regulations specify the sanctions for breaches of electronic marketing
restrictions, which on summary conviction are a fine of up to €5,000 (per communication)
or, on conviction on indictment, maximum fines ranging from €50,000 for a natural person
to €250,000 for a body corporate.
The ODPC exercises its powers of enforcement on a regular basis, including through
conducting inspections of organisations. During the course of 2015, 51 audits and inspections
were carried out and four entities were prosecuted for a total of 24 offences.
216
© 2018 Law Business Research Ltd
Ireland
Marketing offences
A number of companies were prosecuted in 2015 for making unsolicited marketing calls
and communications. In one case, a fine of €1,000 was imposed. Orders to make charitable
donations ranging from €1,000 and up to €35,000 were also made (this approach is
sometimes applied by courts as an alternative to levying a fine).
217
© 2018 Law Business Research Ltd
Ireland
b if a breach is caused by a data processor, he or she should report it to the data controller
as soon as he or she becomes aware of it;
c if the personal data was protected by technological measures (such as encryption) to
such an extent that it would be unintelligible to any person who is not authorised to
access it, then the data controller may decide that there is no risk to the personal data
(and so no notification to the data subject is necessary);
d any incident that has put personal data at risk should be reported to the ODPC as soon
as the data controller becomes aware of it. There are some limited exceptions to this
provided for in the Code; for example, this is not required where:
• it affects fewer than 100 data subjects;
• the full facts of the incident have been reported without delay to those affected;
and
• the breach does not involve sensitive personal data or personal data of a financial
nature; and
e if the data controller is unclear about whether to report the incident, the Code
advises that the incident should be reported to the ODPC. The Code advises that
the controller should make contact with the ODPC within two working days of the
incident occurring.
Once the ODPC is made aware of the circumstances surrounding a breach or a possible
breach, it will decide whether a detailed report or an investigation (or both) is required.
Regarding cybersecurity, the government is in the process of implementing the
National Cyber Security Strategy 2015–2017, which established the National Cyber Security
Centre (NCSC) within the Department of Communications, Energy and Natural Resources
and outlines the government’s plan to address the risks posed by cybercrime to the digital
economy and society. The objectives include:
a improving the resilience and robustness of the critical information infrastructure in
crucial economic sectors;
b engaging with international partners to ensure that cyberspace remains open, secure,
unitary and free;
c raising awareness of the responsibilities of businesses and individuals;
d ensuring that Ireland has a comprehensive and flexible legal and regulatory framework
in place to combat cybercrime; and
e building capacity to engage in the emergency management of cyber incidents.
The NCSC aims to build on the work of the Computer Security Incident Response Team,
which was established in 2011. The NCSC also intends to introduce legislation to transpose
the EU Network and Information Security Directive (which was approved in 2016), the
Budapest Convention on Cybercrime and Directive 2013/40/EU on attacks against
information systems.
In September 2016, the Central Bank of Ireland, the regulator for financial institutions,
published Cross Industry Guidance in respect of Information Technology and Cybersecurity,
which relates to IT governance and risk management by regulated financial institutions in
Ireland.
218
© 2018 Law Business Research Ltd
Ireland
X OUTLOOK
The main feature of the short to mid-term Irish data protection landscape is the coming into
effect of the General Data Protection Regulation (GDPR) in May 2018. With the final text
of the GDPR now published, businesses are starting to familiarise themselves with the new
regime that the GDPR will bring about. We are already seeing controllers and processors
alike looking to implement aspects of the GDPR, notably privacy by design in new product
and service offerings that they plan to roll out between now and May 2018.
The next phase of proceedings regarding data transfers has already started in the Irish
courts. The ODPC is seeking a ruling from the CJEU on whether, following the Schrems
decision, the transfer of data to the United States based on model clauses is permissible. It
is expected that the Irish courts’ decision as to whether to make the referral will be issued in
2017.
In its most recent Annual Report, the ODPC lists its next priorities as including the
expansion of its capacity and capability, and working closely with all stakeholders, and
particularly with the Article 29 Working Party, towards the implementation of the GDPR.
219
© 2018 Law Business Research Ltd
Chapter 16
JAPAN
Tomoki Ishiara1
I OVERVIEW
In Japan, the Act on the Protection of Personal Information2 (APPI) primarily handles the
protection of data privacy issues. The APPI was drastically amended in 2016 and has been in
full force since 30 May 2017. Prior to the amendment, the APPI was applied solely to business
operators that have used any personal information database containing details of more than
5,000 persons on any day in the past six months3 but this requirement was eliminated by the
amendment. Under the amended APPI, the Personal Information Protection Commission
(PPC) was established as an independent agency whose duties include protecting the rights
and interests of individuals while promoting proper and effective use of personal information.
Under the amended APPI, the legal framework has been drastically changed and the PPC
has primary responsibility for personal information protection policy in Japan. Prior to the
amendment, as of July 2015, 39 guidelines for 27 sectors regarding personal information
protection were issued by government agencies, including the Ministry of Health, Labour
and Welfare,4 the Japan Financial Services Agency,5 and the Ministry of Economy, Trade and
Industry.6 Under the amended IPPI, however, the guidelines (the APPI Guidelines)7 that
prescribe in detail the interpretations and practices of the APPI are principally provided by
the PPC, with a limited number of special guidelines provided to specific sectors (such as
medical and financial ones) by the PPC and the relevant ministries.8
1 Tomoki Ishiara is counsel at Sidley Austin Nishikawa Foreign Law Joint Enterprise.
2 Act No. 57 of 30 May 2003, enacted on 30 May 2003 except for Chapters 4 to 6 and Articles 2 to 6 of the
Supplementary Provisions; completely enacted on 1 April 2005 and amended by Act No. 49 of 2009 and
Act No. 65 of 2015: www.ppc.go.jp/files/pdf/Act_on_the_Protection_of_Personal_Information.pdf.
3 Article 2 of the Order for Enforcement of the Act on the Protection of Personal Information (Cabinet
Order 506, 2003, enacted on 10 December 2003).
4 The Guidelines on Protection of Personal Information in the Employment Management (Announcement
No. 357 of 14 May 2012 by the Ministry of Health, Labour and Welfare).
5 The Guidelines Targeting Financial Sector Pertaining to the Act on the Protection of Personal Information
(Announcement No. 63 of 20 November 2009 by the Financial Services Agency).
6 The Guidelines Targeting Medical and Nursing-Care Sectors Pertaining to the Act on the Protection of
Personal Information (Announcement in April 2017 by the PCC and the Ministry of Health, Labour and
Welfare).
7 The General Guidelines regarding the Act on the Protection of Personal Information dated November 2017
(partially amended March 2017).
8 The Guidelines Targeting Financial Sector Pertaining to the Act on the Protection of Personal Information
(Announcement in February 2017 by the PCC and the Financial Services Agency).
220
© 2018 Law Business Research Ltd
Japan
9 Strategic Headquarters for the Promotion of an Advanced Information and Telecommunications Network
Society.
10 http://japan.kantei.go.jp/policy/it/20140715_2.pdf.
11 The European Commission pointed out the lack of a data protection authority in the Japanese system in
its report: Korfe, Brown, et al., ‘Comparative study on different approaches to new privacy challenges, in
particular in the light of technological developments’ (20 January 2010).
12 Act on the Use of Numbers to Identify a Specific Individual in the Administrative Procedure (Act No. 27
of 2013). See Section II.ii.
13 Article 61 APPI.
221
© 2018 Law Business Research Ltd
Japan
Framework for promoting the use of personal data (big data issues)
The use of personal data is expected to create innovation with the multidisciplinary utilisation
of diverse and vast amounts of data, thereby creating new businesses. However, the system
under the previous APPI required consent from principals to use their personal data for
purposes other than those specified. Accordingly, providing personal data to third parties
was cumbersome for businesses, and created a barrier to the use of personal data, especially
launching new business using big data. Under the amended APPI, a business operator
handling personal information may produce anonymously processed information (limited
to information constituting anonymously processed information databases, etc.) and process
personal information in accordance with standards prescribed by the PPC rules such that it is
impossible to identify a specific individual from, or de-anonymise, the personal information
used for the production.16 This amendment allows various businesses to share with other
businesses the personal data maintained by them, and so develop or foster new business or
innovation.
14 Article 24 APPI.
15 Article 23 APPI.
16 Article 36(1) APPI.
222
© 2018 Law Business Research Ltd
Japan
223
© 2018 Law Business Research Ltd
Japan
amended APPI. This authority consists of one chair and eight commission members.24 The
chair and commissioners were appointed by Japan’s prime minister and confirmed by the
National Diet. The numbering system fully came into effect on 1 January 2016. Unlike other
national ID numbering systems, Japan has not set up a centralised database for the numbers
because of concerns about data breaches and privacy.
24 www.ppc.go.jp/en/aboutus/commission/.
25 Act No. 26 of 17 April 2002.
26 Act No. 57 of 4 June 1976.
27 Under the APPI, by definition, this information is not defined as sensitive information.
28 Article 2(7) APPI does not grant the right to correct, add and delete etc. to personal information that
would be deleted within six months.
29 Article 36(2) APPI does not require a personal information handling business operator to delete the
information on a method of anonymisation but take actions for security control such information.
224
© 2018 Law Business Research Ltd
Japan
a information about a living person that can identify him or her by name, date of birth or
other description contained in the information (including information that will allow
easy reference to other information that will enable the identification of the specific
individual);30 or
b information about a living person that contains an individual identification code,
which means any character, letter, number, symbol or other codes designated by
Cabinet Order,31 falling under any of the following items:
• those able to identify a specific individual that are a character, letter, number,
symbol or other codes into which a bodily or partial feature of the specific
individual has been converted to be provided for use by computers; and
• those characters, letters, numbers, symbols or other codes assigned in relation to
the use of services provided to an individual, or to the purchase of goods sold
to an individual, or that are stated or electromagnetically recorded in a card or
other document issued to an individual so as to be able to identify a specific user
or purchaser, or recipient of issuance by having made the said codes differently
assigned or stated or recoded for the said user or purchaser, or recipient of issuance.32
225
© 2018 Law Business Research Ltd
Japan
Personal data38
‘Personal data’ comprises personal information constituting a personal information database,
etc. (when personal information such as names and addresses is compiled as a database, it is
personal data in terms of the APPI).
To maintain society’s trust of business activities, it is important for businesses to announce their
appropriate initiatives for complaint processing and not using personal information for multiple uses
through the formulation and announcement of their policies (so-called privacy policies or privacy
statements, etc.) and philosophies on the promotion of the personal information protection. It is also
important for businesses to externally explain, in advance and in an easy-to-understand manner, their
procedures relating to the handling of personal information, such as notification and announcement
of the purpose of use and disclosure, etc., as well as comply with the relevant laws and ordinances.
The government formulated the Basic Policy based on Article 7, Paragraph 1 APPI. To provide
for the complete protection of personal information, the Basic Policy shows the orientation
of measures to be taken by local public bodies and other organisations, such as businesses
that handle personal information, as well as the basic direction concerning the promotion of
measures for the protection of personal information and the establishment of measures to be
taken by the state. The Basic Policy requires a wide range of government and private entities
to take specific measures for the protection of personal information.
In this respect, under the previous APPI, a business operator handling personal
information could not change the use of personal information ‘beyond a reasonable extent’.
The purpose of use after the change therefore had to be duly related to that before the change.
226
© 2018 Law Business Research Ltd
Japan
The amended APPI has slightly expanded the scope of altering the purpose of use to enable
flexible operations by prohibiting alteration of the utilisation purpose ‘beyond the scope
recognised reasonably relevant to the pre-altered utilisation purpose’.42
In addition, a business operator handling personal information must not handle
personal information about a person beyond the scope necessary for the achievement of the
purpose of use, without obtaining the prior consent of the person.43
227
© 2018 Law Business Research Ltd
Japan
50 Article 23(1)(i) APPI. The APPI Guidelines mention the following cases:
a response to a criminal investigation in accordance with Article 197(2) of the Criminal Procedure Law;
b response to an investigation based upon a warrant issued by the court in accordance with Article 218
of the Criminal Procedure Law; and
c response to an inspection conducted by the tax authority.
51 Article 23(2) APPI.
52 Article 23(5)(i) APPI.
53 Article 23(5)(ii) APPI.
54 Article 23(5)(iii) APPI.
228
© 2018 Law Business Research Ltd
Japan
of accessibility includes cases in which a response is made without delay upon the request
of the person), the procedures for responding to a request for disclosure, correction and
cessation of the retention of the personal data.55
Correction
When a business operator handling personal information is requested by a person to correct,
add or delete such retained personal data as may lead to the identification of the person on
the ground that the retained personal data are incorrect, the business operator must make an
investigation without delay within the scope necessary for the achievement of the purpose of
use and, on the basis of the results, correct, add or delete the retained personal data, except
in cases where special procedures are prescribed by any other laws and regulations for such
correction, addition or deletion.56
55 The APPI Guidelines provide examples of what corresponds to such an accessible condition for the person,
such as posting on the website, distributing brochures, replying without delay to a request by the person
and providing the email address for enquiries in online electronic commerce.
56 Article 29(1) APPI.
57 Article 75 APPI.
58 Article 23(1) APPI.
59 Article 24 APPI.
60 Article 11 Rules of the PPC.
229
© 2018 Law Business Research Ltd
Japan
and reasonable measures taken in accordance with the provisions of the APPI or
accreditation as a receiver of personal data according to international standards on
the protection of personal information, such as being certified under the Asia-Pacific
Economic Cooperation Cross-Border Privacy Rules) for operating in a manner
equivalent to that of a business operator handling personal data; and
b international personal data transfer to a third party in a foreign country that is
considered, according to the rules of the PPC, to have established a personal information
protection system with standards equivalent to those in Japan regarding the protection
of an individual’s rights and interests.61
61 At the time of writing, the PPC has not yet designated any country as having standards equivalent to those
in Japan regarding the protection of personal information but the PPC has announced that it will designate
member countries of the EU as qualified ones. See Section II.iv.
62 Article 20 APPI.
63 8-3 (Systemic Security Control Measures) of the APPI Guidelines, p. 88.
64 8-4 (Human Security Control Measures) and 3-3-3 (Supervision of Employees) of the APPI Guidelines,
pp. 92, 41.
230
© 2018 Law Business Research Ltd
Japan
ii Disclosure
When a business operator handling personal information is requested by a person to disclose
such retained personal data as may lead to the identification of the person, the business
operator must disclose the retained personal data without delay by a method prescribed by a
Cabinet Order.67 However, in the following circumstances, the business operator may keep
all or part of the retained personal data undisclosed where disclosure:
a is likely to harm the life, person, property, or other rights or interests of the person or a
third party;
b is likely to seriously impede the proper execution of the business of the business operator
handling the personal information; or
c violates other laws and regulations.68
231
© 2018 Law Business Research Ltd
Japan
Main penalties70
A business operator that violates orders issued under Paragraphs 2 or 3 of Article 42
(recommendations and orders by the PPC in the event of a data security breach) shall be
sentenced to imprisonment with forced labour of not more than six months or to a fine of
not more than ¥300,000.71
A business operator that does not make a report72 as required by Articles 40 or 56 or
that has made a false report shall be sentenced to a fine of not more than ¥300,000.73
69 Article 44 APPI.
70 The Unfair Competition Prevention Act (Act No. 47 of 1993) prohibits certain acts (unfair competition),
including an act to acquire a trade secret from the holder by theft, fraud or other wrongful methods; and
an act to use or disclose the trade secret so acquired. For the prevention of unfair competition, the Act
provides measures, such as injunctions, claims for damages and penal provisions (imprisonment for a term
not exceeding 10 years or a fine in an amount not exceeding ¥20 million. In the case of a juridical person,
a fine not exceeding ¥1 billion (in certain cases the fine is not to exceed ¥500 million) may be imposed
(Articles 21 and 22)).
71 Article 84 APPI.
72 The PPC may have a business operator handling personal information make a report on the handling of
personal information to the extent necessary for fulfilling the duties of a business operator (Articles 40 and
56 APPI).
73 Article 85 APPI.
74 3-3-4 of the APPI Guidelines, p.42.
232
© 2018 Law Business Research Ltd
Japan
that the mobile phone company take the necessary measures to prevent a recurrence and to
report the result to the Ministry (in respect of violation of the duty regarding security control
measures under Article 2075 APPI).76
233
© 2018 Law Business Research Ltd
Japan
down a new decision clarifying the liability of businesses handling personal information for
the leaking of customer’s personal information and a method of calculating the amount of
damages arising from the information leak.
234
© 2018 Law Business Research Ltd
Japan
Finally, the Basic Act on Cybersecurity, which provides the fundamental framework of
cybersecurity policy in Japan, was passed in 2014.84
In addition, the PPC has the authority to collect reports from, or advise, instruct or give
orders to, the data controllers.86
An organisation that is involved in a data breach may, depending on the circumstances,
be subject to the suspension, closure or cancellation of the whole or part of its business
operations, an administrative fine, penalty or sanction, civil actions and class actions or a
criminal prosecution.
X OUTLOOK
i The future development of the amended APPI
As stated in Section II, the amended APPI, which entered fully into force in May 2017,
has drastically changed the legal framework for the protection of personal information in
Japan. As of this writing, there have as yet been no leading cases or new matters to which the
amended APPI applies and, led by the PPC, new practices based upon the new framework
have just started. It is anticipated that the role of the PPC will be central to the new privacy
policy in Japan and thus special attention should be paid to its activities for insight into the
future development of the amended APPI.
235
© 2018 Law Business Research Ltd
Japan
236
© 2018 Law Business Research Ltd
Chapter 17
MALAYSIA
Shanthi Kandiah1
I OVERVIEW
The Personal Data Protection Act 2010 (PDPA), which came into force on 15 November 2013,
sets out a comprehensive cross-sectoral framework for the protection of personal data in
relation to commercial transactions.
The PDPA was seen as a key enabler to strengthen consumer confidence in electronic
commerce and business transactions given the rising number of cases of credit card fraud,
identity theft and selling of personal data without customer consent. Before the PDPA, data
protection obligations were spread out among certain sectoral secrecy and confidentiality
obligations, while personal information was primarily protected as confidential information
through contractual obligations or civil actions for breach of confidence.
The PDPA imposes strict requirements on any person who collects or processes
personal data (data users) and grants individual rights to ‘data subjects’. Enforced by the
Commissioner of the Department of Personal Data Protection (the Commissioner), it
is based on a set of data protection principles akin to that found in the Data Protection
Directive 95/46/EC of the European Union (EU)2 and, for this reason, the PDPA is often
described as European-style privacy law. An important limitation to the PDPA is that it does
not apply to the federal and state governments.3
The processing of information by a credit reporting agency is also exempted from the
PDPA. In the past, credit reporting agencies did not fall under the purview of any regulatory
authority in Malaysia, drawing heavy criticism for inaccurate credit information reporting.
The Credit Reporting Agencies Act 2010, which came into force on 15 January 2014, now
provides for the registration of persons carrying on credit reporting businesses under the
regulatory oversight of the Registrar Office of Credit Reporting Agencies, a division under
the Ministry of Finance, which is charged with developing a regulated and structured credit
information sharing industry.
1 Shanthi Kandiah is a partner at SK Chambers. She was assisted in writing this chapter by Aida Harun and
Carmen Koay, associates at SK Chambers.
2 The EU Data Protection Directive 95/46/EC has now been replaced with the EU General Data Protection
Regulation, which came into force on 25 May 2018.
3 There is some ambiguity about which public entities fall within this definition. It does not appear that
agencies and statutory bodies established under Acts of Parliament or state enactments to perform
specific public functions, such as Bank Negara Malaysia (BNM), the Employees Provident Fund, the
Securities Commission Malaysia and the Companies Commission of Malaysia, fall within the scope of this
exemption.
237
© 2018 Law Business Research Ltd
Malaysia
i Cybersecurity
The PDPA enumerates the security principle as one of its data protection principles.
Under this principle, an organisation must ensure both technical and organisational
security measures are well in place to safeguard the personally identifiable information that
it processes. The ISO/IEC 27001 Information Security Management System (ISMS), an
international standard, which deals with information technology systems risks such as hacker
attacks, viruses, malware and data theft, is the leading standard for cyber risk management
in Malaysia.
Sectoral regulators such as BNM and the Securities Commission Malaysia have also
been actively tackling issues relating to cybersecurity in relation to their relevant sectors by
issuing guidelines and setting standards for compliance (discussed in Section IX).
The intersection between privacy and cybersecurity also manifests in the extent of the
tolerance for government surveillance activity: the PDPA does not constrain government
access to personal data, as discussed in Section VI. The reasons given to justify broad
government access and use include national security, law enforcement and the combating of
terrorism.
238
© 2018 Law Business Research Ltd
Malaysia
Complaints remain the primary trigger for the investigation and enforcement activities of the
Commissioner. As at June 2018, the Commissioner has received over 700 official complaints
since the coming into force of the law. Unsurprisingly, a majority of complaints relate to
processing of data in the electronic environment.5
Cybersecurity issues have also received significant media attention as Malaysian
companies were not spared in the global ransomware attacks, such as the WannaCry cyberattack
in 2017. Currently, Malaysia does not have a specific law addressing cybersecurity-related
offences. Enforcement agencies, such as the National Cybersecurity Agency (NCSA), have to
rely on existing legislation, such as the Communications and Multimedia Act 1998 (CMA),
the Defamation Act 1957 and the Sedition Act 1948, to combat cyberthreats.6
5 Meeting with officers of the Commissioner at the Personal Data Protection Department in Putrajaya on
9 July 2018.
6 See Section IX.i.
7 Section 5(2) of the PDPA.
8 With effect from 23 June 2016.
9 With effect from 23 December 2016.
10 With effect from 19 January 2017.
11 Section 29 of the PDPA.
239
© 2018 Law Business Research Ltd
Malaysia
Personal data
Three conditions must be fulfilled for any data to be considered as ‘personal data’ within the
ambit of the PDPA.12
First, the data must be in respect of commercial transactions. ‘Commercial transactions’
is defined under the PDPA as transactions of a commercial nature, whether contractual or
not, and includes any matter relating to the supply or exchange of goods or services, agency,
investments, financing, banking and insurance.13 There is some ambiguity as to whether an
activity must have a profit motivation to be considered a commercial transaction.
Second, the information must be processed or recorded electronically or recorded as
part of a filing system.
Third, the information must relate directly or indirectly to a data subject who is
identifiable from the information or other information in the possession of the data user.
A central issue for the application of the PDPA is the extent to which information can be
linked to a particular person. If data elements used to identify the individual are removed, the
remaining data becomes non-personal information, and the PDPA will not apply.14
Sensitive personal data may only be processed with the explicit consent of the data subject
and in the limited circumstances set out in the PDPA.16
240
© 2018 Law Business Research Ltd
Malaysia
the PDPA to social media companies where it concerns data of users of social media if the
interpretation taken is that this data is not being processed by the branch office in Malaysia
or that no equipment in Malaysia is being used to process the data, except for the purpose of
transit through Malaysia.17
A further point to note is that the PDPA only regulates personal data in the context
of commercial transactions. As such, there is also some ambiguity as to whether a nominal
user of social media (i.e., for recreational and social use) would enjoy the protection offered
by the PDPA.
Most of the obligations under the PDPA apply to a ‘data user’ (i.e., ‘a person who either
alone or jointly in common with other persons processes any personal data or has control
over or authorises the processing of any personal data, but does not include a data processor’).
A ‘data processor’ who processes personal data solely on behalf of a data user is not
bound directly by the provisions of the PDPA.
The list of data users was expanded in 2016 to include two additional sectors: pawnbroking
and money lending.18 Failure to register by these categories of data users is an offence.19
Purpose limitation
A data user may not process personal data unless it is for a lawful purpose directly related to
the activity of the data user, the processing is necessary and directly related to the purpose,
and the personal data are adequate and not excessive in relation to that purpose.
The data subject must also consent to the processing of the personal data unless the
processing is necessary for specific exempted purposes.20
241
© 2018 Law Business Research Ltd
Malaysia
Consent
The PDPA does not define ‘consent’; nor does it prescribe any formalities in terms of the
consent. However, the Personal Data Protection Regulations 2013 (the Regulations) provide
that the data user must keep a record of consents from data subjects. The Regulations further
provide that the Commissioner or an inspection officer may require production of the record
of consents. It places the burden of proof for consent squarely on the data user.
Helpfully, the Personal Data Protection Code of Practice for the Utilities Sector
(Electricity) provides examples of consent, whether express or implied, that must be recorded
or maintained by the data user. These examples include:
a signatures, or a clickable box indicating consent;
b deemed consent;
c verbal consent; and
d consent by conduct or performance.
Consent is deemed given by way of conduct or performance if the data subject does not
object to the processing; the data subject voluntarily discloses its personal data; or the data
subject proceeds to use the services of the data user.
Verbal consent should be recorded digitally or via a written confirmation that consent
was given.
Explicit consent
Regarding explicit consent, the Personal Data Protection Code of Practice for the Utilities
Sector (Electricity) provides the following examples: where the data subject provides his or her
identification card to be photocopied or scanned; where the data subject voluntarily provides
the sensitive personal data; and verbal statements that have been recorded or maintained.
Notification
Data users are obliged to notify individuals of their purposes for the collection, use and
disclosure of personal data on or before such collection, use or disclosure. For example, where
a data user intends to use personal information collected for a different purpose, such as
marketing communications, the data user must provide the affected individuals with the
choice to disagree with the purpose before doing so.
Disclosure
Data users shall not disclose personal data for any purpose other than that for which the
data was disclosed at the time of collection, or for a purpose directly related to it; or to any
party other than a third party of the class notified by the data user without a data subject’s
consent.21
Retention
Personal data should not be kept longer than necessary. Retention policies must take into
account any relevant requirements imposed by applicable legislation. However, the Standards
appear to impose organisational requirements that may be challenging for organisations to
21 If a data user is found guilty of disclosing personal data without the consent of the data subject, he or she
may be liable to a 300,000-ringgit fine or two years’ imprisonment, or both.
242
© 2018 Law Business Research Ltd
Malaysia
comply with. Personal data collection forms are required to be destroyed within a period
of 14 days, unless the forms can be said to have some ‘legal value’ in connection with
the commercial transaction. It is unlikely that this time frame would be feasible for most
organisations.
A record of destruction should be properly kept and be made available when requested
by the Commissioner.
Minors
The PDPA does not contain specific protection for minors (below the age of 18). Section 4 of
the PDPA states that for minors, the guardian or person who has parental responsibility for
the minor shall be entitled to give consent on behalf of the minor.
243
© 2018 Law Business Research Ltd
Malaysia
Financial institutions
A banker’s duty of secrecy in Malaysia is statutory as is clearly provided under Section 133(1)
of the Financial Services Act 2013 (FSA). The duty is not absolute.27 Section 153 of the FSA
provides the legal basis for BNM to share a document or information on financial institutions
with an overseas supervisory authority.28
The Guidelines on Data Management and MIS29 Framework issued by BNM sets out
high-level guiding principles on sound data management and MIS practices that should
be followed by financial institutions. It is noteworthy that boards of directors and senior
management are specifically entrusted with the duty to put in place a corporate culture that
reinforces the importance of data integrity.
Healthcare
The Medical Act 1971 is silent on the duty of confidentiality. The Confidentiality Guidelines
issued by the Malaysian Medical Council in October 2011 after the PDPA was enacted are
the most comprehensive articulation of the confidentiality obligation of health professionals.
Direct selling
The PDPA prescribes direct sellers as one of the 11 classes of data users that must register with
the Personal Data Protection Department.
The PDPA also gives consumers the right to request in writing that the direct seller stop
or not begin processing their personal data. Failure to cease using personal data for direct
marketing purposes after a data subject has objected could make the offender liable for a fine
of up to 200,000 ringgit, imprisonment for up to two years, or both.
244
© 2018 Law Business Research Ltd
Malaysia
Unlike EU law, Malaysian law does not require transfer contracts to be made for the benefit
of third parties. Malaysia also has a doctrine of privity of contract that prevents enforcement
of third-party benefits by data subjects.
245
© 2018 Law Business Research Ltd
Malaysia
iv Requirement for data privacy due diligence and oversight over third parties
The Standards require data users, in discharging the security principle, to bind third
parties contractually to ensure the safety of personal data from misuse, loss, modification,
unauthorised access and disclosure. Some organisations do take the additional step of
reserving audit rights over third parties processing personal data of their behalf, but this is
not currently mandated.
246
© 2018 Law Business Research Ltd
Malaysia
The Commissioner’s authorised public officers also have various powers of enforcement
under the PDPA, including:
a conducting investigations on the commission of any offence under the PDPA;
b conducting searches and seizure of data users’ computerised data, documents,
equipment, systems and properties, with or without a warrant;
c requiring the production of computers, books, accounts, computerised data or other
documents kept by data users; and
d arresting without warrant any person who the authorised public officer reasonably
believes has committed or is attempting to commit an offence under the PDPA.
247
© 2018 Law Business Research Ltd
Malaysia
The Securities Commission Malaysia has also issued its Guidelines on Management of Cyber
Risk,36 which sets out a framework to address cybersecurity resilience for capital market
participants’ management of cybersecurity risks.
i Cyberlaws
In contrast to the comprehensive approach of the PDPA, Malaysia’s cyberlaws are scattered
across various pieces of legislation. Presently, the key provisions of Malaysia’s cyberlaws are
as follows.
35 www.mycert.org.my/statistics/2018.php.
36 With effect from 31 October 2016.
248
© 2018 Law Business Research Ltd
Malaysia
CMA
Offences under the CMA include:
a the offence of the use of network facilities or network services by a person to transmit
any communication that is deemed to be offensive and that could cause annoyance to
another person;37
b the offence of using an apparatus or device without authority;38
c the offence of improper use of network facilities or network services – such as annoying,
abusive, threatening, harassing or obscene communications – emails (spamming), SMS
or MMS website content publishing;39
d the offence of interception and disclosure of communications;40 and
e the offence of damage to network facilities.41
249
© 2018 Law Business Research Ltd
Malaysia
entry record and a record of computer usage for each computer, whereas the latter require
online business owners and operators to provide their full details and terms of conditions of
sale, to rectify errors and maintain records.
X OUTLOOK
We expect to see more enforcement actions by the Commissioner in the coming year,
particularly given the focus of the new Minister on enforcement of data breaches. Having
said that, we expect to see the Commission continue to pursue its ‘audit’ type regulation (as
opposed to prosecution) via inspection visits and enforcement notices as a means of instilling
awareness amongst data users on their data protection obligations.
The Cambridge Analytica scandal in April 2018 received wide media coverage in
Malaysia and is likely to have led to elevated awareness and concern among data subjects in
Malaysia on their privacy rights, including the extent of use of their personal data by social
media companies. This is said to be reflected through the high number of complaints from
the public received by the office of the Commissioner this year. In light of this, it is possible
that we will see more legal developments to regulate the internet and social media. Any
ambiguity about the application of the PDPA to social media companies should be resolved
as this is likely to be a recurring theme for user distress over data protection in the near future.
Compliance with the General Data Protection Regulation (GDPR), which came
into force on 25 May 2018, is a topic we expect to see proactively addressed by Malaysian
corporations that collect and process data of EU residents (such as customers, permanent
residents, visitors and expatriates) given its extraterritorial reach and the potentially hefty
fines that can be imposed due to breach.46 The GDPR’s prescriptions on organisational
and technical measures to protect personal data are likely to influence Malaysian standard
setting as well. For example, the office of the Commissioner has indicated that following
the GDPR’s lead, data breach notification is likely to be made compulsory in Malaysia.47 A
blanket requirement to report every breach could be excessively onerous. A threshold such
as ‘a real risk of serious harm’ should accompany such a requirement (which would most
certainly cover identity theft). In these cases, the breach notification should be made to the
consumer. Alternatively, and instead of a mandatory requirement, Parliament may wish
to consider explicitly recognising breach notification as a mitigation point in enforcement
proceedings. This would not just address considerations on fairness to the consumer, but
provide organisations with the incentive to advise consumers of breaches, as well as the
flexibility to evaluate their position.
46 Maximum fine that can be imposed under the GDPR is 4 per cent of worldwide total annual turnover, or
€20 million, whichever is higher.
47 Meeting with officers of the Commissioner at the Personal Data Protection Department in Putrajaya on
9 July 2018.
250
© 2018 Law Business Research Ltd
Chapter 18
MEXICO
I OVERVIEW
The right to privacy or intimacy is contemplated in Paragraphs 1 and 12 of Article 16 of the
Mexican Constitution, which prohibits anyone from intruding onto an individual’s person,
family, domicile, documents or belongings (including any wiretapping of communication
devices), except when ordered by a competent authority supported by the applicable law.
The right to data protection is stipulated in Paragraph 2 of Article 16 of the Constitution,
which seeks to set a standard for all collecting, using, storing, divulging or transferring
(collectively processing) of personal data (as defined below) to secure the right to privacy and
self-determination. The right to privacy and data protection are closely related fundamental
rights that, along with other fundamental rights, seek to protect individuals’ ability to guard
a portion of their lives from the intrusion of third parties. Notwithstanding this, while a
breach of privacy usually results in a breach of the right to protection of personal data, a data
protection breach does not always result in a breach of privacy.
The first formal effort to address personal data protection was introduced in 2002
when the Mexican Congress approved the Federal Law for Transparency and Access to
Public Governmental Information (the Former Transparency Law). Although the Former
Transparency Law was mainly aimed at securing access to any public information in the
possession of the branches of government and any other federal governmental body, it also
incorporated certain principles and standards for the protection of personal data being
handled by those government agencies. This effort was followed by similar legislation at the
state level.
After several attempts to address data protection rights more decisively, in 2009 Congress
finally approved a crucial amendment to the Constitution that recognised the protection of
personal data as a fundamental right. Consequently, Congress enacted the Federal Law for
the Protection of Personal Data in Possession of Private Parties (the Private Data Protection
Law), which became effective on 6 July 2010 and was followed by the Regulations of the
Private Data Protection Law on 22 December 2011.
Additionally, in January 2014 Congress approved an amendment to the Constitution
to create an autonomous entity to be in charge of enforcing the Private Data Protection
Law and to take on the duties of the former Federal Institute for Access to Information and
Protection of Data (the former IFAI), which was originally created as a semi-autonomous
agency separate from the federal public administration. However, in a rather controversial
move, the former IFAI amended its internal regulations so that it could assume the necessary
1 César G Cruz-Ayala is a partner and Diego Acosta-Chin is an associate at Santamarina y Steta, SC.
251
© 2018 Law Business Research Ltd
Mexico
characteristics, and role, of the proposed autonomous entity. Consequently – and as a result
of the new General Law for Transparency and Access to Public Governmental Information,
which annulled the effect of the former Transparency Law – all matters previously dealt
with by the former IFAI are now being handled by the ‘new IFAI’ as an autonomous entity;
and it has adopted the title National Institute of Transparency, Access to Information and
Protection of Personal Data (INAI).
The Private Data Protection Law is an omnibus data protection law that sets the
principles and minimum standards that shall be followed by all private parties when
processing any personal data. However, the Private Data Protection Law also recognises that
standards for implementing data protection may vary depending on the industry or sector;
accordingly, the Private Data Protection Law can certainly be complemented by sectorial laws
and self-imposed regulatory schemes, which would focus on particular industry standards
and requirements, to the extent that those standards and requirements comply with the data
protection principles in the Private Data Protection Law. There have been efforts to promote
such sector-specific rules among those processing any personal data within the same industry.
Finally, on 13 December 2016 the Mexican Congress approved the General Law for
the Protection of Personal Data in Possession of Governmental Entities (the Governmental
Data Protection Law, and collectively with the Private Data Protection Law, the Data
Protection Laws), which was enacted on 27 January 2017, to establish a legal framework for
the protection of personal data by any authority, entity or organ of the executive, legislative
and judicial branches, political parties, and trust and public funds operating at federal, state
and municipal level. On the understanding that this particular publication is intended to
address issues arising from data protection in the private sector, we will not address in detail
the governmental Data Protection Law, unless it is necessary to add context.
The INAI is in charge of promoting the rights to protection of personal data, and
enforcing and supervising compliance with the Data Protection Laws and those secondary
provisions deriving from those Laws. To this end, with respect to the private sector, the INAI
has been authorised to supervise and verify compliance with the Private Data Protection Law;
interpret administrative aspects of the Data Protection Laws; and resolve claims and, inter alia,
impose fines and penalties. The INAI has been actively working through media campaigns to
raise awareness among corporations and individuals of the relevance of adequate protection
of personal data. Although the INAI has the authority to initiate enforcement activities, most
fines and penalties imposed have resulted from claims filed by data subjects. We are aware
that companies that have been fined by the INAI for breaching the Private Data Protection
Law have challenged the decisions by means of nullity claims and amparo lawsuits; however,
the relevant files are not publicly available.
252
© 2018 Law Business Research Ltd
Mexico
On 28 May 2018, the INAI issued a non-binding guideline to assist data controllers
in the processing of biometric data in compliance with the Private Data Protection Law.
Such guideline reaffirms the criteria about what data is deems as ‘personal data’ or ‘sensitive
personal data’ by explaining that biometric data would be considered as personal data when
it directly identifies a person or allows the identification of a person, and as sensitive personal
data when (1) such refers to the most intimate sphere of a data subject; (2) undue use can lead
to discrimination; and (3) illegitimate use results in material risk to the data subject.
On May 2018 several banks in Mexico suffered a major cyberattack on their Interbank
Electronic Payments System (SPEI), and approximately 400 million Mexican pesos were
stolen. From the information publicly available, it appears that money was stolen from
accounts owned by the banks and not by accountholders. The Attorney General Office
(PGR) is still conducting an investigation on such cyberattack. INAI is also investigating if
such attack constitutes a data breach.
It was published on 12 June 2018 in the Federal Official Gazette the approval of the
Mexican Senate to adhere to the Convention for Protection of Individuals with regard to
Automatic Processing of Personal Data dated 28 January 1981 (Convention 108) and its
additional Protocol dated 8 November 2001 (ETS 181), which will enter into force on
1 October 2018. The Mexican government is now committed through Convention 108
and ETS 181 to take necessary measures to give effect to the provisions of said Convention,
and, therefore, it is foreseeable that a bill may be submitted in the near future to amend
the Data Protection Laws. As of the time of writing, Mexico has not yet adhered to the
Additional Protocol of Convention 108 that was approved by the Committee of Ministers of
the Council of Europe on 18 May 2018 (ETS 223) since such is still open for signing until
10 October 2018.
On 15 July 2018 INAI published a bulleting informing that it would initiate a
proceeding to impose penalties against the data controller operating in Mexico the application
‘Pig.gi’. Although there is limited public information, we understand that the investigation
against said company was initiated ex officio by INAI, considering that (1) the respective
privacy notice does not include all of the elements described in the Private Data Protection
Law; (2) the data controller processed users’ personal data for purposes that are not described
in their privacy notice; and (3) failed to implement those means necessary to comply with
data protection principles, such as responsibility and legality.
On 16 July 2018, INAI published certain recommendations to assist data controllers in
preventing theft of personal data while using public Wi-Fi networks to reduce risks associated
with undue processing of personal data.
On July 2018, INAI published a certain non-binding guideline to protect personal
data while using social media applications. Among other matters, such guideline provides
instructions and recommendations about access control and consent for applications,
webpages, and games, as well as suggestions to protect personal data when interacting in any
social media.
Although the General Data Protection Regulations (GDPR) applicable in the European
Union (EU) are not enforceable per se in Mexico, some provisions of GDPR are intended to
address processing beyond the borders of the EU, to the extent such processing is with respect
to personal data of EU citizens or residents or EU Member States. As a result of the above, it
is foreseeable that (1) those entities that intend to carry on any business operation in the EU
(even through remote means), shall meet with these new standards imposed by the GDPR;
253
© 2018 Law Business Research Ltd
Mexico
and (2) those Mexican companies whose parent company is headquartered in the EU, or
process personal data on behalf of those EU companies or subsidiaries, may be asked to meet
with these new standards imposed by the GDPR.
The Private Data Protection Law identifies those data protection principles governing
all processing of personal data, as well as the obligations imposed on any private person,
whether an individual or entity, that has control over the processing of personal data (a
data controller), data processors (as defined below), third parties and any others engaged
in the processing of personal data. As demanded by the Private Data Protection Law, the
Mexican executive branch issued the Regulations of the Private Data Protection Law with
the intention of clarifying the scope of those principles and obligations provided by the
Private Data Protection Law. The Regulations also set out the rules applicable to the exercise
by data subjects of their rights in relation to data controllers and those proceedings arising
from claims before the INAI filed by data subjects in the event of a breach of the Private
Data Protection Law by a data controller. Finally, the Guidelines for Privacy Notices (the
Guidelines), issued by the Secretariat of the Economy, set the standard of detail that should
be met by data controllers when drafting their own privacy notices and the scope of the
language in privacy notices, and the Self-Regulation Parameters on Data Protection establish
the rules, criteria and procedures for the development and implementation of self-regulatory
schemes on data protection, and were also issued by the Secretariat of the Economy.
Both the Federal Consumer Protection Law and Federal Consumer Protection Law
for the Users of Financial Services also contain stipulations protecting consumers, whether
individuals or entities, from any processing of their information for marketing purposes.
Corporations or financial entities that wish to market products must first review the list of
consumers who do not wish to receive marketing information and recorded in the Public
Registry of Consumers held by the Federal Consumers Attorney’s Office (Profeco), or the
Public Registry of Individual Users, which is managed by the National Commission for
the Protection of Financial Services Users (Condusef ). Any marketing activity with any
consumers enrolled in the registries may result in fines by Profeco or Condusef, as applicable.
Key definitions
In addition to any other terms defined herein, the following terms in particular should be
taken into consideration for a better understanding of Mexican law on the subject:
254
© 2018 Law Business Research Ltd
Mexico
a data processor: any natural person or entity that individually or jointly with others
carries out the processing of personal data on behalf of the data controller;
b data subject: the natural person whom the personal data concerns;
c personal data: any information related to an identified or identifiable individual. The
following information would not be subject to the Private Data Protection Law:
• information collected and stored for personal use and not intended for divulgence
or commercialisation;
• information collected by credit bureaux;
• information about entities;
• information about any individual when acting as a merchant or professional
practitioner; and
• information about any individual when rendering services to a legal entity or to
a merchant or professional practitioner, provided that information is limited to
the subject’s name, duties or position, business address, business email, business
telephone and business facsimile, and the information is processed when
representing the merchant or professional practitioner;
d public access source: a database that may be accessed by anyone without complying
with any requirement, except for the payment of a fee;
e sensitive personal data: personal data affecting the most intimate sphere of the data
subject, or of which the misuse may be a cause for discrimination or great risk for the
data subject, such as information regarding racial or ethnic origins, political opinions,
religious beliefs, trade union membership, physical or mental health, and sex life;
f transfer: any kind of communication of personal data made to a person other than the
controller, data processor or data subject; and
g remittance: any kind of communication of personal data between the data controller
and the data processor, within or outside Mexican territory.
255
© 2018 Law Business Research Ltd
Mexico
• processing prevents association between the personal data and the data subject or
his or her identification because of the structure, content or grade of disaggregation
of the personal data;
• processing is intended to comply with obligations resulting from a legal
relationship between the data controller and the data subject;
• there is an emergency situation that may injure an individual or damage his or
her assets;
• processing is essential for the purposes of rendering healthcare services or
assistance, the application of preventive medicine, determination of medical
diagnosis or the management of healthcare services, as long as the data subject
is unable, in the terms provided by the General Health Law, to grant his or her
consent for the applicable procedure; and
• a competent authority orders the processing.
c Quality: the data controller shall cause personal data in a database to be relevant,
accurate and up to date for the purpose for which it is meant to be used, and shall only
retain personal data for as long as is necessary to fulfil the specified purpose or purposes.
d Purpose: processing of personal data shall be limited to the purpose or purposes
specified in the privacy notice. No database containing sensitive personal data shall be
created without justifying that the purpose for its collection is legitimate, concrete and
in compliance with those activities or explicit purposes sought by the data controller.
Any processing of personal data for a purpose that is not compatible or analogous to
what is set forth in the privacy notice shall require a new consent from the data subject.
e Proportionality: processing of personal data must be necessary, adequate and relevant
for the purpose or purposes set forth in the privacy notice. With respect to sensitive
personal data, reasonable efforts shall be made to keep the period of processing to a
minimum.
f Loyalty: processing of personal data shall favour the interests of the data subject and a
reasonable expectation of privacy, which shall be understood as the level of confidence
that any person deposits in another that the personal data exchange between them shall
be processed as agreed between them in compliance with the Private Data Protection
Law.
g Transparency: data controllers shall inform data subjects, by means of a privacy notice,
about the personal data that will be subject to processing, and the purpose or purposes
for the processing. With respect to sensitive personal data, the privacy notice shall
expressly state that the information is of a sensitive nature.
h Responsibility: data controllers shall adopt the necessary measures to comply with all
data protection principles during the processing of personal data, even if the processing
is carried out by data processors or third parties. Therefore, a data controller shall
ensure full compliance with the privacy notice delivered to the data subject by that data
controller or by third parties with whom it has a legal relationship.
In addition to the aforementioned principles, all data controllers shall comply with the duties
of security and confidence, which are also applicable to data processors and third parties
receiving any personal data from a data controller, in which case the latter must verify that
these duties are observed by the third parties concerned.
256
© 2018 Law Business Research Ltd
Mexico
Compliance
INAI has ex officio authority to supervise compliance with the Private Data Protection Law, to
date, many proceedings to verify compliance have resulted from claims filed by data subjects,
however, INAI determined to initiate ex officio proceedings when deemed appropriate.
When drafting the privacy notice, data controllers must identify the different uses intended for
the personal data, and also distinguish those uses required for the legal relationship between
the data controller and data subject (necessary purposes) from those that are not (secondary
purposes). This requirement is important considering that a data subject may choose to reject
(or in the future withdraw consent for) processing for those secondary purposes without
affecting his or her relationship with the data controller.
When required, consent for processing any personal data must be obtained upon the
collection of the personal data if the collection is made personally or directly from the data
subject, or before any processing if personal data was not collected by the data controller
directly from the data subject.
257
© 2018 Law Business Research Ltd
Mexico
Data subjects also have the following rights, which are meant to secure protection of
personal data (the ARCO rights):
a access: a data subject is entitled to access his or her personal data held by a data
controller, as well as to know the privacy notice to which processing is subject;
b rectification: a data subject is entitled to rectify his or her personal data when it is
inaccurate or incomplete;
c cancellation: a data subject shall always be entitled to cancel his or her personal data.
The cancellation of personal data implies that the information shall be kept by the data
controller as long as required under the applicable legal relationship or once that time
has elapsed, the data controller shall delete the corresponding personal data, unless
otherwise requires by an applicable statute; and
d opposition: a data subject shall always be entitled, with legal cause, to oppose the
processing of his or her data. If a data subject does so, the data controller shall not be
entitled to process the data concerning that data subject.
Notwithstanding the above, and in addition to the ARCO rights, the data subject shall also
be entitled to withdraw consent (withdrawal), either in whole or in part, with respect to the
processing of personal data, and may limit the use or divulgement of personal data (data
limitation), and, collectively with the ARCO rights and the right of withdrawal (data claims),
by opting out mechanisms or enrolling in lists kept by the data controller, or of Profeco or
Condusef, of those data subjects unwilling to receive marketing communications. The data
controller shall describe the means available to the data subject to exercise any of the data
claims. Data claims shall be exercised free of charge, unless the data subject exercises the same
claim to access personal data within a period of 12 months, in which case the data controller
may charge a fee that shall not exceed three times the unit for measure and update (UMA) in
force. Unfortunately, the creation of awareness in Mexico regarding the protecting of personal
data is still a major challenge, considering that the lack of knowledge (and, in some cases,
interest) together with the degree of specialisation of this matter may be delaying proper
compliance with the Private Data Protection Law. Many data controllers are still gaining
interest and experience in these matters, which has caused inadequate implementation of
privacy notices, since this requires adequately mapping all data being processed to assess all
implications. It is still common to see data controllers drafting their privacy notices without
considering whether they are in fact processing any personal data, and to what extent.
258
© 2018 Law Business Research Ltd
Mexico
259
© 2018 Law Business Research Ltd
Mexico
d required by an agreement entered into or to be entered into between the data controller
and a third party in the interest of the data subject;
e necessary or legally required to protect the public interest or the prosecution or
enforcement of justice;
f required for the acknowledgment, exercise or defence of a right in a judicial proceeding;
or
g necessary for the preservation of, or compliance with, a legal relationship between the
data controller and the data subject.
Any international data transfer shall be evidenced by an agreement or any other document
whereby the third party assumes the same data protection obligations undertaken by the data
controller and the conditions for processing as consented to by the data subject as detailed
in the corresponding privacy notice. International data transfers do not need the approval
of the INAI or any other Mexican regulatory agency to be completed and there is no need
to submit standard contractual clauses or comparable instruments to any of them; however,
a data controller may seek, at its sole discretion, the opinion of the INAI on whether an
international transfer complies with these applicable requirements before completing such
transfer.
260
© 2018 Law Business Research Ltd
Mexico
g implement audits;
h conduct training for those officers involved in the processing;
i have a record of the means used to store personal data; and
j put in place a procedure to anticipate and mitigate any risks arising from the
implementation of new products, services, technologies and business plans when
processing personal data.
Penalties
In the event that the INAI becomes aware during a DPP or VP of a presumed breach of the
Private Data Protection Law, a proceeding to impose penalties will commence assessing the
infringement. The available penalties include the following:
261
© 2018 Law Business Research Ltd
Mexico
a a warning issued by the INAI urging a data controller to comply with the data subject’s
demands. Note that this course of action is limited to certain types of infringement;
b fines representing an amount of between 100 and 320,000 times the UMA,2 which
is published by the National Institute of Statistics and Geography, which will be
determined based on the nature of the infringement; and
c imprisonment for up to three years in certain cases, such as when someone authorised
to process any personal data causes a security breach in relation to the data under his
or her control with the purpose of obtaining a gain; or imprisonment for up to five
years when someone processes personal data with the intention of obtaining a gain by
deceiving, or taking advantage of the error of, a data subject or the person authorised
to transfer any personal data.
The penalties set out in (b) and (c) above may be doubled if the infringement involves sensitive
personal data. Although the Private Data Protection Law does not entitle a data subject to
receive any indemnification in light of damage suffered because of a data controller’s breach,
it does acknowledge that any of the fines or penalties indicated above would be imposed
against a data controller without prejudice to any liability that the data controller may have
in civil and criminal law.
When assessing the fine or penalty to be imposed, the INAI would consider:
a the nature of the personal data;
b the inappropriateness of the failure to comply with the claim of the data subject;
c whether the action or omission was deliberate;
d the economic capacity of the data controller; and
e any reoccurrence of the breach.
Data controllers may challenge these sanctions or fines by means of a nullity claim before the
Federal Court of Tax and Administrative Justice.
In addition, Profeco and Condusef are entitled to verify the adequate use of consumer
information. If either of them finds that a corporation is engaging in unsolicited marketing to
a customer enrolled in the Public Registry of Consumers or the Public Registry of Individual
Users, or that it has used consumers’ data for a purpose other than marketing, the following
shall apply: as of 2017, Profeco may impose fines of up to 1.56 million Mexican pesos; or
Condusef may impose fines of up to 2,000 times the UMA in force.3
In recent years, the INAI has fined, inter alia, financial institutions, telecom companies
and healthcare providers. The most significant fines imposed by the INAI so far are discussed
below. However, most of these fines have been challenged by the data controllers concerned
and the proceedings are pending resolution.
Tarjetas Banamex
A fine of 9.8 million Mexican pesos was imposed on Tarjetas Banamex, SA de CV SOFOM,
ER (Tarjetas Banamex) on the grounds that Tarjetas Banamex personnel made telephone
calls to collect an unpaid balance but to a telephone number belonging to a data subject that
was different from the cardholder in question, and failed to allow the data subject to rectify
262
© 2018 Law Business Research Ltd
Mexico
and cancel his personal data stored with Tarjetas Banamex. This resolution has been removed
from INAI’s webpage, as a result of a preventive measure issued by the Federal Fiscal and
Administrative Court.
Hospital
A fine of 4.6 million Mexican pesos was imposed to Operadora de Hospitales Ángeles, SA
de CV (the hospital) on the grounds that the hospital was negligent when processing and
answering a claim filed by a data subject to request access to her clinical file. Given that the
clinical file contained sensitive personal data of the data subject, the fine was doubled.
Telcel
A fine of 10.2 million Mexican pesos was imposed on Radiomóvil Dipsa, SA de CV (Telcel).
Telcel personnel had made calls to collect unpaid balances from individuals who were on a
frequently dialled-number list of persons owing money to Telcel, and divulged to them the
amount owed without the express consent of the data subject.
Banorte
A fine of 32 million Mexican pesos was imposed on Banco Mercantil del Norte, SA, Institución
de Banca Múltiple, Grupo Financiero Banorte (Banorte). Banorte collected sensitive personal
data without the consent of the data subject and stored the data without a legal justification
in breach of the principles of information, proportionality and legality, as it failed to deliver
a privacy notice to the claimant and processed personal data of the husband of the claimant
that was not necessary, adequate or relevant for the purpose of the data collection.
A fine of 35,050 Mexican pesos was imposed on a fitness club. The INAI’s decision to fine the
fitness club was based on the following arguments:
a fingerprints are biometric data and constitute sensitive personal data, therefore the
fitness club collected the data without the written consent of the data subject;
b the fitness club privacy notice did not comply with the Private Data Protection Law;
and
263
© 2018 Law Business Research Ltd
Mexico
c the fitness club processed personal data from the claimant in breach of the principles
of information, responsibility and legality, since the fitness club failed to deliver its
privacy notice to the claimant, did not adopt adequate security measures and processed
personal data in contravention of the Private Data Protection Law.
As a result of the above, foreign companies must always analyse whether their activities, or the
activities of their affiliates, would result in the application of the Private Data Protection Law.
Foreign companies have also faced certain challenges considering that, under the
premise that privacy notices should be simple and easy to understand, the INAI has been
reluctant to accept privacy notices issued by multiple data controllers, even if they are part of
the same corporate group.
264
© 2018 Law Business Research Ltd
Mexico
A data controller must notify each data subject upon confirmation that a data breach has
occurred, once it has taken any actions intended to assess the magnitude of the breach. The
notice shall contain at least the nature of the incident, the personal data affected, advice
on the actions that may be adopted by the data subject to protect his or her interests, the
remedial actions that were immediately carried out and the means through which the data
subject may obtain further information. In addition, the data controller would have to take
corrective and preventive actions and improve its security measures to avoid the reoccurrence
of the same breach.
The Private Data Protection Law and its Regulations do not oblige a data controller
to notify the INAI upon the occurrence of a breach or of the measures taken by the data
controller. However, failing to comply with any of the obligations mentioned above may
constitute an infraction under the Private Data Protection Law that may result in the
imposition of sanctions by the INAI.
X OUTLOOK
We are not aware of any intended amendments to the Private Data Protection Law since the
previous edition of this publication; however, we anticipate that a bill will be submitted in
order to harmonise the Data Protection Laws with the Convention 108 and ETS 181.
265
© 2018 Law Business Research Ltd
Chapter 19
POLAND
I OVERVIEW
When it comes to protection of privacy and personal data, Poland has followed the EU
standards and laws for many years and, in addition to the entry into force of the Polish
Act on Personal Data Protection (the Act) on 10 May 2018, the country prepared its legal
framework for the introduction of the General Data Protection Regulation (GDPR). There
is still some room for improvement (e.g., how fast data privacy matters are dealt with by
the data protection authority), but it seems that this is not a Poland-specific issue.2 Further
legislative works are, however, needed, for example, in banking and insurance law.
Data protection officers and experts are in high demand in both the public and private
sectors. Several higher-education bodies offer postgraduate studies focused on privacy and
there are GDPR events on a daily basis. The awareness in society regarding privacy is high and
probably increasing, owing to the fact that the GDPR is directly applicable. The e-Privacy
regulation is also likely to increase this demand.
New legislation, not necessarily connected to the GDPR, was enacted in the previous
year or will be enacted soon, including a law on counterterrorism and preventing hate speech
on the internet. From many perspectives, and for different reasons, privacy is a topical issue
and although there are still aspects that are expected to be regulated in the near future, there
are some who say it is already an overregulated area.
1 Anna Kobylańska and Marcin Lewoszewski are partners, and Maja Karczewska and Aneta Miśkowiec are
associates at Kobylańska & Lewoszewski Kancelaria Prawna Sp J.
2 www.politico.eu/pro/starving-watchdogs-will-police-eu-biggest-privacy-law-general-data-protection-
regulation-europe/.
266
© 2018 Law Business Research Ltd
Poland
and adopted in the Act, such as labour law, local government and banking law provisions.
The basic and most needed provisions have been adopted and implemented in compliance
with the GDPR.
Entities responsible for the implementation of the GDPR in Poland as well as private
entities, such as lawyers, businesses and entrepreneurs, conducted trainings, lectures and
events in order to familiarise themselves with the GDPR and its practical implementation.
In connection with the necessity to implement the NIS Directive,3 work on the draft
law on the national cybersecurity system began on 8 January 2018 and was redirected to
the Polish parliament on 30 April 2018. The last step taken towards the adoption of the
above-mentioned was taken on 5 July 2018, which was the third and last reading at a Polish
legislative proceeding. The Act on the National Cybersecurity System was signed by the
President of Poland on 1 September 2018 and is now binding.
3 Directive (EU) 2016/1148 of the European Parliament and of the Council of 6 July 2016 concerning
measures for a high common level of security of network and information systems across the Union
(http://eur-lex.europa.eu/legal-content/EN/TXT/?uri=uriserv%3AOJ.L_.2016.194.01.0001.01.ENG).
4 Journal of Laws No. 78, item 483, available in English at:
www.sejm.gov.pl/prawo/konst/angielski/kon1.htm.
5 Journal of Laws 2014, Item 121 with amendments.
6 Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection
of individuals with regard to the processing of personal data and on the free movement of such data
(http://eur-lex.europa.eu/legal-content/EN/TXT/?uri=celex%3A31995L0046).
7 www.giodo.gov.pl/en/408/171.
267
© 2018 Law Business Research Ltd
Poland
regulating how data should be processed are present. As was stated before, sectoral regulations
will be amended to bring them into line with the GDPR. Nevertheless, the legislative
procedure has not yet been completed.
Notwithstanding this regulatory spread, it seems that the President of the Office of
Personal Data Protection (PUODO (the name of the supervisory authority was changed
by the Act; the previous name was the General Inspector of Personal Data Protection)) has
been less active when it comes to enforcement actions and inspections. According to publicly
available statistics,8 in the first half of 2018 (so before the entry into force of the GDPR),
PUODO conducted 21 inspections (compared with 212 in 2017). There is no information
on the number of received complaints in 2018. In comparison, in 2017 there were 2,950
submitted complaints.
Legal grounds for personal data processing include, among others, consent of a data subject,
necessity to exercise a contract with the data subject, necessity of exercising rights or duties
arising from law, and legitimate interests. The controllers often ask data subjects to grant their
consent but, in fact, all other legal grounds should also be taken into account. Consent of
a data subject may be easily withdrawn (at any time after its granting), so it is always worth
considering other legal grounds for personal data processing.
The controller is obliged to fulfil an information obligation to inform data subjects
about their rights. This information is provided at the first moment the data is gathered by
the controller. The information should include: identity and contact details of the controller
or data protection officer, the purpose and legal basis of the data collection, data recipients
or categories of data recipient, possible transfer of personal data, storage period, whether the
provision of personal data is a statutory or contractual requirement, the existence of rights
to request from the controller as well as the right to lodge a complaint and information on
the existence of automated decision-making, including profiling. Even more categories of
information have to be provided in a situation where the personal data are not collected
directly from the data subject.
If the controller outsources areas of its business, including personal data processing, it is
obliged to ensure the outsourced third party (called a processor) takes proper care of the data.
For this reason, the controller is obliged to enter into a data-processing agreement with the
processor. The data processing agreement should include a provision obliging the processor to
process the data solely within the scope of, and for the purpose determined in, the contract as
well as imposing an obligation on the processor to sufficiently guarantee implementation of
appropriate technical and organisational measures.
8 https://giodo.gov.pl/pl/1520114/9175.
268
© 2018 Law Business Research Ltd
Poland
Under Polish law, the consent of the user should not be implied. With respect to the consent
for the use of information included in cookies, however, the law allows consent to be granted
indirectly (by making a choice in a browser’s settings). In practice, website users get initial
information on the use of cookies each time they open a new website (via a pop-up banner).
It is possible to use a website without accepting the cookie policy; however, website owners
often require users to click the ‘I understand’ button before enabling full use of the website.
Non-compliance with the cookie law may result in a financial penalty of up to 3 per cent
of the infringer’s revenue from the previous year.10
269
© 2018 Law Business Research Ltd
Poland
Location tracking
In July 2017, GIODO (now PUODO) published a broad analysis of the impact of location
tracking on privacy.11 The analysis covers both the Act on the Protection of Personal Data
and the GDPR.
According to the authority’s stated view, data collected with reference to location
tracking should be considered personal data. Therefore, the general rules for processing such
data should be applied. The key principles applying to location tracking are the principles of
legality,12 expediency,13 adequacy,14 substantive correctness,15 timeliness,16 and integrity and
confidentiality.17 PUODO considers consent of the individual concerned to be the key legal
basis for such processing.
As stated within the analysis, just as telecoms operators process a particular device’s
location using base stations, database owners with mapped Wi-Fi access points process
personal data when calculating the location of a particular smart mobile device. By specifying
both objectives and the means of such processing, these entities become controllers within
the meaning of Article 4(7) of the GDPR.18
Electronic marketing
In terms of the Polish law regarding unsolicited commercial information, the rules of using
electronic devices for marketing purposes became unclear. It is forbidden to send commercial
information by means of electronic communication (including emails, text messages and
internet communicators) without the user’s consent.19 This prohibition is broadly interpreted:
even a company logo or a marketing slogan used in an electronic signature may be treated
as commercial information. Moreover, this prohibition relates not only to sending emails
to private persons, but also to individuals who represent companies. There is also one more
prohibition on the use of telecommunication devices or automated calling systems for direct
marketing.20 Under this law, companies cannot make phone calls or send emails or text
messages with their offers without users’ prior consent. As a result of these two types of
prohibition, companies started asking users to grant consent to these two types of action,
causing annoyance and lack of understanding on the part of the users.
Spamming may be punished under five different acts of Polish law (the Act on Provision
of Services by Electronic Means, the Act on Combating Unfair Competition, the Act on
Combating Unfair Market Practices, the Act on Competition and Consumer Protection and
the Telecommunications Law) with a maximum financial penalty of up to 10 per cent of the
previous year’s turnover. In practice, spammers and cold callers are rarely punished for their
actions.
270
© 2018 Law Business Research Ltd
Poland
The new rules on the use of electronic devices for marketing purposes are expected with
the adoption of the EU ePrivacy Regulation.21
21 Proposal for the Regulation of the European Parliament and of the Council concerning the respect for
private life and the protection of personal data in electronic communications and repealing EU Directive
2002/58/EC (Regulation on Privacy and Electronic Communications).
22 Journal of Laws 2014, Item 1502.
271
© 2018 Law Business Research Ltd
Poland
were collected, for a period not exceeding three months, in case the video recording is not
evidence in legal proceedings or the employer has not been informed that it may be evidence
in such proceedings. The employer is limited also as to the location of the video surveillance,
owing to the provision of the Act that states that to lawfully install the video surveillance in
sanitary rooms, cloakrooms, canteens, smoking rooms or premises made available to trade
union organisations, the employer shall ensure that such monitoring is necessary for the
allowed purposes and that it does not violate either the dignity and other personal rights of
the employee or the principles of freedom and independence of the trade unions.
The Act places strong emphasis on the information obligation in the context of
video surveillance in the workplace, imposing on the employer an obligation to regulate
the purposes, scope and the way of use of the surveillance in collective agreements with
trade unions or in the internal workplace policies. If there is no collective agreement or the
employer is not obliged to set workplace regulations, this information shall be included in a
notice given to the employees. In each case every employee shall be provided in writing with
the aforementioned information before he or she starts to carry out the work duties, and if
the employee is already carrying out work duties – at least two weeks before the launch of the
video surveillance. The employer is also obliged to indicate the monitored rooms and areas
in a clear and visible manner, through the use of appropriate signs or acoustic signals, no
later than one day before the launch of the video surveillance. The Act explicitly states that
the aforementioned obligations are without prejudice to the information obligation deriving
from the GDPR provisions.
The Polish legislator decided to regulate also the issue of email correspondence
surveillance conducted by the employers, which – unlike video monitoring – is allowed to
be undertaken for the purpose of exercising control over the working time and the potential
off-duty activities of the employees, as the relevant provision states that it may be introduced
when it is necessary ‘to ensure the workflow enables full use of the working hours and proper
use of work tools handed to the employee’. However, this kind of workplace surveillance is
also facing some limits, as its conduct cannot infringe the privacy of correspondence and the
personal rights of the employees. It should be noted, though, that the information obligations
in case of email surveillance correspond to the obligations imposed on the employer in case
of video surveillance.
It has to be noted that the sector-specific acts on data protection, whose aim is to adjust
the regulations regarding different sectors of Polish economy to the GDPR requirements, are
still being processed. Therefore, more specific regulations on company policies and practices
are expected to be adopted in Poland in the near future.
23 Act of 16 September 2011 on Exchanging Information with Investigation Institutions from EU Countries.
272
© 2018 Law Business Research Ltd
Poland
certain requirements on data receivers, such as removing or anonymising personal data after a
certain time, limiting the scope of personal data processed or refraining from informing data
subjects about their personal data processing.
Apart from courts and prosecutors, there are numerous other authorities and institutions
that may request a disclosure of information, such as the Polish Police Force, the Internal
Security Agency, the Polish Foreign Intelligence Agency, the Polish Border Guard, the Military
Intelligence and Military Counter-Intelligence Services, the Central Anti-Corruption Bureau
and the Polish Military Police.
273
© 2018 Law Business Research Ltd
Poland
now explicitly regulated in the GDPR as to the processing activities conducted by a processor,
which is required to delete all existing copies after the end of the provision of services relating
to processing.
Another case concerned a company that sent notifications to their customers titled
‘Important information regarding actualisation of your personal data’, a few months before
the GDPR started to be directly applicable. The notifications attracted the attention of
the Polish supervisory authority, as the customers where requested not only to give their
consent to processing of their data, but also to give their consent to online marketing
and telemarketing, as well as to agree to make their personal data available for marketing
purposes to the company’s business partners. What was crucial in the case was the fact that
the notification included a request to tick all six checkboxes and provide the company with
the actual contact data, as they stated that the company ‘is obliged to update them due to the
new regulations’. A decision has not been issued in this case yet, however, in the light of the
GDPR provisions, according to opinions expressed by the experts, it is probable that such
consent to processing should not be perceived as freely given.
24 www.trojmiasto.pl/wiadomosci/Pozwali-sasiadow-za-zamontowanie-kamer-Przegrali-n111886.html.
274
© 2018 Law Business Research Ltd
Poland
ii Data breaches
The GDPR imposes a general obligation on the controllers regarding notifying data breaches
to the relevant supervisory authorities. It also defines the elements that each notification has
to include.
According to the Act, the PUODO may keep an IT system, by which the controllers
shall be able to notify data breaches. The wording of the aforesaid provision suggests that
keeping such system is optional and a controller is allowed to notify the supervisory authority
also by traditional means. This conclusion was confirmed by a supervisory authority’s officer,
who nevertheless made it clear that notifying data breaches by electronic means is highly
recommended.
Therefore, on the PUODO’s website there is already an electronic form available,
which is intended to be used while notifying a data breach, along with instructions for the
controllers. It has to be stressed out that the scope of information required in the form is
much broader than the scope of information determined in the GDPR.
275
© 2018 Law Business Research Ltd
Poland
For instance, regarding the nature of breach, the controller is required to provide
information whether the breach is a data confidentiality breach, a data integrity breach, or
a data accessibility breach, which the form briefly explains. The controller is obliged also to
indicate what did the breach consist in, however, the form provides for some suggestions
presented in a form of checkboxes. The form requires the controller to indicate whether the
breach was caused by intentional or unintentional, internal or external action; as well as to
provide additional description of the cause. The scope of information is broadened also in
case of categories of data (owing to the requirement to classify them as e.g., ‘identification
data’, ‘economic data’, ‘official documents’, etc). The form requires also from the controller
providing detailed information as to the measures taken or proposed to address the data
breach; in particular regarding the carried out or planned communication with data subjects,
including the indication of the date and the means of the communication, number of
data subjects, as well as providing the supervisory authority with the exact wording of the
communication. The controller is also required to inform whether the breach has already
been notified to foreign supervisory authorities and – if applicable – to indicate what kind of
legal obligations were met by such notification.
As to the manner of notifying the data breach to the supervisory authority, it has to
be mentioned that to settle official matters by electronic means in Poland, owning a trusted
profile is necessary. A trusted profile is a free-of-charge method of confirming identity in
electronic contacts with Polish administration. However, owing to the fact that obtaining
a trusted profile requires going through a registration process, not all entrepreneurs use
it. Nevertheless, owing to the approach adopted by PUODO, it can be assumed that the
electronic procedure of notifying data breaches will enjoy wide popularity among the Polish
entrepreneurs.
X OUTLOOK
Businesses operating in Poland look forward to sector-specific acts implementing
amendments of certain sector provisions regarding data protection to ensure compliance of
the national legal framework with the GDPR, which, alongside the latter, will constitute the
final and complex version of the package of legal acts implementing the GDPR. This covers
key business sectors, such as banking, insurance, telecommunications and e-commerce.
The GDPR is also a game-changer for the regulator itself, as it will face new, sometimes
complicated, procedures. We can expect to see some uncertainty in the area of privacy law in
the coming years, and from many perspectives.
At the same time, we are still awaiting general regulation of cybersecurity and
implementation of the NIS Directive. Data breaches are also becoming more and more
difficult to prevent, and the state and businesses should have proper tools to defend against
criminal activity.
276
© 2018 Law Business Research Ltd
Chapter 20
RUSSIA
Vyacheslav Khayryuzov1
I OVERVIEW
The Russian legal system is based on a continental civil law, code-based system. Both federal
and regional legislation exist; however, federal legislation takes priority in cases of conflict.
Generally, the issues of data privacy are regulated at federal level, and the regions of Russia do
not issue any specific laws or regulations in this respect.
The latest Constitution of Russia, which provides that each individual has a right to
privacy and personal and family secrets, was adopted in 1993. Each individual has a right
to keep his or her communication secret, and restriction of this right is allowed only subject
to a court decision. Collection, storage, use and dissemination of information about an
individual’s private life are allowed only with the individual’s consent. The protection of
these basic rights is regulated by special laws (e.g., on communications) and also specific
regulations enacted in relation to these laws.
In 2007, Russia adopted a major law regulating data privacy issues, Federal Law No.
152-FZ on Personal Data dated 27 July 2006 (the Personal Data Law). The Personal Data
Law covers almost all aspects of data protection, for example, what is considered personal
data, what types of data can be collected and processed, how and in what cases data can be
collected and processed, and what technical and organisational measures must be applied
by companies or individuals that collect data. Unlike European law, the Personal Data Law
does not distinguish between data controllers and data processors. Therefore, any individual
or entity working with personal data is considered a personal data operator and thus falls
under the regulation of the Personal Data Law. There are also several specific regulations,
mainly covering the technical side of data processing and to a certain extent clarifying the
provisions of the Personal Data Law. Such regulations are issued by the Russian government,
the Russian data protection authority (i.e., the Federal Service for Supervision in the Sphere
of Communication, Information Technology and Mass Communications (DPA)) or the
authorities responsible for various security issues in Russia, such as the Federal Service for
Technical and Export Control (FSTEK) or the Federal Security Service (FSB).
Since 2007, data privacy has never been a topic of intense discussion or major
enforcement. However, this changed rather dramatically in 2014. The general approach of
the government to privacy became fairly protectionist. Even though the officials usually make
statements to the media that free data flows and the development of worldwide interconnected
technologies is the real present and they do not want to impede the development of technologies,
in reality the new laws adopted during the last four years are creating artificial barriers and
277
© 2018 Law Business Research Ltd
Russia
thus harming Russian business. In 2014, the Russian parliament adopted amendments to
the Personal Data Law (that then became known as the Data Localisation Law) that require
data operators that collect Russian citizens’ personal data to store and process such personal
data using databases located in Russia. The Data Localisation Law was highly criticised by
business and the media but nevertheless came into force on 1 September 2015. While this
law generated a great deal of profit for Russian data centres, it also created high costs for
ordinary businesses, which needed to redesign their data storage infrastructure.
In addition to the Data Localisation Law, Russia adopted amendments to the Russian
Federal Law on Information, Information Technology and Protection of Information. These
amendments require companies that provide video, audio or text communication services
(usually ‘messengers’) to register with the authorities, to store users’ messages or audio or
video calls for up to six months and to provide the security authorities with decryption keys if
the messages are encrypted. These rules have resulted in the blocking of Blackberry Messenger
and a few other messengers in Russia and in a campaign to block the Telegram messenger.
278
© 2018 Law Business Research Ltd
Russia
importantly, the Data Localisation Law requires that all personal data of Russian citizens
must be stored and processed in Russia. The location of databases with personal data of
Russian citizens must be reported to the DPA.
279
© 2018 Law Business Research Ltd
Russia
d have a primary database in Russia: it must be ensured that the primary database with
the personal data of any Russian citizens is located in Russia (e.g., in a Russian data
centre or on any other server);
e comply with technical requirements: data operators must ensure that their systems are
compliant with the technical requirements of the FSB and FSTEK, as well as Decree
No. 1119;
f perform a data protection audit: every three years, data operators must perform an
internal data protection audit and as a result of such audit adopt a document confirming
that the data protection processes are in compliance with the Personal Data Law;
g adopt internal regulations on personal data protection and a privacy policy: if the data
is collected online, the privacy policy must be published on the operator’s website and
in the mobile app where the users need to consent to such policy;
h appoint a data privacy officer (i.e., an employee who will be in charge of implementation
and control of clients’ personal data protection);
i handle requests of individuals: data operators must comply with the requests of
individuals related to their personal data. Such requests must be answered (e.g., access
to personal data granted; personal data deleted at the request of the individual, etc.);
j define potential threats to personal data subjects: data operators must adopt an internal
document that assesses the potential threat to data subjects in the event of, for example,
unauthorised disclosure of their personal data and what measures are implemented in
order to avoid damage to data subjects;
k acquaint its employees with the internal data protection processes and regulations, and
conduct training sessions on personal data security; and
l register with the DPA (unless subject to exemptions).
The above list of steps is rather standard and may apply to most data operators; however, it is
not exhaustive and the relevant measures may vary depending on the types of data collected
and the means of collection and processing. The exact list of measures must be defined on a
case-by-case basis.
280
© 2018 Law Business Research Ltd
Russia
innovation. Issues such as location tracking, Big Data, data portability, employee monitoring,
facial recognition technology, behavioural advertising and electronic marketing remain, to a
certain extent, grey areas without adequate regulation.
However, the situation is changing. For instance, the DPA and the courts currently
support the idea that technological measures such as cookies constitute personal data. This
definitely makes business operations even more complicated. In addition, the lawmakers
intend to adopt a law on big data with a potential requirement to localize all data in Russia.
Obtaining written consent is in many cases a core element of Russian data protection law.
However, this may become a burdensome procedure, especially for companies that do
business on the internet. The main problem is that the only alternative to a wet signature
is a qualified enhanced electronic signature. Under Russian law, only a qualified enhanced
e-signature has the legal force of a handwritten signature. Such signatures must be created
using certified encryption software and are obtained at special certification centres. It is very
uncommon for an individual to have this tool.
The Personal Data Law also requires that the data exporter and the data importer enter
into an agreement (or at least add a provision to their agreement in the event of a cross-border
transaction) that must stipulate that the data importer will ensure at least the same level of
data protection as applied by the data exporter and certain other obligations provided under
the Personal Data Law.
281
© 2018 Law Business Research Ltd
Russia
and technical measures to be taken by the company in order to protect personal data.
Normally, all of the above can be covered in a single privacy policy. However, in practice not
all companies have implemented privacy policies, especially small and mid-sized companies.
Russian laws on trade unions give trade unions powers to influence labour-related
decisions, for example, certain decisions affecting labour relations. The company must take
into account the opinion of the trade union in cases provided for by law, such as regulatory
acts, internal regulations (local normative acts), or collective agreements. Thus, before the
approval and implementation of the privacy policy, the opinion of the trade union must be
requested.
As already noted above, all companies must appoint an internal data privacy officer.
The Personal Data Law does not provide much detail with respect to data privacy officers,
their role in the company and detailed regulation of their rights. Therefore, these are normally
covered in privacy policies as well.
Companies are obliged to have internal documents covering various aspects of
information security, including technical and organisational measures to be taken by the
companies. Normally, such documents are developed by external service providers that have
a state licence to provide information security services. These documents are of a technical
nature and normally cover the types of software and hardware a company should use to
protect its information systems that contain personal data.
282
© 2018 Law Business Research Ltd
Russia
283
© 2018 Law Business Research Ltd
Russia
The same lack of enforcement accompanied the Yarovaya Law. There were occasional
blockings (such as Blackberry Messenger); however, due to the limited popularity of such
messaging services, the enforcement cases did not attract much attention. Everything
changed with a case regarding one of the most popular messengers in Russia – Telegram.
On 20 March 2018, the Supreme Court of Russia dismissed the claim by a representative
of the Telegram messaging service to abolish the order of FSB dated 19 July 2016 requiring
messaging services to provide decryption keys to the FSB, which allow the security authorities
to read correspondence by Telegram’s users.
Telegram has frequently commented in the press that it is unable to provide the
decryption keys due to the nature of end-to-end encryption technology, while the FSB
believes this is technically possible. Telegram finally refused to provide the FSB with any
decryption keys and, therefore, on 13 April 2018, the Taganskyi District Court of Moscow
upheld the DPA’s claim to block access to Telegram. On 16 April 2018, the DPA reached out
to telecom operators, requesting that they commence blocking the messenger. All Russian
telecom operators are obliged to block access to the relevant resources.
Telegram’s lawyers appealed this decision without success. Since April 2018, the DPA
has been trying to block Telegram using its IP address, which seems to be an ineffectual
strategy. Telegram decided to contend with the DPA (luckily they have no actual presence
in Russia) and started jumping from one IP address to another. At one time, the DPA was
blocking millions of IP addresses, which caused interruptions in many internet services
(including those hosted on the Amazon and Google networks) and caused negative criticism
of the DPA by other authorities, the internet ombudsman and businesses. There was at least
one court case where a company that suffered from blocking (even though they are not
related to Telegram) sued the DPA. The case is to be tried this year. So far, the chase continues
and Telegram is still available despite the DPA’s actions.
284
© 2018 Law Business Research Ltd
Russia
foreign data protection authorities as well as the lack of relevant treaties on legal assistance,
the prospects of enforcement against a purely foreign legal entity are doubtful. In any event,
the issues described in this chapter, in particular data-localisation requirements, must be
taken into consideration by any foreign companies intending to expand their business to
the Russian market. The LinkedIn case also confirms that even the lack of a presence in
Russia does not release foreign data operators from the obligation to comply with certain
requirements of the Personal Data Law.
285
© 2018 Law Business Research Ltd
Russia
firewalls, anti-virus applications and software containing encryption) before permitting the
products to be imported and sold in the country. This is done to ensure that there are no
‘backdoors’ in the software that could be used by foreign intelligence services.
X OUTLOOK
The major issues for the upcoming years are still the Data Localisation Law and Yarovaya
Law. Generally, there is a strong feeling that Russian data protection law and internet
regulations as such will move towards more formalisation and less room for flexibility because
the authorities welcome additional control over the internet and personal data flows.
Furthermore, there are various initiatives related to regulation of Big Data, various
comparatively minor amendments to the Personal Data Law (e.g., new fines for failure to
ensure proper data processing by data recipients under data transfer agreements), etc.
It is also expected that more court practice will appear. The number of court cases
related to data privacy is already increasing and we expect even more enforcement actions and
court clarifications in this field.
286
© 2018 Law Business Research Ltd
Chapter 21
SINGAPORE
I OVERVIEW
In 2017 and 2018, Singapore has continued to rapidly develop its data protection, cybercrime,
and cybersecurity regimes. As set out in Singapore’s October 2016 cybersecurity strategy
report,2 the government views its efforts in these areas as part of an integrated cybersecurity
plan to protect the country from cyberthreats and to reinforce Singapore’s standing as a leading
information systems hub. The key legal components in this strategy include the Personal
Data Protection Act 2012 (PDPA), Singapore’s first comprehensive framework established
to ensure the protection of personal data, the Computer Misuse and Cybersecurity Act
(CMCA) to combat cybercrime and other cyberthreats, and the recently passed Cybersecurity
Act (the Cybersecurity Act), which focuses on protecting Singapore’s critical information
infrastructure (CII) and establishing a comprehensive national cybersecurity framework.
In this chapter, we will outline the key aspects of the PDPA, CMCA and the
Cybersecurity Act. The chapter will place particular emphasis on the PDPA, including a
brief discussion of the key concepts, the obligations imposed on data handlers, and the
interplay between technology and the PDPA. Specific regulatory areas such as the protection
of minors, financial institutions, employees and electronic marketing will also be considered.
International data transfer is particularly pertinent in the increasingly connected world; how
Singapore navigates between practical considerations and protection of the data will be briefly
examined. We also consider the enforcement of the PDPA in the event of non-compliance.
This chapter also will review the amendments to the CMCA and the CMCA’s
linkages with the Cybersecurity Act. The discussion will cover the proposed consolidation of
cybersecurity authority within Singapore’s Cybersecurity Agency (CSA) and the new position
of Commissioner of Cybersecurity established by the Cybersecurity Act.
287
© 2018 Law Business Research Ltd
Singapore
(1) broadening the circumstances under which organisations could collect, use and disclose
personal data without consent, and (2) imposing a mandatory data breach notification
requirement in certain situations. The consultation period closed on 5 October 2017, and
the PDPC issued its responses to the feedback on 1 February 2018.3 Regarding consent, the
PDPC had proposed not requiring consent if it would be impractical for the organisation to
obtain consent and the collection, use and disclosure of the personal data were not expected in
any way to have an adverse effect on the individual. In such a situation, the PDPC proposed
allowing a notification-of-purpose in lieu of consent. In response to public feedback, the
PDPC decided to remove the condition of ‘impractical to obtain consent.’ The PDPC also
proposed creating a catch-all ‘legal or business purpose’ exception to consent where it would
not be desirable or appropriate to obtain the individual’s consent and the benefits to the
public generally or to a subset of the public ‘clearly outweigh’ any adverse effect or risks to the
individual (such as where an organisation would like to share personal data in order to detect
and prevent fraudulent activity). Following public feedback, the PDPC proposed to instead
provide for a ‘legitimate interests’ exception to consent, which would be an evolution of the
‘legal or business purpose’ approach and would be further clarified in future guidelines from
the PDPC. Regarding the data breach notification requirement, the PDPC had proposed to
require data breach notification in the following circumstances: (1) if there is any risk of impact
or harm to affected individuals, the organisation must notify the individuals and the PDPC;
(2) if the scale of the data breach is ‘significant’ (i.e., involving 500 or more individuals), the
organisation must notify the PDPC; and (3) if a data intermediary experiences a breach, it
must notify its clients immediately. In response to public feedback, the PDPC announced
that it will not prescribe a statutory threshold for the number of affected individuals (i.e.,
500) that would constitute a ‘significant’ data breach, but rather would issue guidance on
assessing the scale of impact.
In March 2018, Singapore announced that it had joined the Asia-Pacific Economic
Cooperation (APAC) Cross-Border Privacy Rules (CBPR) system, as well as the APAC
Privacy Recognition for Processors (PRP) programme. Upon joining, Singapore became the
sixth member of the CBPR system – which already included Canada, Japan, Korea, Mexico
and the United States – and the second member of the PRP programme after the United
States. APEC established the CBPR programme to facilitate the transmittal of personal
data across national borders within and between companies and organisations. (The APEC
PRP programme seeks to accomplish similar goals for data processors.) Companies and
organisations in CBPR member countries that collect and use personal data may obtain
CBPR certification through a compliance review process by an independent evaluator. The
Singapore government has indicated that the PDPC intends to launch a certification scheme
for both the CBPR and PRP standards by the end of 2018.
In April 2018, the PDPC issued a Public Consultation for Managing Unsolicited
Commercial Messages and the Provision of Guidance to Support Innovation in the Digital
Economy. This consultation aims to bring together and streamline existing ‘do not call’ rules
contained in the PDPA and the Spam Control Act, ban parties from screening the do not
call registry and selling the resulting information to marketers, and include instant messages
within the remit of the PDPA. This consultation closed on 12 June 2018.
3 www.pdpc.gov.sg/-/media/Files/PDPC/PDF-Files/Legislation-and-Guidelines/PDPC-Response-to-
Feedback-for-Public-Consultation-on-Approaches-to-Managing-Personal-Data-in-the-Dig.pdf.
288
© 2018 Law Business Research Ltd
Singapore
289
© 2018 Law Business Research Ltd
Singapore
4 www.csa.gov.sg/~/media/csa/cybersecurity_bill/cybersecurity%20act%20-%20faqs.pdf.
5 Government agencies are not covered by the scope of the PDPA.
6 Section 2 of the PDPA.
7 Section 5.30, PDPA Key Concepts Guidelines.
8 Section 4(5) of the PDPA.
9 Second Schedule Paragraph 1(c); Third Schedule Paragraph 1(c); Fourth Schedule Paragraph 1(d) of the
PDPA.
10 Section 4(4)(b) of the PDPA. The protection of personal data of individuals deceased for less than 10 years
is limited; only obligations relating to disclosure and protection (Section 24) continue to apply.
11 Section 4(4) of the PDPA.
290
© 2018 Law Business Research Ltd
Singapore
Pursuant to the PDPA, organisations are responsible for personal data in their possession
or under their control.12 ‘Organisations’ include individuals who are resident in Singapore,
local and foreign companies, associations and bodies (incorporated and unincorporated),
whether or not they have an office or a place of business in Singapore.13 The PDPA does not
apply to public agencies.14 Individuals acting in a personal or domestic capacity, or where
they are an employee acting in the course of employment within an organisation, are similarly
excluded from the obligations imposed by the PDPA.15
Where an organisation acts in the capacity of a data intermediary, namely an organisation
that processes data on another’s behalf, it would only be subject to the protection and
retention obligations under the PDPA. The organisation that engaged its services remains
fully responsible in respect of the data as if it had processed the data on its own.16
There is no requirement to prove harm or injury to establish an offence under the
PDPA, although this would be necessary in calculating damages or any other relief to be
awarded to the individual in a private civil action against the non-compliant organisation.17
Subsidiary legislation to the PDPA includes implementing regulations relating to the
Do Not Call (DNC) Registry,18 enforcement,19 composition of offences,20 requests for access
to and correction of personal data, and the transfer of personal data outside Singapore.21
There is also various sector-specific legislation, such as the Banking Act, the
Telecommunications Act and the Private Hospitals and Medical Clinics Act, imposing specific
data protection obligations. All organisations will have to comply with PDPA requirements
in addition to the existing sector-specific requirements. In the event of any inconsistencies,
the provisions of other laws will prevail.22
The PDPC has released various advisory guidelines, as well as sector-specific advisory
guidelines for the telecommunications, real estate agency, education, social services and
healthcare sectors. The PDPC has also published advisory guidelines on data protection
relating to specific topics such as photography, analytics and research, data activities relating
to minors and employment. While the advisory guidelines are not legally binding, they
provide helpful insight and guidance into problems particular to each sector or area.
291
© 2018 Law Business Research Ltd
Singapore
Consent23
An organisation may only collect, use or disclose personal data for purposes to which an
individual has consented. Where the individual provided the information voluntarily and
it was reasonable in the circumstances, the consent may be presumed. Consent may be
withdrawn at any time with reasonable notice.24 The provision of a service or product must
not be made conditional upon the provision of consent beyond what is reasonable to provide
that product or service.
An organisation may obtain personal data with the consent of the individual from a
third party source under certain circumstances. For example, with organisations that operate
in a group structure, it is possible for one organisation in the group to obtain consent to the
collection, use and disclosure of an individual’s personal data for the purposes of the other
organisations within the corporate group.25
Purpose limitation26
Organisations are limited to collecting, using or disclosing personal data for purposes that
a reasonable person would consider appropriate in the circumstances and for a purpose to
which the individual has consented.
Notification27
Organisations are obliged to notify individuals of their purposes for the collection, use and
disclosure of the personal data on or before the collection, use and disclosure. The PDPC has
also released a guide to notification to assist organisations in providing clearer notifications to
consumers on the collection, use and disclosure of personal data that includes suggestions on
the layout, language and placement of notifications.28
292
© 2018 Law Business Research Ltd
Singapore
Accuracy32
An organisation is obliged to make a reasonable effort to ensure that the personal data
collected by or on behalf of the organisation are accurate and complete if they are likely to
be used to make a decision that affects an individual or are likely to be disclosed to another
organisation.
Protection33
An organisation is obliged to implement reasonable and appropriate security safeguards to
protect the personal data in its possession or under its control from unauthorised access or
similar risks. As a matter of good practice, organisations are advised to design and organise
their security arrangements in accordance with the nature and varying levels of sensitivity of
the personal data.34
Retention limitation35
An organisation may not retain the personal data for longer than is reasonable for the purpose
for which they were collected, and for no longer than is necessary in respect of its business or
legal purpose. Beyond that retention period, organisations should either delete or anonymise
their records.
Transfer limitation36
An organisation may not transfer personal data to a country or territory outside Singapore
unless it has taken appropriate steps to ensure that the data protection provisions will be
complied with, and that the overseas recipient is able to provide a standard of protection that
is comparable to the protection under the PDPA (see Section IV).
Openness37
An organisation is obliged to implement necessary policies and procedures in compliance
with the PDPA, and to ensure that this information is available publicly.
293
© 2018 Law Business Research Ltd
Singapore
identifies a particular networked device. However, where IP addresses are combined with
other information such as cookies, individuals may be identified via their IP addresses, which
would thus be considered personal data.
In relation to organisations collecting data points tied to a specific IP address, for
example, to determine the number of unique visitors to a website, the PDPC takes the
view that if the individual is not identifiable from the data collected, then the information
collected would not be considered personal data. If, on the other hand, an organisation tracks
a particular IP address and profiles the websites visited for a period such that the individual
becomes identifiable, then the organisation would be found to have collected personal data.
Depending on the purpose for the use of cookies, the PDPA would apply only where
cookies collect, use or disclose personal data. Thus, in respect of session cookies that only
collect and store technical data, consent is not required.38 Where cookies used for behavioural
targeting involve the collection and use of personal data, the individual’s consent is required.39
Express consent may not be necessary in all cases; consent may be reflected when an individual
has configured his or her browser setting to accept certain cookies but reject others.
If an organisation wishes to use cloud-based solutions that involve the transfer of
personal data to another country, consent of the individual may be obtained pursuant to the
organisation providing a written summary of the extent to which the transferred personal data
will be protected to a standard comparable with the PDPA.40 It is not clear how practicable
this would be in practice; a cloud-computing service may adopt multi-tenancy and data
commingling architecture to process data for multiple parties. That said, organisations may
take various precautions such as opting for cloud providers with the ability to isolate and
identify personal data for protection, and ensure they have established platforms with a
robust security and governance framework.
As regards social media, one issue arises where personal data are disclosed on social
networking platforms and become publicly available. As noted earlier, the collection, use and
disclosure of publicly available data is exempt from the requirement to obtain consent. If,
however, the individual changes his or her privacy settings so that the personal information is
no longer publicly available, the PDPC has adopted the position that, as long as the personal
data in question were publicly available at the point of collection, the organisation will be
able to use and disclose the same without consent.41
294
© 2018 Law Business Research Ltd
Singapore
guardians on the minor’s behalf.43 The Education Guidelines44 provide further guidance on
when educational institutions seeking to collect, use or disclose personal data of minors are
required to obtain the consent of the parent or legal guardian of the student.
Given the heightened sensitivity surrounding the treatment of minors, the PDPC
recommends that organisations ought to take relevant precautions on this issue. Such
precautions may include making the terms and conditions easy to understand for minors,
placing additional safeguards in respect of personal data of minors and, where feasible,
anonymising their personal data before use or disclosure.
Financial institutions
A series of notices issued by the Monetary Authority of Singapore (MAS),45 the country’s
central bank and financial regulatory authority, require various financial institutions to,
among other things:
a upon request, provide access as soon as reasonably practicable to personal data in
the possession or under the control of the financial institution, which relates to an
individual’s factual identification data such as full name or alias, identification number,
residential address, telephone number, date of birth and nationality; and
b correct an error or omission in relation to the categories of personal data set out above
upon request by a customer if the financial institution is satisfied that the request is
reasonable.
Electronic marketing
The PDPA contains provisions regarding the establishment of a national DNC Registry and
obligations for organisations that send certain kinds of marketing messages to Singapore
43 Section 14(4) of the PDPA. See also discussion at Section 8.9 of the PDPA Selected Topics Guidelines.
44 Sections 2.5–2.8, PDPC Advisory Guidelines on the Education Sector, issued 11 September 2014.
45 MAS Notice SFA13-N01 regulating approved trustees; MAS Notice 626 regulating banks; MAS Notice
SFA04-N02 regulating capital markets intermediaries; MAS Notice FAA-N06 regulating financial advisers;
MAS Notice 824 regulating finance companies; MAS Notice 3001 regulating holders of money-changers’
licences and remittance licences; MAS Notice PSOA-N02 regulating holders of stored value facilities;
MAS Notice 314 regulating life insurers; MAS Notice 1014 regulating merchant banks; and MAS Notice
TCA-N03 regulating trust companies.
295
© 2018 Law Business Research Ltd
Singapore
telephone numbers to comply with these provisions. The PDPA Healthcare Guidelines46
provide further instructions on how the DNC provisions apply to that sector, particularly
in relation to the marketing of drugs to patients. In relation to the DNC Registry, the
obligations only apply to senders of messages or calls to Singapore numbers, and where the
sender is in Singapore when the messages or calls are made, or where the recipient accesses
them in Singapore. Where there is a failure to comply with the DNC provisions, fines of up
to S$10,000 may be imposed for each offence.
Employees
The PDPC provides that organisations should inform employees of the purposes of the
collection, use and disclosure of their personal data and obtain their consent.
Employers are not required to obtain employee consent in certain instances. For
instance, the collection of employee’s personal data for the purpose of managing or
terminating the employment relationship does not require the employee’s consent, although
employers are still required to notify their employees of the purposes for their collection,
use and disclosure.47 Examples of managing or terminating an employment relationship
can include using the employee’s bank account details to issue salaries or monitoring how
the employee uses company computer network resources. The PDPA does not prescribe the
manner in which employees may be notified of the purposes of the use of their personal
data; as such, organisations may decide to inform their employees of these purposes via
employment contracts, handbooks or notices on the company intranet.
In addition, collection of employee personal data necessary for ‘evaluative purposes’,
such as to determine the suitability of an individual for employment, neither requires the
potential employee to consent to, nor to be notified of, their collection, use or disclosure.48
Other legal obligations, such as to protect confidential information of their employees, will
nevertheless continue to apply.49
Section 25 of the PDPA requires an organisation to cease to retain documents relating
to the personal data of an employee once the retention is no longer necessary.
296
© 2018 Law Business Research Ltd
Singapore
b it has taken appropriate steps to ensure that the recipient is bound by legally enforceable
obligations to protect the personal data in accordance with standards comparable to the
PDPA.51 Such legally enforceable obligations would include any applicable laws of the
country to which the personal data is transferred, contractual obligations or binding
corporate rules for intra-company transfers.52
Notwithstanding the above, an organisation is taken to have satisfied the latter requirement
if, inter alia, the individual consents to the transfer pursuant to the organisation providing a
summary in writing of the extent to which the personal data transferred to another country
will be protected to a standard comparable to the PDPA;53 or where the transfer is necessary
for the performance of a contract.
In respect of personal data that simply passes through servers in Singapore en route to
an overseas destination, the transferring organisation will be deemed to have complied with
the transfer limitation obligation.54
The Key Concepts Guidelines55 also provide examples to illustrate situations in which
organisations are deemed to have transferred personal data overseas in compliance with their
transfer limitation obligation pursuant to Section 26 of the PDPA, regardless of whether the
foreign jurisdiction’s privacy laws are comparable to the PDPA. An example is when a tour
agency needs to share a customer’s details (e.g., his or her name and passport number) to
make hotel and flight bookings. The tour agency is deemed to have complied with Section 26
since the transfer is necessary for the performance of the contract between the agency and
the customer.
An organisation is also deemed to have complied with the transfer limitation obligation
if the transfer is necessary for the performance of a contract between a Singaporean company
and a foreign business, and the contract is one that a reasonable person would consider to be
in the individual’s interest.
Other examples given by the Key Concepts Guidelines include the transferring of
publicly available personal data, and transferring a patient’s medical records to another
hospital where the disclosure is necessary to respond to a medical emergency.
The Key Concepts Guidelines also set out the scope of contractual clauses at
Section 19.5 for recipients to comply with the required standard of protection in relation
to personal data received so that it is comparable to the protection under the PDPA. The
Key Concepts Guidelines sets out in a table (reproduced below) the areas of protection a
transferring organisation should minimally set out in its contract in two situations: where
the recipient is another organisation (except a data intermediary); and where the recipient
is a data intermediary (i.e., an organisation that processes the personal data on behalf of the
transferring organisation pursuant to a contract).
297
© 2018 Law Business Research Ltd
Singapore
Recipient
Organisation (except data
S/N Area of protection Data intermediary intermediary)
1 Purpose of collection, use and disclosure by recipient Yes
2 Accuracy Yes
3 Protection Yes Yes
4 Retention limitation Yes Yes
5 Policies on personal data protection Yes
6 Access Yes
7 Correction Yes
298
© 2018 Law Business Research Ltd
Singapore
ii Cookie policy
If the corporate website requires collection of personal data or uses cookies that require
collection of personal data, users ought to be notified of the purpose for the collection, use or
disclosure of the personal data, and prompted for their consent in that regard.
299
© 2018 Law Business Research Ltd
Singapore
use personal data about an individual without the consent of the individual if the use is
necessary for any investigation or proceedings.63 These exceptions, however, do not extend to
internal audits or investigations. Nevertheless, it may be argued that consent from employees
is not required as such audits would fall within the purpose of managing or terminating the
employment relationship.64 Employees may be notified of such potential purposes of use of
their personal data in their employee handbooks or contracts, as the case may be.
On an international scale, Singapore is active in providing legal assistance and in the
sharing of information, particularly in respect of criminal matters. That said, the PDPC may
not share any information with a foreign data protection body unless there is an undertaking
in writing that it will comply with its terms in respect of the disclosed data. This obligation is
mutual, and the PDPA also authorises the PDPC to enter into a similar undertaking required
for a foreign data protection body where required.65
300
© 2018 Law Business Research Ltd
Singapore
or is attributable to his or her neglect.72 Further, employers are deemed to be vicariously liable
for the acts of their employees, unless there is evidence showing that the employer had taken
steps to prevent the employee from engaging in the infringing acts.73
Directions issued by the PDPC may be appealed to be heard before the Appeal
Committee. Thereafter, any appeals against decisions of the Appeal Committee shall lie to
the High Court, but only on a point of law or the quantum of the financial penalty. There
would be a further right of appeal from the High Court’s decisions to the Court of Appeal, as
in the case of the exercise of its original civil jurisdiction.74
In relation to breaches of the DNC Registry provisions, an organisation may be liable
for fines of up to S$10,000 for each breach.
301
© 2018 Law Business Research Ltd
Singapore
organisation may be taken until after the right of appeal has been exhausted and the final
decision is made.78 Once the final decision is made, a person who suffers loss or damage as a
result of a contravention of the PDPA may commence civil proceedings directly.79
ii Cybersecurity
Singapore is not a signatory to the Council of Europe’s Convention on Cybercrime.
In Singapore, the CMCA and the Cybersecurity Act are the key legislations governing
cybercrime and cybersecurity. The CMCA is primarily focused on defining various cybercrime
offences, including criminalising the unauthorised accessing80 or modification of computer
material,81 use or interception of a computer service,82 obstruction of use of a computer,83
302
© 2018 Law Business Research Ltd
Singapore
and unauthorised disclosure of access codes.84 The 2017 amendments to the CMCA added
the offences of obtaining or making available personal information that the offender believes
was obtained through a computer crime85 and using or supplying software or other items to
commit or facilitate the commission of a computer crime.86
Although the CMCA is in general a criminal statute, the 2013 amendments added a
cybersecurity provision in the event of certain critical cybersecurity threats. In particular, the
Minister of Home Affairs may direct entities to take such pre-emptive measures as necessary
to prevent, detect or counter any cybersecurity threat posed to national security, essential
services or the defence of Singapore or foreign relations of Singapore.87
The Cybersecurity Act greatly expands national cybersecurity protections, including
by imposing affirmative reporting, auditing and other obligations on CII owners and by
appointing a new Commissioner of Cybersecurity with broad authority, including the power
to establish mandatory codes of practice and standards of performance for CII owners.
X OUTLOOK
In keeping with its declared strategy, Singapore continues to progress on clarifying and
enforcing its existing data privacy and cybersecurity regime.
303
© 2018 Law Business Research Ltd
Chapter 22
SPAIN
I OVERVIEW
Data protection and privacy are distinct rights under Spanish law, but both are deemed
fundamental rights derived from respect for the dignity of human beings. They are primarily
based on the free choice of individuals to decide whether to share with others (public
authorities included) information that relates to them (personal data) or that belongs to their
private and family life, home and communications (privacy). Both fundamental rights are
recognised in the Lisbon Treaty (the Charter of Fundamental Rights of the European Union)
and the Spanish Constitution of 1978. Data protection rules address, inter alia, security
principles and concrete measures that are helpful to address some cybersecurity issues, in
particular, because specific cybersecurity legislation (which not only covers personal data and
private information but rather any information) is new and not sufficiently developed yet.
Spain had an omnibus data protection framework law along the lines of the EU
approach (mainly Law 15/1999 of 13 December on the Protection of Personal Data (the DP
Law), as developed by Royal Decree 1720/2007 of 21 December (RD 1720/2007), jointly
the DP Regulations), applying both to the private and public sectors. In addition, there are
certain sector-specific regulations that also include data protection provisions.
The General Data Protection Regulation (GDPR) has not automatically repealed the
DP Regulations; however, the DP Regulations remain in force only to the extent that they do
not contravene the GDPR. For this reason, a new draft data protection law (the Draft Bill)
is currently under discussion in the Spanish parliament that will provide for local rules and
administrative proceedings adapted to the GDPR. Approval of the Draft Bill is expected by
the end of 2018.
In addition, some personal data and or some processing activities may require specific
protection such as certain financial, e-communications or health-related data or processing
activities. There are several codes of conduct for data protection that were approved under
former legal regime (i.e., the DP Regulations) in various sectors but, in general, they
merely adjusted the general obligations to the specific needs of the corresponding sector or
organisation. These codes will have to be reviewed pursuant to the GDPR.
The rights to data protection and privacy are not absolute and, where applicable, must
be balanced with other fundamental rights or freedoms (e.g., freedom of information or
expression) as well as other legitimate interests (e.g., intellectual property rights, public
security and prosecution of crimes).
1 Leticia López-Lapuente and Reyes Bermejo Bosch are lawyers at Uría Menéndez Abogados, SLP.
304
© 2018 Law Business Research Ltd
Spain
In the case of data protection, this balance must be assessed by the organisation and
could be challenged before the Spanish Data Protection Authority (DPA), which is in charge
of supervising the application of the regulations on data protection (see Section III.i). Privacy
infringements must be claimed before the (civil or criminal) courts.
The DPA was created in 1993, and has been particularly active in its role of educating
organisations and the general public on the value of data protection and of imposing
significant sanctions. In 2017 alone, the DPA received 10,651 claims from individuals and
authorities, and issued and published 852 sanctioning resolutions within the private sector.
These sanctions are published on the DPA’s website, which is used by the media (and others)
as an important source of data protection information. However, as a consequence of the
GDPR’s approval, the DPA is reviewing the contents to be published on its website (www.
aepd.es) and it is likely that a significant part of the resolutions issued in the past will be
removed from the website.
305
© 2018 Law Business Research Ltd
Spain
Privacy rights are mainly regulated by the Spanish Constitution, Law 1/1982 of 5 May
on civil protection of the rights to honour, personal and family privacy, and an individual’s
own image, and by the Spanish Criminal Code.
Personal data and private data are not synonymous. Personal data are any kind of
information (alphanumeric, graphic, photographic, acoustic, etc.) concerning an identified
or identifiable natural person, irrespective of whether or not this information is private.
However, data regarding ideology, trade union membership, religion, beliefs, racial origin,
health or sex life as well as criminal and administrative offences are deemed more sensitive
and require specific protection.
Protecting personal data is achieved by allocating specific duties to both ‘controllers’
(i.e., those who decide on the data processing purposes and means) and ‘processors’ (i.e.,
those who process the data only on behalf of a controller to render a service).
The DPA is the entity in charge of supervising compliance with the data protection
duties imposed by the GDPR and DP Regulations (fair information, legitimate ground,
security, notification, proportionality and quality, etc.).2 The DPA has carried out ex officio
audits of specific sectors (including online recruitment procedures, TV games and contests,
hotels, department stores, distance banking, hospitals, schools, webcams and mobile apps).
However, the DPA’s activity in terms of individual compliance investigations has significantly
increased over the past 10 years, as has the number of fines imposed. Indeed, failure to
comply with the GDPR and DP Regulations may result in the imposition of administrative
fines depending on the severity of the offence (and regardless of whether civil or criminal
offences are also committed, if applicable). Neither harm nor injury is required (i.e., the
infringement itself suffices for the offender to be deemed liable), but the lack of any harm or
injury is considered an attenuating circumstance to grade the amount of the administrative
fine. However, harm or injury will be required to claim damages arising from breaches of data
protection rights before civil and criminal courts.
2 The data protection right is enforced by the DPA at a national level with limited exceptions. For example,
Catalonia and the Basque country are regions that have regional data protection authorities with
competence limited to the processing of personal data by the regional public sector.
306
© 2018 Law Business Research Ltd
Spain
d when the recipient is not located in the EU or EEA (or in a country whose regulations
afford an equivalent or adequate level of protection identified by the European
Commission or the DPA), appropriate guarantees must be adopted, unless a legal
exemption applies;
e controllers should adopt appropriate security measures, as explained in Section IX; and
f data subjects have a right to access all data relating to them, to rectify their data and have
their data erased if the processing does not comply with the data protection principles,
in particular, when data are incomplete, inaccurate or excessive in relation to the
legitimate purpose of its processing. Data subjects are also entitled to object to certain
processing activities that do not require their consent or are made for direct marketing
purposes, as well as to request the restriction of processing and the portability of their
data.
In addition to the above, the GDPR has added specific mandatory content for a processing
agreement to be valid (as provided by Article 28.3 of the GDPR) including the duty to
provide assistance to the controller in the event of data breaches or the duty to allow audits
to its processing of data. Since the duties under the GDPR became applicable as from May
2018, the DPA has published specific guidelines on how to comply with the GDPR rules
regarding processing agreements.
307
© 2018 Law Business Research Ltd
Spain
Since the above regulations generally refer to the DP Regulations and after May 2018 they
will need to be reviewed according to the GDPR or, at least, reinterpreted according to
GDPR rules.
iv Technological innovation
Technology has created specific issues in the privacy field, including:
a online tracking and behavioural advertising: as a general rule, explicit prior consent is
required. The DPA does not generally consider that online behavioural advertising or
profiling activities can be based on the existence of a legitimate interest. In addition, the
DPA has expressly announced that profiling activities must be considered as separate
processing activities from any others, such as advertising ones, and, as such, a specific
and separate legal ground must legitimate these activities (e.g., a separate consent);
b location tracking: the DPA considers that the use of this technology in work
environments may be reasonable and proportionate and subject to certain requirements
(mainly, that specific information has been previously provided to data subjects on the
potential monitoring of IT resources);
c use of cookies: as a general rule, explicit prior consent is required for installing cookies
or similar devices on terminal equipment. In June 2018 the DPA announced that
cookie policies must be adjusted according to the GDPR’s requirements and has issued
certain guidelines on how banners and privacy policies should be adapted accordingly.
In 2017, the DPA initiated 395 investigations and issued 55 sanctioning resolutions
regarding Internet services (certain of which included the use of cookies);
d biometrics: traditionally, the processing of biometric data has not been considered
‘sensitive’ and, therefore, the DPA has made no specific requirements in this area. The
implementation of the GDPR in Spain implies a change in the concept of biometrics,
which are now considered especially protected data, and we are currently awaiting the
DPA’s guidelines in this regard;
e big data analytics: in April 2017, the DPA published guidelines on how to implement
big data projects according to GDPR rules;
f anonymisation, de-identification and pseudonymisation: the DPA has adopted an
official position regarding the use of ‘anonymous’ data and open data in big data projects.
308
© 2018 Law Business Research Ltd
Spain
In particular, the DPA published guidelines at the end of 2016 on the protection
of personal data related to the reuse of public-sector information and guidelines on
anonymisation techniques;
g internet of things and artificial intelligence: the DPA has not adopted an official
position regarding the internet of things and artificial intelligence;
h data portability: the DPA has published a legal report on, among other issues, the
data portability right. The DPA stated that the portability right includes not only
data subjects’ current data, but also their former data (either provided by them or
inferred from the contractual relationship); however, the information obtained from
the application of profiling techniques (e.g., algorithms) would not be subject to
portability. Although the DPA’s legal reports are not binding, they are highly useful
since they reflect the DPA’s doctrinal tendency;
i right of erasure or right to be forgotten: the right to be forgotten in relation to search
engines is actively pursued both by Spanish data subjects and the DPA. Notably, Google
Spain,3 in which the CJEU’s ruling recognised the right to be forgotten, was initiated
in Spain and the Spanish DPA had a significant role in the case. There are several DPA
resolutions issued every year recognising the right of Spanish individuals to be forgotten
and also setting out certain exceptions to the applicability of the right. Recently, the
Spanish Constitutional Court, in its ruling dated 4 June 2018, confirmed this approach
and has recognised the right to be forgotten as a new fundamental right, different but
related to data protection rights; and
j data-ownership issues: to date, there is no Spanish legislation that specifically regulates
the question of ownership of data. Notwithstanding this, several regulations exist that
may have an impact on data ownership including, among others, data protection
legislation, copyright law (which regulates rights over databases) or even unfair
competition rules.
3 Case C‑131/12.
4 The DPA’s prior authorisation is not required in the cases set out in Article 26 of EU Directive 95/46/EC.
309
© 2018 Law Business Research Ltd
Spain
and specific public administration regulations (Law 9/1968 of 5 April on secrecy pertaining
to official issues, Law 38/2003 of 17 November on subsidies and Law 19/2013 of 9 December
on transparency and access to public information).
Privacy officers
Before May 2018, a chief privacy officer was not mandatory, but in practice this role was
deemed crucial for the controller or the processor to comply with the DP Regulations, in
particular when the organisation is complex or if the data processed are sensitive or private.
From May 2018, several Spanish data controllers and processors are required to appoint
a data protection officer according to Article 37 of the GDPR. Although the Draft Bill of the
new data protection law is not definitive, it is expected to expand and detail more the cases in
which the appointment of a data protection officer will be mandatory.
Under DP Regulations, the appointment of a security officer was required under certain
circumstances but from 25 May 2018, the appointment of this role is no longer mandatory.
Work councils
Any employee representative in the organisation is entitled to issue a non-binding report
before the implementation of new methods of control of the work. Although it is unclear what
qualifies as a ‘method of control’ of the work, it is advisable to inform the works council of
the implementation of new methods (e.g., whistle-blowing systems) and offer their members
the possibility of issuing the above-mentioned non-binding report before its implementation.
310
© 2018 Law Business Research Ltd
Spain
5 See footnote 2.
311
© 2018 Law Business Research Ltd
Spain
issued; and the fines imposed amounted to approximately €17.3 million. Most of the
sanctions imposed on the private sector were for lack of consent and breach of the quality
principle.
312
© 2018 Law Business Research Ltd
Spain
provisions not only of the GDPR but also of the LSSI, as well as the consumer regulations
(only if consumers resident in Spain are involved), irrespective of where the organisation is
established.
Other criminal offences that could be related to cybercrime were also modified (computer
fraud, sexual offences, technological theft, and offences against intellectual and industrial
property). The Criminal Code was amended again in March 2015. Specifically, aligned with
European regulations on computer-related offences, the following new criminal offences are
regulated: (1) intercepting data from information systems for the discovery and disclosure of
secrets; and (2) creating computer programs or equipment for the purposes of discovering
and disclosing secrets or committing damage to IT systems. Finally, legal entities can be held
criminally liable for the above-mentioned offences.
313
© 2018 Law Business Research Ltd
Spain
Without prejudice to the above, there are no cybersecurity laws and requirements
applicable to organisations ‘generally’, but rather a certain number of rules that address
specific cybersecurity issues:
In 2012, the security breach notification regime was introduced in Spain through the
GTL in line with Directive 2009/136/EC: the providers of public communications networks
or publicly available electronic communications services must notify any security breaches,
when personal data are involved, to both the data subjects and the DPA. In March 2014,
the DPA approved an online system to notify security breaches. The requirements of the
notification itself are those established in EU Regulation 611/2013. Since the notification of
data breaches is not mandatory in general (except for the above-mentioned service providers),
most of them remain unknown to the DPA and the public. One of those made public was
the security breach suffered by BuyVip (which belongs to the Amazon group) in 2011, which
involved the names, dates of birth, email addresses, phone numbers and shipping addresses
of its customers. Although BuyVip was not subject to a notification duty in Spain, it decided
to inform all its users of the security breach, and the notice went viral on the internet. The
DPA then initiated an ex officio investigation, but the sanction imposed on BuyVip, if any,
was not made public.
The LISS was amended in 2014 to establish specific obligations on cybersecurity
incidents applicable to information society services providers, domain name registries and
registrars. These obligations are twofold:
a to collaborate with the relevant computer emergency response teams to respond to
cybersecurity incidents affecting the internet network (to this end, the relevant
information – including IP addresses – must be disclosed to them, but ‘respecting the
secrecy of communications’); and
b to follow specific recommendations on the management of cybersecurity incidents,
which will be developed through codes of conduct (these have not yet been developed).
6 The following infrastructure areas have been considered ‘critical’ by Law 8/2011 (which transposes
Directive 2008/114/EC into Spanish law): administration, water, food, energy, space, the chemical
industry, the nuclear industry, research facilities, health, the financial and tax system, ICT and transport.
314
© 2018 Law Business Research Ltd
Spain
the measures to be taken to protect the operation of the system as a comprehensive set of
components organised for one purpose; and protection measures, focused on the protection
of specific assets according to their nature, and the required quality according to the level of
security of the affected areas. Spanish law does not directly address restrictions to cybersecurity
measures.
Although cybersecurity requirements do not specifically refer to personal data (but
rather to any kind of information), specific security measures will have to be implemented
when personal data are involved. In particular, the GDPR requires controllers and processors
to implement appropriate technical and organisational measures to ensure a level of security
appropriate to the risk. There is no a mandatory list of security measures to be implemented;
however, RD 1720/2007 provides a list of security measures (e.g., establishing an incidents
record), distinguishing three levels of security measures depending on the nature of the data,
which can be used as a standard specially for SMEs (taking into account the state of the art;
costs of implementation; and nature, scope, context and purposes of processing as well as the
risk of the varying likelihood and severity for the rights and freedoms of natural persons).
In addition to the above-mentioned laws, certain authorities with specific cybersecurity
responsibilities have issued guidance, such as:
a the guidelines published by the Spanish National Institute of Cybersecurity (INCIBE)
in 2015 regarding, inter alia:
• how companies should manage information leaks;
• cybersecurity on e-commerce;
• security-related risk management for companies; and
• protocols and network security in industrial control systems infrastructures;
b the publication by INCIBE in 2016 of a consolidated code of cybersecurity rules in
Spain;
c the National Cybersecurity Strategy issued by the presidency in 2013;
d the strategy series on cybersecurity issued by the Ministry of Defence; and
e the Supervisory Control and Data Acquisition Guidelines issued by the CNPIC in
collaboration with the National Cryptological Centre (CNN) in 2010.
X OUTLOOK
Data protection is constantly evolving. In the past, it has been neglected by both private and
public organisations or deemed an unreasonable barrier for the development of the economy.
However, this trend has definitively changed in the past five years.
This change is mostly due to the sanctions imposed by the DPA, the role of data in
the development of the digital economy (the ‘data driven economy’), the active voice of
users in the digital environment (developing new social interactions and not only acting as
315
© 2018 Law Business Research Ltd
Spain
consumers) and the fact that the European Commission and the European Parliament have
definitively embraced a strong ‘privacy mission’. Decisions of the CJEU (such as the in the
Schrems v. Facebook or in the Google v. Costeja cases) have also sent out a clear message on the
importance of data protection rules in Europe.
The adoption in 2016 of the GDPR constituted a significant milestone in the
construction of a new data protection environment. In Spain, the Spanish parliament is
currently working on the approval of the Draft Bill, although this approval is not expected
before the end of 2018. Although the GDPR provides for data protection principles that
are similar to those of the former DP Regulations, as construed by the CJEU and the
Article 29 Working Party, it also provides for new rules and standards. Spanish organisations
are particularly concerned about the new fines (the applicable criteria for which would be
similar to those used in antitrust regulations – a percentage of annual worldwide turnover),
the accountability principle, the general security breach notification and the mandatory
implementation of a data-protection officer. Additional requirements regarding information
and consent duties set out in the GDPR will also be a challenge for Spanish data controllers.
Also, changes in the regulation of the cybersecurity legal regime are expected to happen
in Spain in the next year, particularly if the NIS Directive is finally implemented.
316
© 2018 Law Business Research Ltd
Chapter 23
SWITZERLAND
I OVERVIEW
Data protection and data privacy are fundamental constitutional rights protected by the Swiss
Constitution. Swiss data protection law is set out in the Swiss Federal Data Protection Act
of 19 June 19922 (DPA) and the accompanying Swiss Federal Ordinance to the Federal Act
on Data Protection of 14 June 19933 (DPO). Further data protection provisions governing
particular issues (e.g., the processing of employee or medical data) are spread throughout a
large number of legislative acts. As Switzerland is neither a member of the European Union
(EU) nor of the European Economic Area (EEA), it has no general duty to implement or
comply with EU laws.4 Accordingly, Swiss data protection law has some peculiarities that
differ from the legal framework provided by the EU General Data Protection Regulation5
(GDPR). However, because of Switzerland’s location in the centre of Europe and its close
economic relations with the EU, Swiss law is in general strongly influenced by EU law, both
in terms of content and interpretation. A closer alignment of Swiss data protection law with
the GDPR is also one of the aims of the ongoing reform of the DPA, which the Swiss Federal
Council initiated in April 2015.
The Swiss Data Protection and Information Commissioner (Commissioner) is the
responsible authority for supervising both private businesses and federal public bodies with
respect to data protection matters. The Commissioner has published several explanatory
guidelines that increase legal certainty with respect to specific issues such as data transfers
abroad, technical and organisational measures, processing of data in the medical sector
and processing of employee data.6 Despite the lack of drastic sanctions in respect of data
protection under the current legislative regime, it is nonetheless a topic at the forefront of
public attention in Switzerland, especially given the active presence of the Commissioner and
the high level of media attention given to data protection matters.
1 Jürg Schneider is a partner, Monique Sturny is a managing associate and Hugh Reeves is an associate at
Walder Wyss Ltd.
2 Classified compilation (SR) 235.1, last amended as of 1 January 2014.
3 Classified compilation (SR) 235.11, last amended as of 16 October 2012.
4 Specific duties exist in certain areas based on international treaties. Furthermore, the GDPR, which became
effective on 25 May 2018, is not only relevant for companies located in EU and EEA Member States, but
also for Swiss companies under certain circumstances, see Section II below for more detail.
5 Regulation (EU) 2016/679 of the European Parliament and the Council of 27 April 2016 on the
protection of natural persons with regard to the processing of personal data and on the free movement of
such data, and repealing Directive 95/46/EC.
6 The guidelines are not legally binding, but do set de facto standards.
317
© 2018 Law Business Research Ltd
Switzerland
7 The draft DPA, the explanatory report of the Swiss Federal Council and the summary of the results of the
consultation process are available in German, French and Italian on the website of the Swiss Confederation
at: (in German) www.ejpd.admin.ch/ejpd/de/home/aktuell/news/2017/2017-09-150.html; (in French)
www.ejpd.admin.ch/ejpd/fr/home/aktuell/news/2017/2017-09-150.html; and (in Italian) www.ejpd.
admin.ch/ejpd/it/home/aktuell/news/2017/2017-09-150.html (all sites last visited on 21 July 2018).
An unofficial English translation of the draft DPA can be found at: https://www.dataprotection.ch/
dpa-revision/documentation-and-english-translation/.
8 Classified compilation (SR) 780.1.
318
© 2018 Law Business Research Ltd
Switzerland
Act and the revised related ordinance9 entered into force on 1 March 2018.10 The main
changes concern in particular the monitoring of new technologies, the tasks of the competent
authority, the personal scope of application and the storage of data.11
The new Swiss Federal Act on Intelligence Service (the Intelligence Service Act) was
approved in a referendum in September 2016 and entered into force, together with its related
ordinance, on 1 September 2017.12 The new Intelligence Service Act will bring increased
monitoring competence for Swiss intelligence services and was predominantly driven by
increased efforts to prevent terrorism. The expansion of surveillance options has been heavily
debated and criticised for undermining privacy and other fundamental rights of data subjects.
Many Swiss companies have been conducting GDPR implementation projects recently
due to the wide extraterritorial scope of application of the GDPR, and also in anticipation
of the expected changes to Swiss data protection law that will bring a closer alignment of the
Swiss provisions to the GDPR. The GDPR applies to the processing activities of many Swiss
companies as it applies, inter alia, to data processing activities outside the EU and EEA that
have effects in the EU or EEA (the effects doctrine). In particular, the GDPR applies to Swiss
companies in connection with the targeted offering of goods or services to persons in the EU
and EEA or the monitoring of behaviour of persons in the EU and EEA (Article 3 GDPR).
In addition, the GDPR may become applicable if a person with habitual residence in the EU
or EEA were to claim the applicability of the law of his or her state of habitual residence based
on Article 139 Paragraph 1 Letter (a) of the Swiss Federal Act on Private International Law of
18 December 198713 (PILA) or, if the effects of an infringement of personality rights through
the processing of personal data occurred in the EU or EEA, the injured person may claim the
applicability of the law of the state in which the effects of the damaging act occurred and the
infringing party should have foreseen that the effects would occur in that state (Article 139
Paragraph 1 Letter (b) and Paragraph 3 PILA).
9 Ordinance on the Supervision of Postal and Telecommunication Services of 18 March 2016, classified
compilation (SR) 780.11.
10 Classified compilation (SR) 780.1 and SR 780.11.
11 BBl 2013 2686.
12 Classified compilation (SR) 121 and SR 121.1.
13 Classified compilation [SR] 291, last amended as of 1 April 2017.
14 Classified compilation (SR) 101, last amended as of 12 February 2017.
15 Classified compilation (SR) 235.13, last amended as of 1 November 2016.
16 As mentioned in footnote 8, the guidelines are not legally binding, but do set de facto standards.
319
© 2018 Law Business Research Ltd
Switzerland
The DPA and DPO apply to data processing activities by private persons (i.e.,
individuals and legal entities) and by federal bodies. In contrast, data processing activities
by cantonal and communal bodies are regulated by the cantonal data protection laws and
supervised by cantonal data protection commissioners, who also issue guidance within their
scope of competence. Hence, data processing activities of cantonal and communal bodies
are subject to slightly different regimes in each of the 26 cantons. Unless explicitly set forth
otherwise, the present chapter focuses on the Swiss federal legislation without addressing the
particularities of the data protection legislation at the cantonal level.
As mentioned, it is likely that some terms will change under the revised data protection
regime. In particular, it appears likely that ‘profiling’ will replace the term ‘personality profiles’
and the concepts of ‘data file’ and ‘controller of the data file’ will no longer be used in the
17 Article 3 DPA.
320
© 2018 Law Business Research Ltd
Switzerland
revised DPA. However, as mentioned above, the suggested amendments of the DPA are still
subject to parliamentary discussions and it is thus too early to give conclusive indications as
to the revised wording of the DPA.
Principle of proportionality
The processing of personal data must be proportionate. This means that the data processing
must be necessary for the intended purpose and reasonable in relation to the infringement of
privacy. Subject to applicable regulations on the safekeeping of records, personal data must
not be retained longer than necessary.
Principle of transparency
The collection of personal data, and in particular the purposes of its processing, must be
evident to the data subject concerned. This principle does not always lead to a specific
disclosure obligation, but it will be necessary to give notice of any use of personal data that
is not apparent to the data subject from the circumstances. For example, if personal data
are collected in the course of concluding or performing a contract, but the recipient of the
personal data intends to use the data for purposes outside the scope of the contract or for
the benefit of third parties, then those uses of the personal data must be disclosed to the data
subject.
321
© 2018 Law Business Research Ltd
Switzerland
Detailed technical security requirements for the processing of personal data are set out
in the DPO.
Principle of lawfulness
Personal data must be processed lawfully. This means that the processing of personal data
must not violate any Swiss legislative standards, including any normative rules set forth in
acts other than the DPA that directly or indirectly aim at the protection of the personality
rights of a data subject.
19 The public interest justification must exist from a Swiss perspective. However, this does not only include
Swiss public interests. Supporting foreign concerns – depending on the circumstances – may also qualify as
a public interest from a Swiss perspective. This needs to be checked on a case-by-case basis.
322
© 2018 Law Business Research Ltd
Switzerland
e processes personal data for purposes that are not related to a specific person, in particular
research, planning or statistics, and the results are published in a manner that does not
permit the identification of the data subjects; or
f collects personal data about a person who is a public figure to the extent that the
personal data relates to the role of the person as a public figure.
The fact that a data handler has one of the above-listed interests in processing personal data
does not mean per se that the data handler has an overriding interest in processing the personal
data. The interest of the data handler in processing the personal data must always be weighed
against the interest of the data subject in being protected against an infringement of his or
her privacy. Only in situations where the interest of the data handler outweighs the interest
of the data subject is the processing of personal data justified by the overriding interest of the
data handler.
Consent
Under Swiss data protection law, processing of personal data does not require consent of the
data subject concerned in all instances. As mentioned above, consent of the data subject may
constitute a possible justification for a data processing that would otherwise be unlawful (e.g.,
because of an infringement of the principles outlined above, or in the event of a disclosure
of sensitive personal data or personality profiles to third parties for such third parties’ own
purposes).20 To the extent that the legality of data processing is based on the consent of the
data subject concerned, the consent is only valid if (1) it is given voluntarily upon provision
of adequate information and, (2) in case of processing of sensitive personal data or personality
profiles, it is given expressly (Article 4 Paragraph 5 DPA).
Registration
Controllers of data files that regularly process sensitive personal data or personality profiles,
or regularly disclose personal data to third parties (including affiliates), must register their
data files with the Commissioner before they start processing the data (Article 11a DPA).
The Commissioner maintains a register of data files that have been registered in this manner
that is accessible online. If a controller is required to register, it becomes subject to additional
documentary obligations. There are several exceptions to the duty to register data files. Inter
alia, no registration is required if the controller of the data file is obliged by Swiss law to
process the data in question (e.g., in the case of an employer processing employee data for
Swiss social security purposes) or has nominated its own independent data protection officer
monitoring the data protection compliance of the data controller. Several further exceptions
are set forth in Article 11a Paragraph 5 DPA and Article 4 Paragraph 1 DPO.
The draft of the revised DPA foresees that the registration duty shall be repealed and
replaced with a new documentation requirement for both controllers and processors similar
to the records of processing activities according to Article 30 GDPR.
323
© 2018 Law Business Research Ltd
Switzerland
Cloud computing
Cloud computing raises various data protection issues. The Commissioner has issued a guide
pointing out the risks and setting out the data protection requirements when using cloud
computing services.21
In particular, the processing of personal data may only be assigned to a cloud service
provider if the assignment is based on an agreement or on the law, if the personal data
is processed by the cloud service provider only in the manner permitted for the assignor,
and if the assignment is not prohibited by a statutory or contractual duty of confidentiality
(Article 10a Paragraph 1 DPA). Furthermore, the assignor must ensure that the cloud service
provider guarantees data security (Article 10a Paragraph 2 DPA). The assignor must in
particular ensure that the cloud service provider preserves the confidentiality, availability and
integrity of the personal data by taking adequate measures against unauthorised processing
through adequate technical and organisational measures (see Article 7 DPA and Article 8 et
seq. DPO). Additionally, if cloud computing services involve disclosures of personal data
abroad, the specific requirements for transborder data flows must be complied with (see
Section IV). Finally, the assignor must also ensure that, despite the use of a cloud service
provider, the data subjects may still exercise their right to information (Article 8 DPA), and
may demand deletion or correction of data in accordance with Article 5 DPA.
Big data
Big data offers manifold opportunities for social and scientific research and for businesses,
but at the same time, it may threaten privacy rights if the processed data is not or not
adequately anonymised. The DPA is not applicable to fully and completely anonymised data.
In contrast, if the processing of big data involves the processing of data that has not been
fully and completely anonymised (e.g., because it can be ‘de-anonymised’ at a later stage by
merging different data files), the right to privacy and the protection of personal data need
to be ensured. The use of big data that is not entirely anonymised and the general data
protection principles of the DPA are potentially conflicting, particularly with regard to the
principles of purpose limitation, proportionality and transparency (see Section III.ii).
324
© 2018 Law Business Research Ltd
Switzerland
Cookies
Since 2007, the use of cookies has been regulated in Article 45c Letter (b) of the
Telecommunications Act of 30 April 1997.22 According to this Article, website operators have
to inform users about the use of cookies and its purpose. Furthermore, they need to explain
how cookies can be rejected (i.e., how cookies can be deactivated in the user’s browser).
Switzerland basically follows the opt-out principle.
Drones
In Switzerland, in general, drones of up to 30 kilograms do not require a specific permit, as
long as they do not overfly crowds of people and provided that the ‘pilot’ has visual contact
with the drone at all times.23 Nowadays drones are usually equipped with cameras. As a
result, people using drones need to comply with data protection regulations as soon as they
view or record identified or identifiable persons. To the extent that such viewing or recording
constitutes an unlawful breach of the privacy of the data subjects concerned, it needs to be
justified either by the consent of the injured party, by an overriding private or public interest
or by law (Article 13 Paragraph 1 DPA).24
325
© 2018 Law Business Research Ltd
Switzerland
employees concerned. If monitoring is required for legitimate reasons, it must at all times
remain proportionate (i.e., limited to the extent absolutely required) and the employees must
be informed in advance about the use of monitoring systems. Permanent monitoring is in
general not permitted.
The Commissioner has issued specific guidelines with respect to the processing of
employee data.27
As a general rule, employers shall not read any employee emails that have private content
(even if misuse has been established). In the event of specific suspicion of a criminal offence,
evidence may, however, be saved, and the employer may refer to the criminal prosecution
authorities for further prosecution.
Whistle-blowing hotlines
The use of whistle-blowing hotlines is not specifically regulated by the DPA or the CO.
Hence, the general rules, in particular on data and employee protection, apply. In a nutshell
and from a DPA and CO perspective, whistle-blowing hotlines can be used if certain
minimum requirements are met, such as, inter alia:
a the transparent informing of employees, contractors, etc., about the existence of the
whistle-blowing hotline;
b the informing of relevant employees, contractors, etc., of allegations about them
contained in a specific whistle-blowing report, unless there is an overriding interest not
to do so in order to protect the ensuing investigations or the reporting person;
c adequate safeguards to protect the data subjects from false or slanderous accusations;
and
d strong state-of-the-art security measures.
27 Commissioner, ‘Guide on the processing of personal data in the work area’ (status November 2014;
https://www.edoeb.admin.ch/edoeb/de/home/dokumentation/taetigkeitsberichte/aeltere-berichte/19-
-taetigkeitsbericht-2011-2012/buergeranfragen-zur-ueberwachung-am-arbeitsplatz.html, in German; no
English version available; last visited on 21 July 2018).
326
© 2018 Law Business Research Ltd
Switzerland
327
© 2018 Law Business Research Ltd
Switzerland
If personal data are to be transferred to a country that does not provide an adequate
data protection level for the personal data being transferred, the transfer may only occur if
(Article 6 Paragraph 2 DPA):
a sufficient safeguards, in particular contractual clauses (typically EU Model Contract
Clauses adapted to Swiss law requirements), ensure an adequate level of protection
abroad;
b the data subject has consented in an individual specific case;
c the processing is directly connected with the conclusion or the performance of a
contract and the personal data are that of a contractual party;
d disclosure is essential in specific cases to either safeguard an overriding public interest,
or for the establishment, exercise or enforcement of legal claims before the courts;
e disclosure is required in the specific case to protect the life or the physical integrity of
the data subject;
f the data subject has made the data generally accessible and has not expressly prohibited
its processing; or
g disclosure is made within the same company or the same group of companies, provided
those involved are subject to data protection rules that ensure an adequate level of
protection (i.e., that have adopted binding corporate rules, BCR).
In case of data transfer justified under Letter (a) and (g) above, the Commissioner must be
informed in advance (i.e., before the transfer takes place) about the safeguards that have been
taken or the BCR that have been adopted. If the safeguards consist of EU Model Contract
Clauses adapted to Swiss law requirements or other contractual clauses explicitly accepted by
the Commissioner,31 then it is sufficient to inform the Commissioner that such clauses have
been entered into, and there is no need to actually submit the clauses to the Commissioner
for review. As regards information about BCR, it is common practice to submit a copy of the
rules to the Commissioner.
On 11 January 2017, the Swiss Federal Council announced the establishment of the
Swiss–US Privacy Shield. This framework is separate from – but closely resembles – the EU–
US Privacy Shield (which was formally adopted by the European Commission on 16 July 2016
and predates the Swiss–US Privacy Shield). It replaces the former Swiss–US Safe Harbor
Framework and purports to facilitate the transfers of personal data from Switzerland to the
United States. Companies based in the United States have been able to self-certify under the
Swiss–US Privacy Shield since 12 April 2017.32 For a company certified under the Swiss–US
Privacy Shield an adequate level of data protection is deemed to exist for the personal data
covered by the certification. Hence personal data may be transferred from Switzerland to
a company based in the United States that is certified under the Swiss–US Privacy Shield
even if none of the exceptions set forth in Article 6 Paragraph 2 DPA apply. As mentioned
31 See the standard contractual clauses for the transborder outsourcing of data processing accepted
by the Commissioner, available at: https://www.edoeb.admin.ch/edoeb/en/home/data-protection/
handel-und-wirtschaft/entreprises/anmeldung-einer-datensammlung/mustervertrag-fuer-das-outsourcing
-von-datenbearbeitungen-ins-au.html (status November 2013; last visited on 21 July 2018).
32 The dedicated Privacy Shield Framework website sets up this process: www.privacyshield.gov/welcome
(last visited on 21 July 2018). It also allows any interested person to consult the list of certified companies:
www.privacyshield.gov/list.
328
© 2018 Law Business Research Ltd
Switzerland
above, the Swiss–US Privacy Shield is separate from the EU–US Privacy Shield. For transfers
from Switzerland to the United States, the certification under the Swiss–US Privacy Shield is
relevant and a certification only under the EU–US Privacy Shield is not sufficient.
In contrast to other countries’ legislation, the DPA does not require private data handlers to
appoint a data protection officer. For this reason, and until a few years ago, companies’ data
protection officers have not played a very important role in Switzerland compared with their
role in other countries. However, in the past few years, more and more medium-sized and
large companies domiciled in Switzerland have chosen to appoint a data protection officer
who independently monitors internal compliance with data protection regulations and
maintains a list of the data files of the company in question. In fact, appointing such a data
protection officer is one way for private data controllers to avoid having to register data files
with the Commissioner that otherwise would have to be registered under the current regime
33 Federal public controllers of data files have a similar obligation to issue a processing policy for automated
data files that contain sensitive personal data or personality files, are used by two or more federal bodies, are
disclosed to third parties or are connected to other data files (see Article 21 DPO).
329
© 2018 Law Business Research Ltd
Switzerland
(see Article 11a Paragraph 3 DPA in relation to Article 11a Paragraph 5 Letter (e) DPA; see
also Section III.ii). Currently, over 1,000 companies have notified the Commissioner of their
appointment of an independent data protection officer.
BCR ensuring an adequate level of protection of personal data on a group-wide level
facilitate the cross-border disclosure of personal data among group companies (see Section IV).
Despite this fact, and until recently, BCR have not been used very frequently in Switzerland.
34 The DPA also does not apply to pending Swiss civil proceedings, pending Swiss criminal proceedings
and pending Swiss proceedings under constitutional or under administrative law, with the exception of
administrative proceedings of first instance (see Article 2 Paragraph 2 Letter (c) DPA).
35 In contrast, producing and taking evidence in purely private foreign arbitral proceedings is not subject
to Article 271 CC and therefore do not require that the parties follow the requirements of mutual
legal assistance proceedings. However, as the DPA fully applies to the processing of personal data in
foreign-based private arbitral proceedings, any cross-border disclosure must comply with the requirements
set forth in Article 6 DPA (see Section IV). For more details and exceptions, see Jürg Schneider, Ueli
Sommer, Michael Cartier, in Catrien Noorda, Stefan Hanloser (eds), E-Discovery and Data Privacy: A
Practical Guide, Kluwer Law International BV, 2011, Chapter 5.25, Switzerland.
330
© 2018 Law Business Research Ltd
Switzerland
c all third parties (who have a justifiable interest in keeping the information secret)
consent to such a disclosure;
d Switzerland has no immediate sovereign interest in keeping the information secret; and
e all requirements set forth by the DPA (in particular as regards cross-border transfers)
are complied with.
However, Article 273 CC does not apply in cases in which Swiss authorities have granted
mutual legal assistance and disclosure takes place in accordance with the proceedings.
Contrary to Article 271 CC, Article 273 CC can also be violated by activities taking place
outside Switzerland.
36 The processing of personal data by cantonal and communal bodies is regulated by cantonal law. Each
canton has a cantonal data protection authority, be it a cantonal data protection officer or a commission
competent for cantonal and communal data protection matters. Some cantons have jointly appointed an
inter-cantonal data protection authority.
331
© 2018 Law Business Research Ltd
Switzerland
c inform the Commissioner about the safeguards and data protection rules in relation to
a transfer of personal data abroad under Article 6 Paragraph 3 DPA;
d register a database with the Commissioner; or
e cooperate with the Commissioner (Article 34 DPA).
37 According to the latest statistics published by the Swiss Federal Statistical Office, only 43 offences in the
sense of Article 34 and Article 35 DPA have been reported during 2009 to 2015. The published statistics
neither indicate whether the sanctions relate to Article 34 or Article 35 DPA nor mention the amount
of fines that have been imposed. Furthermore, the published statistics may be incomplete and the actual
number of sanctions may be higher.
38 Swiss Federal Supreme Court decisions dated 12 January 2015, 4A_406/2014; 4A_408/2014 (BGE 141
III 119).
39 Swiss Federal Supreme Court decision dated 17 January 2015 (BGE 139 II 7).
40 Classified compilation (SR) 152.3, last amended as of 19 August 2014.
41 Swiss Federal Administrative Court decisions dated 23 August 2016, A-6334/2014, A-6320/2014 and
A-6315/2014.
332
© 2018 Law Business Research Ltd
Switzerland
that the information does not contain business secrets in the sense of Article 25 of the Swiss
Federal Cartel Act of 6 October 1995 (ACart)42 and does not contain information provided
by leniency applicants in the sense of Article 49a Paragraph 2 ACart.
On 11 May 2017, the Swiss Federal Administrative Court published a leading case dated
18 April 2017 relating to personality profiles and retrievability of personal data via search
engines.43 The decision, which concerns a case of the Commissioner against a Swiss economic
information platform and credit agency, is final and binding as none of the parties appealed
against said decision. The Swiss Federal Administrative Court came to the conclusion that
personal data that in combination reveals an essential part of the personality of a data subject
and that is not relevant in assessing the creditworthiness of the person in question may not be
published without the consent of the data subject concerned. The Commissioner’s claim that
the economic information platform and credit agency’s data relating to persons registered in
the commercial registry should only be retrievable with search engines in the same manner
as data of the official Swiss Federal Commercial Registry was rejected (search engines, in
particular Google, only show search results for the Swiss Commercial Registry (i.e., www.
zefix.ch) if the search name and also the term ‘Zefix’ are entered into the search tool). The
Swiss Federal Administrative Court stated that the economic information platform and credit
agency only has limited influence on the publication of search results on search engines.
Also, the Swiss Federal Administrative Court pointed out that the possibility of finding data
via search engines may have positive effects from a data protection perspective as it increases
transparency.
Lastly, the European Court of Human Rights (ECHR), in a ruling of 18 October 2016,
overruled a decision of the Swiss Federal Supreme Court in the field of publicly regulated
accident insurance. The Swiss Supreme Court had previously ruled that accident insurance
companies could lawfully conduct secret surveillance of the candidates for, or beneficiaries
of, insurance benefits, despite the absence of a sufficiently detailed legal basis. Subsequent
to the ECHR ruling, the Swiss Federal Supreme Court, on 14 July 2017, in line with the
ECHR ruling, decided that, likewise, the federal social security office could not lawfully
conduct secret surveillance of candidates for or beneficiaries of disability insurance. The Swiss
parliament is currently drafting an amendment that provides sufficient legal basis for such
surveillance by specifically setting out applicable requirements and conditions.
333
© 2018 Law Business Research Ltd
Switzerland
However, as regards claims for damages, it is in practice often very difficult for a data subject
to prove actual damage based on privacy infringements.
44 This, however, does not apply to public law provisions of the DPA (such as the obligation to register a data
file with the Commissioner or to inform the Commissioner of a transfer abroad) as such rules are governed
by the principle of territoriality and only apply to facts that take place in Switzerland.
45 Such as, for example, an obligation to register a data file with the Commissioner, or there may be instances
where data that before their transfer or disclosure to Switzerland were not subject to specific data protection
regulations suddenly becoming subject to the data protection regulations set forth in the DPA and the
DPO because of the fact that the DPA and DPO currently also apply to the processing of personal data
pertaining to legal entities (even if, at a later stage, the data are transferred abroad from Switzerland again).
334
© 2018 Law Business Research Ltd
Switzerland
data in Switzerland (whether on one’s own or by using group companies or third-party service
providers), or before cross-border exchanges of personal data in the context of a group of
companies or otherwise.
335
© 2018 Law Business Research Ltd
Switzerland
On a Swiss federal level, the Reporting and Analysis Centre for Information Assurance
(MELANI) was established in 2004. MELANI functions as a cooperation model, inter alia,
between the Swiss Federal Finance Department and the Swiss Federal Defence Department.
It serves private computers and internet users (in particular providing them with information
about risks relating to the use of modern information and communication technologies) as well
as selected providers of critical national infrastructures (such as banks and telecommunication
services providers). MELANI has created various checklists and documentation regarding IT
security. In 2008, MELANI established GovCERT.ch, the computer emergency response
team (CERT) of the government, and the official national CERT of Switzerland, GovCERT.
ch is a member of the Forum of Incident Response and Security Teams, and of the European
Government CERTs group.
Finally, Switzerland ratified the Council of Europe Convention on Cybercrime of 2001
in 2011. The Convention entered into force for Switzerland on 1 January 2012 together with
a minor amendment of the CC and the Swiss Federal Act on International Mutual Assistance
in Criminal Matters of 20 March 1981.50
X OUTLOOK
The ongoing reform of the DPA is likely to lead to a tightening of the Swiss data protection
regime. Based on the publication of the draft of the revised DPA,51 the following aspects are
particularly noteworthy:
a transparency in data processing is increased. In particular, private sector actors will have
a duty to inform data subjects in the event of data collection and processing;
b self-regulation shall be encouraged. Professional and business associations may prepare
codes of conduct and submit them to the Commissioner for the delivery of an opinion;
c the data controller will have to perform an impact assessment whenever it appears
that the envisaged data processing may lead to an increased risk to the data subjects’
personality and fundamental rights, although some exceptions apply;
d a duty to notify the Commissioner or even the data subjects in cases of breach of data
protection will bind data controllers;
e the present rules on personality profiles will be abolished. However, they will be
replaced by new rules on profiling;
f the draft introduces the concepts of privacy by design and privacy by default. Hence,
data protection must take place from the outset (i.e., from the conception of the
processing) and the least invasive settings must be applied by default;
g the duty to declare data files to the Commissioner shall be abolished for private actors.
Data controllers and data processors must, however, keep records of their processing
activities;
h personal data relating to legal entities shall no longer be protected under the DPA;
i the Commissioner shall obtain greater powers and will in particular have the competence
to render binding decisions on data controllers and processors; and
j criminal sanctions for data protection misconduct will be increased significantly. In
fact, fines of up to 250,000 Swiss francs may be levied in cases of intentional offences
against certain provisions of the revised DPA.
336
© 2018 Law Business Research Ltd
Switzerland
Moreover, the revision process will affect not only the DPA itself, but also many other laws,
such as the CC, criminal procedure regulations and so forth.
The text that will eventually become law, may contain deviations from the published
draft. It is nonetheless to be expected that the final revised DPA will include many of the
changes suggested in the draft of the revised DPA. Entry into force of the new, revised DPA,
which was initially expected to take place in 2018, should now unfold in two parts. A first
part should enter into force in 2019, while the second part is tentatively expected to enter
into force in 2020 (for further detail, see above Section II).
337
© 2018 Law Business Research Ltd
Chapter 24
TURKEY
I OVERVIEW
The protection of personal data is recognised as a fundamental right under Article 20(3)
of the Constitution of the Republic of Turkey2 as of its amendment in 2010. Since the
aforementioned Article requires that the principles and procedures regarding the protection
of personal data shall be laid down in law; the constitutional guarantee for the protection
of personal data is intended to manage the processing of personal data on a regulatory level.
In this respect, Law on the Protection of Personal Data No. 6698 (the DP Law), which
constitutes the main legislative instrument that specifies the principles and procedures
concerning the processing and protection of personal data, has been published in the Official
Gazette on 7 April 2016 and is in effect as of this date.
The data protection authority established by the DP Law, the Personal Data Protection
Board (the Board), is currently active and has been regularly publishing secondary legislation
of the DP Law as well as principle decisions and guidance documents concerning the
application of the DP Law. Additionally, certain sector-specific data protection rules are
scattered under sector-specific laws. For example, commercial economic communications are
regulated under a different instrument and the administrative authority that supervises these
communications is the Ministry of Trade and not the Board.
Because Turkey is currently not an EU country, in principle, EU’s General Data
Protection Regulation3 (GDPR) is not directly applicable in Turkey. However, since the
territorial scope of the GDPR applies where the personal data processing activities are related
to the offering of goods or services to data subjects that are in the Union by a controller or
processor not established in the Union, data controllers located in Turkey might be required
to comply with the GDPR.
‘Data protection’ as a concept is becoming more and more topical in the country. The
Board is continuing its work to create public awareness on the issue. On this endeavour, the
1 Batu Kınıkoğlu is a partner, Selen Zengin is an attorney and Kaan Can Akdere is a legal intern at
BTS&Partners.
2 Published in the Official Gazette No. 17844 and dated 20 October 1982. Available in English: https://
global.tbmm.gov.tr/docs/constitution_en.pdf
3 Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the
protection of natural persons with regard to the processing of personal data and on the free movement of
such data, and repealing Directive 95/46/EC (General Data Protection Regulation), Official Journal L 119,
4 May 2016.
338
© 2018 Law Business Research Ltd
Turkey
Board is organising seminars, sharing educational videos and publishing guidance documents
with regards to the implementation of the principles and procedures set forth under the DP
Law.
With regard to cybersecurity, the relevant legislation is still evolving. Cybersecurity rules
are not consolidated under one legislative instrument but rather scattered under different
sector-specific regulations. Entities practising in critical sectors such as telecommunications,
energy, banking and finance, and insurance are generally subjected to cybersecurity or
information-security requirements.
4 Published in the Official Gazette No. 30356 and dated 10 March 2018.
5 Published in the Official Gazette No. 30356 and dated 10 March 2018.
6 Data breach notification made by Careem Inc. Published on 4 May 2018: https://www.kvkk.gov.tr/
Icerik/4219/Kamuoyu-Duyurusu-Ihlal-Bildirimi.
7 Data breach notification made by Ticketmaster UK. Published on 29 June 2018: https://www.kvkk.gov.tr/
Icerik/5244/Kamuoyu-Duyurusu-Veri-Ihlali-Bildirimi.
339
© 2018 Law Business Research Ltd
Turkey
biometrics and genetics. Notably, data relating to appearance and dress is not considered as
a special category of personal data under the GDPR but is considered as such under the DP
Law.
There is multiple secondary legislation of the DP Law that provides further specification
on certain provisions of the DP Law. The secondary legislation that is most relevant to data
controllers is as follows.
8 Published in the Official Gazette No. 30224 and dated 28 October 2017.
9 Published in the Official Gazette No. 30286 and dated 30 December 2017.
340
© 2018 Law Business Research Ltd
Turkey
The conditions for lawful data processing stated under Article 5 are:
a if none of the following conditions can be met, explicit consent10 of the data subject,
b if processing is expressly permitted by any law;
c if processing is necessary in order to protect the life or physical integrity of the data
subject or another person where the data subject is physically or legally incapable of
giving consent;
d if it is necessary to process the personal data of parties of a contract, provided that the
processing is directly related to the execution or performance of the contract;
e if processing is necessary for compliance with a legal obligation which the controller is
subject to;
f if the relevant information is publicised by the data subject herself or himself;
g if processing is necessary for the institution, usage, or protection of a right; and
h if processing is necessary for the legitimate interests of the data controller, provided that
the fundamental rights and freedoms of the data subject are not harmed.
Conditions for processing ‘special categories of personal data’ are provided under Article 6
and are more restricted.
It is prohibited to process special categories of personal data without obtaining the
explicit consent of the data subject; however, special categories of personal data other than
those relating to health and sexual life, may be processed without obtaining the explicit
consent of the data subject if processing is permitted by any law.
Personal data relating to health and sexual life can only be processed without obtaining
the explicit consent of the data subject for purposes of protection of public health, operation
of preventive medicine, medical diagnosis, treatment and care services, planning and
management of health services and financing by persons under the obligation of secrecy or
authorised institutions and organisations.
10 ‘Explicit consent’ is defined as ‘Freely given, specific and informed consent’. Consent must be free (for
example, consent must not be made conditional for the provision of a service), informed, limited to the
relevant act of processing and have been given unambiguously by data subject acting in a way which leaves
no doubt that the data subject agrees to the processing of his or her data.
341
© 2018 Law Business Research Ltd
Turkey
Principles and procedures that must be followed when fulfilling this obligation are provided
in detail under the Communiqué on the procedures and principles to be complied with when
fulfilling obligation to inform (the Communiqué on the obligation to inform). For example,
the Communiqué on the obligation to inform requires data controllers to inform data
subjects and obtain their consent separately, and states that, when informing data subjects, a
clear, simple and understandable wording must be used.
Principles and procedures regarding the obligation to register with the Registry are provided
in detail under the Regulation on the Data Controller Registry. On an additional note, the
Regulation requires data controllers resident in Turkey to appoint a contact person and
register it with the Registry. The contact person shall be the ‘middleman’ that will carry out
the communication with the data subjects and the data controller. Similarly, data controllers
that are not resident in Turkey are expected to appoint a ‘data controller representative’,
which can be either a real person who is a Turkish citizen, or a legal entity located in Turkey.
This person shall be notified to the Registry during registration.
What the phrase ‘all necessary technical and organisational measures’ actually means is not
explicitly defined under the data protection legislation; however, the ‘Guidebook on Personal
Data Security’ published by the Board11 provides guidance on what measures are expected
from the data controllers to be taken.
What is more, the DP Law expects additional protective measures to be taken when
handling special categories of personal data; these measures are specified under a principle
11 Guidebook on Personal Data Security (Technical and Organisational Security Measures): https://www.
kvkk.gov.tr/SharedFolderServer/CMSFiles/7512d0d4-f345-41cb-bc5b-8d5cf125e3a1.pdf.
342
© 2018 Law Business Research Ltd
Turkey
decision taken by the Board12 and include using cryptographic encryption measures, signing
NDA agreements with the personnel and setting two-stage authentication systems over the
information systems that contain personal data.
Additionally, data controllers are required to notify the relevant data subjects and the
Board if personal data is obtained by others through unlawful means (e.g., a cyberattack or
data leakage) as soon as possible.
12 ‘Personal Data Protection Board’s Decision No. 2018/10 dated 31/01/2018 on Adequate Security Measures
to be Taken by Data Controllers When Processing Special Categories of Personal Data’ published on
7 March 2018: https://kvkk.gov.tr/Icerik/4110/2018-10.
13 Published in the Official Gazette No. 29417 and dated 15 July 2015.
343
© 2018 Law Business Research Ltd
Turkey
Sector-specific legislation
Although the DP Law is the main data protection instrument, there is sector-specific
legislation that governs the protection of personal data under their respective sectors and
areas such as the Regulation on Processing of Personal Data and Protection of Privacy in the
Electronic Communication Sector,14 Article 73 of the Banking Law15 about banking secrecy
and ‘customer secrets’, and the Regulation on Processing of Health Data and Ensuring its
Privacy.16
ix Technological innovation
Use of cookies and similar technologies
Cookies and similar online tracking technologies are not regulated under a specific law;
therefore, general rules under the DP Law apply. Processing of personal data for the purposes
of targeted and behavioural advertising or profiling, generally, can only be carried out with
the explicit consent of the data subject. Consequently, Turkish online media organisations
are continuously switching to opt-in schemes for their tracking activities and adding cookie
banners to their websites.
14 Published in the Official Gazette No. 28363 and dated 24 July 2012.
15 Published in the Official Gazette No. 25983 and dated 1 November 2005.
16 Published in the Official Gazette No. 29863 and dated 20 October 2016.
17 Council of State, 11th Chamber, Decision No. 2017/4906 dated 13 June 2017.
344
© 2018 Law Business Research Ltd
Turkey
18 Court of Cassation, 19th Criminal Chamber, Decision number 2017/5325 dated 5 June 2017.
19 Supreme Court, application number 2013/5653. Published in the Official Gazette No. 29811 and dated
24 August 2016.
20 Essential Contractual Clauses Required in the Undertaking to be Prepared by Data Controllers When
Transferring Personal Data Abroad, Published on 16 May 2018: https://www.kvkk.gov.tr/Icerik/4236/
Yurtdisina-Veri-Aktariminda-Veri-Sorumlularinca-Hazirlanacak-Taahhutnamede-Yer-Alacak-Asgari-
Unsurlar.
345
© 2018 Law Business Research Ltd
Turkey
Furthermore, the data processing inventory shall be the basis for the notifications to be
made to the Registry, and Article 5 of the Communiqué on the obligation to inform states
that the information provided during the fulfilment of the obligation to inform must be
compliant with the information disclosed to the Registry. Therefore, the information within
the inventory is fundamental for lawfully fulfilling the obligation to register with the registry
and the obligation to inform the data subjects.
346
© 2018 Law Business Research Ltd
Turkey
Banking Regulation and Supervision Authority, and the Information Technologies and
Communication Agency may request information from relevant players of their corresponding
sectors and may conduct on site auditing activities. During the audits, supervisory authorities
may access records which include personal data.
Lastly, Turkey is a party to the Convention of 1 March 1954 on civil procedure and
multiple bilateral treaties on legal assistance. Therefore, data may be disclosed in response
to lawful requests made by foreign governments complying with due process under the
Convention.
347
© 2018 Law Business Research Ltd
Turkey
because of a breach of data processing principles. For example, the Board sanctioned a bank
because it violated the principle of ‘data minimisation’ when it provided a six-month account
statement of its customer to a civil court when the court only asked for the statement of the
last three months. In another example, the Board found a breach of data security obligations
where the data controller had made the explicit consent of the data subject a precondition for
the provision of certain goods or services.
348
© 2018 Law Business Research Ltd
Turkey
ii Data breaches
The most important data breach notification obligation under Turkish law is the personal
data breach notification stipulated under the DP Law. Data controllers are required to notify
the data subject and the Board ‘in case personal data is acquired by others through unlawful
means’. Data breaches that fall under this notification obligation are not categorised by their
scope, seriousness or its possible adverse effects. Thus, all data breaches where personal data is
obtained unlawfully by third parties must be notified to the data subject and the Board. The
relevant provision of the Law states that the notification should be made ‘as soon as possible’.
However, the Law does not state a specific maximum period for notification and the Board
has not yet issued such an opinion. Lastly, the Board has not yet issued any formal or content
requirements with regards to the notification obligation.
X OUTLOOK
Data protection is a relatively new regulatory area for Turkey. Yet the developments that we
have observed in the area in the last two years have been fast and are not expected to slow
down in the following years. For the near term, two of the most significant developments that
are expected are the activation of the data controller registry and the publishing of the list of
countries that have an ‘adequate level of personal data protection’ by the Board. It is advisable
for the foreign entities to be on the watch for these two legal developments as these will have
significant effects for their businesses in Turkey.
The GDPR has had an impact on the Turkish entities owing to its extended territorial
scope and high level of monetary fines. Turkish businesses that are active in the European
market are mindful of the requirements brought by it. The DP Law was prepared by taking
note of the EU Data Protection Directive of 1995 and it is known that the Board is paying
close attention to the data protection developments in Europe. If the ‘Europeanisation’ trend
continues for data protection in Turkey, in the long term amendments to the DP Law that
are in line with the provisions of the GDPR should not come as a surprise.
22 See Communiqué on Information System Management, published in the Official Gazette No. 30292 and
dated 5 January 2018.
23 See Regulation on Supervision and Auditing of Insurance and Individual Annuity Insurance Sectors,
published in the Official Gazette No. 28054 and dated 14 September 2011.
24 See Regulation on Internal Systems of Banks and Evaluation Process for Efficiency of Internal Capital,
published in the Official Gazette No. 29057 and dated 11 July 2014.
25 See Regulation on the Activities of the Payment and Security Settlement Systems, published in the Official
Gazette No. 29044 and dated 28 June 2014.
26 CERT Website available in English: https://www.usom.gov.tr/.
349
© 2018 Law Business Research Ltd
Chapter 25
UNITED KINGDOM
I OVERVIEW
Like other countries in Europe, the United Kingdom has passed legislation designed to
supplement the data protection requirements of the EU General Data Protection Regulation
(GDPR),2 which came into force on 25 May 2018, repealing the EU Data Protection
Directive 95/46/EC (the Data Protection Directive)3 and which regulates the collection and
processing of personal data across all sectors of the economy. The UK Data Protection Act
2018 (DPA 2018), which came into force on 23 May 2018, repeals the UK Data Protection
Act 1998 (DPA 1998), introduces certain specific derogations that further specify the
application of the GDPR in UK law, in addition to transposing the data protection and
national security provisions of the EU Law Enforcement Directive 2016/6804 as well as
granting powers and imposing duties on the national data supervisory authority, the UK’s
Information Commissioner’s Office (ICO).
1 William RM Long is a partner, Géraldine Scali is a counsel and Francesca Blythe is an associate at Sidley
Austin LLP.
2 Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the
protection of natural persons with regard to the processing of personal data and on the free movement of
such data, and repealing Directive 95/46/EC (General Data Protection Regulation).
3 European Parliament and Council Directive 95/46/EC of 24 October 1995 on the protection of
individuals with regard to the processing of personal data and on the free movement of such data.
4 Directive (EU) 2016.680 of the European Parliament and of the Council of 27 April 2016 on the
protection of natural persons with regard to the processing of personal data by competent authorities for
the purposes of the prevention, investigation, detection or prosecution of criminal offences or the execution
of criminal penalties, and on the free movement of such data, and repealing Council Framework Decision
2008/977/JHA.
5 ICO, Guide to the General Data Protection Regulation (GDPR) accessible at https://ico.org.uk/
for-organisations/guide-to-the-general-data-protection-regulation-gdpr/.
350
© 2018 Law Business Research Ltd
United Kingdom
Law Enforcement processing, highlighting the key requirements of Part 3 of the DPA 2018
that controllers and processors have to comply with when processing personal data for ‘law
enforcement purposes’.
In April 2018,the Information Commissioner, Elizabeth Denham, stated the ICO is
preparing for the post-Brexit environment, ‘in order to ensure that the information rights
of UK citizens are not adversely affected’ by Brexit.6 It is clear that the UK leaving the EU
on 29 March 2019 will be highly significant from a data protection perspective and further
details are provided in Section XII below.
6 IAPP Europe Data Protection Intensive 2018, Elizabeth Denham, 18 April 2018.
7 Directive 2002/58/EC of the European Parliament and Council of 12 July 2002 concerning the processing
of personal data and the protection of privacy in the electronic communications sector.
8 Proposal for a Regulation of the European Parliament and of the Council concerning the respect for private
life and the protection of personal data in electronic communications and repealing Directive 2002/58/EC
(Regulation on Privacy and Electronic Communications).
351
© 2018 Law Business Research Ltd
United Kingdom
b attempt to encourage the shifting of the burden of obtaining consent for the use of
cookies to website browsers; and
c make consent for direct marketing harder to obtain and require it to meet the standard
set out in the GDPR; however, existing exceptions (such as the exemption that applies
where there is an existing relationship and similar products and services are being
marketed) are likely to be retained.
352
© 2018 Law Business Research Ltd
United Kingdom
The UK DPA 2018 does not introduce any further requirements in relation to the first data
protection principle.
353
© 2018 Law Business Research Ltd
United Kingdom
The ICO guide on the GDPR contains guidance on the reliance of each Article 6 legal
basis.10 In particular, the ICO has also published detailed guidance on legitimate interests
together with a legitimate interest assessment template11 that covers three tests controllers
should conduct as part of any assessment:
a the purpose test – to assess whether there is a legitimate interest behind the processing;
b the necessity test – to assess whether the processing is necessary for the purpose it has
identified; and
c the balancing test – to consider the impact on data subjects’ interests and rights and
freedoms and to assess whether they override the controller’s own legitimate interests.
Additionally, the ICO’s guidance on the GDPR, contains a section on consent, which makes
reference to the GDPR’s high standard on consent, being unambiguous, involving a clear
affirmative action and requiring distinct or granular options to give consent for distinct
processing operations. As consent must be freely given, certain organisations in a position
of power over their data subjects may find it difficult to show valid freely given consent, for
example, consent obtained from employees by their employers is unlikely to be freely given
as such consent is not considered freely given or a genuine choice, with employees possibly
facing employment consequences as a result of failing to provide consent.
The GDPR and DPA 2018 apply a stricter regime for special categories of personal
data and criminal convictions data, where such data may only be processed on the basis of
certain limited grounds which constitute fair and lawful processing, including, for example,
where the controller had obtained explicit consent of the data subject or where necessary
for the purposes of carrying out its obligations and exercising specific rights in the field of
employment and social security.12
10 ICO, Guide to the General Data Protection Regulation (GDPR)/ Lawful basis for processing- accessible at
https://ico.org.uk/for-organisations/guide-to-the-general-data-protection-regulation-gdpr/.
11 ICO, Sample LIA template.
12 Articles 9 and 10 of the GDPR, Sections 10 and 11 and Schedule 1 of the DPA 2018.
354
© 2018 Law Business Research Ltd
United Kingdom
d preventing fraud;
e insurance; and
f occupational pensions.
Where processing personal data in reliance on a condition under the DPA 2018 the
controller will need to have in place an ‘appropriate policy document’ which explains the
controller’s procedures for securing compliance with the principles in Article 5 of the GDPR,
and explains the controller’s policies as regards the retention and erasure of personal data
processed in reliance on the DPA 2018 condition.
Part 3 also permits a controller to rely on a Part 2 condition and the requirement that the
processing be in the substantial public interest can be disapplied. Where processing criminal
records and offences data in reliance on a condition under the DPA 2018 the controller will
need to have in place an ‘appropriate policy document’.
v Health Data
Data concerning health falls within scope of the special categories of personal data under
Article 9 of the GDPR. The GDPR defines ‘data concerning health’ as ‘personal data related
to the physical or mental health of a natural person, including the provision of health care
services, which reveal information about his or her health status’.
One of the lawful processing grounds for health data is Article 9(2)(j) of the GDPR
where processing is necessary for scientific research purposes. To rely on this legal ground the
355
© 2018 Law Business Research Ltd
United Kingdom
processing must comply with Article 89(1) of the GDPR which requires that the processing
be subject to appropriate safeguards which ensure technical and organisational measures are
in place in particular, to comply with the principle of data minimisation.
Article 19 of the DPA 2018 states that the processing will not meet these requirements
where:
a it is likely to cause substantial damage or distress to an individual; or
b the processing is carried out to support measures or decisions relating to a particular
individual, unless this includes purposes of approved medical research.
The DPA 2018 includes exemptions from the data subject rights for data concerning health
where:
a it is processed by a court, supplied in a report or other evidence given to a court, and
under specified rules (i.e., those relating to family and children’s hearings in the courts)
may be withheld from an individual13;
b the request is made by someone with parental responsibility for a person under the age
of 18 (or 16 in Scotland) and the data subject has an expectation that the information
would not be disclosed to the requestor or has expressly indicated should not be
disclosed.14
The DPA 2018 also includes an exemption from the subject access right to health data where
disclosure would likely cause serious harm to the physical or mental health of the individual
or another person.15
The ICO states in its guidance on the appointment of DPOs, that regardless of whether the
GDPR requires an organisation to appoint a DPO, the organisation must ensure that it has
sufficient staff and resources to discharge its obligations under the GDPR and that a DPO
can be seen to play a key role in an organisation’s data protection governance structure and to
help improve accountability. The guidance further advises that should an organisation decide
that it does not need to appoint a DPO it is recommended that this decision be recorded to
help demonstrate compliance with the accountability principle.
356
© 2018 Law Business Research Ltd
United Kingdom
The DPO must be designated on the basis of professional qualities and, in particular,
expert knowledge of data protection law and practices.17 The data controllers and data
processors who do not meet the criteria for a required appointment of a DPO may voluntarily
appoint one and are required to notify the ICO of any voluntary appointment.
Required and voluntary appointments of DPOs must be notified to the ICO in the
form of an email, including:
a the contact details of the DPO;
b the registration number of the data controller or processor; and
c whether the appointment of the DPO was required or voluntary.
The ICO will publish the name of the DPO on the Data Protection Public Register, where
the data controller or data processor has consented to publication.
Section 71 of the DPA 2018 requires controllers to entrust their DPO with the
following non-exhaustive tasks:
a informing and advising the controller, any processor engaged by the controller, and
any employee of the controller who carries out the processing of personal data, of that
person’s obligations under the DPA 2018;
b providing advice on the carrying out of a data protection impact assessment (see below)
and monitoring compliance;
c cooperating with the ICO;
d acting as the contact point for the ICO on issues relating to processing of personal data;
e monitoring compliance with the policies of the controller in relation to the protection
of personal data; and
f monitoring compliance by the controller of Section 71 of the DPA 2018.
357
© 2018 Law Business Research Ltd
United Kingdom
The ICO guidance also recommends that where a controller decides not to carry out a DPIA,
the reasons for this decision are documented.21
20 ICO, Guide to the General Data Protection Regulation (GDPR)/ Individual Rights/ Right to be Informed-
accessible at https://ico.org.uk/for-organisations/guide-to-the-general-data-protection-regulation-gdpr/.
21 ICO, Guide to the General Data Protection Regulation (GDPR)/ Accountability and Governance-
accessible at https://ico.org.uk/for-organisations/guide-to-the-general-data-protection-regulation-gdpr/.
358
© 2018 Law Business Research Ltd
United Kingdom
x Second data protection principle: processing for specified, explicit and lawful
purposes (purpose limitation)
Personal data can only be obtained for specified, explicit and lawful purposes, and must not
be further processed in a manner that is incompatible with those purposes.
The UK DPA 2018 does not introduce any further requirements in relation to the
second data protection principle.
The ICO’s published guidance on GDPR includes a section on purpose limitation,22
where it requires controllers to specify the purposes of the processing to data subjects at the
outset of the processing, in the form of records of the processing activities that controllers are
required to maintain and information notices that are required to be given to data subjects
prior to the processing.
xi Third data protection principle: personal data must be adequate, relevant and
limited to what is strictly necessary (data minimisation)
A controller must ensure that the personal data it holds is adequate, relevant and limited to
what is necessary in relation to the purposes for which they are processed.
The UK DPA 2018 does not introduce any further requirements in relation to the third
data protection principle.
The ICO’s published guidance on the GDPR, contains guidance on data minimisation,23
requiring controllers to identify the minimum amount of personal data needed to fulfil its
processing purposes, noting if the processing carried out does not help the controller to
achieve its purposes the personal data held is most likely inadequate.
The ICO recommends controllers should carry out periodic reviews of their processing
in order to check that the personal data held is still relevant and adequate for its purposes,
deleting any personal data that is no longer needed.24
xii Fourth data protection principle: personal data must be accurate and where
necessary kept up to date (accuracy)
Controllers must ensure that personal data is accurate and, where necessary, kept up to
date. The ICO recommends25 controllers take reasonable steps to ensure the accuracy of any
personal data obtained, ensure that the source and status of any personal data is clear, and
carefully consider any challenges to the accuracy of information and whether it is necessary
to periodically update the information.
22 ICO, Guide to the General Data Protection Regulation (GDPR)/Principles/Purpose limitation, accessible
at https://ico.org.uk/for-organisations/guide-to-the-general-data-protection-regulation-gdpr/.
23 ICO, Guide to the General Data Protection Regulation (GDPR)/Principles/Data minimisation, accessible
at https://ico.org.uk/for-organisations/guide-to-the-general-data-protection-regulation-gdpr/.
24 ibid.
25 ICO, Guide to the General Data Protection Regulation (GDPR)/Principles/Accuracy, accessible at
https://ico.org.uk/for-organisations/guide-to-the-general-data-protection-regulation-gdpr/principles/
accuracy/.
359
© 2018 Law Business Research Ltd
United Kingdom
xiii Fifth data protection principle: personal data must be kept in a form that
permits the identification of data subjects for no longer than is necessary (storage
limitation)
Personal data must be kept in a form that permits the identification of data subjects for
no longer than is necessary for the purposes for which the personal data are processed. In
practice, this means that the controller must review the length of time it keeps personal data
and consider the purpose or purposes it holds the information for in deciding whether (and
for how long) to retain this information. Controllers must also securely delete personal data
that is no longer needed for this purpose or these purposes, and update, archive or securely
delete information if it goes out of date.
It is good practice to establish standard retention periods for different categories of
information (e.g., employee data and customer data). To determine the retention period for
each category of information, controllers should take into account and consider any legal or
regulatory requirements or professional rules that would apply.26
The ICO, in its published guidance on the GDPR, contains guidance on storage
limitation, recommending ensuring that controllers erase or anonymise personal data27 where
controllers no longer need it, in order to reduce the risk of the personal data becoming
excessive, irrelevant, inaccurate or out of date. This will also help controllers comply with the
data minimisation and accuracy principles, while ensuring the risk that the controller uses the
personal data in error is reduced.
The ICO also recommends in its GDPR storage limitation guidance28 that it is good
practice for controllers to adopt clear policies on retention periods and erasure, which can
help reduce the burden of dealing with questions from data subjects about retention and
access requests for the erasure of personal data.
xiv Sixth data protection principle: personal data must be processed in a manner that
ensures appropriate security of personal data
Personal data must be processed in a manner that ensures appropriate security of personal
data, including protection against unauthorised or unlawful processing and against accidental
loss, destruction or damage, using appropriate technical or organisational measures. Where
a controller uses a data processor to process personal data on its behalf, the controller must
ensure that it has entered into a written contract that obliges the data processor to implement
appropriate technical and organisational measures to ensure a level of security appropriate to
the risk of processing personal data.
The ICO recommends, in its published guidance on security under the GDPR,29 before
deciding what measures are appropriate, controllers should assess the personal data risk by
carrying out an information risk assessment. A controller should review the personal data
26 ICO, Guide to the General Data Protection Regulation (GDPR)/Principles/Storage limitation, accessible at
https://ico.org.uk/for-organisations/guide-to-the-general-data-protection-regulation-gdpr/.
27 ICO, Guide to the General Data Protection Regulation (GDPR)/Principles/Storage limitation, accessible at
https://ico.org.uk/for-organisations/guide-to-the-general-data-protection-regulation-gdpr/.
28 ibid.
29 ICO, Guide to the General Data Protection Regulation (GDPR)/Security, accessible at https://ico.org.uk/
for-organisations/guide-to-the-general-data-protection-regulation-gdpr/.
360
© 2018 Law Business Research Ltd
United Kingdom
it holds, and the way it is used to assess how valuable, sensitive or confidential the personal
data is, including assessing any potential damage or distress that may be caused if the data is
compromised.
When carrying out the assessment, the ICO recommends taking into account:
a the nature and extent of the controller’s premises and computer systems;
b the number of staff the controller has;
c the extent of the staff’s access to the personal data; and
d any personal data held or used by the processor acting on the controller’s behalf.30
In addition, the ICO recommends that controllers should aim to build a culture of security
awareness within the organisation, identifying a person with day-to-day responsibility for
information security within the organisation and ensuring the person has the appropriate
resources and authority to do their job effectively.31
The ICO considers encryption to be an appropriate technical measure owing to its
widespread availability and relatively low cost of implementation.32 However, there are other
measures, such as pseudonymisation of data and anonymisation that can also be used to
ensure the security of personal data.
The technical and organisational measures controllers have in place are also considered
by the ICO when deciding whether to impose an administrative fine on the controller for the
infringement of the GDPR and DPA 2018.
30 ibid.
31 ibid.
32 ibid.
33 ICO, Guide to the General Data Protection Regulation (GDPR)/Accountability and governance, accessible
at https://ico.org.uk/for-organisations/guide-to-the-general-data-protection-regulation-gdpr/.
361
© 2018 Law Business Research Ltd
United Kingdom
f carry out data protection impact assessments for uses of personal data likely to result in
a high risk to the individual’s interests; and
g adhere to relevant codes of conduct and sign up to certification schemes.
The ICO notes that if controllers adopt a privacy management framework this can help embed
accountability measures and create a culture of privacy across the controller’s organisation.34
The framework could include:
a robust programme controls informed by the GDPR requirements;
b appropriate reporting structures; and
c assessment and evaluation procedures.
The guidance has not yet been updated to take into account the entry into force of the GDPR
and DPA 2018.
34 ibid.
35 In November 2012, the ICO published a code of practice on managing data protection risks related to
anonymisation. This code provides a framework for organisations considering using anonymisation and
explains what it expects from organisations using such processes.
362
© 2018 Law Business Research Ltd
United Kingdom
ii Big data
The DPA 2018 does not prohibit the use of big data and analytics. The ICO issued guidance
in July 2014 and revised it in August 201736 considering data protection issues raised by big
data. The ICO suggested how data controllers can comply with the DPA 2018 and the GDPR
while using big data, covering a broad range of topics including anonymisation, privacy
impact assessments, repurposing data, data minimisation, transparency and subject access.
The guidance included three questions on which the ICO invited feedback. A summary
of feedback on big data and data protection and the ICO position was published in April
2015.37
In addition, the Financial Conduct Authority (FCA) published in March 2017 a
feedback statement following its call for input on big data on retail general insurance.38 The
FCA’s key findings were that although big data is producing a range of benefits for consumers
in motor and home insurance, there are also concerns about its impact on data protection. To
address some of these concerns the FCA proposed to co-host a roundtable with the ICO and
various stakeholders to discuss data protection and the use of personal data in retail general
insurance.
Organisations should also install antivirus software on personal devices, provide technical
support to the employees on their personal devices when they are used for business purposes,
and have in place a ‘BYOD acceptable-use policy’ providing guidance to users on how they
can use their own devices to process corporate data and personal data.
The guidance has not yet been updated to take into account the entry into force of the
GDPR and DPA 2018.
36 ICO, Guidelines on Big Data and Data Protection, 28 July 2014 and revised 18 August 2017.
37 ICO, Summary of Feedback on Big Data and Data Protection and ICO Response, 10 April 2015.
38 FCA, FS16/5, Call for Inputs on Big Data in retail general insurance.
39 ICO, Guidelines on Bring Your Own Device (BYOD), 2013.
363
© 2018 Law Business Research Ltd
United Kingdom
iv Cloud computing
The use of cloud computing and how it complies with EU data protection requirements
has been a subject of much discussion recently. The ICO, like many other data protection
authorities in the EU, published guidance on cloud computing, in 2012.40
The ICO proposes a checklist that organisations can follow prior to entering into an
agreement with a cloud provider, with questions on confidentiality, integrity, availability, and
other legal and data protection issues.41
According to the guidance, cloud customers should choose their cloud provider based
on economic, legal and technical considerations. The ICO considers it is important that, at
the very least, such contracts should allow cloud customers to retain sufficient control over
the data to fulfil their data protection obligations.
The ICO is currently updating the cloud computing guidance to reflect the entry into
force of the GDPR and DPA 2018.
364
© 2018 Law Business Research Ltd
United Kingdom
The code and supplementary guidance has not yet been updated to reflect the entry into force
of the GDPR and DPA 2018.
ii Employee monitoring47
The DPA 2018 does not prevent employers from monitoring their employees. However,
monitoring employees will usually be intrusive, and workers have legitimate expectations that
they can keep their personal lives private. Workers are also entitled to a degree of privacy in
their work environment.
DPIAs must be carried out when the processing of personal data is likely to result in a
high risk to the rights and freedoms of individuals. The Article 29 Working Party Guidance
on Data Protection Impact Assessments48 provides examples of when a DPIA should be
carried out. An employee monitoring programme is identified by the Article 29 Working
Party as an example of when a DPIA should be carried out. Organisations should carry out a
privacy impact assessment before starting to monitor their employees to clearly identify the
purposes of monitoring, the benefit it is likely to deliver, the potential adverse impact of the
monitoring arrangement, and to judge if monitoring is justified, as well as take into account
the obligation that arises from monitoring. Organisations should also inform workers who
are subject to the monitoring of the nature, extent and reasons for monitoring unless covert
monitoring is justified.
Employers should also establish a policy on use by employees of electronic
communications, explaining acceptable use of internet, phones and mobile devices, and the
purpose and extent of electronic monitoring. It should also be outlined how the policy is
enforced and the penalties for a breach of the policy.
Opening personal emails should be avoided where possible and should only occur
where the reason is sufficient to justify the degree of intrusion involved.
365
© 2018 Law Business Research Ltd
United Kingdom
On 8 June 2017, the Article 29 Working Party adopted an opinion on data processing
at work that also addressed employee monitoring.49 This opinion is unlikely to fundamentally
change the ICO’s approach to employee monitoring in the United Kingdom. However,
it does include a number of new recommendations, including that where it is possible to
block websites rather than continually monitoring internet usage, employers should prefer
prevention to detection.
iv Electronic marketing52
Under PECR, unsolicited electronic communications to individuals should only be sent with
the recipient’s consent.53 The only exemption to this rule is known as ‘soft opt-in’, which will
apply if the sender has obtained the individual’s details in the course of a sale or negotiations
for a sale of a product or service; the messages are only marketing for similar products; and
the person is given a simple opportunity to refuse marketing when his or her details are
collected, and if he or she does not opt out, he or she is given a simple way to do so in future
messages. These UK rules on consent do not apply to marketing emails sent to companies
and other corporate bodies, such as a limited liability partnership, Scottish partnership or UK
government body.54
Senders of electronic marketing messages must provide the recipients with the sender’s
name and a valid contact address.55
The ICO has created a direct-marketing checklist, which enables organisations to check
if their marketing messages comply with the law and which also proposes a guide to the
366
© 2018 Law Business Research Ltd
United Kingdom
different rules on marketing calls, texts, emails, faxes and mail. The ICO has also published
guidance on direct marketing, which it updated in March 2016.56 The ICO has launched a
consultation phase on a Direct Marketing Code of Practice, which will replace the guidance.
In addition, the ICO has published on its website a guide on rules for businesses when
marketing to other businesses under GDPR and PECR.57 It advises that the GDPR applies
to individuals who can be identified either directly or indirectly, even when they are acting
in a professional capacity. It also notes GDPR only applies to loose business cards where
controllers intend to file them or input the details of the card into a computer system.
The proposed ePrivacy Regulation, which will have direct effect in the United Kingdom
if it takes effect before the United Kingdom exits the European Union on 29 March 2019,
will supersede the PECR. The current draft of the ePrivacy Regulation would require a higher
standard of consent for direct marketing, equivalent to the consent standard in the GDPR.
However, it is possible that existing exemptions such as the soft opt-in may be retained.58
v Financial services
Financial services organisations, in addition to data protection requirements under the DPA
2018, also have legal and regulatory responsibilities to safeguard consumer data under rules
of the UK Financial Conduct Authority (FCA), which includes having adequate systems and
controls in place to discharge their responsibilities.
This includes financial services firms taking reasonable care to establish and maintain
effective systems and controls for countering the risk that the firm might be used to further
financial crime, such as by misuse of customer data.59
Failure to comply with these security requirements may lead to the imposition of
significant financial penalties by the FCA.
This chapter does not consider the data protection safeguards and derogations in detail,
which are set out in the EU chapter. However, it should be noted that under the DPA
1998, controllers were allowed to determine for themselves that their transfers of personal
367
© 2018 Law Business Research Ltd
United Kingdom
data outside of the EEA were adequately protected. The DPA 2018 does not contain such a
self-adequacy assessment. However, the GDPR contains a more limited version of the DPA
1998 self-adequacy assessment, and allows transfers:
a that are not repetitive, concern only a limited number of data subjects and are necessary
for the purposes of compelling legitimate interests that are not overridden by the
interests or rights and freedoms of the data subject;
b where the controller has assessed all the circumstances surrounding the data transfer
and has, as a result, implemented suitable data protection safeguards; and
c has notified the relevant data protection authority of the transfer.
The DPA 2018 also introduces a derogation where the transfer is a necessary and proportionate
measure for the purposes of the controller’s statutory function.
In addition, the DPA 2018 also introduces further derogations for the transfer of
personal data from the UK to a country outside of the EEA where the transfer is necessary for
law enforcement purposes and is based on an adequacy decision.
If it is not based on an adequacy decision, it must be based on appropriate safeguards
where a legal instrument containing appropriate safeguards for the protection of personal
data binds the intended recipient of the personal data, or the data controller having assessed
all the circumstances surrounding the transfers of that type of personal data to that specific
country or territory outside of the EEA concludes that appropriate safeguards exist to protect
the personal data. When relying on this particular derogation, the transfer must also be
documented and such documents must be provided to the ICO upon request, including
the date and time of the transfer, the name or any other pertinent information about the
recipient, the justification for the transfer of the personal data; and a description of the
personal data transferred.
If it is not based on an adequacy decision or on there being appropriate safeguards, it
must be based on special circumstances that allow for the transfer of personal data from the
UK to a country or territory outside of the EEA, where the transfer is necessary:
a to protect the vital interests of the data subject or another person;
b to safeguard the legitimate interests of the data subject;
c for the protection of an immediate and serious threat to the public security of a Member
State or a third country;
d in individual cases for any law enforcement purposes, (provided the controller has
not determined that fundamental rights and freedoms of the data subject override the
public interest in the transfer of personal data from the UK to a third country); or
e in individual cases for a legal purpose (provided the controller has not determined
that fundamental rights and freedoms of the data subject override the public interest
in the transfer of personal data from the UK to a third country). When relying on this
particular derogation, the transfer must also be documented and such documents must
be provided to the ICO upon request, including the date and time of the transfer, the
name or any other pertinent information about the recipient, the justification for the
transfer of the personal data, and a description of the personal data transferred.
368
© 2018 Law Business Research Ltd
United Kingdom
60 The Article 29 Working Party has, however, published a working document on this topic. See the European
Union Overview chapter for more details.
369
© 2018 Law Business Research Ltd
United Kingdom
require a monetary penalty to be paid for failing to comply with the GDPR or the
DPA 2018. Under the GDPR, such monetary penalties can amount to €20 million or
4 per cent of annual worldwide turnover.
As the DPA 2018 came into effect on 23 May 2018, any information notices issued by the
ICO to commence possible investigations, assessment notices or enforcement notices served
pre-23 May 2018 and thus served under the Data Protection Act 1998, continue to have
effect under the DPA 2018.
In a speech at the Data Protection Practitioners’ Conference on 9 April 2018, the ICO
Information Commissioner, Elizabeth Dunham, stated that the ‘enforcement is a last resort’
and that she has ‘no intention of changing the ICO’s proportionate and pragmatic approach
after 25th of May’. She added, ‘Hefty fines will be reserved for those organisations that
persistently, deliberately or negligently flout the law’ and ‘those organisations that self-report,
engage with us to resolve issues and can demonstrate effective accountability arrangements
can expect this to be a factor when we consider any regulatory action’.
In addition, the ICO is responsible for promoting public awareness and in particular
raising awareness among controllers and processors, of their obligations under the GDPR
and DPA 2018.
The FCA also has enforcement powers and can impose financial penalties on financial
services organisations for failure to comply with their obligations to protect customer data.
370
© 2018 Law Business Research Ltd
United Kingdom
UK, or in any other EEA state, that process personal data in relation to the offering of goods
or services to data subjects in the UK or to the monitoring of data subjects in the UK, as
far as their behaviour takes place in the UK. Data controllers not established in the United
Kingdom or any other EEA country and processing personal data of data subjects in the UK
must nominate a representative established in the UK and comply with the data principles
and requirements under the GDPR and DPA 2018.
61 Case C-698/15 Secretary of State for the Home Department v. Tom Watson, Peter Brice and Geoffrey Lewis.
371
© 2018 Law Business Research Ltd
United Kingdom
with considerable judicial criticism the IPA needs further amendments; however, it is unclear
whether these amendments will take the form of further primary legislation or a statutory
instrument.
UK cybersecurity strategy
In November 2011, the Cabinet Office published the UK Cyber Security Strategy: Protecting
and promoting the UK in a digital world, with four objectives for the government to achieve
by 2015:
a tackling cybercrime and making the United Kingdom one of the most secure places in
the world to do business;
b to be more resilient to cyberattacks and better able to protect our interests in cyberspace;
c to create an open, stable and vibrant cyberspace that the UK public can use safely and
that supports open societies; and
d to have the cross-cutting knowledge, skills and capability it needs to underpin all our
cybersecurity objectives.
In March 2013, the government launched the Cyber-security Information Sharing Partnership
to facilitate the sharing of intelligence and information on cybersecurity threats between the
government and industry.
The government has also developed the Cyber Essentials scheme, which aims to provide
clarity on good cybersecurity practice.
Along with the Cyber Essentials scheme, the government has published the Assurance
Framework, which enables organisations to obtain certifications to reassure customers,
investors, insurers and others that they have taken the appropriate cybersecurity precautions.
The voluntary scheme is currently open and available to all types of organisation.
In June 2015, the government launched a new online cybersecurity training course to
help the procurement profession stay safe online.
In July 2015, the government announced the launch of a new voucher scheme to
protect small businesses from cyberattacks, which will offer micro, small and medium-sized
businesses up to £5,000 for specialist advice to boost their cybersecurity and protect new
business ideas and intellectual property.
In January 2016, the government announced plans to assist start-ups offering
cybersecurity solutions. Such start-ups will be given help, advice and support through the
Early State Accelerator Programme, a £250,000 programme designed to assist start-ups
in developing their products and bringing them to market. The programme is run by
Cyber London and the Centre for Secure Information Technologies, and is funded by the
government’s National Cyber Security Strategy programme.
In March 2016, the government announced that the United Kingdom’s new national
cyber centre (announced in November 2015) would be called the National Cyber Security
Centre (NCSC). The NCSC, which is based in London, opened in October 2016 and is
intended to help tackle cybercrime.
In response to the European Parliament’s proposal for a NIS Directive in March
2014, which was part of the European Union’s Cybersecurity Strategy, and proposed certain
372
© 2018 Law Business Research Ltd
United Kingdom
measures including new requirements for ‘operators of essential services’ and ‘digital service
providers’, the UK government has implemented the NIS Directive into national law in the
form of the UK Network and Information Systems Regulations 2018 (the NIS Regulations),
which came into force on 10 May 2018.
The NIS Regulations have established a legal framework that imposes security and
notification of security incident obligations on:
a operators of essential services, being energy, transport, digital infrastructure, the health
sector and drinking water supply and distribution services; and
b on relevant digital service providers, being online marketplace providers, online search
engines and cloud computing service providers.
The NIS Regulations also require the UK government to outline and publish a strategy to
provide strategic objectives and priorities on the security of the network and information
systems in the UK.
The NIS Regulations also imposes a tiered system of fines in proportion to the impact
of the security incident, with a maximum fine of £17 million imposed where a competent
authority decides the incident has caused or could cause an immediate threat to life or a
significantly adverse impact on the UK economy.
Data controllers in the UK may in the event of a data security breach have to notify the
relevant authorities both under the GDPR and the NIS Regulations.Data breaches
Under the GDPR data controllers are required to report personal data breaches to the
ICO without undue delay, unless the breach is unlikely to result in a risk to the rights and
freedoms of the data subject. and, where feasible, no later than 72 hours after the controller
becomes aware of the breach.62 If a controller does not report the data breach within 72
hours, it must provide a reasoned justification for the delay in notifying the ICO. The
controller is also subject to a concurrent obligation to notify affected data subjects without
undue delay when the notification is likely to result in a high risk to the rights and freedoms
of natural persons.63 Under the GDPR, data processors also have an obligation to notify the
data controller of personal data breaches without undue delay after becoming aware of a
personal data breach.64
According to the ICO, there should be a presumption to report a breach to the ICO if a
significant volume of personal data is concerned and also where smaller amounts of personal
data are involved but there is still a significant risk of individuals suffering substantial harm.65
The ICO have stated the 72-hour deadline to report a personal data breach includes evenings,
weekends and bank holidays66 and where a controller is not able to report a breach within the
72-hour deadline, it must give reasons to the ICO for its delay.
As part of the notification, the ICO requires controllers to inform the ICO of:
a the number of data subjects affected by the personal data breach;
b the type of personal data that has been affected;
373
© 2018 Law Business Research Ltd
United Kingdom
c the likely impact on the data subjects as a result of the personal data breach;
d steps the controller has taken to rectify the personal data breach and to ensure it does
not happen again; and
e the name of the DPO or another point of contact for the ICO to request further
information.
The GDPR also imposes a requirement on controllers to inform the data subject where
the personal data breach represents a high risk to their rights and freedoms. The ICO, in a
webinar in July 2018,67 stated it was of the view that the threshold is higher for informing
data subjects of the personal data breach than it is for informing the ICO of the personal
data breach. According to the ICO, this is because the aim of informing data subjects is
so that they can take action to protect themselves in the event of a personal data breach.
Therefore, informing them of every personal data breach, regardless of whether it has an effect
on the data subject, can lead to notification fatigue, where the consequences of the breach
are relatively minor.
In addition, when notification is given to the ICO of the personal data breach, the ICO
can also require the controller to inform the data subjects of the personal data breach.
In addition, under the PECR68 and the Notification Regulation,69 internet and
telecommunication service providers must report breaches to the ICO no later than 24
hours after the detection of a personal data breach where feasible.70 The ICO has published
guidance on this specific obligation to report breaches.71
XII OUTLOOK
The UK departs the European Union on 29 March 2019, but there is no legally binding
transition agreement, at present, that will determine the nature and content of any transitional
agreement, in particular, in relation to the processing of personal data between the UK and
the EU.
As the GDPR is a regulation, it has direct effect in UK law. As the GDPR came into
force prior to the UK’s scheduled departure from the EU its data protection obligations will
continue to have legal effect post-Brexit, unless the UK government decides to introduce
legislation repealing the provisions and legal effect of the GDPR in UK law and amend the
provisions of the DPA 2018.
67 ibid.
68 PECR Regulation 5A(2).
69 Commission Regulation No. 611/2013 of 24 June 2013 on the measures applicable to the notification
of personal data breaches under Directive 2002/58/EC of the European Parliament and of the Council
on privacy and electronic communications (the Notification Regulation), which entered into force on
25 August 2013.
70 Article 2 of the Notification Regulation. The content of the notification is detailed in Annex 1 to the
Notification Regulation.
71 ICO, Guidance on Notification of PECR Security Breaches, 26 September 2013.
374
© 2018 Law Business Research Ltd
United Kingdom
In relation to the processing and transfer of personal data between the UK and the EU,
the UK government has proposed a ‘bespoke adequacy agreement’72 between the EU and
the UK. Under the agreement, the current adequacy framework provided by the European
Commission should be extended to include:
a a clear and transparent framework to facilitate dialogue between the UK and the EU,
minimise the risk of disruption to data flows and support a stable relationship between
the UK and the EU to protect the personal data of UK and EU data subjects;73 and
b greater regulatory cooperation and enforcement action between the ICO and EU
Member State data supervisory authorities.
The Information Commissioner, Elizabeth Denham, has stated that ‘there is no doubt that
achieving a treaty arrangement or an adequacy decision with the EU represents the simplest
way of ensuring the continued frictionless flow of data between the EU and the UK’.74
More generally, it is expected the ICO will continue to publish guidance on the GDPR
and DPA 2018 during 2018 and beyond.
72 Her Majesty’s Government, ‘The Future Relationship Between the United Kingdom and the European
Union’, 12 July 2018.
73 Her Majesty’s Government, ‘The Future Relationship Between the United Kingdom and the European
Union’, 12 July 2018, Chapter 3.2.1, Paragraph (8)(a).
74 ‘Building the cybersecurity community’, Elizabeth Denham, National Cyber Security Centre’s CYBERUK
2018 event, 12 April 2018.
375
© 2018 Law Business Research Ltd
Chapter 26
UNITED STATES
I OVERVIEW
Although not universally acknowledged, the US commercial privacy regime is arguably
the oldest, most robust, well developed and effective in the world. The US privacy system
has a relatively flexible and non-prescriptive nature, relying more on post hoc government
enforcement and private litigation, and on the corresponding deterrent value of such
enforcement and litigation, than on detailed prohibitions and rules. With certain notable
exceptions, the US system does not apply a ‘precautionary principle’ to protect privacy, but
rather allows injured parties (and government agencies ) to bring legal action to recover
damages for, or enjoin a party from, ‘unfair or deceptive’ business practices. However, US
federal law does impose affirmative prohibitions and restrictions in certain commercial
sectors, such as those involving financial and medical data, and electronic communications,
as well as with respect to children’s privacy, background investigations and ‘consumer reports’
for credit or employment purposes, and certain other specific areas. State laws add numerous
additional privacy requirements.
Legal protection of privacy in civil society has been recognised in US common law
since 1890, when the article ‘The Right to Privacy’ was published in the Harvard Law Review
by Professors Samuel D Warren and Louis D Brandeis. Moreover, from its conception by
Warren and Brandeis, the US system for protecting privacy in the commercial realm has
been focused on addressing technological innovation. The Harvard professors astutely noted
that ‘[r]ecent inventions and business methods call attention to the next step which must
be taken for the protection of the person, and for securing to the individual [. . .] the right
“to be let alone”’. In 1974, Congress enacted the federal Privacy Act, regulating government
databases, and found that ‘the right to privacy is a personal and fundamental right protected
by the Constitution of the United States’. It is generally acknowledged that the US Privacy
Act represented the first official embodiment of the fair information principles and practices
that have been incorporated in many other data protection regimes, including the European
Union’s 1995 Data Protection Directive.
1 Alan Charles Raul is a partner at Sidley Austin LLP. Vivek K Mohan was previously an associate and is
now senior privacy and cybersecurity counsel at Apple Inc. His work on the chapter predated his tenure
at Apple. The authors wish to thank Tasha D Manoranjan and Frances E Faircloth, who were previously
associates at Sidley, for their contributions to this chapter and prior versions. Passages of this chapter
were originally published in ‘Privacy and data protection in the United States’, The debate on privacy and
security over the network: Regulation and markets, 2012, Fundación Telefónica; and Raul and Mohan,
‘The Strength of the U.S. Commercial Privacy Regime’, 31 March 2014, a memorandum to the Big Data
Study Group, US Office of Science and Technology Policy.
376
© 2018 Law Business Research Ltd
United States
The United States has also led the way for the world not only in establishing model
legal data protection standards in the 1974 Privacy Act, but also in terms of imposing
affirmative data breach notification and information security requirements on private entities
that collect or process personal data from consumers, employees and other individuals. The
state of California was the path-breaker on data security and data breach notifications by
first requiring in 2003 that companies notify individuals whose personal information was
compromised or improperly acquired. Since then, all 50 states,2 the District of Columbia and
other US jurisdictions, and the federal banking, healthcare and communications agencies,
have also required companies to provide mandatory data breach notifications to affected
individuals, and have imposed affirmative administrative, technical and physical safeguards to
protect the security of sensitive personal information. Dozens of other medical and financial
privacy laws also exist in various states. There is, however, no single omnibus federal privacy
law in the United States. Moreover, there is no designated central data protection authority
in the United States, although the Federal Trade Commission (FTC) has primarily assumed
that role for consumer privacy. The FTC is independent of the President, and is not obliged
(although it is encouraged) to respect the Administration’s perspective on the proper balance
between costs and benefits with respect to protecting data privacy. The Chair of the FTC is
designated by the President, however, and may be removed as Chair (although not as one of
the FTC’s five commissioners) at the discretion of the President.
As in the EU and elsewhere, privacy and data protection are balanced in the United
States in accordance with other rights and interests that societies need to prosper and flourish,
namely economic growth and efficiency, technological innovation, property and free speech
rights and, of course, the values of promoting human dignity and personal autonomy. The
most significant factor in counterbalancing privacy protections in the United States, perhaps,
is the right to freedom of expression guaranteed by the First Amendment. Preserving free
speech rights for everyone certainly entails complications for a ‘right to be forgotten’, since
one person’s desire for oblivion may run counter to another’s sense of nostalgia (or some other
desire to memorialise the past for good or ill).
The First Amendment has also been interpreted to protect people’s right to know
information of public concern or interest, even if it trenches to some extent on individual
privacy. Companies have also been deemed to have a First Amendment right to communicate
relatively freely with their customers by exchanging information in both directions (subject
to the information being truthful, not misleading and otherwise not the subject of an unfair
or deceptive business practice).
The dynamic and robust system of privacy governance in the United States marshals
the combined focus and enforcement muscle of the FTC, state attorneys general, the Federal
Communications Commission (FCC), the Securities and Exchange Commission (SEC),
the Consumer Financial Protection Bureau (and other financial and banking regulators),
the Department of Health and Human Services, the Department of Education, the judicial
system, and last – but certainly not least – the highly motivated and aggressive US private
plaintiffs’ bar. Taken together, this enforcement ecosystem has proven to be nimble, flexible
and effective in adapting to rapidly changing technological developments and practices,
responding to evolving consumer and citizen expectations, and serving as a meaningful agent
2 South Dakota and Alabama became the 49th and 50th states to enact data breach notification laws in
2018. South Dakota enacted data breach notification legislation on 21 March 2018, while Alabama
enacted data breach notification legislation on 28 March 2018.
377
© 2018 Law Business Research Ltd
United States
378
© 2018 Law Business Research Ltd
United States
the development of other federal and state privacy legislation around the US. For example,
California was the first state to enact data breach notification legislation, which all other
states then followed.
On 16 May 2017, Washington became the third state to pass a law regulating biometric
data, which governs the collection, use and retention of ‘biometric identifiers’, including
fingerprints, voice prints, eye retinas, irises, or other patterns or characteristics that can
be used to identify someone. The law specifically excludes ‘physical or digital photograph,
video or audio recording or data generated therefrom’ (in addition to certain health-related
data), suggesting the statute will have limited application in the context of facial-recognition
technology. The law restricts the sale, lease and other disclosure of the data and requires its
protection, but like a similar law in Texas, it does not provide for a private right of action.
Illinois, the other state to pass a biometric data law, does, however, provide for a private cause
of action, which has already spawned some litigation. Other states, including Connecticut,
New Hampshire and Alaska, have considered the regulation of biometric data.
One case that saw continued development in early 2017 was Spokeo, Inc v. Robins.
Thomas Robins had sued Spokeo for wilful violations of the Fair Credit Reporting Act
(FCRA), alleging that inaccurate information disclosed about him on Spokeo’s website
harmed his employment opportunities. In May 2016, the Supreme Court remanded the
case to the Ninth Circuit for consideration of whether Robins had suffered an injury
that was sufficiently ‘concrete’ to find standing. On remand from the Supreme Court, on
15 August 2017, the Ninth Circuit held that an alleged injury was sufficiently ‘concrete’,
citing the harms that may arise when persons’ personal information is misused or improperly
accessed. On 22 January 2018, the United States Supreme Court declined to review the
Ninth Circuit Court of Appeals’ decision.
In data breach litigation, courts continue to disagree about whether plaintiffs should
prevail where they cannot allege that the criminal actually misused stolen data. In August
2017, the DC Circuit held that plaintiffs making allegations related to a 2015 breach had
plausibly alleged a risk of harm, even without proving that their potentially stolen social
security numbers had already been misused. Meanwhile, the Eighth Circuit held – on the
one hand – that a plaintiff had standing to sue a company after a breach based on the theory
that the plaintiff had paid for a certain level of security, and thus, the plaintiff arguably did
not get the value of that bargain. On the other hand, however, the same court held that
the case should be dismissed for failure to state a claim because of lack of evidence that
anyone actually suffered fraud or identity theft resulting in financial loss. Moreover, the court
stated that: ‘[t]he implied premise that because data was hacked [the company’s] protections
must have been inadequate is a “naked assertion devoid of further factual enhancement” that
cannot survive a motion to dismiss’ and ‘massive class action litigation should be based on
more than allegations of worry and inconvenience’.
Amid this uncertainty, large-scale breaches and attacks continue to occur. On
12 May 2017, the WannaCry attack disabled computers in organisations across the world,
including the UK National Health Service. Hackers, believed to be in North Korea, demanded
money to unfreeze the computers. WannaCry exploited weaknesses in unpatched Windows
XP operating systems and wreaked havoc in the United States, the United Kingdom and
around the world. On 7 September 2017, Equifax, one of the three major consumer credit
reporting agencies, announced that it had suffered a hack that potentially compromised the
379
© 2018 Law Business Research Ltd
United States
i FTC actions
In October 2016, the FTC announced the release of a new guide for businesses dealing
with data breaches. The guide covers the process businesses should follow and what officials
they should contact when there is a data breach. It includes advice regarding secure systems,
managing service providers, segmenting networks and notifying users whose information has
been stolen. The FTC also released a video explaining much of the same material.
On 6 February 2017, the FTC announced that VIZIO had agreed to pay US$2.2
million to settle charges by the FTC and the New Jersey attorney general that it installed
software on TVs to collect viewing data of its 11 million customers without their knowledge
or consent. The order required VIZIO to prominently disclose and obtain affirmative express
consent for data collection and sharing. The settlement also required VIZIO to delete all data
it collected before 1 March 2016 and to implement a comprehensive data privacy programme
that would be regularly assessed.
On 15 August 2017, the FTC reached a settlement with Uber regarding allegations that
the company had misrepresented its cybersecurity protections and engaged in unreasonable
cybersecurity practices. The settlement sheds greater light on what the FTC means by the
‘reasonable data security’ measures it expects companies to take. Uber suffered a breach of
its drivers’ location and other data and was the subject of 2014 news reports that alleged
Uber employees could gain access to and use its customers’ personal information, including
precise geolocation data. The FTC settlement clarified the core elements of a ‘reasonable’
data security programme, including restricted employee access to sensitive data, multi-factor
authentication for remote access and encryption of sensitive personal data both in transit and
at rest.
The Court of Justice of the European Union (CJEU) has had an outsize impact on
privacy and data protection issues that affect US companies. The CJEU decision invalidating
the US–EU Safe Harbor in October 2015 led to lengthy negotiations between US and EU
authorities on an appropriate replacement mechanism for data transfers across the Atlantic,
resulting in the EU–US Privacy Shield Framework (Privacy Shield), which has been in place
for more than a year. The FTC has brought three recent enforcement actions alleging that
companies made false claims about Privacy Shield participation. In all three complaints, the
FTC alleged the companies falsely stated in their privacy policies that they would comply with
Privacy Shield, because the companies started the application for Privacy Shield compliance
but did not complete the necessary steps to ensure full compliance before claiming they were
Privacy Shield participants.
380
© 2018 Law Business Research Ltd
United States
d credit and consumer reports and background investigations at the federal level; and
e a further extensive array of specific privacy laws at the state level.
Moreover, the United States is the unquestioned world leader in mandating information
security and data breach notifications, without which information privacy is not possible.
If one of the sector-specific federal or state laws does not cover a particular category of data
or information practice, then the Federal Trade Commission Act (FTCA), and each state’s
‘little FTCA’ analogue, comes into play. Those general consumer protection statutes broadly,
flexibly and comprehensively proscribe (and authorise tough enforcement against) unfair or
deceptive acts or practices. The FTC is the de facto privacy regulator in the United States. State
attorneys general and private plaintiffs can also enforce privacy standards under analogous
‘unfair and deceptive acts and practices’ standards in state law. Additionally, information
privacy is further protected by a network of common law torts, including invasion of privacy,
public disclosure of private facts, ‘false light’, appropriation or infringement of the right of
publicity or personal likeness, and, of course, remedies against general misappropriation or
negligence. In short, there are no substantial lacunae in the regulation of commercial data
privacy in the United States. In taking both a general (unfair or deceptive) and sectoral
approach to commercial privacy governance, the United States has empowered government
agencies to oversee data privacy where the categories and uses of data could injure individuals.
FTCA
Section 5 of the FTCA prohibits ‘unfair or deceptive acts or practices in or affecting
commerce’. While the FTCA does not expressly address privacy or information security, the
FTC applies Section 5 to information privacy, data security, online advertising, behavioural
tracking and other data-intensive, commercial activities. The FTC has brought successful
enforcement actions under Section 5 against companies that failed to adequately disclose
their data collection practices, failed to abide by the promises made in their privacy policies,
failed to comply with their security commitments or failed to provide a ‘fair’ level of security
for consumer information.
Under Section 5, an act or practice is deceptive if there is a representation or omission
of information likely to mislead a consumer acting reasonably under the circumstances; and
the representation or omission is ‘material’ – defined as an act or practice ‘likely to affect the
consumer’s conduct or decision with regard to a product or service’. An act or practice is
‘unfair’ under Section 5 if it causes or is likely to cause substantial injury to consumers that
is not reasonably avoidable and lacks countervailing benefits to consumers or competition.
The FTC takes the position that companies must disclose their privacy practices
adequately, and that in certain circumstances, this may require particularly timely, clear and
prominent notice, especially for novel, unexpected or sensitive uses. The FTC brought an
enforcement action in 2009 against Sears for allegedly failing to adequately disclose the extent
to which it collected personal information by tracking the online browsing of consumers who
downloaded certain software. The consumer information allegedly collected included ‘nearly
all of the Internet behavior that occurs on [. . .] computers’. The FTC required Sears to
prominently disclose any data practices that would have significant unexpected implications
in a separate screen outside any user agreement, privacy policy or terms of use.
381
© 2018 Law Business Research Ltd
United States
The FTC’s report does not, however, require opt-in consent for the use of non-sensitive
information in behavioural advertising.
Classification of data
The definitions of personal data and sensitive personal data vary by regulation. The FTC
considers information that can reasonably be used to contact or distinguish an individual
(including IP addresses) to constitute personal data (at least in the context of children’s
382
© 2018 Law Business Research Ltd
United States
privacy). Generally, sensitive data includes personal health data, credit reports, personal
information collected online from children under 13, precise location data, and information
that can be used for identity theft or fraud.
Federal laws
Congress has passed laws protecting personal information in the most sensitive areas of
consumer life, including health and financial information, information about children and
credit information. Various federal agencies are tasked with rule making, oversight and
enforcement of these legislative directives.
The scope of these laws and the agencies that are tasked with enforcing them is
formidable. Laws such as the Children’s Online Privacy Protection Act of 1998 (COPPA),
the Health Insurance Portability and Accountability Act of 1996, the Financial Services
Modernization Act of 1999 (Gramm-Leach-Bliley Act or GLBA), the FCRA, the Electronic
Communications Privacy Act, the Communications Act (regarding CPNI) and the Telephone
Consumer Protection Act of 1991, to name just a few, prescribe specific statutory standards
to protect the most sensitive consumer data.
The Cybersecurity Act, passed in 2015, includes a Cybersecurity Information Sharing
Act (CISA). CISA is designed to foster cyberthreat information sharing and to provide
certain liability shields related to such sharing and other cyber-preparedness. In addition,
US intelligence agency collection of bulk phone metadata pursuant to the USA Freedom
Act ended in 2015, which means that targeted court orders are required for government
collection of phone metadata stored by telecommunications companies.
The Defend Trade Secrets Act (DTSA) also provides federal legislative protection for
information by expanding access to judicial redress for unauthorised access and use of trade
secrets. The DTSA amends the Economic Espionage Act of 1996 to provide plaintiffs with
a private cause of action to sue for trade-secret theft and pursue damages in federal court.
The DTSA authorises a federal court to grant an injunction to prevent actual or threatened
misappropriation of trade secrets, but the injunction may not prevent a person from entering
into an employment relationship; nor place conditions on employment based merely on
information the person knows. Rather, any conditions placed on employment must be ‘based
on evidence of threatened misappropriation’. Moreover, the DTSA precludes the court from
issuing an injunction that would ‘otherwise conflict with an applicable state law prohibiting
restraints on the practice of a lawful profession, trade or business’.
State laws
In addition to the concurrent authority that state attorneys general share for enforcement
of certain federal privacy laws, state legislatures have been especially active on privacy issues
that states view worthy of targeted legislation. In the areas of online privacy and data security
alone, state legislatures have passed laws covering a broad array of privacy-related issues,3
3 See www.ncsl.org/research/telecommunications-and-information-technology/state-laws-related-to-
internet-privacy.aspx.
383
© 2018 Law Business Research Ltd
United States
cyberstalking,4 data disposal,5 privacy policies, security breach notification,6 employer access
to employee social media accounts,7 unsolicited commercial communications8 and electronic
solicitation of children,9 to name but a few.
California is viewed as a leading legislator in the privacy arena, and its large population
and high-tech sector means that the requirements of California law receive particular attention
and often have de facto application to businesses operating across the United States.10
The highly significant, new California Consumer Privacy Act of 2018 is discussed
above in Section II.
4 See www.ncsl.org/research/telecommunications-and-information-technology/cybersecurity-
legislation-2016.aspx.
5 See www.ncsl.org/research/telecommunications-and-information-technology/data-disposal-laws.aspx.
6 See www.ncsl.org/research/telecommunications-and-information-technology/security-breach-
notification-laws.aspx.
7 See www.ncsl.org/research/telecommunications-and-information-technology/employer-access-to-social-
media-passwords-2013.aspx.
8 See www.ncsl.org/research/telecommunications-and-information-technology/state-spam-laws.aspx.
9 See www.ncsl.org/research/telecommunications-and-information-technology/electronic-solicitation-or-
luring-of-children-sta.aspx.
10 See oag.ca.gov/privacy/privacy-laws.
11 See www.aboutads.info; www.networkadvertising.org/choices/?partnerId=1//.
384
© 2018 Law Business Research Ltd
United States
Federal
Financial privacy
For financial privacy, the federal banking agencies and the FTC were previously primarily
responsible for enforcing consumer privacy under the GLBA, which applies to financial
institutions. Following the 2010 Dodd-Frank legislation, such laws will be primarily
(but not exclusively) enforced by the new Consumer Financial Protection Bureau, which
has significant, independent regulatory and enforcement powers. The FTC, however, will
remain primarily responsible for administering the FCRA, along with the general unfair
and deceptive acts and practices standards under the FTCA and COPPA, which impose
affirmative privacy and security duties on entities that collect personal information from
children under 13 years of age.
385
© 2018 Law Business Research Ltd
United States
The GLBA addresses financial data privacy and security by establishing standards
for safeguarding customers’ ‘non-public personal information’ – or personally identifiable
financial information – stored by ‘financial institutions’, and by requiring financial
institutions to provide notice of their information-sharing practices. In brief, the GLBA
requires financial institutions to provide notices of policies and practices regarding disclosure
of personal information; to prohibit the disclosure of such data to unaffiliated third parties,
unless consumers are provided the right to opt out of such disclosure or other exceptions
apply; and to establish safeguards to protect the security of personal information.
The FCRA, as amended by the Fair and Accurate Credit Transactions Act of 2003,
imposes requirements on entities that possess or maintain consumer credit reporting
information, or information generated from consumer credit reports. Consumer reports are
‘any written, oral, or other communication of any information by a consumer reporting
agency bearing on a consumer’s creditworthiness, credit standing, credit capacity, character,
general reputation, personal characteristics, or mode of living which is used or expected to
be used or collected in whole or in part for the purpose of serving as a factor in establishing
the consumer’s eligibility’ for credit, insurance, employment or other similar purposes. The
FCRA mandates accurate and relevant data collection to give consumers the ability to access
and correct their credit information, and limits the use of consumer reports to permissible
purposes such as employment, and extension of credit or insurance.12
The Consumer Financial Protection Bureau (CFPB), which is the primary federal
regulator of consumer financial products and services, brought its first data security
enforcement action in 2016 under the authority granted by Dodd-Frank against Dwolla
Inc, an online payments company, for allegedly deceptive representations with respect to its
data security practices. Dodd-Frank authorises the CFPB to take action against institutions
engaged in unfair, deceptive or abusive acts or practices or that otherwise violate federal
consumer financial laws. Under the terms of the CFPB order against Dwolla, the company
was required to stop misrepresenting its data security practices, train employees properly and
fix security flaws. In addition, Dwolla was required to pay a US$100,000 civil money penalty.
On 18 October 2017, the CFPB released a set of consumer protection principles
principles designed to protect consumer interests in the market for services built around
consumer-approved use of financial information. The Principles are targeted to so-called ‘data
aggregation’ or ‘screen scraping’ services that collect customer information in order to provide
financial planning or other services. Over the past few years, data aggregation services and
banks have struggled to develop the right model for sharing customer account data. The
Principles issued by the CFPB seek to provide a potential data-sharing model for banks
and data aggregation services while protecting consumer interests. Although the Principles
set forth by the CFPB are not binding requirements, they signal increased momentum for
a workable model of data sharing between banks and fintech companies. They may also
demonstrate the CFPB’s expectations of market participants and its broader viewpoints
about consumer privacy and consent. The nine Principles cover the areas of data access,
data scope and usability, consumer control and informed consent, separate authorisation
credentials, data security, access transparency, data accuracy, consumer ability to dispute and
resolve unauthorised access, and efficient and effective accountability mechanisms for risks.
12 Available at www.ftc.gov/enforcement/rules/rulemaking-regulatory-reform-proceedings/
fair-credit-reporting-act.
386
© 2018 Law Business Research Ltd
United States
Healthcare privacy
For healthcare privacy, agencies within the Department of Health and Human Services
administer and enforce HIPAA, as amended by the Health Information Technology for
Economic and Clinical Health Act (HITECH). HIPAA was enacted to create national
standards for electronic healthcare transactions, and the US Department of Health and
Human Services has promulgated regulations to protect privacy and security of personal
health information (PHI). Patients generally have to opt in before their information can
be shared with other organisations.13 HIPAA applies to ‘covered entities’, which include
health plans, healthcare clearing houses and healthcare providers that engage in electronic
transactions as well as, via HITECH, service providers to covered entities that need access
to PHI to perform their services. It also imposes requirements in connection with employee
medical insurance.
‘Protected health information’ is defined broadly as ‘individually identifiable health
information [. . .] transmitted or maintained in electronic media’ or in ‘any other form or
medium’. ‘Individually identifiable health information’ is defined as information that is a
subset of health information, including demographic information that ‘is created or received
by a health care provider, health plan, employer, or health care clearinghouse’; that ‘relates
to the past, present, or future physical or mental health or condition of an individual; the
provision of health care to an individual; or the past, present, or future payment for the
provision of health care to an individual’; and that either identifies the individual or provides
a reasonable means by which to identify the individual. HIPAA also does not apply to
‘de-identified’ data.
A ‘business associate’ is an entity that performs or assists a covered entity in the
performance of a function or activity that involves the use or disclosure of PHI (including,
but not limited to, claims processing or administration activities). Business associates are
required to enter into agreements, called business associate agreements, requiring business
associates to use and disclose PHI only as permitted or required by the business associate
agreement or as required by law, and to use appropriate safeguards to prevent the use or
disclosure of PHI other than as provided for by the business associate agreement, as well as
numerous other provisions regarding confidentiality, integrity and availability of electronic
PHI. HIPAA and HITECH not only restrict access to and use of medical information, but
also impose stringent information security standards.
Communications privacy
For communications privacy, the FCC, the Department of Justice and, to a considerable
extent, private plaintiffs can enforce the data protection standards in the Electronic
Communications Privacy Act, the Computer Fraud and Abuse Act and various sections of
the Communications Act, which include specific protection for CPNI such as telephone call
records. The Electronic Communications Privacy Act of 1986 protects the privacy and security
of the content of certain electronic communications and related records. The Computer
Fraud and Abuse Act prohibits hacking and other forms of harmful and unauthorised
access or trespass to computer systems, and can often be invoked against disloyal insiders
13 Available at aspe.hhs.gov/report/health-insurance-portability-and-accountability-act-1996.
387
© 2018 Law Business Research Ltd
United States
Children’s privacy
COPPA applies to operators of commercial websites and online services that are directed to
children under the age of 13, as well as general audience websites and online services that
have actual knowledge that they are collecting personal information from children under the
age of 13. COPPA requires that these website operators post a privacy policy, provide notice
about collection to parents, obtain verifiable parental consent before collecting personal
information from children, and other actions.15
State legislation
In the areas of online privacy and data security alone, state legislatures have passed a number
of laws covering access to employee and student social media passwords, children’s online
privacy, e-Reader privacy, online privacy policies, false and misleading statements in website
privacy policies, privacy of personal information held by ISPs, notice of monitoring of
employee email communications and internet access, phishing, spyware, security breaches,
spam and event data recorders. California is viewed as the leading legislator in the privacy
arena, with many other states following its privacy laws. State attorneys general also have
concurrent authority with the FTC or other federal regulators under various federal laws,
such as COPPA, HIPAA and others.
The National Council of State Legislatures summarises the following state provisions
regarding online privacy:
14 See www.fcc.gov/document/fcc-strengthens-consumer-protections-against-unwanted-calls-and-texts.
15 Available at www.law.cornell.edu/USCode/text/15/6501.
388
© 2018 Law Business Research Ltd
United States
389
© 2018 Law Business Research Ltd
United States
that are subject to data transfer restrictions set forth by other countries. The ruling by the
CJEU that the US–EU Safe Harbor Framework is ‘invalid’ has brought a considerable degree
of uncertainty to the thousands of companies that rely on it as a bedrock of day-to-day global
operations. This development had a significant impact on businesses that rely on Safe Harbor
to legitimise transfers of personal data from the EU to the United States.
The EU–US Privacy Shield provides a new framework for transatlantic data transfers.
The new agreement, which was announced in February and activated in August, replaces
Safe Harbor, which was invalidated by the European Court of Justice in October 2015.
The new agreement places more stringent duties on US companies to safeguard Europeans’
personal data and on the US Department of Commerce and the FTC for increased scrutiny,
enforcement and partnership with European data protection authorities. As part of the
framework, the United States agrees that there will be no indiscriminate mass surveillance
and access to data for law enforcement and national security purposes with respect to data
transferred under the new framework, and must meet certain checks to ensure data are
only accessed as necessary and proportionate. In addition, European citizens who believe
their data have been compromised in violation of the new agreement will be able to bring
complaints to a dedicated ombudsperson. However, some elements of the new agreement
share qualities with the now-defunct Safe Harbor, including that companies will subscribe to
data protection principles, and that there will be a structured redress process.
In 2012, the United States was approved as the first formal participant in the Asia-Pacific
Economic Cooperation (APEC) Cross-Border Privacy Rules system, and the FTC became the
system’s first privacy enforcement authority. The FTC’s Office of International Affairs18 works
with consumer protection agencies globally to promote cooperation, combat cross-border
fraud and develop best practices.19 In particular, the FTC works extensively with the Global
Privacy Enforcement Network and APEC.20
390
© 2018 Law Business Research Ltd
United States
Corporate privacy managers have also emphasised that while compliance-oriented laws
in other jurisdictions do not always keep pace with technological innovation, the FTC’s
Section 5 enforcement authority allows it to remain nimble in protecting consumer privacy
as technology and consumer expectations evolve over time.
The United States does not require companies to appoint a data protection officer
(although specific laws such as the GLBA and HIPAA require companies to designate
employees to be responsible for the organisation’s mandated information security and privacy
programmes). However, it is best practice to appoint a chief privacy officer and an IT security
officer. Most businesses in the United States are required to take reasonable physical, technical
and organisational measures to protect the security of sensitive personal information, such
as financial or health information. An incident response plan and vendor controls are not
generally required under federal laws (other than under the GLBA and HIPAA), although
they are best practice in the United States and may be required under some state laws. Regular
employee training regarding data security is also recommended. Under the FCC’s now
judicially upheld Open Internet Order, broadband ISPs are now also likely to be expected to
have incident response plans and vendor controls for data security.
Some states have enacted laws that impose additional security or privacy requirements.
For example, Massachusetts regulations require regulated entities to have a comprehensive,
written information security programme and vendor security controls, and California
requires covered entities to have an online privacy policy with specific features, such as an
effective date. And, on 22 May 2018, Vermont enacted the first state-level measure aimed at
data brokers. The law requires data brokers to register as such with the Secretary of State, or
be subject to civil and other penalties. It also requires data brokers to disclose information
about their collection activities, adopt standard security measures, and notify authorities of
security breaches.
22 Société Nationale Industrielle Aérospatiale v. US District Court, 482 US 522, 549 (1987) (requiring a detailed
comity analysis balancing domestic and foreign sovereign interests, in particular US discovery interests and
391
© 2018 Law Business Research Ltd
United States
In a highly significant recent case, the federal court in the Southern District of New York
(Manhattan) ruled that Microsoft could be required to transfer customer communications
(the contents of emails) stored in Ireland to law enforcement in the United States.23 However,
in July 2016, the Second Circuit overturned the District Court’s decision, holding that the
government cannot force Microsoft to turn over customer emails stored outside the United
States.24 The issue in the case concerns whether a search warrant served in the United States
could authorise the extraterritorial transfer of customer communications notwithstanding
the laws of Ireland and the availability of the mutual legal assistance treaty process. The
Second Circuit held that Microsoft would not have to turn over customer emails stored in
Ireland because the warrant provision of the Stored Communications Act (SCA) does not
extend to data stored on foreign servers. The Court stated that ‘Congress did not intend
the SCA’s warrant provisions to apply extraterritorially’. Microsoft’s resistance to the US
government’s search warrant was supported by numerous other communications and tech
companies. Microsoft hailed this decision as one that ensures people’s privacy rights are
protected by the laws of their own country, as well as one that prevents foreign governments
from accessing consumer data stored within the United States. On 17 April 2018, the United
States Supreme Court vacated and remanded the case, with instructions to dismiss it as moot
in light of the 23 March 2018 enactment of the Clarifying Lawful Overseas Use of Data Act
(CLOUD Act), and subsequent warrant from the government for the information pursuant
to the new law.
In a significant January 2018 case, Leibovic v. United Shore Fin. Servs., LLC, the United
States Court of Appeals for the Sixth Circuit issued a decision that concluded a company had
implicitly waived privilege when it disclosed certain materials relating to a privileged forensic
data breach investigation in response to a discovery request.25 The Sixth Circuit’s decision
emphasises the need for caution by litigants wishing to raise a defence that relies on privileged
investigations and reports, including third-party forensic reports, or otherwise disclosing the
conclusions of such investigations and reports.
foreign blocking statutes). These issues are currently being litigated in a case involving the execution of a
criminal search warrant issued to Microsoft for data stored in its servers located in Ireland. The case is now
on appeal following the District Court decision obliging Microsoft to produce the data in question.
23 In re Warrant to Search a Certain Email Account Controlled & Maintained by Microsoft Corp, 15 F Supp 3d
466.
24 In re Warrant to Search a Certain E-mail Account Controlled & Maintained by Microsoft Corp, No. 14-02985
(2nd Cir 14 July 2016).
25 See In re United Shore Fin. Servs., LLC, No. 17-2290, 2018 WL 2283893, at *1 (6th Cir 3 January 2018).
392
© 2018 Law Business Research Ltd
United States
consumer protection regulators (usually the state attorney general) – exercise broad authority
to protect privacy. In this sense, the United States has more than 50 de facto privacy regulators
overseeing companies’ information privacy practices. Compliance with the FTC’s guidelines
and mandates on privacy issues is not necessarily coterminous with the extent of an entity’s
privacy obligations under federal law – a number of other agencies, bureaus and commissions
are endowed with substantive privacy enforcement authority.
Oversight of privacy is by no means exclusively the province of the federal government
– state attorneys general have increasingly established themselves in this space, often drawing
from authorities and mandates similar to those of the FTC. The plaintiff’s bar increasingly
exerts its influence, imposing considerable privacy discipline on the conduct of corporations
doing business with consumers.
At the federal level, Congress has passed robust laws protecting consumers’ sensitive
personal information, including health and financial information, information about children
and credit information. At the state level, nearly all 50 states have data breach notification
laws on the books,26 and many state legislatures – notably California27 – have passed privacy
laws that typically affect businesses operating throughout the United States.28
FTC
The FTC is the most influential government body that enforces privacy and data protection29
in the United States.30 It oversees essentially all business conduct in the country affecting
interstate (or international) commerce and individual consumers.31 Through exercise of
powers arising out of Section 5 of the FTCA, the FTC has taken a leading role in laying
out general privacy principles for the modern economy. Section 5 charges the FTC with
prohibiting ‘unfair or deceptive acts or practices in or affecting commerce’.32 The FTC’s
jurisdiction spans across borders – Congress has expressly confirmed the FTC’s authority to
provide redress for harm abroad caused by companies within the United States.33
Former FTC Commissioner Julie Brill noted, ‘the FTC has become the leading privacy
enforcement agency in the United States by using with remarkable ingenuity, the tools at its
26 See www.ncsl.org/research/telecommunications-and-information-technology/security-breach-
notification-laws.aspx.
27 See www.ncsl.org/research/telecommunications-and-information-technology/state-laws-related-to-
internet-privacy.aspx.
28 See, for example, www.ncsl.org/research/telecommunications-and-information-technology/security-breach-
notification-laws.aspx and www.ncsl.org/research/telecommunications-and-information-technology/
state-laws-related-to-internet-privacy.aspx.
29 This discussion refers generally to ‘privacy’ even though, typically, the subject matter of an FTC action
concerns ‘data protection’ more than privacy. This approach follows the usual vernacular in the United
States.
30 See Daniel J Solove and Woodrow Hartzog, ‘The FTC and the New Common Law of Privacy’, 114
Columbia Law Review (‘It is fair to say that today FTC privacy jurisprudence is the broadest and most
influential force on information privacy in the United States – more so than nearly any privacy statute and
any common law tort.’) available at papers.ssrn.com/sol3/papers.cfm?abstract_id=2312913.
31 See www.ftc.gov/about-ftc/what-we-do.
32 15 USC Section 45.
33 15 USC Section 45(a)(4).
393
© 2018 Law Business Research Ltd
United States
disposal to prosecute an impressive series of enforcement cases’.34 Using this authority, the
FTC has brought numerous privacy deception and unfairness cases and enforcement actions,
including over 100 spam and spyware cases and approximately 60 data security cases.35
The FTC has sought and received various forms of relief for privacy related ‘wrongs’ or
bad acts, including injunctive relief, damages and the increasingly popular practice of consent
decrees. Such decrees require companies to unequivocally submit to the ongoing oversight of
the FTC, and to implement controls, audit, and other privacy enhancing processes during a
period that can span decades. These enforcement actions have been characterised as shaping
a common law of privacy that guides companies’ privacy practices.36
‘Deception’ and ‘unfairness’ effectively cover the gamut of possible privacy-related
actions in the marketplace. Unfairness is understood to encompass unexpected information
practices, such as inadequate disclosure or actions that a consumer would find ‘surprising’
in the relevant context. The FTC has taken action against companies for deception when
false promises, such as those relating to security procedures that are purportedly in place,
have not been honoured or implemented in practice. As part of this new common law of
privacy (which has developed quite aggressively in the absence of judicial review), the FTC’s
enforcement actions include both online and offline consumer privacy practices across a
variety of industries, and often target emerging technologies such as the internet of things.
The agency’s orders generally provide for ongoing monitoring by the FTC, prohibit
further violations of the law and subject businesses to substantial financial penalties for order
violations. The orders protect all consumers dealing with a business, not just the consumers
who complained about the problem. The FTC also has jurisdiction to protect consumers
worldwide from practices taking place in the United States – Congress has expressly confirmed
the FTC’s authority to redress harm abroad caused from within the United States.37
The states
Similarly to the FTC, state attorneys general retain powers to prohibit unfair or deceptive
trade practices arising from powers granted by ‘unfair or deceptive acts and practices’ statutes.
Recent privacy events have seen increased cooperation and coordination in enforcement
among state attorneys general, whereby multiple states will jointly pursue actions against
companies that experience data breaches or other privacy allegations. Coordinated actions
among state attorneys general often exact greater penalties from companies than would
typically be obtained by a single enforcement authority. In the past two years, several state
attorneys general have formally created units charged with the oversight of privacy, in states
such as California, Connecticut and Maryland.
The mini FTCAs in 43 states and the District of Columbia include a broad prohibition
against deception that is enforceable by both consumers and a state agency. In 39 states and
the District of Columbia, these statutes include prohibitions against unfair or unconscionable
acts, enforceable by consumers and a state agency.
34 Commissioner Julie Brill, ‘Privacy, Consumer Protection, and Competition’, Loyola University Chicago
School of Law (27 April 2012), available at www.ftc.gov/speeches/brill/120427loyolasymposium.pdf.
35 See Commissioner Maureen K Ohlhausen, ‘Remarks at the Digital Advertising Alliance Summit’
(5 June 2013), available at www.ftc.gov/speeches/ohlhausen/130605daasummit.pdf.
36 See, for example, Solove and Harzog, 2014 (see footnote 29).
37 15 USC Section 45(a)(4).
394
© 2018 Law Business Research Ltd
United States
Internet of things
The FTC recently broke new ground by bringing an enforcement action in the emerging field
of the ‘internet of things’. In September 2013, the FTC announced that it settled a case with
TRENDnet, a company that markets video cameras designed to allow consumers to monitor
their homes remotely. The FTC’s complaint charged that the company falsely claimed in
numerous product descriptions that its cameras were ‘secure’; in reality, the cameras were
equipped with faulty software that permitted anyone with the cameras’ internet address to
watch or listen online. As a result, hundreds of consumers’ private camera feeds were made
public on the internet. The FTC’s order imposes numerous requirements on TRENDnet:
a a prohibition against misrepresenting the security of its cameras;
b the establishment of a comprehensive information security programme designed to
address security risks;
c submitting to third-party assessments of its security programmes every two years for the
next 20 years;
d notifying customers of security issues with the cameras and the availability of the
software update to correct them; and
e providing customers with free technical support for the next two years.38
The FTC issued a report on the internet of things, ‘Internet of Things: Privacy & Security in a
Connected World’, in 2015. Two years in the making, the report provides recommendations
to companies about protecting consumer privacy and securing customer data created by
the new world of sensors and wearables – mainly by building security into products and
services, minimising data collection, and giving consumers notice and choice about how
their data are used. The report considers new statutes to be premature, but does suggest that
the agency intends to adapt existing authorities under the FTCA, the FCRA and COPPA.
Republican Commissioner Wright dissented from the report, arguing that the FTC should
not issue recommendations and best practices without engaging in a cost–benefit analysis to
determine that such measures would, if adopted, improve consumer welfare. Commissioner
Wright also suggested that the Commission departed from standard practice by issuing policy
recommendations in a workshop report, as such reports typically serve only to ‘synthesise the
record developed during the proceedings’. Addressing attendees at the Better Business 2016
Conference in Washington, DC on 21 April 2016, Federal Trade Commissioner Maureen
Ohlhausen remarked that the Commission should examine existing privacy regulations to
determine how they apply to the potential new privacy risks created by the internet of things.
38 Press release, ‘FTC Approves Final Order Settling Charges Against TRENDnet, Inc.’ (7 February 2014),
available at www.ftc.gov/news-events/press-releases/2014/02/ftc-approves-final-order-settling-charges-
against-trendnet-inc.
395
© 2018 Law Business Research Ltd
United States
Commissioner Ohlhausen expressed excitement about the potential benefits that smart
devices can bring, but cautioned that these technologies carry with them new risks with
respect to data collection and surveillance.
In 2016, the FTC published another report, entitled ‘Big Data: A Tool for Inclusion
or Exclusion? Understanding the Issues’. The report focused on how Big Data are used after
being collected and analysed, and presented questions for businesses to consider to avoid
exclusionary or discriminatory outcomes for consumers. The report discussed innovative uses
of Big Data that are benefiting underserved populations, such as through increased educational
and healthcare opportunities, but also looked at risks that could arise from biases about
certain groups. The report discusses numerous factors for companies to consider to enhance
the relevance, quality, accuracy, objectivity and fairness of predictions and decision-making
based on Big-Data analytics and embedded algorithms.
On 8 January 2018, the FTC announced a settlement with VTech (a maker of electronic
children’s toys) for violations of COPPA, adding to the regulatory activity mounting in the
last few years around the internet of things, and more specifically, the internet of toys. The
company agreed to pay US$650,000 to settle allegations that its app and platform collected
personal information from almost 3,000,000 children without providing direct notice and
obtaining their parent or guardian’s consent. Specifically, the FTC alleged that the company
failed to provide a link to its privacy policy in each area where personal information was
collected from children. The FTC also alleged that the company failed to take reasonable
steps to secure the data it collected in violation of both COPPA and the FTC Act, and that
these poor data security practices contributed to a November 2015 data breach.
396
© 2018 Law Business Research Ltd
United States
Robocalls
The FCC remains interested in preventing robocalls. The FCC issued its biannual warning to
political campaigns about robocalls and text abuse in March 2016. The FCC’s warning said
the FCC ‘is committed to protecting consumers from harassing, intrusive, and unwanted
robocalls and texts, including to cell phones and other mobile devices’. The warning pledged
that the FCC’s Enforcement Bureau will ‘rigorously enforce’ the TCPA. On 16 March 2018,
the US Court of Appeals for the DC Circuit issued a ruling on a challenge to the FCC’s
2015 order that expanded the scope of the Telephone Consumer Protection Act (TCPA). In
ACA International v. FCC, the court invalidated a rule that had broadly defined automatic
telephone dialing systems, or ‘auto-dialers’; it also struck down the FCC’s approach to
situations where a caller obtains a party’s consent to be called but then, unbeknownst to
the caller, the consenting party’s wireless number is reassigned.40 In the same ruling, the
court upheld the FCC’s decision to allow parties who have consented to be called to revoke
their consent in ‘any reasonable way,’ as well as the FCC’s decision to limit the scope of an
exemption to the TCPA’s consent requirement for certain healthcare-related calls. Following
the ruling, the FCC issued a public notice seeking input about how it should interpret the
TCPA.
39 See, for example, press release, ‘Attorney General Announces $7 Million Multistate Settlement With
Google Over Street View Collection of WiFi Data’ (12 March 2013), available at www.ct.gov/ag/cwp/view.
asp?Q=520518.
40 ACA Int’l v. Fed. Commc’ns Comm’n, 885 F.3d 687, 692 (DC Cir 2018).
397
© 2018 Law Business Research Ltd
United States
Unsolicited faxes
The FCC imposed a US$1.84 million penalty against Scott Malcolm, DSM Supply and
Somaticare for sending 115 unsolicited fax advertisements to the fax machines of 26
consumers. The faxes were primarily sent to healthcare practitioners. The FCC issued this
forfeiture order in February 2016.
These rights protect not only the potential abuse of information, but generally govern its
collection and use.
Role of courts
Courts remain central to defining and reshaping the contours of privacy rights and remedies.
This role goes beyond the role of trial courts in adjudicating claims brought by regulators
and private parties that seek to protect and define privacy rights and remedies; interest in
these issues has been expressed at the highest levels. The Supreme Court has demonstrated
recent interest on commercial privacy matters. Although it refused to take up Spokeo, Inc v.
Robins again in 2018, in 2016, the Supreme Court held that an injury suffered under the
398
© 2018 Law Business Research Ltd
United States
FCRA must be sufficiently ‘concrete’ to find standing (discussed above). The Court held that
a bare procedural violation was insufficient for proper standing. Additionally, in a November
2013 dismissal of a petition for certiorari, Chief Justice Roberts noted in dicta what issues
the Court might consider when evaluating the fairness of class action remedies brought by
plaintiffs challenging a privacy settlement.43 Consumer protection regulators like the FTC
and state attorneys general are becoming increasingly aggressive, both in terms of the scope
of enforcement jurisdiction and the stringency of regulator expectations.
399
© 2018 Law Business Research Ltd
United States
in distinct buckets: primarily consumer or personal information on the one hand, and
critical infrastructure or sensitive corporate data on the other. Of course, the same or similar
safeguards provide protection in both contexts.
While the United States does not have an omnibus law that governs data security, an
overlapping and comprehensive set of laws enforced by federal and state agencies provides
for the security of this information. These information security safeguards for personal and
consumer information, as well as data breach notification provisions, are prescribed in the
federal GLBA (financial data), HIPAA (healthcare data) and 50 state laws, plus the laws of
numerous US territories and districts such as the District of Columbia (for broad categories
of sensitive personal information). The GLBA, HIPAA and Massachusetts state law44
provide the most detailed and rigorous information security safeguards. The emergence of
the National Institute for Standards and Technology (NIST) cybersecurity framework, as
detailed below, is likely to emerge as the predominant framework under which companies
undertake to ensure information security.
Fifty states and various US jurisdictions have enacted data breach notification laws,
which have varying notification thresholds and requirements. These laws generally require
that individuals be notified, usually by mail (although alternate notice provisions exist), of
incidents in which their personal information has been compromised. These laws usually
include a notification trigger involving the compromise of the name of an individual and a
second, sensitive data element such as date of birth or credit card account number.
The GLBA Safeguards Rule requires financial institutions to protect the security and
confidentiality of their customers’ personal information, such as names, addresses, phone
numbers, bank and credit card account numbers, income and credit histories, and social
security numbers. The Safeguards Rule requires companies to develop a written information
security plan that is appropriate to the company’s size and complexity, the nature and scope
of its activities, and the sensitivity of the customer information it handles. As part of its plan,
each company must:
a designate an employee to coordinate its information security programme;
b conduct a risk assessment for risks to customer information in each relevant area of
the company’s operation and evaluate the effectiveness of the current safeguards for
controlling these risks;
c design and implement a safeguards programme, and regularly monitor and test it;
d select service providers that can maintain appropriate safeguards, contractually require
them to maintain such safeguards and oversee their handling of customer information;
and
e evaluate and adjust the programme in light of relevant circumstances, including changes
in the firm’s business or operations, or the results of security testing and monitoring.45
The SEC has broad investigative and enforcement powers over public companies that have
issued securities that are subject to the Securities Acts, and enforce this authority through the
use of a number of statutes, including Sarbanes-Oxley. The SEC has investigated companies
that are public issuers that have suffered cybersecurity incidents, including Target, and has
44 See Standards for the Protection of Personal Information of Residents of the Commonwealth (of
Massachusetts), 201 CMR 17.00, available at www.mass.gov/ocabr/docs/idtheft/201cmr1700reg.pdf.
45 www.business.ftc.gov/documents/bus54-financial-institutions-and-customer-information-complying-
safeguards-rule.
400
© 2018 Law Business Research Ltd
United States
considered theories, including that material risks were not appropriately disclosed and reported
pursuant to the agency’s guidance on how and when to disclose material cybersecurity risk;
and that internal controls for financial reporting relating to information security did not
adequately capture and reflect the potential risk posed to the accuracy of financial results. The
SEC also enforces Regulation S-P, which implements the privacy and security provisions of
the GLBA for entities subject to its direct regulatory jurisdiction (such as broker-dealers and
investment advisers). In 2015, the SEC and its ‘self-regulatory’ counterpart, the Financial
Industry Regulatory Authority, issued guidance and ‘sweep’ reports regarding the state of data
security among broker-dealers and investment advisers.
On 21 February 2018, the SEC published new interpretive guidance to assist publicly
traded companies in disclosing their material cybersecurity risks and incidents to investors.
The SEC suggested that all public companies adopt cyber disclosure controls and procedures
that enable companies to:
a identify cybersecurity risks and incidents;
b assess and analyse their impact on a company’s business;
c evaluate the significance associated with such risks and incidents;
d provide for open communications between technical experts and disclosure advisers;
e make timely disclosures regarding such risks and incidents; and,
f adopt internal policies to prevent insider trading while the company is investigating a
suspected data breach.
The Department of Health and Human Services administers the HIPAA Breach Notification
Rule, which imposes significant reporting requirements and provides for civil and criminal
penalties for the compromise of PHI maintained by entities covered by the statute (covered
entities) and their business associates. The HIPAA Security Rule also requires covered entities
to maintain appropriate administrative, physical and technical safeguards to ensure the
confidentiality, integrity and security of electronic PHI.
In April 2015, the Department of Justice issued its own guide, Best Practices for
Victim Response and Reporting of Cyber Incidents.46 The Department noted concerns about
working with law enforcement after suffering a data breach: ‘Historically, some companies
have been reticent to contact law enforcement following a cyber incident fearing that a
criminal investigation may result in disruption of its business or reputational harm. However,
a company harbouring such concerns should not hesitate to contact law enforcement.’
Several states also require companies operating within that state to adhere to information
security standards. The most detailed and strict of these laws is the Massachusetts Data
Security Regulation, which requires that companies maintain a written information security
policy (commonly known as a WISP) that covers technical, administrative and physical
controls for the collection of personal information.
In February 2013, President Obama issued Executive Order 13,636, ‘Improving Critical
Infrastructure Cybersecurity’. This Executive Order directs the Department of Homeland
Security to address cybersecurity and minimise risk in the 16 critical infrastructure sectors
identified pursuant to Presidential Policy Directive 21.47 The Order directed the NIST to
develop a cybersecurity framework, the first draft of which was released in February 2014.
46 Available at www.justice.gov/sites/default/files/criminal-ccips/legacy/2015/04/30/04272015reporting-
cyber-incidents-final.pdf.
47 Available at www.dhs.gov/critical-infrastructure-sectors.
401
© 2018 Law Business Research Ltd
United States
402
© 2018 Law Business Research Ltd
United States
on 11 August 2016 that it is nearly certain that the hacking of the Democratic Party in late
July was the work of the Russian government. The federal investigation of the hack revealed
that, in addition to the DNC and to the Democratic Congressional Campaign Committee,
other party-affiliated groups were targeted in the hack, which probably included the breach
of personal email accounts of the groups and group leaders. On 20 March 2017, after the
2016 election and inauguration of President Donald Trump, the FBI confirmed that it was
investigating the Russian government’s interference in the 2016 election. In September 2017,
the consumer reporting agency Equifax announced that the sensitive financial information
of 143 million Americans had been exposed to hackers that exploited an unpatched website
vulnerability. Given the pivotal role of credit bureaux such as Equifax, the ramifications of
this breach may impact decision-making in the consumer financial sector.
In 2018, Yahoo! settled cybersecurity allegations brought by the SEC (for US$35
million) and by shareholders for (US$80 million).
X OUTLOOK
With regard to privacy regulation of internet, telecom and tech companies, it is still not
certain in which direction new regulators appointed by the Trump administration will head.
Privacy has not been an especially partisan issue in the United States to date.
Under new FTC Chairman Joseph Simons, the agency ‘will hold a series of public
hearings during the fall and winter 2018 examining whether broad-based changes in the
economy, evolving business practices, new technologies, or international developments might
require adjustments to competition and consumer protection law, enforcement priorities,
and policy.’ These hearings will include coverage of privacy and cybersecurity enforcement.
Public comments have been solicited on the FTC’s authority to deter unfair and deceptive
conduct in privacy and data security matters, including the identification of any additional
tools or authorities necessary to adequately deter unfair and deceptive conduct related to
privacy and data security.
There are also indications that the White House is considering the development of
a new privacy framework that may be published by a component of the Department of
Commerce in the fall of 2018.
403
© 2018 Law Business Research Ltd
Appendix 1
DIEGO ACOSTA-CHIN
Santamarina y Steta, SC
Mr Acosta-Chin obtained his law degree from the Monterrey Institute of Technology and
Higher Education in 2008. He is fluent in Spanish and English.
Mr Acosta-Chin joined Santamarina y Steta, SC in 2009, and since then his professional
practice has been focused on corporate matters, including mergers and acquisitions, data
privacy matters, the prevention of money laundering, e-commerce and foreign investment.
Mr Acosta-Chin’s practice focuses on data privacy matters, and he advises clients on
analyses of the implications of, and actions necessary for compliance with, data privacy
legislation, including the drafting and filing of writs with respect to official communications
issued by the National Institute of Transparency, Access to Information and Protection of
Personal Data regarding its surveillance and enforcement divisions, mapping of the processing
of personal data throughout different departments or business units of an organisation,
drafting the required documents to comply with the law, coordinating efforts to be in
compliance with the law, advising on breaches of personal data confidentiality obligations
and implementing cross-border contingency plans to mitigate and prevent security breaches,
among other matters.
MERCEDES DE ARTAZA
M&M Bomchil
Mercedes de Artaza is a senior lawyer in the competition and antitrust, foreign trade, and
mergers and acquisitions departments. She joined the firm in 2011.
405
© 2018 Law Business Research Ltd
About the Authors
She graduated as a lawyer from the Catholic University and completed her masters’
degree in corporate law at the Austral University. She is also a professor of company law in
the University of Buenos Aires since 2007.
Her practice focuses on providing advice on anticompetitive and anti-dumping
investigations, foreign trade and import-export regimes, the defence of merger, acquisition
and joint venture operations before the competition authorities, compliance, data protection,
anticorruption laws, and advice on corporate and contractual matters. She has represented
important local and foreign companies in matters relating to her area of expertise.
She is the author of several publications on issues linked to her areas of specialisation
and a speaker at conferences in Argentina and abroad.
Her professional performance has been recognised by various specialised publications,
including Chambers Latin America and Best Lawyers.
406
© 2018 Law Business Research Ltd
About the Authors
She contributes to the firm’s data protection newsletter and legal magazine (Actualidad
Jurídica Uría Menéndez) on aspects of and updates relating to data protection regulatory
issues and case law.
FRANCESCA BLYTHE
Sidley Austin LLP
Francesca Blythe is an associate in the London office at Sidley Austin LLP, whose main practice
areas are data protection, privacy, cybersecurity, e-commerce and information technology.
ANNE-MARIE BOHAN
Matheson
Anne-Marie Bohan is a partner in both the asset management and investment funds group
and the FinTech group at Matheson, and is head of the outsourcing group. She advises on all
aspects of outsourcing, information technology law and e-commerce law, with specific focus
on the requirements of financial institutions and financial services providers in these areas.
Anne-Marie has extensive experience in drafting and negotiating contracts for the
development, sale, purchase and licensing of hardware, software and IT systems for both
suppliers and users of IT within the financial services industry and across a broad range
of other industries. She has also acted in some of the largest value and most complex IT
and telecommunications systems and services outsourcing contracts, including advising on
the largest and highest value financial services outsourcing to date, in Ireland. Anne-Marie’s
practice also includes advising a broad range of clients on data protection and privacy issues,
including employee data protection issues.
Anne-Marie has written numerous articles on electronic commerce, internet, security
issues, data protection and copyright law, and contributed the Ireland chapter to Outsourcing
Contracts – a Practical Guide in 2009. She has also spoken at conferences on IT and electronic
commerce issues, including electronic signatures, internet security, e-commerce and data
protection. She also contributed the Irish chapter to Getting the Deal Through: e-Commerce
in both 2002 and 2003, and has lectured as part of the Law Society of Ireland, diploma in
electronic commerce. Anne-Marie was a member of the Matheson team that advised the
Department of Public Enterprise on the drafting of the Electronic Commerce Act 2000.
SHAUN BROWN
nNovation LLP
Shaun Brown is a partner with nNovation LLP, an Ottawa-based law firm that specialises in
regulatory matters. With several years of experience both in the public and private sectors,
Shaun’s practice focuses on e-commerce, e-marketing, privacy, access to information and
information security. Shaun assists clients by developing practical and effective risk-mitigation
strategies, and by representing clients before tribunals and in litigation-related matters.
Shaun has a deep understanding of the online marketing industry from both a technical
and legal perspective. He speaks and writes regularly on privacy, marketing and information
management issues, is a co-author of The Law of Privacy in Canada, and teaches the same
subject in the faculty of law at the University of Ottawa.
407
© 2018 Law Business Research Ltd
About the Authors
ELLYCE R COOPER
Sidley Austin LLP
Ellyce Cooper is a partner in the firm’s Century City office and a member of the complex
commercial litigation and privacy and cybersecurity practices. Ellyce has extensive experience
in handling government enforcement matters and internal investigations as well as complex
civil litigation. She assists companies facing significant investigations and assesses issues to
determine a strategy going forward. Ellyce’s diverse experience includes representing clients
in internal investigations and government investigations along with responding to and
coordinating crisis situations. Her client list includes notable companies from the healthcare,
pharmaceutical, accounting, financial, defence and automotive industries. Ellyce earned her
JD from the University of California, Los Angeles School of Law and her BA, magna cum
laude, from the University of California Berkeley.
CÉSAR G CRUZ-AYALA
Santamarina y Steta, SC
Mr Cruz-Ayala obtained his law degree from the Facultad Libre de Derecho de Monterrey
in May 1994, which was followed by a master’s in comparative jurisprudence at New York
University School of Law in May 1998. He is fluent in Spanish and English.
Mr Cruz-Ayala joined Santamarina y Steta, SC in 1993 and became a partner in 2006.
During that time, his professional practice has been focused on mergers and acquisitions,
data privacy matters, prevention of money laundering, and e-commerce, real estate and
transnational business projects.
Mr Cruz-Ayala’s practice focuses on data privacy matters and he has a broad knowledge
of data privacy legislation and its implications. He advises clients on assessing and complying
with Mexican data privacy laws, including mapping of the processing of personal data
throughout different departments or business units of an organisation, drafting the
documents required to comply with the law, coordinating efforts to be in compliance with
the law, advising on breaches of personal data confidentiality obligations and implementing
cross-border contingency plans to mitigate and prevent security breaches, among other
matters. Mr Cruz-Ayala is very active in the industry and regularly organises and participates
in seminars, webinars and conferences in this area.
SANUJ DAS
Subramaniam & Associates
Sanuj specialises in litigation, both IP and non-IP, and is a member of the Subramaniam &
Associates litigation team. He also handles patent revocation proceedings before the appellate
board, along with patent, trademark and design opposition proceedings. He has worked with
a diverse array of clients, including professionals and scientists from the telecommunication,
pharmaceutical, FMCG and apparels sectors. In addition to a bachelor’s degree in law, Sanuj
holds a bachelor’s and a master’s degree in pharmacy, with a specialisation in pharmaceuticals.
408
© 2018 Law Business Research Ltd
About the Authors
TAMÁS GÖDÖLLE
Bogsch & Partners Law Firm
Tamás Gödölle graduated from the law faculty of Eötvös Loránd University in Budapest.
He studied commercial and international private law for one year at the Ludwig Maximilian
409
© 2018 Law Business Research Ltd
About the Authors
University of Munich in Germany and continued with postgraduate legal studies at Queen
Mary and Westfield College, University of London (1990–1991). As a corporate, commercial
and intellectual property lawyer, he has been practising in Hungary, advising and representing
national and multinational clients, for over 24 years. Dr Gödölle has been a partner at
Bogsch & Partners since 1996, where he specialises in trademark, copyright, antitrust, unfair
competition and advertising matters, as well as franchise, distributor and licence contracts.
He also has extensive experience in information technology, privacy, data protection and life
science and media law issues. He is a member of the Budapest Bar, the Hungarian Association
for the Protection of Industrial Property and Copyright (MIE), both the Hungarian and the
International League of Competition Law (LIDC), ECTA, INTA, AIPPI, ITechLaw and
GRUR. As well as speaking Hungarian, he is fluent in English and German.
TOMOKI ISHIARA
Sidley Austin Nishikawa Foreign Law Joint Enterprise
Mr Ishiara’s practice areas include intellectual property law, antitrust law, data security and
privacy law, entertainment law, investigation, litigation and arbitration. Mr. Ishiara has
extensive experience in the field of intellectual property law, including giving advice to clients
on patent, utility model, design patent, copyright, and trademark matters (including advice
on employee invention rules), engaging in litigations and arbitrations. Also, Mr. Ishiara
regularly advises foreign clients on compliance matters (e.g., data privacy, FCPA) and engages
in subsequent investigations on such violations.
SHANTHI KANDIAH
SK Chambers
Shanthi Kandiah founded SK Chambers with the goal of creating a stand-alone regulatory
firm that services individuals and entities involved at all levels of the regulatory scheme. Today,
SK Chambers does just that – it is focused on delivering legal services in competition law, the
full spectrum of multimedia laws, privacy and data protection matters, and anti-bribery and
corruption laws, as well as capital market laws and exchange rules.
Shanthi Kandiah regularly advises many corporations in sectors such as media and
telecommunications, FMCG, construction and credit reporting on privacy and data
protection matters, including the following: compliance strategies that prevent and limit
risk; managing risks through contracts with customers and suppliers; data protection and
cyberrisk due diligence in relation to acquisitions, dispositions and third-party agreements;
crisis management when a data breach occurs; investigations management – when faced with
regulatory action for data security breaches; and data transfers abroad – advising on risks and
issues.
She holds an LLM and a postgraduate diploma in economics for competition law, both
from King’s College London.
MAJA KARCZEWSKA
Kobylańska & Lewoszewski Kancelaria Prawna Sp J
Maja Karczewska is a lawyer working for Kobylanska & Lewoszewski law firm. Her main fields
of interest include media and advertising law, as well as intellectual property law (especially
copyright). She also provides legal assistance in the field of personal data protection. Maja
410
© 2018 Law Business Research Ltd
About the Authors
Karczewska regularly publishes articles on personal data protection and intellectual property
issues. On day-to-day basis she supports clients from media and new technologies sectors.
VYACHESLAV KHAYRYUZOV
Noerr
Vyacheslav Khayryuzov heads digital business and data privacy and co-heads the IP practice
groups in the Moscow office of Noerr. He advises clients that predominantly operate in the
technology, retail, media sectors. His extensive experience includes international copyright
and software law, data privacy protection, as well as commercial and media law issues in
Russia. In addition, he advises clients on general IP matters. He represents both national and
international clients, ranging from start-ups to large national and international corporations.
Vyacheslav joined Noerr in 2007, having previously worked as a senior counsel at
Rambler, a major Russian internet company, where he worked on a number of international
projects.
He is currently a local representative for Russia in the International Technology Law
Association (ITechLaw) and a member of Digitalisation committee of the German–Russian
Chamber of Commerce.
Vyacheslav has been recommended for Intellectual Property and TMT by The Legal
500 EMEA, Chambers Europe, Best Lawyers, Who’s Who Legal and others.
BATU KINIKOĞLU
BTS&Partners
Batu Kınıkoğlu (LLM) is the head of the data protection practice at BTS & Partners. Batu
graduated from Istanbul University, Faculty of Law and achieved his masters degree from
the University of Edinburgh. He has a broad range of experience on data protection and
telecommunications law and is valued by clients for his technical knowledge and dedication.
He advises clients on a wide range of issues, including data protection, information privacy,
cybersecurity, e-commerce and telecommunications law. His expertise also includes copyright
and open source software licensing. He also advises clients on public procurement projects
relating to information and communication technologies and has articles published in
international academic journals on subjects ranging from copyright to internet regulation.
ANNA KOBYLAŃSKA
Kobylańska & Lewoszewski Kancelaria Prawna Sp J
Anna Kobylańska, an advocate with 15 years of experience, was in charge of data protection,
new technologies and intellectual property in a global advisory company before joining
Kobylańska & Lewoszewski as a founding partner. Anna specialises in providing advice
on the protection of personal data to clients from the pharmaceuticals, financial services,
media and automotive sectors. She regularly oversees projects focused on the analysis and
implementation of the provisions of the GDPR. Anna co-authored the book Protecting
Personal Data in the Practice of Entrepreneurs. She is also a lecturer at the H Grocjusz Centre
for Intellectual Property Law, in the field of personal data protection. She was a member of
the INTA Committee for the Protection of Personal Data (an international association of
trademark law specialists). For the past six years, Anna has been recognised by Chambers
Europe as one of leading lawyers in Poland in the TMT/data protection category. In 2017, her
411
© 2018 Law Business Research Ltd
About the Authors
practice was recognised by Polish legal ranking company Polityka Insight as one of Poland’s
foremost teams in the field of personal data.
MARCIN LEWOSZEWSKI
Kobylańska & Lewoszewski Kancelaria Prawna Sp J
Marcin Lewoszewski is a legal counsel, member of the Warsaw Bar Associations. Before
establishing his own law firm, he worked for more than seven years in the TMT team with
one of the leading international law firms based in Warsaw. Before that, for two years, he
worked at the Inspector’s General Office for Personal Data Protection (GIODO). He is
co-chair of the IAPP KnowledgeNET for Poland.
Marcin specialises in legal advice on personal data protection and the law of new
technologies, including the provision of electronic services, database protection, gambling,
IT systems implementation and telecommunications law. He advised clients in locating data
processing centres in Poland and participated in creating one of the largest online B2B trading
platforms in Poland. He has many years of experience in leading projects aimed at adapting
business practices to the requirements of the data protection law. On numerous occasions,
he represented clients in proceedings conducted by the Inspector General for Personal
Data Protection, including for the acceptance of binding corporate rules by the supervisory
authority, and in connection with GIODO (the DPA) inspections. His experience includes
negotiating database licence agreements, as well as advising clients on the legal aspects of
obtaining data from publicly available records. His professional interests focus on selected
sectors of the economy, primarily pharmaceuticals, e-commerce, new technologies, and
media.
WILLIAM RM LONG
Sidley Austin LLP
William Long is a global co-leader of Sidley’s highly ranked privacy and cybersecurity practice
and also leads the EU data protection practice at Sidley. William advises international clients
on a wide variety of GDPR, data protection, privacy, information security, social media,
e-commerce and other regulatory matters.
William has been a member of the European Advisory Board of the International
Association of Privacy Professionals (IAPP) and on the DataGuidance panel of data
412
© 2018 Law Business Research Ltd
About the Authors
protection lawyers. He is also on the editorial board of e-Health Law & Policy and also assists
with dplegal (‘data privacy’ legal), a networking group of in-house lawyers in life sciences
companies examining international data protection issues.
William was previously in-house counsel to one of the world’s largest international
financial services groups. He has been a member of a number of working groups in London
and Europe looking at the EU regulation of e-commerce and data protection.
He holds a JD from Columbia Law School and a BA from the University of California,
Berkeley.
LETICIA LÓPEZ-LAPUENTE
Uría Menéndez Abogados, SLP
Leticia López-Lapuente is a lawyer in the Madrid office of Spanish law firm Uría Menéndez.
She heads the firm’s data protection and IT practice, and leads the LATAM data protection
group.
Leticia focuses her practice on data protection, commercial and corporate law, especially
in the internet, software, e-commerce and technology sectors. She also advises on privacy law
issues. Leticia provides clients operating in these sectors with day-to-day advice on regulatory,
corporate and commercial matters, including the drafting and negotiation of contracts,
M&A, privacy advice, consumer protection and e-commerce issues, corporate housekeeping,
public procurement and RFP procedures, and dealings with public authorities. She has been
involved in major transactions and assisted businesses and investors in these sectors.
She regularly speaks in national and international fora regarding personal data protection
and technology, in addition to having written numerous articles on data protection-related
matters.
ANETA MIŚKOWIEC
Kobylańska & Lewoszewski Kancelaria Prawna Sp J
Aneta Miśkowiec is a lawyer, University of Warsaw law graduate. Before joining Kobylańska &
Lewoszewski, Aneta worked in an international law firm, dealing with issues of various areas
of law. Aneta supports the team in the practice of personal data protection and intellectual
property law as part of the implementation of the obligations resulting from the General
Data Protection Regulation. Aneta defended her master’s thesis on personal data protection
under the title ‘Privacy Impact Assessment’ and took second place in the seventh edition of
the essay competition for students, organised by the Polish data protection authority.
VIVEK K MOHAN
Sidley Austin LLP
Vivek K Mohan is senior privacy and cybersecurity counsel at Apple Inc, where he is responsible
for privacy and security issues associated with Apple’s products, services and corporate
infrastructure. He joined Apple from the privacy, data security and information law group
at Sidley Austin LLP, where he counselled clients in the technology, telecommunications,
healthcare and financial services sectors. Mr Mohan is the co-editor and author of the
PLI treatise ‘Cybersecurity: A Practical Guide to the Law of Cyber Risk’, published in
September 2015. He has worked as an attorney at Microsoft, at the Internet Bureau of the
New York State Attorney General (under a special appointment) and at General Electric’s
413
© 2018 Law Business Research Ltd
About the Authors
corporate headquarters (on secondment). For five years, Mr Mohan was a resident fellow and
later a non-resident associate with the Cybersecurity Project at the Harvard Kennedy School.
MICHAEL MORRIS
Allens
Michael is an expert telecommunications, technology, intellectual property and data
protection lawyer, and is well known for staying on the cutting edge of legal developments in
these areas for corporate and government clients in Australia. He is particularly experienced
in large projects and transactions involving the procurement and delivery of ICT, business
process outsourcing and ICT systems separations and business transformations. He is part
of Allens’ leading practice advising on management of the full data life cycle, particularly the
use, exchange, monetisation and protection of data, and he regularly advises clients across all
industry sectors and the government on data security, privacy and associated issues.
HUGH REEVES
Walder Wyss Ltd
Hugh Reeves is an associate in the information technology, intellectual property and
competition team of the Swiss law firm Walder Wyss Ltd. His preferred areas of practice
include technology transfers, data protection and privacy law, as well as information
technology and telecommunications law. He is also active in the areas of copyright, patent,
trademark and trade secret law.
Hugh Reeves was educated at the University of Lausanne (BLaw, 2008; MLaw, 2010)
and the University of California at Berkeley (LLM, 2016).
414
© 2018 Law Business Research Ltd
About the Authors
GÉRALDINE SCALI
Sidley Austin LLP
Géraldine Scali is a counsel in the London office of Sidley Austin LLP, whose main practice
areas are data protection, privacy, cybersecurity, e-commerce and information technology.
JÜRG SCHNEIDER
Walder Wyss Ltd
Jürg Schneider is a partner with the Swiss law firm Walder Wyss Ltd. Jürg Schneider’s
practice areas include information technology, data protection and outsourcing. He regularly
advises both Swiss and international firms on comprehensive licensing, development, system
integration and global outsourcing projects. He has deep and extensive experience in the
fields of data protection, information security and e-commerce, with a particular focus on
transborder and international contexts. Jürg Schneider is a member of the board of directors
of the International Technology Law Association and immediate past co-chair of its data
protection committee. In addition, Jürg Schneider regularly publishes and lectures on ICT
topics in Switzerland and abroad.
Jürg Schneider was educated at the University of Neuchâtel (lic iur 1992, Dr iur 1999).
He has previously worked as a research assistant at the University of Neuchâtel, as a trainee at
the legal department of the canton of Neuchâtel and in a Neuchâtel law firm.
Jürg Schneider speaks German, French and English. He is registered with the Zurich
Bar Registry and admitted to practise in all of Switzerland.
STEVEN DE SCHRIJVER
Astrea
Steven De Schrijver is a partner in the Brussels office of Astrea. He has more than 25 years of
experience advising some of the largest Belgian and foreign technology companies, as well as
innovative entrepreneurs on complex commercial agreements and projects dealing with new
technologies. His expertise includes e-commerce, software licensing, website development
and hosting, privacy law, IT security, technology transfers, digital signatures, IT outsourcing,
cloud computing, advertising, drones, robotics and social networking.
Steven has also been involved in several national and cross-border transactions in the IT,
media and telecom sectors. He participated in the establishment of the first mobile telephone
network in Belgium, the establishment of one of the first e-commerce platforms in Belgium,
the acquisition of the Flemish broadband cable operator and network, and the acquisition
and sale of several Belgian software and technology companies. He has also been involved in
numerous outsourcing projects and data protection (now GDPR) compliance projects.
Steven is the Belgian member of EuroITCounsel, a quality circle of independent
IT lawyers. He is also a board member of ITechLaw and the International Federation of
Computer Law Associations. In 2012, 2014, 2017 and 2018 he was awarded the Global
Information Technology Lawyer of the Year award by Who’s Who Legal and, in 2012, he
received the ILO Client Choice Award in the corporate law category for Belgium.
Steven has been admitted to the Brussels Bar. He holds a law degree from the University
of Antwerp (1992) and an LLM degree from the University of Virginia School of Law (1993).
He obtained his CIPP/E certification in 2018.
415
© 2018 Law Business Research Ltd
About the Authors
OLGA STEPANOVA
Winheller Rechtsanwaltsgesellschaft mbH
Olga Stepanova heads the IP/IT department at Winheller Attorneys at Law & Tax Advisors,
where she advises German and international companies and non-profit organisations on
issues of data protection, IT law and intellectual property. She also provides legal counsel
in German and international copyright, trademark and media law matters. As member of
Winheller’s Russian desk, she advises her Russian clients in their mother tongue.
MONIQUE STURNY
Walder Wyss Ltd
Monique Sturny is a managing associate in the information technology, intellectual property
and competition team of the Swiss law firm Walder Wyss Ltd. She advises international and
domestic companies on data protection law, competition law, distribution law, contract law
and information technology law matters, as well as with respect to the setting up of compliance
programmes. She represents clients in both antitrust and data protection proceedings in court
and before administrative bodies. She regularly publishes and speaks at conferences in her
areas of practice.
Monique Sturny was educated at the University of Fribourg (lic iur, 2002), the London
School of Economics and Political Science (LLM in international business law, 2007) and the
University of Berne (Dr iur, 2013).
ADITI SUBRAMANIAM
Subramaniam & Associates
Aditi Subramaniam has a bachelor’s degree in English literature from the University of Delhi
and a bachelor’s degree in law from the University of Oxford. She also holds a master’s degree
in Law (LLM), from Columbia University, New York, United States. She specialises in patent
and trade mark prosecution and contentious matters, including oppositions and appeals
before the Intellectual Property Office and the Appellate Board, as well as litigation before
the District and High Courts. She also advises clients on data protection, pharmaceutical
advertising and cybersecurity. She is widely published and very well regarded in the Indian
and international legal fraternity.
416
© 2018 Law Business Research Ltd
About the Authors
a ‘leading lawyer’ and has also been listed by Who’s Who Legal as a ‘leading business lawyer’ in
‘life sciences,’ ‘business crime defense’ and ‘investigations.’ In the 2018 edition of Chambers
Asia-Pacific, Yuet is described as ‘exceptionally bright’ and ‘very responsive and knowledgeable
and can immediately dive into the issues’. The 2015 edition of Chambers Global stated ‘Ms
Tham is described by clients as “a marvellous and gifted attorney”’. Meanwhile, Chambers
Asia-Pacific noted that Yuet ‘is frequently sought after by international corporations, who
respect her experience and expertise in risk management’.
FRANCISCO ZAPPA
M&M Bomchil
Francisco Zappa is a semi-senior lawyer in the mergers and acquisitions and entertainment
law departments. He joined M&M Bomchil in 2011.
He graduated with honours from the University of Salvador, Buenos Aires and
completed his masters’ degree in corporate law at the University of San Andrés, Buenos Aires.
His practice focuses on diverse corporate and contractual matters. He has wide experience in
fair trade and consumer protection issues and specialises in data protection law.
During 2017, he was an international associate at the New York offices of Simpson
Thacher & Bartlett.
He is a frequent speaker at chambers of commerce on matters in his areas of expertise.
SELEN ZENGIN
BTS&Partners
Selen Zengin graduated from Istanbul Bilgi University, faculty of law in 2016 and was admitted
to the Istanbul Bar Association in 2018. She particularly specialises in data protection and
electronic communications as well as cybersecurity, digital advertising and legal technology
sectors. Selen provides consultancy to local and international clients during the processes
of negotiating, reviewing and drafting of legal instruments and prepares regulatory and
technical compliance reports.
417
© 2018 Law Business Research Ltd
Appendix 2
ALLENS BTS&PARTNERS
Level 26 Esentepe Mah
480 Queen Street 23 Temmuz Sok. No:2 34394
Brisbane Queensland 4000 Şişli
Australia Istanbul
Tel: +61 7 3334 3000 Turkey
Fax: +61 7 3334 3444 Tel: +90 212 292 7934 /
[email protected] +90 212 245 0801
www.allens.com.au Fax: +90 212 292 7939 /
+90 212 251 6719
[email protected]
ASTREA [email protected]
Louizalaan 235 [email protected],
1050 Brussels [email protected]
Belgium www.bts-legal.com
Posthofbrug 6
2600 Berchem JUN HE LLP
Antwerp 20/F, China Resources Building
Belgium 8 Jianguomenbei Avenue
Beijing 100005
Tel: +32 2 215 97 58 China
Fax: +32 2 216 50 91 Tel: +86 10 8519 1718
[email protected] Fax:+86 10 8519 1350
www.astrealaw.be [email protected]
www.junhe.com
419
© 2018 Law Business Research Ltd
Contributing Law Firms’ Contact Details
420
© 2018 Law Business Research Ltd
Contributing Law Firms’ Contact Details
Woolgate Exchange
SK CHAMBERS
25 Basinghall Street
EC2V 5HA 9B Jalan Setiapuspa
London Bukit Damansara
United Kingdom 50490 Kuala Lumpur
Tel: +44 20 7360 3600 Malaysia
Fax: +44 20 7626 7937 Tel: +60 3 2011 6800
[email protected] Fax: +60 3 2011 6801
[email protected] [email protected]
[email protected] www.skchambers.co
421
© 2018 Law Business Research Ltd
Contributing Law Firms’ Contact Details
422
© 2018 Law Business Research Ltd
lawreviews
For more information, please contact [email protected]